diff --git a/README.md b/README.md index 7e017707..3a8ae967 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ -# CDKTF Go bindings for hashicorp/hcp provider version 0.97.0 +# CDKTF Go bindings for hashicorp/hcp provider version 0.98.1 -This repo builds and publishes the [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs) bindings for [CDK for Terraform](https://cdk.tf). +This repo builds and publishes the [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs) bindings for [CDK for Terraform](https://cdk.tf). ## Go Package @@ -23,7 +23,7 @@ This project is explicitly not tracking the Terraform hcp provider version 1:1. These are the upstream dependencies: * [CDK for Terraform](https://cdk.tf) -* [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0) +* [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1) * [Terraform Engine](https://terraform.io) If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped. diff --git a/hcp/README.md b/hcp/README.md index 7e017707..3a8ae967 100644 --- a/hcp/README.md +++ b/hcp/README.md @@ -1,6 +1,6 @@ -# CDKTF Go bindings for hashicorp/hcp provider version 0.97.0 +# CDKTF Go bindings for hashicorp/hcp provider version 0.98.1 -This repo builds and publishes the [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs) bindings for [CDK for Terraform](https://cdk.tf). +This repo builds and publishes the [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs) bindings for [CDK for Terraform](https://cdk.tf). ## Go Package @@ -23,7 +23,7 @@ This project is explicitly not tracking the Terraform hcp provider version 1:1. These are the upstream dependencies: * [CDK for Terraform](https://cdk.tf) -* [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0) +* [Terraform hcp provider](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1) * [Terraform Engine](https://terraform.io) If there are breaking changes (backward incompatible) in any of the above, the major version of this project will be bumped. diff --git a/hcp/awsnetworkpeering/AwsNetworkPeering.go b/hcp/awsnetworkpeering/AwsNetworkPeering.go index 5827a8c4..a3fbf4db 100644 --- a/hcp/awsnetworkpeering/AwsNetworkPeering.go +++ b/hcp/awsnetworkpeering/AwsNetworkPeering.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering hcp_aws_network_peering}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering hcp_aws_network_peering}. type AwsNetworkPeering interface { cdktf.TerraformResource // Experimental. @@ -539,7 +539,7 @@ func (j *jsiiProxy_AwsNetworkPeering) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering hcp_aws_network_peering} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering hcp_aws_network_peering} Resource. func NewAwsNetworkPeering(scope constructs.Construct, id *string, config *AwsNetworkPeeringConfig) AwsNetworkPeering { _init_.Initialize() @@ -557,7 +557,7 @@ func NewAwsNetworkPeering(scope constructs.Construct, id *string, config *AwsNet return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering hcp_aws_network_peering} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering hcp_aws_network_peering} Resource. func NewAwsNetworkPeering_Override(a AwsNetworkPeering, scope constructs.Construct, id *string, config *AwsNetworkPeeringConfig) { _init_.Initialize() diff --git a/hcp/awsnetworkpeering/AwsNetworkPeeringConfig.go b/hcp/awsnetworkpeering/AwsNetworkPeeringConfig.go index 8f8d12b4..d249a692 100644 --- a/hcp/awsnetworkpeering/AwsNetworkPeeringConfig.go +++ b/hcp/awsnetworkpeering/AwsNetworkPeeringConfig.go @@ -24,25 +24,25 @@ type AwsNetworkPeeringConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#hvn_id AwsNetworkPeering#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#hvn_id AwsNetworkPeering#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` // The account ID of the peer VPC in AWS. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#peer_account_id AwsNetworkPeering#peer_account_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#peer_account_id AwsNetworkPeering#peer_account_id} PeerAccountId *string `field:"required" json:"peerAccountId" yaml:"peerAccountId"` // The ID of the network peering. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#peering_id AwsNetworkPeering#peering_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#peering_id AwsNetworkPeering#peering_id} PeeringId *string `field:"required" json:"peeringId" yaml:"peeringId"` // The ID of the peer VPC in AWS. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#peer_vpc_id AwsNetworkPeering#peer_vpc_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#peer_vpc_id AwsNetworkPeering#peer_vpc_id} PeerVpcId *string `field:"required" json:"peerVpcId" yaml:"peerVpcId"` // The region of the peer VPC in AWS. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#peer_vpc_region AwsNetworkPeering#peer_vpc_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#peer_vpc_region AwsNetworkPeering#peer_vpc_region} PeerVpcRegion *string `field:"required" json:"peerVpcRegion" yaml:"peerVpcRegion"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#id AwsNetworkPeering#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#id AwsNetworkPeering#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -53,11 +53,11 @@ type AwsNetworkPeeringConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#project_id AwsNetworkPeering#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#project_id AwsNetworkPeering#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#timeouts AwsNetworkPeering#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#timeouts AwsNetworkPeering#timeouts} Timeouts *AwsNetworkPeeringTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/awsnetworkpeering/AwsNetworkPeeringTimeouts.go b/hcp/awsnetworkpeering/AwsNetworkPeeringTimeouts.go index 3393534f..b51a322f 100644 --- a/hcp/awsnetworkpeering/AwsNetworkPeeringTimeouts.go +++ b/hcp/awsnetworkpeering/AwsNetworkPeeringTimeouts.go @@ -5,11 +5,11 @@ package awsnetworkpeering type AwsNetworkPeeringTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#create AwsNetworkPeering#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#create AwsNetworkPeering#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#default AwsNetworkPeering#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#default AwsNetworkPeering#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering#delete AwsNetworkPeering#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering#delete AwsNetworkPeering#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` } diff --git a/hcp/awsnetworkpeering/README.md b/hcp/awsnetworkpeering/README.md index 841ca637..60f3579a 100644 --- a/hcp/awsnetworkpeering/README.md +++ b/hcp/awsnetworkpeering/README.md @@ -1,3 +1,3 @@ # `hcp_aws_network_peering` -Refer to the Terraform Registry for docs: [`hcp_aws_network_peering`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_network_peering). +Refer to the Terraform Registry for docs: [`hcp_aws_network_peering`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_network_peering). diff --git a/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachment.go b/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachment.go index cebdc20b..f4e5f03a 100644 --- a/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachment.go +++ b/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachment.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment}. type AwsTransitGatewayAttachment interface { cdktf.TerraformResource // Experimental. @@ -516,7 +516,7 @@ func (j *jsiiProxy_AwsTransitGatewayAttachment) TransitGatewayIdInput() *string } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Resource. func NewAwsTransitGatewayAttachment(scope constructs.Construct, id *string, config *AwsTransitGatewayAttachmentConfig) AwsTransitGatewayAttachment { _init_.Initialize() @@ -534,7 +534,7 @@ func NewAwsTransitGatewayAttachment(scope constructs.Construct, id *string, conf return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Resource. func NewAwsTransitGatewayAttachment_Override(a AwsTransitGatewayAttachment, scope constructs.Construct, id *string, config *AwsTransitGatewayAttachmentConfig) { _init_.Initialize() diff --git a/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentConfig.go b/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentConfig.go index 4c0d85bd..b858bffe 100644 --- a/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentConfig.go +++ b/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentConfig.go @@ -24,36 +24,36 @@ type AwsTransitGatewayAttachmentConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#hvn_id AwsTransitGatewayAttachment#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#hvn_id AwsTransitGatewayAttachment#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` // The Amazon Resource Name (ARN) of the Resource Share that is needed to grant HCP access to the transit gateway in AWS. // // The Resource Share should be associated with the HCP AWS account principal (see [aws_ram_principal_association](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ram_principal_association)) and the transit gateway resource (see [aws_ram_resource_association](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ram_resource_association)) // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#resource_share_arn AwsTransitGatewayAttachment#resource_share_arn} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#resource_share_arn AwsTransitGatewayAttachment#resource_share_arn} ResourceShareArn *string `field:"required" json:"resourceShareArn" yaml:"resourceShareArn"` // The user-settable name of the transit gateway attachment in HCP. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#transit_gateway_attachment_id AwsTransitGatewayAttachment#transit_gateway_attachment_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#transit_gateway_attachment_id AwsTransitGatewayAttachment#transit_gateway_attachment_id} TransitGatewayAttachmentId *string `field:"required" json:"transitGatewayAttachmentId" yaml:"transitGatewayAttachmentId"` // The ID of the user-owned transit gateway in AWS. // // The AWS region of the transit gateway must match the HVN. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#transit_gateway_id AwsTransitGatewayAttachment#transit_gateway_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#transit_gateway_id AwsTransitGatewayAttachment#transit_gateway_id} TransitGatewayId *string `field:"required" json:"transitGatewayId" yaml:"transitGatewayId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#id AwsTransitGatewayAttachment#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#id AwsTransitGatewayAttachment#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // The ID of the HCP project where the transit gateway attachment is located." If not specified, the project specified in the HCP Provider config block will be used, if configured. If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#project_id AwsTransitGatewayAttachment#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#project_id AwsTransitGatewayAttachment#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#timeouts AwsTransitGatewayAttachment#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#timeouts AwsTransitGatewayAttachment#timeouts} Timeouts *AwsTransitGatewayAttachmentTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentTimeouts.go b/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentTimeouts.go index 4556b297..6918b276 100644 --- a/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentTimeouts.go +++ b/hcp/awstransitgatewayattachment/AwsTransitGatewayAttachmentTimeouts.go @@ -5,11 +5,11 @@ package awstransitgatewayattachment type AwsTransitGatewayAttachmentTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#create AwsTransitGatewayAttachment#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#create AwsTransitGatewayAttachment#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#default AwsTransitGatewayAttachment#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#default AwsTransitGatewayAttachment#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment#delete AwsTransitGatewayAttachment#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment#delete AwsTransitGatewayAttachment#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` } diff --git a/hcp/awstransitgatewayattachment/README.md b/hcp/awstransitgatewayattachment/README.md index ef415dde..f91b0358 100644 --- a/hcp/awstransitgatewayattachment/README.md +++ b/hcp/awstransitgatewayattachment/README.md @@ -1,3 +1,3 @@ # `hcp_aws_transit_gateway_attachment` -Refer to the Terraform Registry for docs: [`hcp_aws_transit_gateway_attachment`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/aws_transit_gateway_attachment). +Refer to the Terraform Registry for docs: [`hcp_aws_transit_gateway_attachment`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/aws_transit_gateway_attachment). diff --git a/hcp/azurepeeringconnection/AzurePeeringConnection.go b/hcp/azurepeeringconnection/AzurePeeringConnection.go index 9ac8714e..86a0e90d 100644 --- a/hcp/azurepeeringconnection/AzurePeeringConnection.go +++ b/hcp/azurepeeringconnection/AzurePeeringConnection.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection hcp_azure_peering_connection}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection hcp_azure_peering_connection}. type AzurePeeringConnection interface { cdktf.TerraformResource AllowForwardedTraffic() interface{} @@ -631,7 +631,7 @@ func (j *jsiiProxy_AzurePeeringConnection) UseRemoteGatewaysInput() interface{} } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection hcp_azure_peering_connection} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection hcp_azure_peering_connection} Resource. func NewAzurePeeringConnection(scope constructs.Construct, id *string, config *AzurePeeringConnectionConfig) AzurePeeringConnection { _init_.Initialize() @@ -649,7 +649,7 @@ func NewAzurePeeringConnection(scope constructs.Construct, id *string, config *A return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection hcp_azure_peering_connection} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection hcp_azure_peering_connection} Resource. func NewAzurePeeringConnection_Override(a AzurePeeringConnection, scope constructs.Construct, id *string, config *AzurePeeringConnectionConfig) { _init_.Initialize() diff --git a/hcp/azurepeeringconnection/AzurePeeringConnectionConfig.go b/hcp/azurepeeringconnection/AzurePeeringConnectionConfig.go index cefaf15a..6b50e720 100644 --- a/hcp/azurepeeringconnection/AzurePeeringConnectionConfig.go +++ b/hcp/azurepeeringconnection/AzurePeeringConnectionConfig.go @@ -24,48 +24,48 @@ type AzurePeeringConnectionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The `self_link` of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#hvn_link AzurePeeringConnection#hvn_link} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#hvn_link AzurePeeringConnection#hvn_link} HvnLink *string `field:"required" json:"hvnLink" yaml:"hvnLink"` // The ID of the peering connection. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#peering_id AzurePeeringConnection#peering_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#peering_id AzurePeeringConnection#peering_id} PeeringId *string `field:"required" json:"peeringId" yaml:"peeringId"` // The resource group name of the peer VNet in Azure. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#peer_resource_group_name AzurePeeringConnection#peer_resource_group_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#peer_resource_group_name AzurePeeringConnection#peer_resource_group_name} PeerResourceGroupName *string `field:"required" json:"peerResourceGroupName" yaml:"peerResourceGroupName"` // The subscription ID of the peer VNet in Azure. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#peer_subscription_id AzurePeeringConnection#peer_subscription_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#peer_subscription_id AzurePeeringConnection#peer_subscription_id} PeerSubscriptionId *string `field:"required" json:"peerSubscriptionId" yaml:"peerSubscriptionId"` // The tenant ID of the peer VNet in Azure. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#peer_tenant_id AzurePeeringConnection#peer_tenant_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#peer_tenant_id AzurePeeringConnection#peer_tenant_id} PeerTenantId *string `field:"required" json:"peerTenantId" yaml:"peerTenantId"` // The name of the peer VNet in Azure. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#peer_vnet_name AzurePeeringConnection#peer_vnet_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#peer_vnet_name AzurePeeringConnection#peer_vnet_name} PeerVnetName *string `field:"required" json:"peerVnetName" yaml:"peerVnetName"` // The region of the peer VNet in Azure. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#peer_vnet_region AzurePeeringConnection#peer_vnet_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#peer_vnet_region AzurePeeringConnection#peer_vnet_region} PeerVnetRegion *string `field:"required" json:"peerVnetRegion" yaml:"peerVnetRegion"` // Whether the forwarded traffic originating from the peered VNet is allowed in the HVN. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#allow_forwarded_traffic AzurePeeringConnection#allow_forwarded_traffic} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#allow_forwarded_traffic AzurePeeringConnection#allow_forwarded_traffic} AllowForwardedTraffic interface{} `field:"optional" json:"allowForwardedTraffic" yaml:"allowForwardedTraffic"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#id AzurePeeringConnection#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#id AzurePeeringConnection#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#timeouts AzurePeeringConnection#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#timeouts AzurePeeringConnection#timeouts} Timeouts *AzurePeeringConnectionTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` // If the HVN should use the gateway of the peered VNet. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#use_remote_gateways AzurePeeringConnection#use_remote_gateways} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#use_remote_gateways AzurePeeringConnection#use_remote_gateways} UseRemoteGateways interface{} `field:"optional" json:"useRemoteGateways" yaml:"useRemoteGateways"` } diff --git a/hcp/azurepeeringconnection/AzurePeeringConnectionTimeouts.go b/hcp/azurepeeringconnection/AzurePeeringConnectionTimeouts.go index aa07ddaf..1b042c7d 100644 --- a/hcp/azurepeeringconnection/AzurePeeringConnectionTimeouts.go +++ b/hcp/azurepeeringconnection/AzurePeeringConnectionTimeouts.go @@ -5,11 +5,11 @@ package azurepeeringconnection type AzurePeeringConnectionTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#create AzurePeeringConnection#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#create AzurePeeringConnection#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#default AzurePeeringConnection#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#default AzurePeeringConnection#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection#delete AzurePeeringConnection#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection#delete AzurePeeringConnection#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` } diff --git a/hcp/azurepeeringconnection/README.md b/hcp/azurepeeringconnection/README.md index 5436f5e3..d1987ceb 100644 --- a/hcp/azurepeeringconnection/README.md +++ b/hcp/azurepeeringconnection/README.md @@ -1,3 +1,3 @@ # `hcp_azure_peering_connection` -Refer to the Terraform Registry for docs: [`hcp_azure_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/azure_peering_connection). +Refer to the Terraform Registry for docs: [`hcp_azure_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/azure_peering_connection). diff --git a/hcp/boundarycluster/BoundaryCluster.go b/hcp/boundarycluster/BoundaryCluster.go index 4805f4eb..e83a446d 100644 --- a/hcp/boundarycluster/BoundaryCluster.go +++ b/hcp/boundarycluster/BoundaryCluster.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster hcp_boundary_cluster}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster hcp_boundary_cluster}. type BoundaryCluster interface { cdktf.TerraformResource // Experimental. @@ -518,7 +518,7 @@ func (j *jsiiProxy_BoundaryCluster) Version() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster hcp_boundary_cluster} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster hcp_boundary_cluster} Resource. func NewBoundaryCluster(scope constructs.Construct, id *string, config *BoundaryClusterConfig) BoundaryCluster { _init_.Initialize() @@ -536,7 +536,7 @@ func NewBoundaryCluster(scope constructs.Construct, id *string, config *Boundary return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster hcp_boundary_cluster} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster hcp_boundary_cluster} Resource. func NewBoundaryCluster_Override(b BoundaryCluster, scope constructs.Construct, id *string, config *BoundaryClusterConfig) { _init_.Initialize() diff --git a/hcp/boundarycluster/BoundaryClusterConfig.go b/hcp/boundarycluster/BoundaryClusterConfig.go index ca108d5b..757bdf80 100644 --- a/hcp/boundarycluster/BoundaryClusterConfig.go +++ b/hcp/boundarycluster/BoundaryClusterConfig.go @@ -24,43 +24,43 @@ type BoundaryClusterConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Boundary cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#cluster_id BoundaryCluster#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#cluster_id BoundaryCluster#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // The password of the initial admin user. // // This must be at least 8 characters in length. Note that this may show up in logs, and it will be stored in the state file. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#password BoundaryCluster#password} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#password BoundaryCluster#password} Password *string `field:"required" json:"password" yaml:"password"` // The tier that the HCP Boundary cluster will be provisioned as, 'Standard' or 'Plus'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#tier BoundaryCluster#tier} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#tier BoundaryCluster#tier} Tier *string `field:"required" json:"tier" yaml:"tier"` // The username of the initial admin user. // // This must be at least 3 characters in length, alphanumeric, hyphen, or period. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#username BoundaryCluster#username} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#username BoundaryCluster#username} Username *string `field:"required" json:"username" yaml:"username"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#id BoundaryCluster#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#id BoundaryCluster#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // maintenance_window_config block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#maintenance_window_config BoundaryCluster#maintenance_window_config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#maintenance_window_config BoundaryCluster#maintenance_window_config} MaintenanceWindowConfig *BoundaryClusterMaintenanceWindowConfig `field:"optional" json:"maintenanceWindowConfig" yaml:"maintenanceWindowConfig"` // The ID of the HCP project where the Boundary cluster is located. // // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#project_id BoundaryCluster#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#project_id BoundaryCluster#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#timeouts BoundaryCluster#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#timeouts BoundaryCluster#timeouts} Timeouts *BoundaryClusterTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/boundarycluster/BoundaryClusterMaintenanceWindowConfig.go b/hcp/boundarycluster/BoundaryClusterMaintenanceWindowConfig.go index 155af80e..d032a987 100644 --- a/hcp/boundarycluster/BoundaryClusterMaintenanceWindowConfig.go +++ b/hcp/boundarycluster/BoundaryClusterMaintenanceWindowConfig.go @@ -9,23 +9,23 @@ type BoundaryClusterMaintenanceWindowConfig struct { // // Valid options for maintenance window day - `MONDAY`, `TUESDAY`, `WEDNESDAY`, `THURSDAY`, `FRIDAY`, `SATURDAY`, `SUNDAY` // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#day BoundaryCluster#day} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#day BoundaryCluster#day} Day *string `field:"optional" json:"day" yaml:"day"` // The end time which upgrades can be performed. // // Uses 24H clock and must be in UTC time zone. Valid options include - 1 to 24 (inclusive) // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#end BoundaryCluster#end} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#end BoundaryCluster#end} End *float64 `field:"optional" json:"end" yaml:"end"` // The start time which upgrades can be performed. // // Uses 24H clock and must be in UTC time zone. Valid options include - 0 to 23 (inclusive) // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#start BoundaryCluster#start} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#start BoundaryCluster#start} Start *float64 `field:"optional" json:"start" yaml:"start"` // The upgrade type for the cluster. Valid options for upgrade type - `AUTOMATIC`, `SCHEDULED`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#upgrade_type BoundaryCluster#upgrade_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#upgrade_type BoundaryCluster#upgrade_type} UpgradeType *string `field:"optional" json:"upgradeType" yaml:"upgradeType"` } diff --git a/hcp/boundarycluster/BoundaryClusterTimeouts.go b/hcp/boundarycluster/BoundaryClusterTimeouts.go index 3a23ace5..81dda50d 100644 --- a/hcp/boundarycluster/BoundaryClusterTimeouts.go +++ b/hcp/boundarycluster/BoundaryClusterTimeouts.go @@ -5,11 +5,11 @@ package boundarycluster type BoundaryClusterTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#create BoundaryCluster#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#create BoundaryCluster#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#default BoundaryCluster#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#default BoundaryCluster#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster#delete BoundaryCluster#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster#delete BoundaryCluster#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` } diff --git a/hcp/boundarycluster/README.md b/hcp/boundarycluster/README.md index 865e59f0..39ecc0cd 100644 --- a/hcp/boundarycluster/README.md +++ b/hcp/boundarycluster/README.md @@ -1,3 +1,3 @@ # `hcp_boundary_cluster` -Refer to the Terraform Registry for docs: [`hcp_boundary_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/boundary_cluster). +Refer to the Terraform Registry for docs: [`hcp_boundary_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/boundary_cluster). diff --git a/hcp/consulcluster/ConsulCluster.go b/hcp/consulcluster/ConsulCluster.go index 074c6973..d70e2fd2 100644 --- a/hcp/consulcluster/ConsulCluster.go +++ b/hcp/consulcluster/ConsulCluster.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster hcp_consul_cluster}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster hcp_consul_cluster}. type ConsulCluster interface { cdktf.TerraformResource AutoHvnToHvnPeering() interface{} @@ -795,7 +795,7 @@ func (j *jsiiProxy_ConsulCluster) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster hcp_consul_cluster} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster hcp_consul_cluster} Resource. func NewConsulCluster(scope constructs.Construct, id *string, config *ConsulClusterConfig) ConsulCluster { _init_.Initialize() @@ -813,7 +813,7 @@ func NewConsulCluster(scope constructs.Construct, id *string, config *ConsulClus return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster hcp_consul_cluster} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster hcp_consul_cluster} Resource. func NewConsulCluster_Override(c ConsulCluster, scope constructs.Construct, id *string, config *ConsulClusterConfig) { _init_.Initialize() diff --git a/hcp/consulcluster/ConsulClusterConfig.go b/hcp/consulcluster/ConsulClusterConfig.go index 901fd933..d34d13be 100644 --- a/hcp/consulcluster/ConsulClusterConfig.go +++ b/hcp/consulcluster/ConsulClusterConfig.go @@ -24,73 +24,73 @@ type ConsulClusterConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Consul cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#cluster_id ConsulCluster#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#cluster_id ConsulCluster#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // The ID of the HVN this HCP Consul cluster is associated to. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#hvn_id ConsulCluster#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#hvn_id ConsulCluster#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` // The tier that the HCP Consul cluster will be provisioned as. // // Only `development`, `standard`, `plus`, and `premium` are available at this time. See [pricing information](https://www.hashicorp.com/products/consul/pricing). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#tier ConsulCluster#tier} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#tier ConsulCluster#tier} Tier *string `field:"required" json:"tier" yaml:"tier"` // Enables automatic HVN to HVN peering when creating a secondary cluster in a federation. // // The alternative to using the auto-accept feature is to create an [`hcp_hvn_peering_connection`](hvn_peering_connection.md) resource that explicitly defines the HVN resources that are allowed to communicate with each other. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#auto_hvn_to_hvn_peering ConsulCluster#auto_hvn_to_hvn_peering} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#auto_hvn_to_hvn_peering ConsulCluster#auto_hvn_to_hvn_peering} AutoHvnToHvnPeering interface{} `field:"optional" json:"autoHvnToHvnPeering" yaml:"autoHvnToHvnPeering"` // Denotes the Consul connect feature should be enabled for this cluster. Default to true. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#connect_enabled ConsulCluster#connect_enabled} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#connect_enabled ConsulCluster#connect_enabled} ConnectEnabled interface{} `field:"optional" json:"connectEnabled" yaml:"connectEnabled"` // The Consul data center name of the cluster. If not specified, it is defaulted to the value of `cluster_id`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#datacenter ConsulCluster#datacenter} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#datacenter ConsulCluster#datacenter} Datacenter *string `field:"optional" json:"datacenter" yaml:"datacenter"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#id ConsulCluster#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#id ConsulCluster#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // ip_allowlist block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#ip_allowlist ConsulCluster#ip_allowlist} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#ip_allowlist ConsulCluster#ip_allowlist} IpAllowlist interface{} `field:"optional" json:"ipAllowlist" yaml:"ipAllowlist"` // The minimum Consul patch version of the cluster. // // Allows only the rightmost version component to increment (E.g: `1.13.0` will allow installation of `1.13.2` and `1.13.3` etc., but not `1.14.0`). If not specified, it is defaulted to the version that is currently recommended by HCP. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#min_consul_version ConsulCluster#min_consul_version} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#min_consul_version ConsulCluster#min_consul_version} MinConsulVersion *string `field:"optional" json:"minConsulVersion" yaml:"minConsulVersion"` // The `self_link` of the HCP Consul cluster which is the primary in the federation setup with this HCP Consul cluster. // // If not specified, it is a standalone cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#primary_link ConsulCluster#primary_link} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#primary_link ConsulCluster#primary_link} PrimaryLink *string `field:"optional" json:"primaryLink" yaml:"primaryLink"` // The ID of the HCP project where the HCP Consul cluster is located. // // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#project_id ConsulCluster#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#project_id ConsulCluster#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // Denotes that the cluster has a public endpoint for the Consul UI. Defaults to false. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#public_endpoint ConsulCluster#public_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#public_endpoint ConsulCluster#public_endpoint} PublicEndpoint interface{} `field:"optional" json:"publicEndpoint" yaml:"publicEndpoint"` // The t-shirt size representation of each server VM that this Consul cluster is provisioned with. // // Valid option for development tier - `x_small`. Valid options for other tiers - `small`, `medium`, `large`. For more details - https://cloud.hashicorp.com/pricing/consul. Upgrading the size of a cluster after creation is allowed. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#size ConsulCluster#size} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#size ConsulCluster#size} Size *string `field:"optional" json:"size" yaml:"size"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#timeouts ConsulCluster#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#timeouts ConsulCluster#timeouts} Timeouts *ConsulClusterTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/consulcluster/ConsulClusterIpAllowlistStruct.go b/hcp/consulcluster/ConsulClusterIpAllowlistStruct.go index f91f5f47..ac734b9c 100644 --- a/hcp/consulcluster/ConsulClusterIpAllowlistStruct.go +++ b/hcp/consulcluster/ConsulClusterIpAllowlistStruct.go @@ -7,11 +7,11 @@ package consulcluster type ConsulClusterIpAllowlistStruct struct { // IP address range in CIDR notation. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#address ConsulCluster#address} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#address ConsulCluster#address} Address *string `field:"required" json:"address" yaml:"address"` // Description to help identify source (maximum 255 chars). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#description ConsulCluster#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#description ConsulCluster#description} Description *string `field:"optional" json:"description" yaml:"description"` } diff --git a/hcp/consulcluster/ConsulClusterTimeouts.go b/hcp/consulcluster/ConsulClusterTimeouts.go index ec8375f6..32c86e55 100644 --- a/hcp/consulcluster/ConsulClusterTimeouts.go +++ b/hcp/consulcluster/ConsulClusterTimeouts.go @@ -5,13 +5,13 @@ package consulcluster type ConsulClusterTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#create ConsulCluster#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#create ConsulCluster#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#default ConsulCluster#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#default ConsulCluster#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#delete ConsulCluster#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#delete ConsulCluster#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster#update ConsulCluster#update}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster#update ConsulCluster#update}. Update *string `field:"optional" json:"update" yaml:"update"` } diff --git a/hcp/consulcluster/README.md b/hcp/consulcluster/README.md index 5c775235..cfc235e9 100644 --- a/hcp/consulcluster/README.md +++ b/hcp/consulcluster/README.md @@ -1,3 +1,3 @@ # `hcp_consul_cluster` -Refer to the Terraform Registry for docs: [`hcp_consul_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster). +Refer to the Terraform Registry for docs: [`hcp_consul_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster). diff --git a/hcp/consulclusterroottoken/ConsulClusterRootToken.go b/hcp/consulclusterroottoken/ConsulClusterRootToken.go index 0fb6cc55..0c42b801 100644 --- a/hcp/consulclusterroottoken/ConsulClusterRootToken.go +++ b/hcp/consulclusterroottoken/ConsulClusterRootToken.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token hcp_consul_cluster_root_token}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token hcp_consul_cluster_root_token}. type ConsulClusterRootToken interface { cdktf.TerraformResource AccessorId() *string @@ -414,7 +414,7 @@ func (j *jsiiProxy_ConsulClusterRootToken) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token hcp_consul_cluster_root_token} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token hcp_consul_cluster_root_token} Resource. func NewConsulClusterRootToken(scope constructs.Construct, id *string, config *ConsulClusterRootTokenConfig) ConsulClusterRootToken { _init_.Initialize() @@ -432,7 +432,7 @@ func NewConsulClusterRootToken(scope constructs.Construct, id *string, config *C return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token hcp_consul_cluster_root_token} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token hcp_consul_cluster_root_token} Resource. func NewConsulClusterRootToken_Override(c ConsulClusterRootToken, scope constructs.Construct, id *string, config *ConsulClusterRootTokenConfig) { _init_.Initialize() diff --git a/hcp/consulclusterroottoken/ConsulClusterRootTokenConfig.go b/hcp/consulclusterroottoken/ConsulClusterRootTokenConfig.go index 878c75ce..96bb87c2 100644 --- a/hcp/consulclusterroottoken/ConsulClusterRootTokenConfig.go +++ b/hcp/consulclusterroottoken/ConsulClusterRootTokenConfig.go @@ -24,9 +24,9 @@ type ConsulClusterRootTokenConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Consul cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token#cluster_id ConsulClusterRootToken#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token#cluster_id ConsulClusterRootToken#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token#id ConsulClusterRootToken#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token#id ConsulClusterRootToken#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,11 +36,11 @@ type ConsulClusterRootTokenConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token#project_id ConsulClusterRootToken#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token#project_id ConsulClusterRootToken#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token#timeouts ConsulClusterRootToken#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token#timeouts ConsulClusterRootToken#timeouts} Timeouts *ConsulClusterRootTokenTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/consulclusterroottoken/ConsulClusterRootTokenTimeouts.go b/hcp/consulclusterroottoken/ConsulClusterRootTokenTimeouts.go index 6f0fc06b..afaba769 100644 --- a/hcp/consulclusterroottoken/ConsulClusterRootTokenTimeouts.go +++ b/hcp/consulclusterroottoken/ConsulClusterRootTokenTimeouts.go @@ -5,7 +5,7 @@ package consulclusterroottoken type ConsulClusterRootTokenTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token#default ConsulClusterRootToken#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token#default ConsulClusterRootToken#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/consulclusterroottoken/README.md b/hcp/consulclusterroottoken/README.md index 83a7ad41..6ffa56f5 100644 --- a/hcp/consulclusterroottoken/README.md +++ b/hcp/consulclusterroottoken/README.md @@ -1,3 +1,3 @@ # `hcp_consul_cluster_root_token` -Refer to the Terraform Registry for docs: [`hcp_consul_cluster_root_token`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_cluster_root_token). +Refer to the Terraform Registry for docs: [`hcp_consul_cluster_root_token`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_cluster_root_token). diff --git a/hcp/consulsnapshot/ConsulSnapshot.go b/hcp/consulsnapshot/ConsulSnapshot.go index 947f5925..0f165d73 100644 --- a/hcp/consulsnapshot/ConsulSnapshot.go +++ b/hcp/consulsnapshot/ConsulSnapshot.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot hcp_consul_snapshot}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot hcp_consul_snapshot}. type ConsulSnapshot interface { cdktf.TerraformResource // Experimental. @@ -470,7 +470,7 @@ func (j *jsiiProxy_ConsulSnapshot) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot hcp_consul_snapshot} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot hcp_consul_snapshot} Resource. func NewConsulSnapshot(scope constructs.Construct, id *string, config *ConsulSnapshotConfig) ConsulSnapshot { _init_.Initialize() @@ -488,7 +488,7 @@ func NewConsulSnapshot(scope constructs.Construct, id *string, config *ConsulSna return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot hcp_consul_snapshot} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot hcp_consul_snapshot} Resource. func NewConsulSnapshot_Override(c ConsulSnapshot, scope constructs.Construct, id *string, config *ConsulSnapshotConfig) { _init_.Initialize() diff --git a/hcp/consulsnapshot/ConsulSnapshotConfig.go b/hcp/consulsnapshot/ConsulSnapshotConfig.go index 4c12f4f4..d6899acd 100644 --- a/hcp/consulsnapshot/ConsulSnapshotConfig.go +++ b/hcp/consulsnapshot/ConsulSnapshotConfig.go @@ -24,13 +24,13 @@ type ConsulSnapshotConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Consul cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#cluster_id ConsulSnapshot#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#cluster_id ConsulSnapshot#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // The name of the snapshot. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#snapshot_name ConsulSnapshot#snapshot_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#snapshot_name ConsulSnapshot#snapshot_name} SnapshotName *string `field:"required" json:"snapshotName" yaml:"snapshotName"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#id ConsulSnapshot#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#id ConsulSnapshot#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,11 +40,11 @@ type ConsulSnapshotConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#project_id ConsulSnapshot#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#project_id ConsulSnapshot#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#timeouts ConsulSnapshot#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#timeouts ConsulSnapshot#timeouts} Timeouts *ConsulSnapshotTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/consulsnapshot/ConsulSnapshotTimeouts.go b/hcp/consulsnapshot/ConsulSnapshotTimeouts.go index cdb3abe0..eb96b8b7 100644 --- a/hcp/consulsnapshot/ConsulSnapshotTimeouts.go +++ b/hcp/consulsnapshot/ConsulSnapshotTimeouts.go @@ -5,13 +5,13 @@ package consulsnapshot type ConsulSnapshotTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#create ConsulSnapshot#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#create ConsulSnapshot#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#default ConsulSnapshot#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#default ConsulSnapshot#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#delete ConsulSnapshot#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#delete ConsulSnapshot#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot#update ConsulSnapshot#update}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot#update ConsulSnapshot#update}. Update *string `field:"optional" json:"update" yaml:"update"` } diff --git a/hcp/consulsnapshot/README.md b/hcp/consulsnapshot/README.md index 2677ef6a..a4849a6f 100644 --- a/hcp/consulsnapshot/README.md +++ b/hcp/consulsnapshot/README.md @@ -1,3 +1,3 @@ # `hcp_consul_snapshot` -Refer to the Terraform Registry for docs: [`hcp_consul_snapshot`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/consul_snapshot). +Refer to the Terraform Registry for docs: [`hcp_consul_snapshot`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/consul_snapshot). diff --git a/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeering.go b/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeering.go index 9c5b227d..91d26f17 100644 --- a/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeering.go +++ b/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeering.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering hcp_aws_network_peering}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering hcp_aws_network_peering}. type DataHcpAwsNetworkPeering interface { cdktf.TerraformDataSource // Experimental. @@ -482,7 +482,7 @@ func (j *jsiiProxy_DataHcpAwsNetworkPeering) WaitForActiveStateInput() interface } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering hcp_aws_network_peering} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering hcp_aws_network_peering} Data Source. func NewDataHcpAwsNetworkPeering(scope constructs.Construct, id *string, config *DataHcpAwsNetworkPeeringConfig) DataHcpAwsNetworkPeering { _init_.Initialize() @@ -500,7 +500,7 @@ func NewDataHcpAwsNetworkPeering(scope constructs.Construct, id *string, config return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering hcp_aws_network_peering} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering hcp_aws_network_peering} Data Source. func NewDataHcpAwsNetworkPeering_Override(d DataHcpAwsNetworkPeering, scope constructs.Construct, id *string, config *DataHcpAwsNetworkPeeringConfig) { _init_.Initialize() diff --git a/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringConfig.go b/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringConfig.go index a9e54269..1d038fd8 100644 --- a/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringConfig.go +++ b/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringConfig.go @@ -24,13 +24,13 @@ type DataHcpAwsNetworkPeeringConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering#hvn_id DataHcpAwsNetworkPeering#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering#hvn_id DataHcpAwsNetworkPeering#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` // The ID of the network peering. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering#peering_id DataHcpAwsNetworkPeering#peering_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering#peering_id DataHcpAwsNetworkPeering#peering_id} PeeringId *string `field:"required" json:"peeringId" yaml:"peeringId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering#id DataHcpAwsNetworkPeering#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering#id DataHcpAwsNetworkPeering#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -41,15 +41,15 @@ type DataHcpAwsNetworkPeeringConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering#project_id DataHcpAwsNetworkPeering#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering#project_id DataHcpAwsNetworkPeering#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering#timeouts DataHcpAwsNetworkPeering#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering#timeouts DataHcpAwsNetworkPeering#timeouts} Timeouts *DataHcpAwsNetworkPeeringTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` // If `true`, Terraform will wait for the network peering to reach an `ACTIVE` state before continuing. Default `false`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering#wait_for_active_state DataHcpAwsNetworkPeering#wait_for_active_state} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering#wait_for_active_state DataHcpAwsNetworkPeering#wait_for_active_state} WaitForActiveState interface{} `field:"optional" json:"waitForActiveState" yaml:"waitForActiveState"` } diff --git a/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringTimeouts.go b/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringTimeouts.go index 6b9e04b8..5b85f267 100644 --- a/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringTimeouts.go +++ b/hcp/datahcpawsnetworkpeering/DataHcpAwsNetworkPeeringTimeouts.go @@ -5,7 +5,7 @@ package datahcpawsnetworkpeering type DataHcpAwsNetworkPeeringTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering#read DataHcpAwsNetworkPeering#read}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering#read DataHcpAwsNetworkPeering#read}. Read *string `field:"optional" json:"read" yaml:"read"` } diff --git a/hcp/datahcpawsnetworkpeering/README.md b/hcp/datahcpawsnetworkpeering/README.md index 9a442325..6bc46c37 100644 --- a/hcp/datahcpawsnetworkpeering/README.md +++ b/hcp/datahcpawsnetworkpeering/README.md @@ -1,3 +1,3 @@ # `data_hcp_aws_network_peering` -Refer to the Terraform Registry for docs: [`data_hcp_aws_network_peering`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_network_peering). +Refer to the Terraform Registry for docs: [`data_hcp_aws_network_peering`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_network_peering). diff --git a/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachment.go b/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachment.go index f9bef7a3..a6752e3e 100644 --- a/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachment.go +++ b/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachment.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment}. type DataHcpAwsTransitGatewayAttachment interface { cdktf.TerraformDataSource // Experimental. @@ -460,7 +460,7 @@ func (j *jsiiProxy_DataHcpAwsTransitGatewayAttachment) WaitForActiveStateInput() } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Data Source. func NewDataHcpAwsTransitGatewayAttachment(scope constructs.Construct, id *string, config *DataHcpAwsTransitGatewayAttachmentConfig) DataHcpAwsTransitGatewayAttachment { _init_.Initialize() @@ -478,7 +478,7 @@ func NewDataHcpAwsTransitGatewayAttachment(scope constructs.Construct, id *strin return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment hcp_aws_transit_gateway_attachment} Data Source. func NewDataHcpAwsTransitGatewayAttachment_Override(d DataHcpAwsTransitGatewayAttachment, scope constructs.Construct, id *string, config *DataHcpAwsTransitGatewayAttachmentConfig) { _init_.Initialize() diff --git a/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentConfig.go b/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentConfig.go index e34da7fb..2de83032 100644 --- a/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentConfig.go +++ b/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentConfig.go @@ -24,13 +24,13 @@ type DataHcpAwsTransitGatewayAttachmentConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment#hvn_id DataHcpAwsTransitGatewayAttachment#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment#hvn_id DataHcpAwsTransitGatewayAttachment#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` // The user-settable name of the transit gateway attachment in HCP. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment#transit_gateway_attachment_id DataHcpAwsTransitGatewayAttachment#transit_gateway_attachment_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment#transit_gateway_attachment_id DataHcpAwsTransitGatewayAttachment#transit_gateway_attachment_id} TransitGatewayAttachmentId *string `field:"required" json:"transitGatewayAttachmentId" yaml:"transitGatewayAttachmentId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment#id DataHcpAwsTransitGatewayAttachment#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment#id DataHcpAwsTransitGatewayAttachment#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,15 +40,15 @@ type DataHcpAwsTransitGatewayAttachmentConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment#project_id DataHcpAwsTransitGatewayAttachment#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment#project_id DataHcpAwsTransitGatewayAttachment#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment#timeouts DataHcpAwsTransitGatewayAttachment#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment#timeouts DataHcpAwsTransitGatewayAttachment#timeouts} Timeouts *DataHcpAwsTransitGatewayAttachmentTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` // If `true`, Terraform will wait for the transit gateway attachment to reach an `ACTIVE` state before continuing. Default `false`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment#wait_for_active_state DataHcpAwsTransitGatewayAttachment#wait_for_active_state} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment#wait_for_active_state DataHcpAwsTransitGatewayAttachment#wait_for_active_state} WaitForActiveState interface{} `field:"optional" json:"waitForActiveState" yaml:"waitForActiveState"` } diff --git a/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentTimeouts.go b/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentTimeouts.go index e78dc66d..319363b0 100644 --- a/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentTimeouts.go +++ b/hcp/datahcpawstransitgatewayattachment/DataHcpAwsTransitGatewayAttachmentTimeouts.go @@ -5,7 +5,7 @@ package datahcpawstransitgatewayattachment type DataHcpAwsTransitGatewayAttachmentTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment#default DataHcpAwsTransitGatewayAttachment#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment#default DataHcpAwsTransitGatewayAttachment#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpawstransitgatewayattachment/README.md b/hcp/datahcpawstransitgatewayattachment/README.md index e3e768f7..933d3633 100644 --- a/hcp/datahcpawstransitgatewayattachment/README.md +++ b/hcp/datahcpawstransitgatewayattachment/README.md @@ -1,3 +1,3 @@ # `data_hcp_aws_transit_gateway_attachment` -Refer to the Terraform Registry for docs: [`data_hcp_aws_transit_gateway_attachment`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/aws_transit_gateway_attachment). +Refer to the Terraform Registry for docs: [`data_hcp_aws_transit_gateway_attachment`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/aws_transit_gateway_attachment). diff --git a/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnection.go b/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnection.go index 2cb960aa..fa401350 100644 --- a/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnection.go +++ b/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnection.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection hcp_azure_peering_connection}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection hcp_azure_peering_connection}. type DataHcpAzurePeeringConnection interface { cdktf.TerraformDataSource AllowForwardedTraffic() cdktf.IResolvable @@ -524,7 +524,7 @@ func (j *jsiiProxy_DataHcpAzurePeeringConnection) WaitForActiveStateInput() inte } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection hcp_azure_peering_connection} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection hcp_azure_peering_connection} Data Source. func NewDataHcpAzurePeeringConnection(scope constructs.Construct, id *string, config *DataHcpAzurePeeringConnectionConfig) DataHcpAzurePeeringConnection { _init_.Initialize() @@ -542,7 +542,7 @@ func NewDataHcpAzurePeeringConnection(scope constructs.Construct, id *string, co return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection hcp_azure_peering_connection} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection hcp_azure_peering_connection} Data Source. func NewDataHcpAzurePeeringConnection_Override(d DataHcpAzurePeeringConnection, scope constructs.Construct, id *string, config *DataHcpAzurePeeringConnectionConfig) { _init_.Initialize() diff --git a/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionConfig.go b/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionConfig.go index 0036f21b..004aebb4 100644 --- a/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionConfig.go +++ b/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionConfig.go @@ -24,24 +24,24 @@ type DataHcpAzurePeeringConnectionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The `self_link` of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection#hvn_link DataHcpAzurePeeringConnection#hvn_link} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection#hvn_link DataHcpAzurePeeringConnection#hvn_link} HvnLink *string `field:"required" json:"hvnLink" yaml:"hvnLink"` // The ID of the peering connection. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection#peering_id DataHcpAzurePeeringConnection#peering_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection#peering_id DataHcpAzurePeeringConnection#peering_id} PeeringId *string `field:"required" json:"peeringId" yaml:"peeringId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection#id DataHcpAzurePeeringConnection#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection#id DataHcpAzurePeeringConnection#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection#timeouts DataHcpAzurePeeringConnection#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection#timeouts DataHcpAzurePeeringConnection#timeouts} Timeouts *DataHcpAzurePeeringConnectionTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` // If `true`, Terraform will wait for the peering connection to reach an `ACTIVE` state before continuing. Default `false`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection#wait_for_active_state DataHcpAzurePeeringConnection#wait_for_active_state} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection#wait_for_active_state DataHcpAzurePeeringConnection#wait_for_active_state} WaitForActiveState interface{} `field:"optional" json:"waitForActiveState" yaml:"waitForActiveState"` } diff --git a/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionTimeouts.go b/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionTimeouts.go index cebf07e7..cfeb7953 100644 --- a/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionTimeouts.go +++ b/hcp/datahcpazurepeeringconnection/DataHcpAzurePeeringConnectionTimeouts.go @@ -5,7 +5,7 @@ package datahcpazurepeeringconnection type DataHcpAzurePeeringConnectionTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection#read DataHcpAzurePeeringConnection#read}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection#read DataHcpAzurePeeringConnection#read}. Read *string `field:"optional" json:"read" yaml:"read"` } diff --git a/hcp/datahcpazurepeeringconnection/README.md b/hcp/datahcpazurepeeringconnection/README.md index 9481c003..a1867a74 100644 --- a/hcp/datahcpazurepeeringconnection/README.md +++ b/hcp/datahcpazurepeeringconnection/README.md @@ -1,3 +1,3 @@ # `data_hcp_azure_peering_connection` -Refer to the Terraform Registry for docs: [`data_hcp_azure_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/azure_peering_connection). +Refer to the Terraform Registry for docs: [`data_hcp_azure_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/azure_peering_connection). diff --git a/hcp/datahcpboundarycluster/DataHcpBoundaryCluster.go b/hcp/datahcpboundarycluster/DataHcpBoundaryCluster.go index c4ae4825..8cfa3c81 100644 --- a/hcp/datahcpboundarycluster/DataHcpBoundaryCluster.go +++ b/hcp/datahcpboundarycluster/DataHcpBoundaryCluster.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster hcp_boundary_cluster}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster hcp_boundary_cluster}. type DataHcpBoundaryCluster interface { cdktf.TerraformDataSource // Experimental. @@ -402,7 +402,7 @@ func (j *jsiiProxy_DataHcpBoundaryCluster) Version() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster hcp_boundary_cluster} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster hcp_boundary_cluster} Data Source. func NewDataHcpBoundaryCluster(scope constructs.Construct, id *string, config *DataHcpBoundaryClusterConfig) DataHcpBoundaryCluster { _init_.Initialize() @@ -420,7 +420,7 @@ func NewDataHcpBoundaryCluster(scope constructs.Construct, id *string, config *D return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster hcp_boundary_cluster} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster hcp_boundary_cluster} Data Source. func NewDataHcpBoundaryCluster_Override(d DataHcpBoundaryCluster, scope constructs.Construct, id *string, config *DataHcpBoundaryClusterConfig) { _init_.Initialize() diff --git a/hcp/datahcpboundarycluster/DataHcpBoundaryClusterConfig.go b/hcp/datahcpboundarycluster/DataHcpBoundaryClusterConfig.go index 128cdce6..384ee2aa 100644 --- a/hcp/datahcpboundarycluster/DataHcpBoundaryClusterConfig.go +++ b/hcp/datahcpboundarycluster/DataHcpBoundaryClusterConfig.go @@ -24,9 +24,9 @@ type DataHcpBoundaryClusterConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Boundary cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster#cluster_id DataHcpBoundaryCluster#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster#cluster_id DataHcpBoundaryCluster#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster#id DataHcpBoundaryCluster#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster#id DataHcpBoundaryCluster#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -37,11 +37,11 @@ type DataHcpBoundaryClusterConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster#project_id DataHcpBoundaryCluster#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster#project_id DataHcpBoundaryCluster#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster#timeouts DataHcpBoundaryCluster#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster#timeouts DataHcpBoundaryCluster#timeouts} Timeouts *DataHcpBoundaryClusterTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcpboundarycluster/DataHcpBoundaryClusterTimeouts.go b/hcp/datahcpboundarycluster/DataHcpBoundaryClusterTimeouts.go index d1d8e84c..b27bad1e 100644 --- a/hcp/datahcpboundarycluster/DataHcpBoundaryClusterTimeouts.go +++ b/hcp/datahcpboundarycluster/DataHcpBoundaryClusterTimeouts.go @@ -5,7 +5,7 @@ package datahcpboundarycluster type DataHcpBoundaryClusterTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster#default DataHcpBoundaryCluster#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster#default DataHcpBoundaryCluster#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpboundarycluster/README.md b/hcp/datahcpboundarycluster/README.md index 5b1f7325..ee211608 100644 --- a/hcp/datahcpboundarycluster/README.md +++ b/hcp/datahcpboundarycluster/README.md @@ -1,3 +1,3 @@ # `data_hcp_boundary_cluster` -Refer to the Terraform Registry for docs: [`data_hcp_boundary_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/boundary_cluster). +Refer to the Terraform Registry for docs: [`data_hcp_boundary_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/boundary_cluster). diff --git a/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfig.go b/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfig.go index dcc4ced1..1d14722f 100644 --- a/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfig.go +++ b/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfig.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config hcp_consul_agent_helm_config}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config hcp_consul_agent_helm_config}. type DataHcpConsulAgentHelmConfig interface { cdktf.TerraformDataSource // Experimental. @@ -394,7 +394,7 @@ func (j *jsiiProxy_DataHcpConsulAgentHelmConfig) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config hcp_consul_agent_helm_config} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config hcp_consul_agent_helm_config} Data Source. func NewDataHcpConsulAgentHelmConfig(scope constructs.Construct, id *string, config *DataHcpConsulAgentHelmConfigConfig) DataHcpConsulAgentHelmConfig { _init_.Initialize() @@ -412,7 +412,7 @@ func NewDataHcpConsulAgentHelmConfig(scope constructs.Construct, id *string, con return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config hcp_consul_agent_helm_config} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config hcp_consul_agent_helm_config} Data Source. func NewDataHcpConsulAgentHelmConfig_Override(d DataHcpConsulAgentHelmConfig, scope constructs.Construct, id *string, config *DataHcpConsulAgentHelmConfigConfig) { _init_.Initialize() diff --git a/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigConfig.go b/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigConfig.go index fc0f66ea..b5acb22f 100644 --- a/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigConfig.go +++ b/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigConfig.go @@ -24,17 +24,17 @@ type DataHcpConsulAgentHelmConfigConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Consul cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config#cluster_id DataHcpConsulAgentHelmConfig#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config#cluster_id DataHcpConsulAgentHelmConfig#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // The FQDN for the Kubernetes API. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config#kubernetes_endpoint DataHcpConsulAgentHelmConfig#kubernetes_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config#kubernetes_endpoint DataHcpConsulAgentHelmConfig#kubernetes_endpoint} KubernetesEndpoint *string `field:"required" json:"kubernetesEndpoint" yaml:"kubernetesEndpoint"` // Denotes that the gossip ports should be exposed. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config#expose_gossip_ports DataHcpConsulAgentHelmConfig#expose_gossip_ports} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config#expose_gossip_ports DataHcpConsulAgentHelmConfig#expose_gossip_ports} ExposeGossipPorts interface{} `field:"optional" json:"exposeGossipPorts" yaml:"exposeGossipPorts"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config#id DataHcpConsulAgentHelmConfig#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config#id DataHcpConsulAgentHelmConfig#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -44,11 +44,11 @@ type DataHcpConsulAgentHelmConfigConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config#project_id DataHcpConsulAgentHelmConfig#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config#project_id DataHcpConsulAgentHelmConfig#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config#timeouts DataHcpConsulAgentHelmConfig#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config#timeouts DataHcpConsulAgentHelmConfig#timeouts} Timeouts *DataHcpConsulAgentHelmConfigTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigTimeouts.go b/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigTimeouts.go index fd408444..4dbd7bed 100644 --- a/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigTimeouts.go +++ b/hcp/datahcpconsulagenthelmconfig/DataHcpConsulAgentHelmConfigTimeouts.go @@ -5,7 +5,7 @@ package datahcpconsulagenthelmconfig type DataHcpConsulAgentHelmConfigTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config#default DataHcpConsulAgentHelmConfig#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config#default DataHcpConsulAgentHelmConfig#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpconsulagenthelmconfig/README.md b/hcp/datahcpconsulagenthelmconfig/README.md index 01cac905..2898ea23 100644 --- a/hcp/datahcpconsulagenthelmconfig/README.md +++ b/hcp/datahcpconsulagenthelmconfig/README.md @@ -1,3 +1,3 @@ # `data_hcp_consul_agent_helm_config` -Refer to the Terraform Registry for docs: [`data_hcp_consul_agent_helm_config`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_helm_config). +Refer to the Terraform Registry for docs: [`data_hcp_consul_agent_helm_config`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_helm_config). diff --git a/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecret.go b/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecret.go index 2ef2c886..9413657e 100644 --- a/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecret.go +++ b/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecret.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret hcp_consul_agent_kubernetes_secret}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret hcp_consul_agent_kubernetes_secret}. type DataHcpConsulAgentKubernetesSecret interface { cdktf.TerraformDataSource // Experimental. @@ -347,7 +347,7 @@ func (j *jsiiProxy_DataHcpConsulAgentKubernetesSecret) TimeoutsInput() interface } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret hcp_consul_agent_kubernetes_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret hcp_consul_agent_kubernetes_secret} Data Source. func NewDataHcpConsulAgentKubernetesSecret(scope constructs.Construct, id *string, config *DataHcpConsulAgentKubernetesSecretConfig) DataHcpConsulAgentKubernetesSecret { _init_.Initialize() @@ -365,7 +365,7 @@ func NewDataHcpConsulAgentKubernetesSecret(scope constructs.Construct, id *strin return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret hcp_consul_agent_kubernetes_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret hcp_consul_agent_kubernetes_secret} Data Source. func NewDataHcpConsulAgentKubernetesSecret_Override(d DataHcpConsulAgentKubernetesSecret, scope constructs.Construct, id *string, config *DataHcpConsulAgentKubernetesSecretConfig) { _init_.Initialize() diff --git a/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretConfig.go b/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretConfig.go index 9bc8a548..74cfe940 100644 --- a/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretConfig.go +++ b/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretConfig.go @@ -24,9 +24,9 @@ type DataHcpConsulAgentKubernetesSecretConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Consul cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret#cluster_id DataHcpConsulAgentKubernetesSecret#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret#cluster_id DataHcpConsulAgentKubernetesSecret#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret#id DataHcpConsulAgentKubernetesSecret#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret#id DataHcpConsulAgentKubernetesSecret#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,11 +36,11 @@ type DataHcpConsulAgentKubernetesSecretConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret#project_id DataHcpConsulAgentKubernetesSecret#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret#project_id DataHcpConsulAgentKubernetesSecret#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret#timeouts DataHcpConsulAgentKubernetesSecret#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret#timeouts DataHcpConsulAgentKubernetesSecret#timeouts} Timeouts *DataHcpConsulAgentKubernetesSecretTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretTimeouts.go b/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretTimeouts.go index f261cfbc..0db51a30 100644 --- a/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretTimeouts.go +++ b/hcp/datahcpconsulagentkubernetessecret/DataHcpConsulAgentKubernetesSecretTimeouts.go @@ -5,7 +5,7 @@ package datahcpconsulagentkubernetessecret type DataHcpConsulAgentKubernetesSecretTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret#default DataHcpConsulAgentKubernetesSecret#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret#default DataHcpConsulAgentKubernetesSecret#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpconsulagentkubernetessecret/README.md b/hcp/datahcpconsulagentkubernetessecret/README.md index 69da8438..d4e03810 100644 --- a/hcp/datahcpconsulagentkubernetessecret/README.md +++ b/hcp/datahcpconsulagentkubernetessecret/README.md @@ -1,3 +1,3 @@ # `data_hcp_consul_agent_kubernetes_secret` -Refer to the Terraform Registry for docs: [`data_hcp_consul_agent_kubernetes_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_agent_kubernetes_secret). +Refer to the Terraform Registry for docs: [`data_hcp_consul_agent_kubernetes_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_agent_kubernetes_secret). diff --git a/hcp/datahcpconsulcluster/DataHcpConsulCluster.go b/hcp/datahcpconsulcluster/DataHcpConsulCluster.go index 27fa8d6e..0f846b52 100644 --- a/hcp/datahcpconsulcluster/DataHcpConsulCluster.go +++ b/hcp/datahcpconsulcluster/DataHcpConsulCluster.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster hcp_consul_cluster}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster hcp_consul_cluster}. type DataHcpConsulCluster interface { cdktf.TerraformDataSource AutoHvnToHvnPeering() cdktf.IResolvable @@ -589,7 +589,7 @@ func (j *jsiiProxy_DataHcpConsulCluster) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster hcp_consul_cluster} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster hcp_consul_cluster} Data Source. func NewDataHcpConsulCluster(scope constructs.Construct, id *string, config *DataHcpConsulClusterConfig) DataHcpConsulCluster { _init_.Initialize() @@ -607,7 +607,7 @@ func NewDataHcpConsulCluster(scope constructs.Construct, id *string, config *Dat return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster hcp_consul_cluster} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster hcp_consul_cluster} Data Source. func NewDataHcpConsulCluster_Override(d DataHcpConsulCluster, scope constructs.Construct, id *string, config *DataHcpConsulClusterConfig) { _init_.Initialize() diff --git a/hcp/datahcpconsulcluster/DataHcpConsulClusterConfig.go b/hcp/datahcpconsulcluster/DataHcpConsulClusterConfig.go index 9b47d36b..bb600ddd 100644 --- a/hcp/datahcpconsulcluster/DataHcpConsulClusterConfig.go +++ b/hcp/datahcpconsulcluster/DataHcpConsulClusterConfig.go @@ -24,9 +24,9 @@ type DataHcpConsulClusterConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Consul cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster#cluster_id DataHcpConsulCluster#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster#cluster_id DataHcpConsulCluster#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster#id DataHcpConsulCluster#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster#id DataHcpConsulCluster#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,11 +36,11 @@ type DataHcpConsulClusterConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster#project_id DataHcpConsulCluster#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster#project_id DataHcpConsulCluster#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster#timeouts DataHcpConsulCluster#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster#timeouts DataHcpConsulCluster#timeouts} Timeouts *DataHcpConsulClusterTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcpconsulcluster/DataHcpConsulClusterTimeouts.go b/hcp/datahcpconsulcluster/DataHcpConsulClusterTimeouts.go index 6e8b96dc..9027d159 100644 --- a/hcp/datahcpconsulcluster/DataHcpConsulClusterTimeouts.go +++ b/hcp/datahcpconsulcluster/DataHcpConsulClusterTimeouts.go @@ -5,7 +5,7 @@ package datahcpconsulcluster type DataHcpConsulClusterTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster#default DataHcpConsulCluster#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster#default DataHcpConsulCluster#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpconsulcluster/README.md b/hcp/datahcpconsulcluster/README.md index f3f800c9..b245561b 100644 --- a/hcp/datahcpconsulcluster/README.md +++ b/hcp/datahcpconsulcluster/README.md @@ -1,3 +1,3 @@ # `data_hcp_consul_cluster` -Refer to the Terraform Registry for docs: [`data_hcp_consul_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_cluster). +Refer to the Terraform Registry for docs: [`data_hcp_consul_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_cluster). diff --git a/hcp/datahcpconsulversions/DataHcpConsulVersions.go b/hcp/datahcpconsulversions/DataHcpConsulVersions.go index 2c2ea978..04baba3b 100644 --- a/hcp/datahcpconsulversions/DataHcpConsulVersions.go +++ b/hcp/datahcpconsulversions/DataHcpConsulVersions.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_versions hcp_consul_versions}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_versions hcp_consul_versions}. type DataHcpConsulVersions interface { cdktf.TerraformDataSource Available() *[]*string @@ -322,7 +322,7 @@ func (j *jsiiProxy_DataHcpConsulVersions) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_versions hcp_consul_versions} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_versions hcp_consul_versions} Data Source. func NewDataHcpConsulVersions(scope constructs.Construct, id *string, config *DataHcpConsulVersionsConfig) DataHcpConsulVersions { _init_.Initialize() @@ -340,7 +340,7 @@ func NewDataHcpConsulVersions(scope constructs.Construct, id *string, config *Da return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_versions hcp_consul_versions} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_versions hcp_consul_versions} Data Source. func NewDataHcpConsulVersions_Override(d DataHcpConsulVersions, scope constructs.Construct, id *string, config *DataHcpConsulVersionsConfig) { _init_.Initialize() diff --git a/hcp/datahcpconsulversions/DataHcpConsulVersionsConfig.go b/hcp/datahcpconsulversions/DataHcpConsulVersionsConfig.go index 90f53d94..4f3f6ebd 100644 --- a/hcp/datahcpconsulversions/DataHcpConsulVersionsConfig.go +++ b/hcp/datahcpconsulversions/DataHcpConsulVersionsConfig.go @@ -22,14 +22,14 @@ type DataHcpConsulVersionsConfig struct { Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_versions#id DataHcpConsulVersions#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_versions#id DataHcpConsulVersions#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_versions#timeouts DataHcpConsulVersions#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_versions#timeouts DataHcpConsulVersions#timeouts} Timeouts *DataHcpConsulVersionsTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcpconsulversions/DataHcpConsulVersionsTimeouts.go b/hcp/datahcpconsulversions/DataHcpConsulVersionsTimeouts.go index 449ba4be..49168c49 100644 --- a/hcp/datahcpconsulversions/DataHcpConsulVersionsTimeouts.go +++ b/hcp/datahcpconsulversions/DataHcpConsulVersionsTimeouts.go @@ -5,7 +5,7 @@ package datahcpconsulversions type DataHcpConsulVersionsTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_versions#default DataHcpConsulVersions#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_versions#default DataHcpConsulVersions#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpconsulversions/README.md b/hcp/datahcpconsulversions/README.md index dab847ad..2c10ffe9 100644 --- a/hcp/datahcpconsulversions/README.md +++ b/hcp/datahcpconsulversions/README.md @@ -1,3 +1,3 @@ # `data_hcp_consul_versions` -Refer to the Terraform Registry for docs: [`data_hcp_consul_versions`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/consul_versions). +Refer to the Terraform Registry for docs: [`data_hcp_consul_versions`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/consul_versions). diff --git a/hcp/datahcpgroup/DataHcpGroup.go b/hcp/datahcpgroup/DataHcpGroup.go index c8aa3bba..cb3700f8 100644 --- a/hcp/datahcpgroup/DataHcpGroup.go +++ b/hcp/datahcpgroup/DataHcpGroup.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/group hcp_group}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/group hcp_group}. type DataHcpGroup interface { cdktf.TerraformDataSource // Experimental. @@ -297,7 +297,7 @@ func (j *jsiiProxy_DataHcpGroup) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/group hcp_group} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/group hcp_group} Data Source. func NewDataHcpGroup(scope constructs.Construct, id *string, config *DataHcpGroupConfig) DataHcpGroup { _init_.Initialize() @@ -315,7 +315,7 @@ func NewDataHcpGroup(scope constructs.Construct, id *string, config *DataHcpGrou return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/group hcp_group} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/group hcp_group} Data Source. func NewDataHcpGroup_Override(d DataHcpGroup, scope constructs.Construct, id *string, config *DataHcpGroupConfig) { _init_.Initialize() diff --git a/hcp/datahcpgroup/DataHcpGroupConfig.go b/hcp/datahcpgroup/DataHcpGroupConfig.go index 726a0b84..5ab171c2 100644 --- a/hcp/datahcpgroup/DataHcpGroupConfig.go +++ b/hcp/datahcpgroup/DataHcpGroupConfig.go @@ -24,7 +24,7 @@ type DataHcpGroupConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The group's resource name in format `iam/organization//group/`. The shortened `` version can be used for input. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/group#resource_name DataHcpGroup#resource_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/group#resource_name DataHcpGroup#resource_name} ResourceName *string `field:"required" json:"resourceName" yaml:"resourceName"` } diff --git a/hcp/datahcpgroup/README.md b/hcp/datahcpgroup/README.md index 7a46fb49..c194b5ab 100644 --- a/hcp/datahcpgroup/README.md +++ b/hcp/datahcpgroup/README.md @@ -1,3 +1,3 @@ # `data_hcp_group` -Refer to the Terraform Registry for docs: [`data_hcp_group`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/group). +Refer to the Terraform Registry for docs: [`data_hcp_group`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/group). diff --git a/hcp/datahcphvn/DataHcpHvn.go b/hcp/datahcphvn/DataHcpHvn.go index 9ff1cca4..1506e295 100644 --- a/hcp/datahcphvn/DataHcpHvn.go +++ b/hcp/datahcphvn/DataHcpHvn.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn hcp_hvn}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn hcp_hvn}. type DataHcpHvn interface { cdktf.TerraformDataSource // Experimental. @@ -424,7 +424,7 @@ func (j *jsiiProxy_DataHcpHvn) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn hcp_hvn} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn hcp_hvn} Data Source. func NewDataHcpHvn(scope constructs.Construct, id *string, config *DataHcpHvnConfig) DataHcpHvn { _init_.Initialize() @@ -442,7 +442,7 @@ func NewDataHcpHvn(scope constructs.Construct, id *string, config *DataHcpHvnCon return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn hcp_hvn} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn hcp_hvn} Data Source. func NewDataHcpHvn_Override(d DataHcpHvn, scope constructs.Construct, id *string, config *DataHcpHvnConfig) { _init_.Initialize() diff --git a/hcp/datahcphvn/DataHcpHvnConfig.go b/hcp/datahcphvn/DataHcpHvnConfig.go index 0ca1aaa1..89b40531 100644 --- a/hcp/datahcphvn/DataHcpHvnConfig.go +++ b/hcp/datahcphvn/DataHcpHvnConfig.go @@ -24,9 +24,9 @@ type DataHcpHvnConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn#hvn_id DataHcpHvn#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn#hvn_id DataHcpHvn#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn#id DataHcpHvn#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn#id DataHcpHvn#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,11 +36,11 @@ type DataHcpHvnConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn#project_id DataHcpHvn#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn#project_id DataHcpHvn#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn#timeouts DataHcpHvn#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn#timeouts DataHcpHvn#timeouts} Timeouts *DataHcpHvnTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcphvn/DataHcpHvnTimeouts.go b/hcp/datahcphvn/DataHcpHvnTimeouts.go index 5bca3245..92cc0bfc 100644 --- a/hcp/datahcphvn/DataHcpHvnTimeouts.go +++ b/hcp/datahcphvn/DataHcpHvnTimeouts.go @@ -5,7 +5,7 @@ package datahcphvn type DataHcpHvnTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn#default DataHcpHvn#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn#default DataHcpHvn#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcphvn/README.md b/hcp/datahcphvn/README.md index 1c1801f5..cf3716ad 100644 --- a/hcp/datahcphvn/README.md +++ b/hcp/datahcphvn/README.md @@ -1,3 +1,3 @@ # `data_hcp_hvn` -Refer to the Terraform Registry for docs: [`data_hcp_hvn`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn). +Refer to the Terraform Registry for docs: [`data_hcp_hvn`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn). diff --git a/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnection.go b/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnection.go index eb068d12..8c6ef53c 100644 --- a/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnection.go +++ b/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnection.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection hcp_hvn_peering_connection}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection hcp_hvn_peering_connection}. type DataHcpHvnPeeringConnection interface { cdktf.TerraformDataSource // Experimental. @@ -438,7 +438,7 @@ func (j *jsiiProxy_DataHcpHvnPeeringConnection) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection hcp_hvn_peering_connection} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection hcp_hvn_peering_connection} Data Source. func NewDataHcpHvnPeeringConnection(scope constructs.Construct, id *string, config *DataHcpHvnPeeringConnectionConfig) DataHcpHvnPeeringConnection { _init_.Initialize() @@ -456,7 +456,7 @@ func NewDataHcpHvnPeeringConnection(scope constructs.Construct, id *string, conf return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection hcp_hvn_peering_connection} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection hcp_hvn_peering_connection} Data Source. func NewDataHcpHvnPeeringConnection_Override(d DataHcpHvnPeeringConnection, scope constructs.Construct, id *string, config *DataHcpHvnPeeringConnectionConfig) { _init_.Initialize() diff --git a/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionConfig.go b/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionConfig.go index 1593d8a9..3a3394b2 100644 --- a/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionConfig.go +++ b/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionConfig.go @@ -24,19 +24,19 @@ type DataHcpHvnPeeringConnectionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The unique URL of one of the HVNs being peered. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection#hvn_1 DataHcpHvnPeeringConnection#hvn_1} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection#hvn_1 DataHcpHvnPeeringConnection#hvn_1} Hvn1 *string `field:"required" json:"hvn1" yaml:"hvn1"` // The ID of the peering connection. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection#peering_id DataHcpHvnPeeringConnection#peering_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection#peering_id DataHcpHvnPeeringConnection#peering_id} PeeringId *string `field:"required" json:"peeringId" yaml:"peeringId"` // The unique URL of one of the HVNs being peered. // // Setting this attribute is deprecated, but it will remain usable in read-only form. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection#hvn_2 DataHcpHvnPeeringConnection#hvn_2} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection#hvn_2 DataHcpHvnPeeringConnection#hvn_2} Hvn2 *string `field:"optional" json:"hvn2" yaml:"hvn2"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection#id DataHcpHvnPeeringConnection#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection#id DataHcpHvnPeeringConnection#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -45,11 +45,11 @@ type DataHcpHvnPeeringConnectionConfig struct { // // Always matches hvn_1's project ID. Setting this attribute is deprecated, but it will remain usable in read-only form. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection#project_id DataHcpHvnPeeringConnection#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection#project_id DataHcpHvnPeeringConnection#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection#timeouts DataHcpHvnPeeringConnection#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection#timeouts DataHcpHvnPeeringConnection#timeouts} Timeouts *DataHcpHvnPeeringConnectionTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionTimeouts.go b/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionTimeouts.go index f3a5cb6f..860dcacf 100644 --- a/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionTimeouts.go +++ b/hcp/datahcphvnpeeringconnection/DataHcpHvnPeeringConnectionTimeouts.go @@ -5,7 +5,7 @@ package datahcphvnpeeringconnection type DataHcpHvnPeeringConnectionTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection#default DataHcpHvnPeeringConnection#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection#default DataHcpHvnPeeringConnection#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcphvnpeeringconnection/README.md b/hcp/datahcphvnpeeringconnection/README.md index 3c8c72fa..fc9b37c8 100644 --- a/hcp/datahcphvnpeeringconnection/README.md +++ b/hcp/datahcphvnpeeringconnection/README.md @@ -1,3 +1,3 @@ # `data_hcp_hvn_peering_connection` -Refer to the Terraform Registry for docs: [`data_hcp_hvn_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_peering_connection). +Refer to the Terraform Registry for docs: [`data_hcp_hvn_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_peering_connection). diff --git a/hcp/datahcphvnroute/DataHcpHvnRoute.go b/hcp/datahcphvnroute/DataHcpHvnRoute.go index 51f71d0f..88b5aa6a 100644 --- a/hcp/datahcphvnroute/DataHcpHvnRoute.go +++ b/hcp/datahcphvnroute/DataHcpHvnRoute.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route hcp_hvn_route}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route hcp_hvn_route}. type DataHcpHvnRoute interface { cdktf.TerraformDataSource AzureConfig() DataHcpHvnRouteAzureConfigList @@ -425,7 +425,7 @@ func (j *jsiiProxy_DataHcpHvnRoute) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route hcp_hvn_route} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route hcp_hvn_route} Data Source. func NewDataHcpHvnRoute(scope constructs.Construct, id *string, config *DataHcpHvnRouteConfig) DataHcpHvnRoute { _init_.Initialize() @@ -443,7 +443,7 @@ func NewDataHcpHvnRoute(scope constructs.Construct, id *string, config *DataHcpH return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route hcp_hvn_route} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route hcp_hvn_route} Data Source. func NewDataHcpHvnRoute_Override(d DataHcpHvnRoute, scope constructs.Construct, id *string, config *DataHcpHvnRouteConfig) { _init_.Initialize() diff --git a/hcp/datahcphvnroute/DataHcpHvnRouteConfig.go b/hcp/datahcphvnroute/DataHcpHvnRouteConfig.go index 39cdb72d..3a538a02 100644 --- a/hcp/datahcphvnroute/DataHcpHvnRouteConfig.go +++ b/hcp/datahcphvnroute/DataHcpHvnRouteConfig.go @@ -24,13 +24,13 @@ type DataHcpHvnRouteConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The `self_link` of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route#hvn_link DataHcpHvnRoute#hvn_link} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route#hvn_link DataHcpHvnRoute#hvn_link} HvnLink *string `field:"required" json:"hvnLink" yaml:"hvnLink"` // The ID of the HVN route. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route#hvn_route_id DataHcpHvnRoute#hvn_route_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route#hvn_route_id DataHcpHvnRoute#hvn_route_id} HvnRouteId *string `field:"required" json:"hvnRouteId" yaml:"hvnRouteId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route#id DataHcpHvnRoute#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route#id DataHcpHvnRoute#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -39,11 +39,11 @@ type DataHcpHvnRouteConfig struct { // // Always matches the project ID in `hvn_link`. Setting this attribute is deprecated, but it will remain usable in read-only form. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route#project_id DataHcpHvnRoute#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route#project_id DataHcpHvnRoute#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route#timeouts DataHcpHvnRoute#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route#timeouts DataHcpHvnRoute#timeouts} Timeouts *DataHcpHvnRouteTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcphvnroute/DataHcpHvnRouteTimeouts.go b/hcp/datahcphvnroute/DataHcpHvnRouteTimeouts.go index 1751214f..71f735b6 100644 --- a/hcp/datahcphvnroute/DataHcpHvnRouteTimeouts.go +++ b/hcp/datahcphvnroute/DataHcpHvnRouteTimeouts.go @@ -5,7 +5,7 @@ package datahcphvnroute type DataHcpHvnRouteTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route#default DataHcpHvnRoute#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route#default DataHcpHvnRoute#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcphvnroute/README.md b/hcp/datahcphvnroute/README.md index e9fdca3a..4267e0dd 100644 --- a/hcp/datahcphvnroute/README.md +++ b/hcp/datahcphvnroute/README.md @@ -1,3 +1,3 @@ # `data_hcp_hvn_route` -Refer to the Terraform Registry for docs: [`data_hcp_hvn_route`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/hvn_route). +Refer to the Terraform Registry for docs: [`data_hcp_hvn_route`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/hvn_route). diff --git a/hcp/datahcpiampolicy/DataHcpIamPolicy.go b/hcp/datahcpiampolicy/DataHcpIamPolicy.go index 0796b784..236c5323 100644 --- a/hcp/datahcpiampolicy/DataHcpIamPolicy.go +++ b/hcp/datahcpiampolicy/DataHcpIamPolicy.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/iam_policy hcp_iam_policy}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/iam_policy hcp_iam_policy}. type DataHcpIamPolicy interface { cdktf.TerraformDataSource Bindings() DataHcpIamPolicyBindingsList @@ -275,7 +275,7 @@ func (j *jsiiProxy_DataHcpIamPolicy) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/iam_policy hcp_iam_policy} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/iam_policy hcp_iam_policy} Data Source. func NewDataHcpIamPolicy(scope constructs.Construct, id *string, config *DataHcpIamPolicyConfig) DataHcpIamPolicy { _init_.Initialize() @@ -293,7 +293,7 @@ func NewDataHcpIamPolicy(scope constructs.Construct, id *string, config *DataHcp return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/iam_policy hcp_iam_policy} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/iam_policy hcp_iam_policy} Data Source. func NewDataHcpIamPolicy_Override(d DataHcpIamPolicy, scope constructs.Construct, id *string, config *DataHcpIamPolicyConfig) { _init_.Initialize() diff --git a/hcp/datahcpiampolicy/DataHcpIamPolicyBindings.go b/hcp/datahcpiampolicy/DataHcpIamPolicyBindings.go index af7b6a27..a2f52d8f 100644 --- a/hcp/datahcpiampolicy/DataHcpIamPolicyBindings.go +++ b/hcp/datahcpiampolicy/DataHcpIamPolicyBindings.go @@ -7,11 +7,11 @@ package datahcpiampolicy type DataHcpIamPolicyBindings struct { // The set of principals to bind to the given role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/iam_policy#principals DataHcpIamPolicy#principals} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/iam_policy#principals DataHcpIamPolicy#principals} Principals *[]*string `field:"required" json:"principals" yaml:"principals"` // The role name to bind to the given principals. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/iam_policy#role DataHcpIamPolicy#role} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/iam_policy#role DataHcpIamPolicy#role} Role *string `field:"required" json:"role" yaml:"role"` } diff --git a/hcp/datahcpiampolicy/DataHcpIamPolicyConfig.go b/hcp/datahcpiampolicy/DataHcpIamPolicyConfig.go index f65fc0c1..009bc5a4 100644 --- a/hcp/datahcpiampolicy/DataHcpIamPolicyConfig.go +++ b/hcp/datahcpiampolicy/DataHcpIamPolicyConfig.go @@ -24,7 +24,7 @@ type DataHcpIamPolicyConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // A binding associates a set of principals to a role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/iam_policy#bindings DataHcpIamPolicy#bindings} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/iam_policy#bindings DataHcpIamPolicy#bindings} Bindings interface{} `field:"required" json:"bindings" yaml:"bindings"` } diff --git a/hcp/datahcpiampolicy/README.md b/hcp/datahcpiampolicy/README.md index 96378a43..748cbd2c 100644 --- a/hcp/datahcpiampolicy/README.md +++ b/hcp/datahcpiampolicy/README.md @@ -1,3 +1,3 @@ # `data_hcp_iam_policy` -Refer to the Terraform Registry for docs: [`data_hcp_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/iam_policy). +Refer to the Terraform Registry for docs: [`data_hcp_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/iam_policy). diff --git a/hcp/datahcporganization/DataHcpOrganization.go b/hcp/datahcporganization/DataHcpOrganization.go index b23548a8..d72a6ed5 100644 --- a/hcp/datahcporganization/DataHcpOrganization.go +++ b/hcp/datahcporganization/DataHcpOrganization.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/organization hcp_organization}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/organization hcp_organization}. type DataHcpOrganization interface { cdktf.TerraformDataSource // Experimental. @@ -274,7 +274,7 @@ func (j *jsiiProxy_DataHcpOrganization) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/organization hcp_organization} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/organization hcp_organization} Data Source. func NewDataHcpOrganization(scope constructs.Construct, id *string, config *DataHcpOrganizationConfig) DataHcpOrganization { _init_.Initialize() @@ -292,7 +292,7 @@ func NewDataHcpOrganization(scope constructs.Construct, id *string, config *Data return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/organization hcp_organization} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/organization hcp_organization} Data Source. func NewDataHcpOrganization_Override(d DataHcpOrganization, scope constructs.Construct, id *string, config *DataHcpOrganizationConfig) { _init_.Initialize() diff --git a/hcp/datahcporganization/README.md b/hcp/datahcporganization/README.md index d411605c..8a5ca1e3 100644 --- a/hcp/datahcporganization/README.md +++ b/hcp/datahcporganization/README.md @@ -1,3 +1,3 @@ # `data_hcp_organization` -Refer to the Terraform Registry for docs: [`data_hcp_organization`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/organization). +Refer to the Terraform Registry for docs: [`data_hcp_organization`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/organization). diff --git a/hcp/datahcppackerartifact/DataHcpPackerArtifact.go b/hcp/datahcppackerartifact/DataHcpPackerArtifact.go index 0d25b5cc..3f68b17b 100644 --- a/hcp/datahcppackerartifact/DataHcpPackerArtifact.go +++ b/hcp/datahcppackerartifact/DataHcpPackerArtifact.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact hcp_packer_artifact}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact hcp_packer_artifact}. type DataHcpPackerArtifact interface { cdktf.TerraformDataSource BucketName() *string @@ -494,7 +494,7 @@ func (j *jsiiProxy_DataHcpPackerArtifact) VersionFingerprintInput() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact hcp_packer_artifact} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact hcp_packer_artifact} Data Source. func NewDataHcpPackerArtifact(scope constructs.Construct, id *string, config *DataHcpPackerArtifactConfig) DataHcpPackerArtifact { _init_.Initialize() @@ -512,7 +512,7 @@ func NewDataHcpPackerArtifact(scope constructs.Construct, id *string, config *Da return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact hcp_packer_artifact} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact hcp_packer_artifact} Data Source. func NewDataHcpPackerArtifact_Override(d DataHcpPackerArtifact, scope constructs.Construct, id *string, config *DataHcpPackerArtifactConfig) { _init_.Initialize() diff --git a/hcp/datahcppackerartifact/DataHcpPackerArtifactConfig.go b/hcp/datahcppackerartifact/DataHcpPackerArtifactConfig.go index c5a05626..89738b23 100644 --- a/hcp/datahcppackerartifact/DataHcpPackerArtifactConfig.go +++ b/hcp/datahcppackerartifact/DataHcpPackerArtifactConfig.go @@ -24,37 +24,37 @@ type DataHcpPackerArtifactConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the HCP Packer Bucket where the Artifact is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact#bucket_name DataHcpPackerArtifact#bucket_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact#bucket_name DataHcpPackerArtifact#bucket_name} BucketName *string `field:"required" json:"bucketName" yaml:"bucketName"` // Name of the platform where the HCP Packer Artifact is stored. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact#platform DataHcpPackerArtifact#platform} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact#platform DataHcpPackerArtifact#platform} Platform *string `field:"required" json:"platform" yaml:"platform"` // The Region where the HCP Packer Artifact is stored, if any. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact#region DataHcpPackerArtifact#region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact#region DataHcpPackerArtifact#region} Region *string `field:"required" json:"region" yaml:"region"` // The name of the HCP Packer Channel the Version containing this Artifact is assigned to. // // The Version currently assigned to the Channel will be fetched. // Exactly one of `channel_name` or `version_fingerprint` must be provided. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact#channel_name DataHcpPackerArtifact#channel_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact#channel_name DataHcpPackerArtifact#channel_name} ChannelName *string `field:"optional" json:"channelName" yaml:"channelName"` // Name of the Packer builder that built this Artifact. Ex: `amazon-ebs.example`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact#component_type DataHcpPackerArtifact#component_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact#component_type DataHcpPackerArtifact#component_type} ComponentType *string `field:"optional" json:"componentType" yaml:"componentType"` // The ID of the HCP Organization where the Artifact is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact#project_id DataHcpPackerArtifact#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact#project_id DataHcpPackerArtifact#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // The fingerprint of the HCP Packer Version where the Artifact is located. // // If provided in the config, it is used to fetch the Version. // Exactly one of `channel_name` or `version_fingerprint` must be provided. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact#version_fingerprint DataHcpPackerArtifact#version_fingerprint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact#version_fingerprint DataHcpPackerArtifact#version_fingerprint} VersionFingerprint *string `field:"optional" json:"versionFingerprint" yaml:"versionFingerprint"` } diff --git a/hcp/datahcppackerartifact/README.md b/hcp/datahcppackerartifact/README.md index cd0fb885..a76e9a50 100644 --- a/hcp/datahcppackerartifact/README.md +++ b/hcp/datahcppackerartifact/README.md @@ -1,3 +1,3 @@ # `data_hcp_packer_artifact` -Refer to the Terraform Registry for docs: [`data_hcp_packer_artifact`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_artifact). +Refer to the Terraform Registry for docs: [`data_hcp_packer_artifact`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_artifact). diff --git a/hcp/datahcppackerbucketnames/DataHcpPackerBucketNames.go b/hcp/datahcppackerbucketnames/DataHcpPackerBucketNames.go index ee595c2b..ce89c061 100644 --- a/hcp/datahcppackerbucketnames/DataHcpPackerBucketNames.go +++ b/hcp/datahcppackerbucketnames/DataHcpPackerBucketNames.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names hcp_packer_bucket_names}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names hcp_packer_bucket_names}. type DataHcpPackerBucketNames interface { cdktf.TerraformDataSource // Experimental. @@ -335,7 +335,7 @@ func (j *jsiiProxy_DataHcpPackerBucketNames) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names hcp_packer_bucket_names} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names hcp_packer_bucket_names} Data Source. func NewDataHcpPackerBucketNames(scope constructs.Construct, id *string, config *DataHcpPackerBucketNamesConfig) DataHcpPackerBucketNames { _init_.Initialize() @@ -353,7 +353,7 @@ func NewDataHcpPackerBucketNames(scope constructs.Construct, id *string, config return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names hcp_packer_bucket_names} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names hcp_packer_bucket_names} Data Source. func NewDataHcpPackerBucketNames_Override(d DataHcpPackerBucketNames, scope constructs.Construct, id *string, config *DataHcpPackerBucketNamesConfig) { _init_.Initialize() diff --git a/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesConfig.go b/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesConfig.go index a8a44b8a..aa96bd4b 100644 --- a/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesConfig.go +++ b/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesConfig.go @@ -22,18 +22,18 @@ type DataHcpPackerBucketNamesConfig struct { Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names#id DataHcpPackerBucketNames#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names#id DataHcpPackerBucketNames#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // The ID of the HCP project where the HCP Packer registry is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names#project_id DataHcpPackerBucketNames#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names#project_id DataHcpPackerBucketNames#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names#timeouts DataHcpPackerBucketNames#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names#timeouts DataHcpPackerBucketNames#timeouts} Timeouts *DataHcpPackerBucketNamesTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesTimeouts.go b/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesTimeouts.go index ee164451..cb0d4485 100644 --- a/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesTimeouts.go +++ b/hcp/datahcppackerbucketnames/DataHcpPackerBucketNamesTimeouts.go @@ -5,7 +5,7 @@ package datahcppackerbucketnames type DataHcpPackerBucketNamesTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names#default DataHcpPackerBucketNames#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names#default DataHcpPackerBucketNames#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcppackerbucketnames/README.md b/hcp/datahcppackerbucketnames/README.md index b9943733..9d804ac0 100644 --- a/hcp/datahcppackerbucketnames/README.md +++ b/hcp/datahcppackerbucketnames/README.md @@ -1,3 +1,3 @@ # `data_hcp_packer_bucket_names` -Refer to the Terraform Registry for docs: [`data_hcp_packer_bucket_names`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_bucket_names). +Refer to the Terraform Registry for docs: [`data_hcp_packer_bucket_names`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_bucket_names). diff --git a/hcp/datahcppackerruntask/DataHcpPackerRunTask.go b/hcp/datahcppackerruntask/DataHcpPackerRunTask.go index 2d703f5a..e9de37a6 100644 --- a/hcp/datahcppackerruntask/DataHcpPackerRunTask.go +++ b/hcp/datahcppackerruntask/DataHcpPackerRunTask.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task hcp_packer_run_task}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task hcp_packer_run_task}. type DataHcpPackerRunTask interface { cdktf.TerraformDataSource // Experimental. @@ -346,7 +346,7 @@ func (j *jsiiProxy_DataHcpPackerRunTask) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task hcp_packer_run_task} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task hcp_packer_run_task} Data Source. func NewDataHcpPackerRunTask(scope constructs.Construct, id *string, config *DataHcpPackerRunTaskConfig) DataHcpPackerRunTask { _init_.Initialize() @@ -364,7 +364,7 @@ func NewDataHcpPackerRunTask(scope constructs.Construct, id *string, config *Dat return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task hcp_packer_run_task} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task hcp_packer_run_task} Data Source. func NewDataHcpPackerRunTask_Override(d DataHcpPackerRunTask, scope constructs.Construct, id *string, config *DataHcpPackerRunTaskConfig) { _init_.Initialize() diff --git a/hcp/datahcppackerruntask/DataHcpPackerRunTaskConfig.go b/hcp/datahcppackerruntask/DataHcpPackerRunTaskConfig.go index 4ea731e5..cbf89341 100644 --- a/hcp/datahcppackerruntask/DataHcpPackerRunTaskConfig.go +++ b/hcp/datahcppackerruntask/DataHcpPackerRunTaskConfig.go @@ -22,7 +22,7 @@ type DataHcpPackerRunTaskConfig struct { Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task#id DataHcpPackerRunTask#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task#id DataHcpPackerRunTask#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -32,11 +32,11 @@ type DataHcpPackerRunTaskConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task#project_id DataHcpPackerRunTask#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task#project_id DataHcpPackerRunTask#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task#timeouts DataHcpPackerRunTask#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task#timeouts DataHcpPackerRunTask#timeouts} Timeouts *DataHcpPackerRunTaskTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcppackerruntask/DataHcpPackerRunTaskTimeouts.go b/hcp/datahcppackerruntask/DataHcpPackerRunTaskTimeouts.go index 8d9fa322..da64f35d 100644 --- a/hcp/datahcppackerruntask/DataHcpPackerRunTaskTimeouts.go +++ b/hcp/datahcppackerruntask/DataHcpPackerRunTaskTimeouts.go @@ -5,7 +5,7 @@ package datahcppackerruntask type DataHcpPackerRunTaskTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task#default DataHcpPackerRunTask#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task#default DataHcpPackerRunTask#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcppackerruntask/README.md b/hcp/datahcppackerruntask/README.md index 658b6420..67d03150 100644 --- a/hcp/datahcppackerruntask/README.md +++ b/hcp/datahcppackerruntask/README.md @@ -1,3 +1,3 @@ # `data_hcp_packer_run_task` -Refer to the Terraform Registry for docs: [`data_hcp_packer_run_task`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_run_task). +Refer to the Terraform Registry for docs: [`data_hcp_packer_run_task`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_run_task). diff --git a/hcp/datahcppackerversion/DataHcpPackerVersion.go b/hcp/datahcppackerversion/DataHcpPackerVersion.go index 691ae7a9..333d4f40 100644 --- a/hcp/datahcppackerversion/DataHcpPackerVersion.go +++ b/hcp/datahcppackerversion/DataHcpPackerVersion.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_version hcp_packer_version}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_version hcp_packer_version}. type DataHcpPackerVersion interface { cdktf.TerraformDataSource AuthorId() *string @@ -399,7 +399,7 @@ func (j *jsiiProxy_DataHcpPackerVersion) UpdatedAt() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_version hcp_packer_version} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_version hcp_packer_version} Data Source. func NewDataHcpPackerVersion(scope constructs.Construct, id *string, config *DataHcpPackerVersionConfig) DataHcpPackerVersion { _init_.Initialize() @@ -417,7 +417,7 @@ func NewDataHcpPackerVersion(scope constructs.Construct, id *string, config *Dat return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_version hcp_packer_version} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_version hcp_packer_version} Data Source. func NewDataHcpPackerVersion_Override(d DataHcpPackerVersion, scope constructs.Construct, id *string, config *DataHcpPackerVersionConfig) { _init_.Initialize() diff --git a/hcp/datahcppackerversion/DataHcpPackerVersionConfig.go b/hcp/datahcppackerversion/DataHcpPackerVersionConfig.go index 0dfb6d5e..c24497a1 100644 --- a/hcp/datahcppackerversion/DataHcpPackerVersionConfig.go +++ b/hcp/datahcppackerversion/DataHcpPackerVersionConfig.go @@ -24,17 +24,17 @@ type DataHcpPackerVersionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the HCP Packer Bucket where the Version is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_version#bucket_name DataHcpPackerVersion#bucket_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_version#bucket_name DataHcpPackerVersion#bucket_name} BucketName *string `field:"required" json:"bucketName" yaml:"bucketName"` // The name of the HCP Packer Channel the Version is assigned to. // // The version currently assigned to the Channel will be fetched. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_version#channel_name DataHcpPackerVersion#channel_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_version#channel_name DataHcpPackerVersion#channel_name} ChannelName *string `field:"required" json:"channelName" yaml:"channelName"` // The ID of the HCP Organization where the Version is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_version#project_id DataHcpPackerVersion#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_version#project_id DataHcpPackerVersion#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/datahcppackerversion/README.md b/hcp/datahcppackerversion/README.md index cc40c7be..80cc668d 100644 --- a/hcp/datahcppackerversion/README.md +++ b/hcp/datahcppackerversion/README.md @@ -1,3 +1,3 @@ # `data_hcp_packer_version` -Refer to the Terraform Registry for docs: [`data_hcp_packer_version`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/packer_version). +Refer to the Terraform Registry for docs: [`data_hcp_packer_version`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/packer_version). diff --git a/hcp/datahcpproject/DataHcpProject.go b/hcp/datahcpproject/DataHcpProject.go index 57c45f2e..db36bb0d 100644 --- a/hcp/datahcpproject/DataHcpProject.go +++ b/hcp/datahcpproject/DataHcpProject.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/project hcp_project}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/project hcp_project}. type DataHcpProject interface { cdktf.TerraformDataSource // Experimental. @@ -309,7 +309,7 @@ func (j *jsiiProxy_DataHcpProject) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/project hcp_project} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/project hcp_project} Data Source. func NewDataHcpProject(scope constructs.Construct, id *string, config *DataHcpProjectConfig) DataHcpProject { _init_.Initialize() @@ -327,7 +327,7 @@ func NewDataHcpProject(scope constructs.Construct, id *string, config *DataHcpPr return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/project hcp_project} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/project hcp_project} Data Source. func NewDataHcpProject_Override(d DataHcpProject, scope constructs.Construct, id *string, config *DataHcpProjectConfig) { _init_.Initialize() diff --git a/hcp/datahcpproject/DataHcpProjectConfig.go b/hcp/datahcpproject/DataHcpProjectConfig.go index 2416c689..0cfd44e3 100644 --- a/hcp/datahcpproject/DataHcpProjectConfig.go +++ b/hcp/datahcpproject/DataHcpProjectConfig.go @@ -26,7 +26,7 @@ type DataHcpProjectConfig struct { // // May be given as "" or "project/". If not set, the provider project is used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/project#project DataHcpProject#project} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/project#project DataHcpProject#project} Project *string `field:"optional" json:"project" yaml:"project"` } diff --git a/hcp/datahcpproject/README.md b/hcp/datahcpproject/README.md index b36caaa1..1a135bc0 100644 --- a/hcp/datahcpproject/README.md +++ b/hcp/datahcpproject/README.md @@ -1,3 +1,3 @@ # `data_hcp_project` -Refer to the Terraform Registry for docs: [`data_hcp_project`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/project). +Refer to the Terraform Registry for docs: [`data_hcp_project`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/project). diff --git a/hcp/datahcpserviceprincipal/DataHcpServicePrincipal.go b/hcp/datahcpserviceprincipal/DataHcpServicePrincipal.go index 28b94f03..f263bde4 100644 --- a/hcp/datahcpserviceprincipal/DataHcpServicePrincipal.go +++ b/hcp/datahcpserviceprincipal/DataHcpServicePrincipal.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/service_principal hcp_service_principal}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/service_principal hcp_service_principal}. type DataHcpServicePrincipal interface { cdktf.TerraformDataSource // Experimental. @@ -286,7 +286,7 @@ func (j *jsiiProxy_DataHcpServicePrincipal) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/service_principal hcp_service_principal} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/service_principal hcp_service_principal} Data Source. func NewDataHcpServicePrincipal(scope constructs.Construct, id *string, config *DataHcpServicePrincipalConfig) DataHcpServicePrincipal { _init_.Initialize() @@ -304,7 +304,7 @@ func NewDataHcpServicePrincipal(scope constructs.Construct, id *string, config * return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/service_principal hcp_service_principal} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/service_principal hcp_service_principal} Data Source. func NewDataHcpServicePrincipal_Override(d DataHcpServicePrincipal, scope constructs.Construct, id *string, config *DataHcpServicePrincipalConfig) { _init_.Initialize() diff --git a/hcp/datahcpserviceprincipal/DataHcpServicePrincipalConfig.go b/hcp/datahcpserviceprincipal/DataHcpServicePrincipalConfig.go index 08f62a44..0dec2ea8 100644 --- a/hcp/datahcpserviceprincipal/DataHcpServicePrincipalConfig.go +++ b/hcp/datahcpserviceprincipal/DataHcpServicePrincipalConfig.go @@ -24,7 +24,7 @@ type DataHcpServicePrincipalConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The service principal's resource name in format `iam/project//service-principal/` or `iam/organization//service-principal/`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/service_principal#resource_name DataHcpServicePrincipal#resource_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/service_principal#resource_name DataHcpServicePrincipal#resource_name} ResourceName *string `field:"required" json:"resourceName" yaml:"resourceName"` } diff --git a/hcp/datahcpserviceprincipal/README.md b/hcp/datahcpserviceprincipal/README.md index 63c6a50d..580afc08 100644 --- a/hcp/datahcpserviceprincipal/README.md +++ b/hcp/datahcpserviceprincipal/README.md @@ -1,3 +1,3 @@ # `data_hcp_service_principal` -Refer to the Terraform Registry for docs: [`data_hcp_service_principal`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/service_principal). +Refer to the Terraform Registry for docs: [`data_hcp_service_principal`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/service_principal). diff --git a/hcp/datahcpuserprincipal/DataHcpUserPrincipal.go b/hcp/datahcpuserprincipal/DataHcpUserPrincipal.go index e57db75d..613a42d0 100644 --- a/hcp/datahcpuserprincipal/DataHcpUserPrincipal.go +++ b/hcp/datahcpuserprincipal/DataHcpUserPrincipal.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/user_principal hcp_user_principal}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/user_principal hcp_user_principal}. type DataHcpUserPrincipal interface { cdktf.TerraformDataSource // Experimental. @@ -289,7 +289,7 @@ func (j *jsiiProxy_DataHcpUserPrincipal) UserIdInput() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/user_principal hcp_user_principal} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/user_principal hcp_user_principal} Data Source. func NewDataHcpUserPrincipal(scope constructs.Construct, id *string, config *DataHcpUserPrincipalConfig) DataHcpUserPrincipal { _init_.Initialize() @@ -307,7 +307,7 @@ func NewDataHcpUserPrincipal(scope constructs.Construct, id *string, config *Dat return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/user_principal hcp_user_principal} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/user_principal hcp_user_principal} Data Source. func NewDataHcpUserPrincipal_Override(d DataHcpUserPrincipal, scope constructs.Construct, id *string, config *DataHcpUserPrincipalConfig) { _init_.Initialize() diff --git a/hcp/datahcpuserprincipal/DataHcpUserPrincipalConfig.go b/hcp/datahcpuserprincipal/DataHcpUserPrincipalConfig.go index 065ad2b8..02f6754a 100644 --- a/hcp/datahcpuserprincipal/DataHcpUserPrincipalConfig.go +++ b/hcp/datahcpuserprincipal/DataHcpUserPrincipalConfig.go @@ -24,11 +24,11 @@ type DataHcpUserPrincipalConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The user's email. Can not be combined with user_id. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/user_principal#email DataHcpUserPrincipal#email} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/user_principal#email DataHcpUserPrincipal#email} Email *string `field:"optional" json:"email" yaml:"email"` // The user's unique identifier. Can not be combined with email. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/user_principal#user_id DataHcpUserPrincipal#user_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/user_principal#user_id DataHcpUserPrincipal#user_id} UserId *string `field:"optional" json:"userId" yaml:"userId"` } diff --git a/hcp/datahcpuserprincipal/README.md b/hcp/datahcpuserprincipal/README.md index 17ed024f..0601fe74 100644 --- a/hcp/datahcpuserprincipal/README.md +++ b/hcp/datahcpuserprincipal/README.md @@ -1,3 +1,3 @@ # `data_hcp_user_principal` -Refer to the Terraform Registry for docs: [`data_hcp_user_principal`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/user_principal). +Refer to the Terraform Registry for docs: [`data_hcp_user_principal`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/user_principal). diff --git a/hcp/datahcpvaultcluster/DataHcpVaultCluster.go b/hcp/datahcpvaultcluster/DataHcpVaultCluster.go index 29a26dcd..69fdad7a 100644 --- a/hcp/datahcpvaultcluster/DataHcpVaultCluster.go +++ b/hcp/datahcpvaultcluster/DataHcpVaultCluster.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster hcp_vault_cluster}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster hcp_vault_cluster}. type DataHcpVaultCluster interface { cdktf.TerraformDataSource AuditLogConfig() DataHcpVaultClusterAuditLogConfigList @@ -604,7 +604,7 @@ func (j *jsiiProxy_DataHcpVaultCluster) VaultVersion() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster hcp_vault_cluster} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster hcp_vault_cluster} Data Source. func NewDataHcpVaultCluster(scope constructs.Construct, id *string, config *DataHcpVaultClusterConfig) DataHcpVaultCluster { _init_.Initialize() @@ -622,7 +622,7 @@ func NewDataHcpVaultCluster(scope constructs.Construct, id *string, config *Data return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster hcp_vault_cluster} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster hcp_vault_cluster} Data Source. func NewDataHcpVaultCluster_Override(d DataHcpVaultCluster, scope constructs.Construct, id *string, config *DataHcpVaultClusterConfig) { _init_.Initialize() diff --git a/hcp/datahcpvaultcluster/DataHcpVaultClusterConfig.go b/hcp/datahcpvaultcluster/DataHcpVaultClusterConfig.go index ef20f70b..c9bc5cbf 100644 --- a/hcp/datahcpvaultcluster/DataHcpVaultClusterConfig.go +++ b/hcp/datahcpvaultcluster/DataHcpVaultClusterConfig.go @@ -24,31 +24,31 @@ type DataHcpVaultClusterConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Vault cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster#cluster_id DataHcpVaultCluster#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster#cluster_id DataHcpVaultCluster#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // audit_log_config block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster#audit_log_config DataHcpVaultCluster#audit_log_config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster#audit_log_config DataHcpVaultCluster#audit_log_config} AuditLogConfig interface{} `field:"optional" json:"auditLogConfig" yaml:"auditLogConfig"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster#id DataHcpVaultCluster#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster#id DataHcpVaultCluster#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // metrics_config block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster#metrics_config DataHcpVaultCluster#metrics_config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster#metrics_config DataHcpVaultCluster#metrics_config} MetricsConfig interface{} `field:"optional" json:"metricsConfig" yaml:"metricsConfig"` // The ID of the HCP project where the Vault cluster is located. // // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster#project_id DataHcpVaultCluster#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster#project_id DataHcpVaultCluster#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster#timeouts DataHcpVaultCluster#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster#timeouts DataHcpVaultCluster#timeouts} Timeouts *DataHcpVaultClusterTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcpvaultcluster/DataHcpVaultClusterTimeouts.go b/hcp/datahcpvaultcluster/DataHcpVaultClusterTimeouts.go index 0ebef337..8ee669d5 100644 --- a/hcp/datahcpvaultcluster/DataHcpVaultClusterTimeouts.go +++ b/hcp/datahcpvaultcluster/DataHcpVaultClusterTimeouts.go @@ -5,7 +5,7 @@ package datahcpvaultcluster type DataHcpVaultClusterTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster#default DataHcpVaultCluster#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster#default DataHcpVaultCluster#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpvaultcluster/README.md b/hcp/datahcpvaultcluster/README.md index 44964027..d87b9259 100644 --- a/hcp/datahcpvaultcluster/README.md +++ b/hcp/datahcpvaultcluster/README.md @@ -1,3 +1,3 @@ # `data_hcp_vault_cluster` -Refer to the Terraform Registry for docs: [`data_hcp_vault_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_cluster). +Refer to the Terraform Registry for docs: [`data_hcp_vault_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_cluster). diff --git a/hcp/datahcpvaultplugin/DataHcpVaultPlugin.go b/hcp/datahcpvaultplugin/DataHcpVaultPlugin.go index 98854681..4d8d90c6 100644 --- a/hcp/datahcpvaultplugin/DataHcpVaultPlugin.go +++ b/hcp/datahcpvaultplugin/DataHcpVaultPlugin.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin hcp_vault_plugin}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin hcp_vault_plugin}. type DataHcpVaultPlugin interface { cdktf.TerraformDataSource // Experimental. @@ -382,7 +382,7 @@ func (j *jsiiProxy_DataHcpVaultPlugin) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin hcp_vault_plugin} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin hcp_vault_plugin} Data Source. func NewDataHcpVaultPlugin(scope constructs.Construct, id *string, config *DataHcpVaultPluginConfig) DataHcpVaultPlugin { _init_.Initialize() @@ -400,7 +400,7 @@ func NewDataHcpVaultPlugin(scope constructs.Construct, id *string, config *DataH return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin hcp_vault_plugin} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin hcp_vault_plugin} Data Source. func NewDataHcpVaultPlugin_Override(d DataHcpVaultPlugin, scope constructs.Construct, id *string, config *DataHcpVaultPluginConfig) { _init_.Initialize() diff --git a/hcp/datahcpvaultplugin/DataHcpVaultPluginConfig.go b/hcp/datahcpvaultplugin/DataHcpVaultPluginConfig.go index ba5f7b5d..687a4d70 100644 --- a/hcp/datahcpvaultplugin/DataHcpVaultPluginConfig.go +++ b/hcp/datahcpvaultplugin/DataHcpVaultPluginConfig.go @@ -24,17 +24,17 @@ type DataHcpVaultPluginConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Vault cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin#cluster_id DataHcpVaultPlugin#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin#cluster_id DataHcpVaultPlugin#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // The name of the plugin - Valid options for plugin name - 'venafi-pki-backend'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin#plugin_name DataHcpVaultPlugin#plugin_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin#plugin_name DataHcpVaultPlugin#plugin_name} PluginName *string `field:"required" json:"pluginName" yaml:"pluginName"` // The type of the plugin - Valid options for plugin type - 'SECRET', 'AUTH', 'DATABASE'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin#plugin_type DataHcpVaultPlugin#plugin_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin#plugin_type DataHcpVaultPlugin#plugin_type} PluginType *string `field:"required" json:"pluginType" yaml:"pluginType"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin#id DataHcpVaultPlugin#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin#id DataHcpVaultPlugin#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -44,11 +44,11 @@ type DataHcpVaultPluginConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin#project_id DataHcpVaultPlugin#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin#project_id DataHcpVaultPlugin#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin#timeouts DataHcpVaultPlugin#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin#timeouts DataHcpVaultPlugin#timeouts} Timeouts *DataHcpVaultPluginTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/datahcpvaultplugin/DataHcpVaultPluginTimeouts.go b/hcp/datahcpvaultplugin/DataHcpVaultPluginTimeouts.go index 96e8b1b1..c58f64eb 100644 --- a/hcp/datahcpvaultplugin/DataHcpVaultPluginTimeouts.go +++ b/hcp/datahcpvaultplugin/DataHcpVaultPluginTimeouts.go @@ -5,7 +5,7 @@ package datahcpvaultplugin type DataHcpVaultPluginTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin#default DataHcpVaultPlugin#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin#default DataHcpVaultPlugin#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/datahcpvaultplugin/README.md b/hcp/datahcpvaultplugin/README.md index 8da25996..dd743bdd 100644 --- a/hcp/datahcpvaultplugin/README.md +++ b/hcp/datahcpvaultplugin/README.md @@ -1,3 +1,3 @@ # `data_hcp_vault_plugin` -Refer to the Terraform Registry for docs: [`data_hcp_vault_plugin`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_plugin). +Refer to the Terraform Registry for docs: [`data_hcp_vault_plugin`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_plugin). diff --git a/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsApp.go b/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsApp.go index ed591804..14257a26 100644 --- a/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsApp.go +++ b/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsApp.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_app hcp_vault_secrets_app}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_app hcp_vault_secrets_app}. type DataHcpVaultSecretsApp interface { cdktf.TerraformDataSource AppName() *string @@ -308,7 +308,7 @@ func (j *jsiiProxy_DataHcpVaultSecretsApp) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_app hcp_vault_secrets_app} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_app hcp_vault_secrets_app} Data Source. func NewDataHcpVaultSecretsApp(scope constructs.Construct, id *string, config *DataHcpVaultSecretsAppConfig) DataHcpVaultSecretsApp { _init_.Initialize() @@ -326,7 +326,7 @@ func NewDataHcpVaultSecretsApp(scope constructs.Construct, id *string, config *D return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_app hcp_vault_secrets_app} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_app hcp_vault_secrets_app} Data Source. func NewDataHcpVaultSecretsApp_Override(d DataHcpVaultSecretsApp, scope constructs.Construct, id *string, config *DataHcpVaultSecretsAppConfig) { _init_.Initialize() diff --git a/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsAppConfig.go b/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsAppConfig.go index 8658c10b..9ccdf367 100644 --- a/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsAppConfig.go +++ b/hcp/datahcpvaultsecretsapp/DataHcpVaultSecretsAppConfig.go @@ -24,7 +24,7 @@ type DataHcpVaultSecretsAppConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the Vault Secrets application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_app#app_name DataHcpVaultSecretsApp#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_app#app_name DataHcpVaultSecretsApp#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` } diff --git a/hcp/datahcpvaultsecretsapp/README.md b/hcp/datahcpvaultsecretsapp/README.md index a1aadcce..0a1b412c 100644 --- a/hcp/datahcpvaultsecretsapp/README.md +++ b/hcp/datahcpvaultsecretsapp/README.md @@ -1,3 +1,3 @@ # `data_hcp_vault_secrets_app` -Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_app`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_app). +Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_app`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_app). diff --git a/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecret.go b/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecret.go index 4b770e7d..6cbe123f 100644 --- a/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecret.go +++ b/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecret.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret}. type DataHcpVaultSecretsDynamicSecret interface { cdktf.TerraformDataSource AppName() *string @@ -331,7 +331,7 @@ func (j *jsiiProxy_DataHcpVaultSecretsDynamicSecret) TerraformResourceType() *st } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Data Source. func NewDataHcpVaultSecretsDynamicSecret(scope constructs.Construct, id *string, config *DataHcpVaultSecretsDynamicSecretConfig) DataHcpVaultSecretsDynamicSecret { _init_.Initialize() @@ -349,7 +349,7 @@ func NewDataHcpVaultSecretsDynamicSecret(scope constructs.Construct, id *string, return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Data Source. func NewDataHcpVaultSecretsDynamicSecret_Override(d DataHcpVaultSecretsDynamicSecret, scope constructs.Construct, id *string, config *DataHcpVaultSecretsDynamicSecretConfig) { _init_.Initialize() diff --git a/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecretConfig.go b/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecretConfig.go index bac39f43..c404e213 100644 --- a/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecretConfig.go +++ b/hcp/datahcpvaultsecretsdynamicsecret/DataHcpVaultSecretsDynamicSecretConfig.go @@ -24,11 +24,11 @@ type DataHcpVaultSecretsDynamicSecretConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the Vault Secrets application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_dynamic_secret#app_name DataHcpVaultSecretsDynamicSecret#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_dynamic_secret#app_name DataHcpVaultSecretsDynamicSecret#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` // The name of the Vault Secrets secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_dynamic_secret#secret_name DataHcpVaultSecretsDynamicSecret#secret_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_dynamic_secret#secret_name DataHcpVaultSecretsDynamicSecret#secret_name} SecretName *string `field:"required" json:"secretName" yaml:"secretName"` } diff --git a/hcp/datahcpvaultsecretsdynamicsecret/README.md b/hcp/datahcpvaultsecretsdynamicsecret/README.md index ef228fcb..1f500398 100644 --- a/hcp/datahcpvaultsecretsdynamicsecret/README.md +++ b/hcp/datahcpvaultsecretsdynamicsecret/README.md @@ -1,3 +1,3 @@ # `data_hcp_vault_secrets_dynamic_secret` -Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_dynamic_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_dynamic_secret). +Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_dynamic_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_dynamic_secret). diff --git a/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecret.go b/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecret.go index 3499a101..dd38515c 100644 --- a/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecret.go +++ b/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecret.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret}. type DataHcpVaultSecretsRotatingSecret interface { cdktf.TerraformDataSource AppName() *string @@ -353,7 +353,7 @@ func (j *jsiiProxy_DataHcpVaultSecretsRotatingSecret) TerraformResourceType() *s } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Data Source. func NewDataHcpVaultSecretsRotatingSecret(scope constructs.Construct, id *string, config *DataHcpVaultSecretsRotatingSecretConfig) DataHcpVaultSecretsRotatingSecret { _init_.Initialize() @@ -371,7 +371,7 @@ func NewDataHcpVaultSecretsRotatingSecret(scope constructs.Construct, id *string return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Data Source. func NewDataHcpVaultSecretsRotatingSecret_Override(d DataHcpVaultSecretsRotatingSecret, scope constructs.Construct, id *string, config *DataHcpVaultSecretsRotatingSecretConfig) { _init_.Initialize() diff --git a/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecretConfig.go b/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecretConfig.go index 21f6656b..c558e932 100644 --- a/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecretConfig.go +++ b/hcp/datahcpvaultsecretsrotatingsecret/DataHcpVaultSecretsRotatingSecretConfig.go @@ -24,11 +24,11 @@ type DataHcpVaultSecretsRotatingSecretConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the Vault Secrets application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_rotating_secret#app_name DataHcpVaultSecretsRotatingSecret#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_rotating_secret#app_name DataHcpVaultSecretsRotatingSecret#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` // The name of the Vault Secrets secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_rotating_secret#secret_name DataHcpVaultSecretsRotatingSecret#secret_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_rotating_secret#secret_name DataHcpVaultSecretsRotatingSecret#secret_name} SecretName *string `field:"required" json:"secretName" yaml:"secretName"` } diff --git a/hcp/datahcpvaultsecretsrotatingsecret/README.md b/hcp/datahcpvaultsecretsrotatingsecret/README.md index 0e46f2d3..ca8d9f1b 100644 --- a/hcp/datahcpvaultsecretsrotatingsecret/README.md +++ b/hcp/datahcpvaultsecretsrotatingsecret/README.md @@ -1,3 +1,3 @@ # `data_hcp_vault_secrets_rotating_secret` -Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_rotating_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_rotating_secret). +Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_rotating_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_rotating_secret). diff --git a/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecret.go b/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecret.go index adb67147..117423cc 100644 --- a/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecret.go +++ b/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecret.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_secret hcp_vault_secrets_secret}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_secret hcp_vault_secrets_secret}. type DataHcpVaultSecretsSecret interface { cdktf.TerraformDataSource AppName() *string @@ -331,7 +331,7 @@ func (j *jsiiProxy_DataHcpVaultSecretsSecret) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_secret hcp_vault_secrets_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_secret hcp_vault_secrets_secret} Data Source. func NewDataHcpVaultSecretsSecret(scope constructs.Construct, id *string, config *DataHcpVaultSecretsSecretConfig) DataHcpVaultSecretsSecret { _init_.Initialize() @@ -349,7 +349,7 @@ func NewDataHcpVaultSecretsSecret(scope constructs.Construct, id *string, config return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_secret hcp_vault_secrets_secret} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_secret hcp_vault_secrets_secret} Data Source. func NewDataHcpVaultSecretsSecret_Override(d DataHcpVaultSecretsSecret, scope constructs.Construct, id *string, config *DataHcpVaultSecretsSecretConfig) { _init_.Initialize() diff --git a/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecretConfig.go b/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecretConfig.go index 53f3dd8e..2d19ddc2 100644 --- a/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecretConfig.go +++ b/hcp/datahcpvaultsecretssecret/DataHcpVaultSecretsSecretConfig.go @@ -24,11 +24,11 @@ type DataHcpVaultSecretsSecretConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the Vault Secrets application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_secret#app_name DataHcpVaultSecretsSecret#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_secret#app_name DataHcpVaultSecretsSecret#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` // The name of the Vault Secrets secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_secret#secret_name DataHcpVaultSecretsSecret#secret_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_secret#secret_name DataHcpVaultSecretsSecret#secret_name} SecretName *string `field:"required" json:"secretName" yaml:"secretName"` } diff --git a/hcp/datahcpvaultsecretssecret/README.md b/hcp/datahcpvaultsecretssecret/README.md index acaa84a5..dbde43de 100644 --- a/hcp/datahcpvaultsecretssecret/README.md +++ b/hcp/datahcpvaultsecretssecret/README.md @@ -1,3 +1,3 @@ # `data_hcp_vault_secrets_secret` -Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/vault_secrets_secret). +Refer to the Terraform Registry for docs: [`data_hcp_vault_secrets_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/vault_secrets_secret). diff --git a/hcp/datahcpwaypointaction/DataHcpWaypointAction.go b/hcp/datahcpwaypointaction/DataHcpWaypointAction.go index 047f78f5..b40af4fe 100644 --- a/hcp/datahcpwaypointaction/DataHcpWaypointAction.go +++ b/hcp/datahcpwaypointaction/DataHcpWaypointAction.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_action hcp_waypoint_action}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_action hcp_waypoint_action}. type DataHcpWaypointAction interface { cdktf.TerraformDataSource // Experimental. @@ -346,7 +346,7 @@ func (j *jsiiProxy_DataHcpWaypointAction) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_action hcp_waypoint_action} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_action hcp_waypoint_action} Data Source. func NewDataHcpWaypointAction(scope constructs.Construct, id *string, config *DataHcpWaypointActionConfig) DataHcpWaypointAction { _init_.Initialize() @@ -364,7 +364,7 @@ func NewDataHcpWaypointAction(scope constructs.Construct, id *string, config *Da return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_action hcp_waypoint_action} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_action hcp_waypoint_action} Data Source. func NewDataHcpWaypointAction_Override(d DataHcpWaypointAction, scope constructs.Construct, id *string, config *DataHcpWaypointActionConfig) { _init_.Initialize() diff --git a/hcp/datahcpwaypointaction/DataHcpWaypointActionConfig.go b/hcp/datahcpwaypointaction/DataHcpWaypointActionConfig.go index cc2000b1..768ad377 100644 --- a/hcp/datahcpwaypointaction/DataHcpWaypointActionConfig.go +++ b/hcp/datahcpwaypointaction/DataHcpWaypointActionConfig.go @@ -24,18 +24,18 @@ type DataHcpWaypointActionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Action. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_action#id DataHcpWaypointAction#id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_action#id DataHcpWaypointAction#id} // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // The name of the Action. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_action#name DataHcpWaypointAction#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_action#name DataHcpWaypointAction#name} Name *string `field:"optional" json:"name" yaml:"name"` // The ID of the HCP project where the Waypoint Action is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_action#project_id DataHcpWaypointAction#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_action#project_id DataHcpWaypointAction#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/datahcpwaypointaction/README.md b/hcp/datahcpwaypointaction/README.md index 9cec033d..e9658496 100644 --- a/hcp/datahcpwaypointaction/README.md +++ b/hcp/datahcpwaypointaction/README.md @@ -1,3 +1,3 @@ # `data_hcp_waypoint_action` -Refer to the Terraform Registry for docs: [`data_hcp_waypoint_action`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_action). +Refer to the Terraform Registry for docs: [`data_hcp_waypoint_action`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_action). diff --git a/hcp/datahcpwaypointaddon/DataHcpWaypointAddOn.go b/hcp/datahcpwaypointaddon/DataHcpWaypointAddOn.go index 64f3da2b..56d21cd4 100644 --- a/hcp/datahcpwaypointaddon/DataHcpWaypointAddOn.go +++ b/hcp/datahcpwaypointaddon/DataHcpWaypointAddOn.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on hcp_waypoint_add_on}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on hcp_waypoint_add_on}. type DataHcpWaypointAddOn interface { cdktf.TerraformDataSource ApplicationId() *string @@ -456,7 +456,7 @@ func (j *jsiiProxy_DataHcpWaypointAddOn) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on hcp_waypoint_add_on} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on hcp_waypoint_add_on} Data Source. func NewDataHcpWaypointAddOn(scope constructs.Construct, id *string, config *DataHcpWaypointAddOnConfig) DataHcpWaypointAddOn { _init_.Initialize() @@ -474,7 +474,7 @@ func NewDataHcpWaypointAddOn(scope constructs.Construct, id *string, config *Dat return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on hcp_waypoint_add_on} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on hcp_waypoint_add_on} Data Source. func NewDataHcpWaypointAddOn_Override(d DataHcpWaypointAddOn, scope constructs.Construct, id *string, config *DataHcpWaypointAddOnConfig) { _init_.Initialize() diff --git a/hcp/datahcpwaypointaddon/DataHcpWaypointAddOnConfig.go b/hcp/datahcpwaypointaddon/DataHcpWaypointAddOnConfig.go index 04540480..ad9f1f17 100644 --- a/hcp/datahcpwaypointaddon/DataHcpWaypointAddOnConfig.go +++ b/hcp/datahcpwaypointaddon/DataHcpWaypointAddOnConfig.go @@ -24,18 +24,18 @@ type DataHcpWaypointAddOnConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Add-on. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on#id DataHcpWaypointAddOn#id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on#id DataHcpWaypointAddOn#id} // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Input variables for the Add-on. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on#input_variables DataHcpWaypointAddOn#input_variables} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on#input_variables DataHcpWaypointAddOn#input_variables} InputVariables interface{} `field:"optional" json:"inputVariables" yaml:"inputVariables"` // The name of the Add-on. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on#name DataHcpWaypointAddOn#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on#name DataHcpWaypointAddOn#name} Name *string `field:"optional" json:"name" yaml:"name"` } diff --git a/hcp/datahcpwaypointaddon/README.md b/hcp/datahcpwaypointaddon/README.md index 3fe12eb0..ed99d4a1 100644 --- a/hcp/datahcpwaypointaddon/README.md +++ b/hcp/datahcpwaypointaddon/README.md @@ -1,3 +1,3 @@ # `data_hcp_waypoint_add_on` -Refer to the Terraform Registry for docs: [`data_hcp_waypoint_add_on`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on). +Refer to the Terraform Registry for docs: [`data_hcp_waypoint_add_on`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on). diff --git a/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinition.go b/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinition.go index 9c6b0f42..8cc6513d 100644 --- a/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinition.go +++ b/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinition.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on_definition hcp_waypoint_add_on_definition}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on_definition hcp_waypoint_add_on_definition}. type DataHcpWaypointAddOnDefinition interface { cdktf.TerraformDataSource // Experimental. @@ -423,7 +423,7 @@ func (j *jsiiProxy_DataHcpWaypointAddOnDefinition) VariableOptions() DataHcpWayp } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Data Source. func NewDataHcpWaypointAddOnDefinition(scope constructs.Construct, id *string, config *DataHcpWaypointAddOnDefinitionConfig) DataHcpWaypointAddOnDefinition { _init_.Initialize() @@ -441,7 +441,7 @@ func NewDataHcpWaypointAddOnDefinition(scope constructs.Construct, id *string, c return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Data Source. func NewDataHcpWaypointAddOnDefinition_Override(d DataHcpWaypointAddOnDefinition, scope constructs.Construct, id *string, config *DataHcpWaypointAddOnDefinitionConfig) { _init_.Initialize() diff --git a/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinitionConfig.go b/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinitionConfig.go index f820d6c0..8841b806 100644 --- a/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinitionConfig.go +++ b/hcp/datahcpwaypointaddondefinition/DataHcpWaypointAddOnDefinitionConfig.go @@ -24,18 +24,18 @@ type DataHcpWaypointAddOnDefinitionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Add-on Definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on_definition#id DataHcpWaypointAddOnDefinition#id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on_definition#id DataHcpWaypointAddOnDefinition#id} // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // The name of the Add-on Definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on_definition#name DataHcpWaypointAddOnDefinition#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on_definition#name DataHcpWaypointAddOnDefinition#name} Name *string `field:"optional" json:"name" yaml:"name"` // The ID of the HCP project where the Waypoint Add-on Definition is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on_definition#project_id DataHcpWaypointAddOnDefinition#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on_definition#project_id DataHcpWaypointAddOnDefinition#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/datahcpwaypointaddondefinition/README.md b/hcp/datahcpwaypointaddondefinition/README.md index 59629e30..d0caeb2e 100644 --- a/hcp/datahcpwaypointaddondefinition/README.md +++ b/hcp/datahcpwaypointaddondefinition/README.md @@ -1,3 +1,3 @@ # `data_hcp_waypoint_add_on_definition` -Refer to the Terraform Registry for docs: [`data_hcp_waypoint_add_on_definition`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_add_on_definition). +Refer to the Terraform Registry for docs: [`data_hcp_waypoint_add_on_definition`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_add_on_definition). diff --git a/hcp/datahcpwaypointapplication/DataHcpWaypointApplication.go b/hcp/datahcpwaypointapplication/DataHcpWaypointApplication.go index 45292832..a43e30f5 100644 --- a/hcp/datahcpwaypointapplication/DataHcpWaypointApplication.go +++ b/hcp/datahcpwaypointapplication/DataHcpWaypointApplication.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application hcp_waypoint_application}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application hcp_waypoint_application}. type DataHcpWaypointApplication interface { cdktf.TerraformDataSource // Experimental. @@ -403,7 +403,7 @@ func (j *jsiiProxy_DataHcpWaypointApplication) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application hcp_waypoint_application} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application hcp_waypoint_application} Data Source. func NewDataHcpWaypointApplication(scope constructs.Construct, id *string, config *DataHcpWaypointApplicationConfig) DataHcpWaypointApplication { _init_.Initialize() @@ -421,7 +421,7 @@ func NewDataHcpWaypointApplication(scope constructs.Construct, id *string, confi return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application hcp_waypoint_application} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application hcp_waypoint_application} Data Source. func NewDataHcpWaypointApplication_Override(d DataHcpWaypointApplication, scope constructs.Construct, id *string, config *DataHcpWaypointApplicationConfig) { _init_.Initialize() diff --git a/hcp/datahcpwaypointapplication/DataHcpWaypointApplicationConfig.go b/hcp/datahcpwaypointapplication/DataHcpWaypointApplicationConfig.go index 071e815b..057635c8 100644 --- a/hcp/datahcpwaypointapplication/DataHcpWaypointApplicationConfig.go +++ b/hcp/datahcpwaypointapplication/DataHcpWaypointApplicationConfig.go @@ -24,22 +24,22 @@ type DataHcpWaypointApplicationConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application#id DataHcpWaypointApplication#id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application#id DataHcpWaypointApplication#id} // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Input variables for the Application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application#input_variables DataHcpWaypointApplication#input_variables} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application#input_variables DataHcpWaypointApplication#input_variables} InputVariables interface{} `field:"optional" json:"inputVariables" yaml:"inputVariables"` // The name of the Application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application#name DataHcpWaypointApplication#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application#name DataHcpWaypointApplication#name} Name *string `field:"optional" json:"name" yaml:"name"` // The ID of the HCP project where the Waypoint Application is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application#project_id DataHcpWaypointApplication#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application#project_id DataHcpWaypointApplication#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/datahcpwaypointapplication/README.md b/hcp/datahcpwaypointapplication/README.md index 4c4b839f..8e4b0a45 100644 --- a/hcp/datahcpwaypointapplication/README.md +++ b/hcp/datahcpwaypointapplication/README.md @@ -1,3 +1,3 @@ # `data_hcp_waypoint_application` -Refer to the Terraform Registry for docs: [`data_hcp_waypoint_application`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_application). +Refer to the Terraform Registry for docs: [`data_hcp_waypoint_application`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_application). diff --git a/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplate.go b/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplate.go index 61c7868c..02236766 100644 --- a/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplate.go +++ b/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplate.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_template hcp_waypoint_template}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_template hcp_waypoint_template}. type DataHcpWaypointTemplate interface { cdktf.TerraformDataSource // Experimental. @@ -423,7 +423,7 @@ func (j *jsiiProxy_DataHcpWaypointTemplate) VariableOptions() DataHcpWaypointTem } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_template hcp_waypoint_template} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_template hcp_waypoint_template} Data Source. func NewDataHcpWaypointTemplate(scope constructs.Construct, id *string, config *DataHcpWaypointTemplateConfig) DataHcpWaypointTemplate { _init_.Initialize() @@ -441,7 +441,7 @@ func NewDataHcpWaypointTemplate(scope constructs.Construct, id *string, config * return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_template hcp_waypoint_template} Data Source. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_template hcp_waypoint_template} Data Source. func NewDataHcpWaypointTemplate_Override(d DataHcpWaypointTemplate, scope constructs.Construct, id *string, config *DataHcpWaypointTemplateConfig) { _init_.Initialize() diff --git a/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplateConfig.go b/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplateConfig.go index c398b296..f2c9ac98 100644 --- a/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplateConfig.go +++ b/hcp/datahcpwaypointtemplate/DataHcpWaypointTemplateConfig.go @@ -24,18 +24,18 @@ type DataHcpWaypointTemplateConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Template. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_template#id DataHcpWaypointTemplate#id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_template#id DataHcpWaypointTemplate#id} // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // The name of the Template. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_template#name DataHcpWaypointTemplate#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_template#name DataHcpWaypointTemplate#name} Name *string `field:"optional" json:"name" yaml:"name"` // The ID of the HCP project where the Waypoint Template is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_template#project_id DataHcpWaypointTemplate#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_template#project_id DataHcpWaypointTemplate#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/datahcpwaypointtemplate/README.md b/hcp/datahcpwaypointtemplate/README.md index b0be9a49..0725be3e 100644 --- a/hcp/datahcpwaypointtemplate/README.md +++ b/hcp/datahcpwaypointtemplate/README.md @@ -1,3 +1,3 @@ # `data_hcp_waypoint_template` -Refer to the Terraform Registry for docs: [`data_hcp_waypoint_template`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/data-sources/waypoint_template). +Refer to the Terraform Registry for docs: [`data_hcp_waypoint_template`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/data-sources/waypoint_template). diff --git a/hcp/go.mod b/hcp/go.mod index a7f4093b..b5be339f 100644 --- a/hcp/go.mod +++ b/hcp/go.mod @@ -3,7 +3,7 @@ module github.com/cdktf/cdktf-provider-hcp-go/hcp/v9 go 1.18 require ( - github.com/aws/jsii-runtime-go v1.103.1 + github.com/aws/jsii-runtime-go v1.104.0 github.com/hashicorp/terraform-cdk-go/cdktf v0.20.9 - github.com/aws/constructs-go/constructs/v10 v10.3.0 + github.com/aws/constructs-go/constructs/v10 v10.4.2 ) diff --git a/hcp/group/Group.go b/hcp/group/Group.go index aa422b83..3bbdd7b7 100644 --- a/hcp/group/Group.go +++ b/hcp/group/Group.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group hcp_group}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group hcp_group}. type Group interface { cdktf.TerraformResource // Experimental. @@ -355,7 +355,7 @@ func (j *jsiiProxy_Group) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group hcp_group} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group hcp_group} Resource. func NewGroup(scope constructs.Construct, id *string, config *GroupConfig) Group { _init_.Initialize() @@ -373,7 +373,7 @@ func NewGroup(scope constructs.Construct, id *string, config *GroupConfig) Group return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group hcp_group} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group hcp_group} Resource. func NewGroup_Override(g Group, scope constructs.Construct, id *string, config *GroupConfig) { _init_.Initialize() diff --git a/hcp/group/GroupConfig.go b/hcp/group/GroupConfig.go index 4e1c3a79..623fcf26 100644 --- a/hcp/group/GroupConfig.go +++ b/hcp/group/GroupConfig.go @@ -24,11 +24,11 @@ type GroupConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The group's display_name - maximum length of 50 characters. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group#display_name Group#display_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group#display_name Group#display_name} DisplayName *string `field:"required" json:"displayName" yaml:"displayName"` // The group's description - maximum length of 300 characters. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group#description Group#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group#description Group#description} Description *string `field:"optional" json:"description" yaml:"description"` } diff --git a/hcp/group/README.md b/hcp/group/README.md index 2813dd71..6612fcf2 100644 --- a/hcp/group/README.md +++ b/hcp/group/README.md @@ -1,3 +1,3 @@ # `hcp_group` -Refer to the Terraform Registry for docs: [`hcp_group`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group). +Refer to the Terraform Registry for docs: [`hcp_group`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group). diff --git a/hcp/groupiambinding/GroupIamBinding.go b/hcp/groupiambinding/GroupIamBinding.go index 3fe21a34..f9883ca8 100644 --- a/hcp/groupiambinding/GroupIamBinding.go +++ b/hcp/groupiambinding/GroupIamBinding.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_binding hcp_group_iam_binding}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_binding hcp_group_iam_binding}. type GroupIamBinding interface { cdktf.TerraformResource // Experimental. @@ -355,7 +355,7 @@ func (j *jsiiProxy_GroupIamBinding) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_binding hcp_group_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_binding hcp_group_iam_binding} Resource. func NewGroupIamBinding(scope constructs.Construct, id *string, config *GroupIamBindingConfig) GroupIamBinding { _init_.Initialize() @@ -373,7 +373,7 @@ func NewGroupIamBinding(scope constructs.Construct, id *string, config *GroupIam return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_binding hcp_group_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_binding hcp_group_iam_binding} Resource. func NewGroupIamBinding_Override(g GroupIamBinding, scope constructs.Construct, id *string, config *GroupIamBindingConfig) { _init_.Initialize() diff --git a/hcp/groupiambinding/GroupIamBindingConfig.go b/hcp/groupiambinding/GroupIamBindingConfig.go index 6f1aa3bd..f860b515 100644 --- a/hcp/groupiambinding/GroupIamBindingConfig.go +++ b/hcp/groupiambinding/GroupIamBindingConfig.go @@ -24,15 +24,15 @@ type GroupIamBindingConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The group's resource name in format `iam/organization//group/`. The shortened `` version can be used for input. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_binding#name GroupIamBinding#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_binding#name GroupIamBinding#name} Name *string `field:"required" json:"name" yaml:"name"` // The principal to bind to the given role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_binding#principal_id GroupIamBinding#principal_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_binding#principal_id GroupIamBinding#principal_id} PrincipalId *string `field:"required" json:"principalId" yaml:"principalId"` // The role name to bind to the given principal. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_binding#role GroupIamBinding#role} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_binding#role GroupIamBinding#role} Role *string `field:"required" json:"role" yaml:"role"` } diff --git a/hcp/groupiambinding/README.md b/hcp/groupiambinding/README.md index ff770955..39dc7d00 100644 --- a/hcp/groupiambinding/README.md +++ b/hcp/groupiambinding/README.md @@ -1,3 +1,3 @@ # `hcp_group_iam_binding` -Refer to the Terraform Registry for docs: [`hcp_group_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_binding). +Refer to the Terraform Registry for docs: [`hcp_group_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_binding). diff --git a/hcp/groupiampolicy/GroupIamPolicy.go b/hcp/groupiampolicy/GroupIamPolicy.go index b6c379d3..3a8171cf 100644 --- a/hcp/groupiampolicy/GroupIamPolicy.go +++ b/hcp/groupiampolicy/GroupIamPolicy.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_policy hcp_group_iam_policy}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_policy hcp_group_iam_policy}. type GroupIamPolicy interface { cdktf.TerraformResource // Experimental. @@ -343,7 +343,7 @@ func (j *jsiiProxy_GroupIamPolicy) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_policy hcp_group_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_policy hcp_group_iam_policy} Resource. func NewGroupIamPolicy(scope constructs.Construct, id *string, config *GroupIamPolicyConfig) GroupIamPolicy { _init_.Initialize() @@ -361,7 +361,7 @@ func NewGroupIamPolicy(scope constructs.Construct, id *string, config *GroupIamP return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_policy hcp_group_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_policy hcp_group_iam_policy} Resource. func NewGroupIamPolicy_Override(g GroupIamPolicy, scope constructs.Construct, id *string, config *GroupIamPolicyConfig) { _init_.Initialize() diff --git a/hcp/groupiampolicy/GroupIamPolicyConfig.go b/hcp/groupiampolicy/GroupIamPolicyConfig.go index 8f5b7422..c49460e9 100644 --- a/hcp/groupiampolicy/GroupIamPolicyConfig.go +++ b/hcp/groupiampolicy/GroupIamPolicyConfig.go @@ -24,11 +24,11 @@ type GroupIamPolicyConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The group's resource name in format `iam/organization//group/`. The shortened `` version can be used for input. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_policy#name GroupIamPolicy#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_policy#name GroupIamPolicy#name} Name *string `field:"required" json:"name" yaml:"name"` // The policy to apply. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_policy#policy_data GroupIamPolicy#policy_data} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_policy#policy_data GroupIamPolicy#policy_data} PolicyData *string `field:"required" json:"policyData" yaml:"policyData"` } diff --git a/hcp/groupiampolicy/README.md b/hcp/groupiampolicy/README.md index 5224972e..c939fb93 100644 --- a/hcp/groupiampolicy/README.md +++ b/hcp/groupiampolicy/README.md @@ -1,3 +1,3 @@ # `hcp_group_iam_policy` -Refer to the Terraform Registry for docs: [`hcp_group_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_iam_policy). +Refer to the Terraform Registry for docs: [`hcp_group_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_iam_policy). diff --git a/hcp/groupmembers/GroupMembers.go b/hcp/groupmembers/GroupMembers.go index 884dcf9f..b664e6cf 100644 --- a/hcp/groupmembers/GroupMembers.go +++ b/hcp/groupmembers/GroupMembers.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_members hcp_group_members}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_members hcp_group_members}. type GroupMembers interface { cdktf.TerraformResource // Experimental. @@ -332,7 +332,7 @@ func (j *jsiiProxy_GroupMembers) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_members hcp_group_members} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_members hcp_group_members} Resource. func NewGroupMembers(scope constructs.Construct, id *string, config *GroupMembersConfig) GroupMembers { _init_.Initialize() @@ -350,7 +350,7 @@ func NewGroupMembers(scope constructs.Construct, id *string, config *GroupMember return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_members hcp_group_members} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_members hcp_group_members} Resource. func NewGroupMembers_Override(g GroupMembers, scope constructs.Construct, id *string, config *GroupMembersConfig) { _init_.Initialize() diff --git a/hcp/groupmembers/GroupMembersConfig.go b/hcp/groupmembers/GroupMembersConfig.go index e7c46cef..9ae9a99c 100644 --- a/hcp/groupmembers/GroupMembersConfig.go +++ b/hcp/groupmembers/GroupMembersConfig.go @@ -24,11 +24,11 @@ type GroupMembersConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The group's resource name in the format `iam/organization//group/`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_members#group GroupMembers#group} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_members#group GroupMembers#group} Group *string `field:"required" json:"group" yaml:"group"` // A list of user principal IDs to add to the group. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_members#members GroupMembers#members} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_members#members GroupMembers#members} Members *[]*string `field:"required" json:"members" yaml:"members"` } diff --git a/hcp/groupmembers/README.md b/hcp/groupmembers/README.md index 2a6c82be..e16ac9a2 100644 --- a/hcp/groupmembers/README.md +++ b/hcp/groupmembers/README.md @@ -1,3 +1,3 @@ # `hcp_group_members` -Refer to the Terraform Registry for docs: [`hcp_group_members`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/group_members). +Refer to the Terraform Registry for docs: [`hcp_group_members`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/group_members). diff --git a/hcp/hvn/Hvn.go b/hcp/hvn/Hvn.go index e4e2d0cd..41686ee3 100644 --- a/hcp/hvn/Hvn.go +++ b/hcp/hvn/Hvn.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn hcp_hvn}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn hcp_hvn}. type Hvn interface { cdktf.TerraformResource // Experimental. @@ -506,7 +506,7 @@ func (j *jsiiProxy_Hvn) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn hcp_hvn} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn hcp_hvn} Resource. func NewHvn(scope constructs.Construct, id *string, config *HvnConfig) Hvn { _init_.Initialize() @@ -524,7 +524,7 @@ func NewHvn(scope constructs.Construct, id *string, config *HvnConfig) Hvn { return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn hcp_hvn} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn hcp_hvn} Resource. func NewHvn_Override(h Hvn, scope constructs.Construct, id *string, config *HvnConfig) { _init_.Initialize() diff --git a/hcp/hvn/HvnConfig.go b/hcp/hvn/HvnConfig.go index 27cb6aa1..ab7912fd 100644 --- a/hcp/hvn/HvnConfig.go +++ b/hcp/hvn/HvnConfig.go @@ -24,21 +24,21 @@ type HvnConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The provider where the HVN is located. The provider 'aws' is generally available and 'azure' is in public beta. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#cloud_provider Hvn#cloud_provider} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#cloud_provider Hvn#cloud_provider} CloudProvider *string `field:"required" json:"cloudProvider" yaml:"cloudProvider"` // The ID of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#hvn_id Hvn#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#hvn_id Hvn#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` // The region where the HVN is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#region Hvn#region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#region Hvn#region} Region *string `field:"required" json:"region" yaml:"region"` // The CIDR range of the HVN. If this is not provided, the service will provide a default value. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#cidr_block Hvn#cidr_block} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#cidr_block Hvn#cidr_block} CidrBlock *string `field:"optional" json:"cidrBlock" yaml:"cidrBlock"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#id Hvn#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#id Hvn#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -48,11 +48,11 @@ type HvnConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#project_id Hvn#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#project_id Hvn#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#timeouts Hvn#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#timeouts Hvn#timeouts} Timeouts *HvnTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/hvn/HvnTimeouts.go b/hcp/hvn/HvnTimeouts.go index 6f500df9..7153a11f 100644 --- a/hcp/hvn/HvnTimeouts.go +++ b/hcp/hvn/HvnTimeouts.go @@ -5,11 +5,11 @@ package hvn type HvnTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#create Hvn#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#create Hvn#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#default Hvn#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#default Hvn#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn#delete Hvn#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn#delete Hvn#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` } diff --git a/hcp/hvn/README.md b/hcp/hvn/README.md index b3f0a407..db150afa 100644 --- a/hcp/hvn/README.md +++ b/hcp/hvn/README.md @@ -1,3 +1,3 @@ # `hcp_hvn` -Refer to the Terraform Registry for docs: [`hcp_hvn`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn). +Refer to the Terraform Registry for docs: [`hcp_hvn`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn). diff --git a/hcp/hvnpeeringconnection/HvnPeeringConnection.go b/hcp/hvnpeeringconnection/HvnPeeringConnection.go index 9646cf1d..e0c5d3e8 100644 --- a/hcp/hvnpeeringconnection/HvnPeeringConnection.go +++ b/hcp/hvnpeeringconnection/HvnPeeringConnection.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection hcp_hvn_peering_connection}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection hcp_hvn_peering_connection}. type HvnPeeringConnection interface { cdktf.TerraformResource // Experimental. @@ -470,7 +470,7 @@ func (j *jsiiProxy_HvnPeeringConnection) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection hcp_hvn_peering_connection} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection hcp_hvn_peering_connection} Resource. func NewHvnPeeringConnection(scope constructs.Construct, id *string, config *HvnPeeringConnectionConfig) HvnPeeringConnection { _init_.Initialize() @@ -488,7 +488,7 @@ func NewHvnPeeringConnection(scope constructs.Construct, id *string, config *Hvn return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection hcp_hvn_peering_connection} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection hcp_hvn_peering_connection} Resource. func NewHvnPeeringConnection_Override(h HvnPeeringConnection, scope constructs.Construct, id *string, config *HvnPeeringConnectionConfig) { _init_.Initialize() diff --git a/hcp/hvnpeeringconnection/HvnPeeringConnectionConfig.go b/hcp/hvnpeeringconnection/HvnPeeringConnectionConfig.go index 17bc4142..7967a44a 100644 --- a/hcp/hvnpeeringconnection/HvnPeeringConnectionConfig.go +++ b/hcp/hvnpeeringconnection/HvnPeeringConnectionConfig.go @@ -24,13 +24,13 @@ type HvnPeeringConnectionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The unique URL of one of the HVNs being peered. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#hvn_1 HvnPeeringConnection#hvn_1} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#hvn_1 HvnPeeringConnection#hvn_1} Hvn1 *string `field:"required" json:"hvn1" yaml:"hvn1"` // The unique URL of one of the HVNs being peered. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#hvn_2 HvnPeeringConnection#hvn_2} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#hvn_2 HvnPeeringConnection#hvn_2} Hvn2 *string `field:"required" json:"hvn2" yaml:"hvn2"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#id HvnPeeringConnection#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#id HvnPeeringConnection#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -39,11 +39,11 @@ type HvnPeeringConnectionConfig struct { // // Always matches hvn_1's project ID. Setting this attribute is deprecated, but it will remain usable in read-only form. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#project_id HvnPeeringConnection#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#project_id HvnPeeringConnection#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#timeouts HvnPeeringConnection#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#timeouts HvnPeeringConnection#timeouts} Timeouts *HvnPeeringConnectionTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/hvnpeeringconnection/HvnPeeringConnectionTimeouts.go b/hcp/hvnpeeringconnection/HvnPeeringConnectionTimeouts.go index 6f2c2475..087b1943 100644 --- a/hcp/hvnpeeringconnection/HvnPeeringConnectionTimeouts.go +++ b/hcp/hvnpeeringconnection/HvnPeeringConnectionTimeouts.go @@ -5,11 +5,11 @@ package hvnpeeringconnection type HvnPeeringConnectionTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#create HvnPeeringConnection#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#create HvnPeeringConnection#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#default HvnPeeringConnection#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#default HvnPeeringConnection#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection#delete HvnPeeringConnection#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection#delete HvnPeeringConnection#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` } diff --git a/hcp/hvnpeeringconnection/README.md b/hcp/hvnpeeringconnection/README.md index 8e466fbe..93461e50 100644 --- a/hcp/hvnpeeringconnection/README.md +++ b/hcp/hvnpeeringconnection/README.md @@ -1,3 +1,3 @@ # `hcp_hvn_peering_connection` -Refer to the Terraform Registry for docs: [`hcp_hvn_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_peering_connection). +Refer to the Terraform Registry for docs: [`hcp_hvn_peering_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_peering_connection). diff --git a/hcp/hvnroute/HvnRoute.go b/hcp/hvnroute/HvnRoute.go index 862f5ff4..d7d6b7df 100644 --- a/hcp/hvnroute/HvnRoute.go +++ b/hcp/hvnroute/HvnRoute.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route hcp_hvn_route}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route hcp_hvn_route}. type HvnRoute interface { cdktf.TerraformResource AzureConfig() HvnRouteAzureConfigOutputReference @@ -507,7 +507,7 @@ func (j *jsiiProxy_HvnRoute) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route hcp_hvn_route} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route hcp_hvn_route} Resource. func NewHvnRoute(scope constructs.Construct, id *string, config *HvnRouteConfig) HvnRoute { _init_.Initialize() @@ -525,7 +525,7 @@ func NewHvnRoute(scope constructs.Construct, id *string, config *HvnRouteConfig) return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route hcp_hvn_route} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route hcp_hvn_route} Resource. func NewHvnRoute_Override(h HvnRoute, scope constructs.Construct, id *string, config *HvnRouteConfig) { _init_.Initialize() diff --git a/hcp/hvnroute/HvnRouteAzureConfig.go b/hcp/hvnroute/HvnRouteAzureConfig.go index b6768ddb..50a06468 100644 --- a/hcp/hvnroute/HvnRouteAzureConfig.go +++ b/hcp/hvnroute/HvnRouteAzureConfig.go @@ -9,13 +9,13 @@ type HvnRouteAzureConfig struct { // // Valid options for Next Hop Type - `VIRTUAL_APPLIANCE` or `VIRTUAL_NETWORK_GATEWAY` // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#next_hop_type HvnRoute#next_hop_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#next_hop_type HvnRoute#next_hop_type} NextHopType *string `field:"required" json:"nextHopType" yaml:"nextHopType"` // Contains the IP address packets should be forwarded to. // // Next hop values are only allowed in routes where the next hop type is VIRTUAL_APPLIANCE. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#next_hop_ip_address HvnRoute#next_hop_ip_address} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#next_hop_ip_address HvnRoute#next_hop_ip_address} NextHopIpAddress *string `field:"optional" json:"nextHopIpAddress" yaml:"nextHopIpAddress"` } diff --git a/hcp/hvnroute/HvnRouteConfig.go b/hcp/hvnroute/HvnRouteConfig.go index f309b3f3..1e685bf3 100644 --- a/hcp/hvnroute/HvnRouteConfig.go +++ b/hcp/hvnroute/HvnRouteConfig.go @@ -24,25 +24,25 @@ type HvnRouteConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The destination CIDR of the HVN route. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#destination_cidr HvnRoute#destination_cidr} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#destination_cidr HvnRoute#destination_cidr} DestinationCidr *string `field:"required" json:"destinationCidr" yaml:"destinationCidr"` // The `self_link` of the HashiCorp Virtual Network (HVN). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#hvn_link HvnRoute#hvn_link} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#hvn_link HvnRoute#hvn_link} HvnLink *string `field:"required" json:"hvnLink" yaml:"hvnLink"` // The ID of the HVN route. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#hvn_route_id HvnRoute#hvn_route_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#hvn_route_id HvnRoute#hvn_route_id} HvnRouteId *string `field:"required" json:"hvnRouteId" yaml:"hvnRouteId"` // A unique URL identifying the target of the HVN route. Examples of the target: [`aws_network_peering`](aws_network_peering.md), [`aws_transit_gateway_attachment`](aws_transit_gateway_attachment.md). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#target_link HvnRoute#target_link} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#target_link HvnRoute#target_link} TargetLink *string `field:"required" json:"targetLink" yaml:"targetLink"` // azure_config block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#azure_config HvnRoute#azure_config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#azure_config HvnRoute#azure_config} AzureConfig *HvnRouteAzureConfig `field:"optional" json:"azureConfig" yaml:"azureConfig"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#id HvnRoute#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#id HvnRoute#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -51,11 +51,11 @@ type HvnRouteConfig struct { // // Always matches the project ID in `hvn_link`. Setting this attribute is deprecated, but it will remain usable in read-only form. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#project_id HvnRoute#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#project_id HvnRoute#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#timeouts HvnRoute#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#timeouts HvnRoute#timeouts} Timeouts *HvnRouteTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/hvnroute/HvnRouteTimeouts.go b/hcp/hvnroute/HvnRouteTimeouts.go index 27eabdff..ebb31bd3 100644 --- a/hcp/hvnroute/HvnRouteTimeouts.go +++ b/hcp/hvnroute/HvnRouteTimeouts.go @@ -5,11 +5,11 @@ package hvnroute type HvnRouteTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#create HvnRoute#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#create HvnRoute#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#default HvnRoute#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#default HvnRoute#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route#delete HvnRoute#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route#delete HvnRoute#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` } diff --git a/hcp/hvnroute/README.md b/hcp/hvnroute/README.md index fd562a9d..d78c17b3 100644 --- a/hcp/hvnroute/README.md +++ b/hcp/hvnroute/README.md @@ -1,3 +1,3 @@ # `hcp_hvn_route` -Refer to the Terraform Registry for docs: [`hcp_hvn_route`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/hvn_route). +Refer to the Terraform Registry for docs: [`hcp_hvn_route`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/hvn_route). diff --git a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProvider.go b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProvider.go index 84042e71..c334fccd 100644 --- a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProvider.go +++ b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProvider.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider hcp_iam_workload_identity_provider}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider hcp_iam_workload_identity_provider}. type IamWorkloadIdentityProvider interface { cdktf.TerraformResource Aws() IamWorkloadIdentityProviderAwsOutputReference @@ -449,7 +449,7 @@ func (j *jsiiProxy_IamWorkloadIdentityProvider) TerraformResourceType() *string } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider hcp_iam_workload_identity_provider} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider hcp_iam_workload_identity_provider} Resource. func NewIamWorkloadIdentityProvider(scope constructs.Construct, id *string, config *IamWorkloadIdentityProviderConfig) IamWorkloadIdentityProvider { _init_.Initialize() @@ -467,7 +467,7 @@ func NewIamWorkloadIdentityProvider(scope constructs.Construct, id *string, conf return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider hcp_iam_workload_identity_provider} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider hcp_iam_workload_identity_provider} Resource. func NewIamWorkloadIdentityProvider_Override(i IamWorkloadIdentityProvider, scope constructs.Construct, id *string, config *IamWorkloadIdentityProviderConfig) { _init_.Initialize() diff --git a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderAws.go b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderAws.go index 704708c9..7067114c 100644 --- a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderAws.go +++ b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderAws.go @@ -7,7 +7,7 @@ package iamworkloadidentityprovider type IamWorkloadIdentityProviderAws struct { // The AWS Account ID that is allowed to exchange workload identities. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#account_id IamWorkloadIdentityProvider#account_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#account_id IamWorkloadIdentityProvider#account_id} AccountId *string `field:"required" json:"accountId" yaml:"accountId"` } diff --git a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderConfig.go b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderConfig.go index 445a68c4..7c7faf14 100644 --- a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderConfig.go +++ b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderConfig.go @@ -26,25 +26,25 @@ type IamWorkloadIdentityProviderConfig struct { // // It restricts which upstream identities are allowed to access the service principal. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#conditional_access IamWorkloadIdentityProvider#conditional_access} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#conditional_access IamWorkloadIdentityProvider#conditional_access} ConditionalAccess *string `field:"required" json:"conditionalAccess" yaml:"conditionalAccess"` // The workload identity provider's name. Ideally, this should be descriptive of the workload being federated. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#name IamWorkloadIdentityProvider#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#name IamWorkloadIdentityProvider#name} Name *string `field:"required" json:"name" yaml:"name"` // The service principal's resource name for which the workload identity provider will be created for. // // Only service principals created within a project are allowed. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#service_principal IamWorkloadIdentityProvider#service_principal} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#service_principal IamWorkloadIdentityProvider#service_principal} ServicePrincipal *string `field:"required" json:"servicePrincipal" yaml:"servicePrincipal"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#aws IamWorkloadIdentityProvider#aws}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#aws IamWorkloadIdentityProvider#aws}. Aws *IamWorkloadIdentityProviderAws `field:"optional" json:"aws" yaml:"aws"` // A description for the workload identity provider. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#description IamWorkloadIdentityProvider#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#description IamWorkloadIdentityProvider#description} Description *string `field:"optional" json:"description" yaml:"description"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#oidc IamWorkloadIdentityProvider#oidc}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#oidc IamWorkloadIdentityProvider#oidc}. Oidc *IamWorkloadIdentityProviderOidc `field:"optional" json:"oidc" yaml:"oidc"` } diff --git a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderOidc.go b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderOidc.go index 1f967dec..2b4d3c6a 100644 --- a/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderOidc.go +++ b/hcp/iamworkloadidentityprovider/IamWorkloadIdentityProviderOidc.go @@ -7,13 +7,13 @@ package iamworkloadidentityprovider type IamWorkloadIdentityProviderOidc struct { // The URL of the OIDC Issuer that is allowed to exchange workload identities. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#issuer_uri IamWorkloadIdentityProvider#issuer_uri} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#issuer_uri IamWorkloadIdentityProvider#issuer_uri} IssuerUri *string `field:"required" json:"issuerUri" yaml:"issuerUri"` // allowed_audiences is the set of audiences set on the access token that are allowed to exchange identities. // // The access token must have an audience that is contained in this set. If no audience is set, the default allowed audience will be the resource name of the WorkloadIdentityProvider. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider#allowed_audiences IamWorkloadIdentityProvider#allowed_audiences} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider#allowed_audiences IamWorkloadIdentityProvider#allowed_audiences} AllowedAudiences *[]*string `field:"optional" json:"allowedAudiences" yaml:"allowedAudiences"` } diff --git a/hcp/iamworkloadidentityprovider/README.md b/hcp/iamworkloadidentityprovider/README.md index 93e17555..76df8344 100644 --- a/hcp/iamworkloadidentityprovider/README.md +++ b/hcp/iamworkloadidentityprovider/README.md @@ -1,3 +1,3 @@ # `hcp_iam_workload_identity_provider` -Refer to the Terraform Registry for docs: [`hcp_iam_workload_identity_provider`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/iam_workload_identity_provider). +Refer to the Terraform Registry for docs: [`hcp_iam_workload_identity_provider`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/iam_workload_identity_provider). diff --git a/hcp/jsii/cdktf-provider-hcp-9.17.0.tgz b/hcp/jsii/cdktf-provider-hcp-9.17.0.tgz deleted file mode 100644 index 0e4b5272..00000000 Binary files a/hcp/jsii/cdktf-provider-hcp-9.17.0.tgz and /dev/null differ diff --git a/hcp/jsii/cdktf-provider-hcp-9.18.0.tgz b/hcp/jsii/cdktf-provider-hcp-9.18.0.tgz new file mode 100644 index 00000000..cfbe3a7e Binary files /dev/null and b/hcp/jsii/cdktf-provider-hcp-9.18.0.tgz differ diff --git a/hcp/jsii/jsii.go b/hcp/jsii/jsii.go index f779957d..e94e52f6 100644 --- a/hcp/jsii/jsii.go +++ b/hcp/jsii/jsii.go @@ -16,7 +16,7 @@ import ( cdktf "github.com/hashicorp/terraform-cdk-go/cdktf/jsii" ) -//go:embed cdktf-provider-hcp-9.17.0.tgz +//go:embed cdktf-provider-hcp-9.18.0.tgz var tarball []byte // Initialize loads the necessary packages in the @jsii/kernel to support the enclosing module. @@ -27,5 +27,5 @@ func Initialize() { constructs.Initialize() // Load this library into the kernel - _jsii_.Load("@cdktf/provider-hcp", "9.17.0", tarball) + _jsii_.Load("@cdktf/provider-hcp", "9.18.0", tarball) } diff --git a/hcp/logstreamingdestination/LogStreamingDestination.go b/hcp/logstreamingdestination/LogStreamingDestination.go index 2627978b..8fe684ee 100644 --- a/hcp/logstreamingdestination/LogStreamingDestination.go +++ b/hcp/logstreamingdestination/LogStreamingDestination.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination hcp_log_streaming_destination}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination hcp_log_streaming_destination}. type LogStreamingDestination interface { cdktf.TerraformResource // Experimental. @@ -392,7 +392,7 @@ func (j *jsiiProxy_LogStreamingDestination) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination hcp_log_streaming_destination} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination hcp_log_streaming_destination} Resource. func NewLogStreamingDestination(scope constructs.Construct, id *string, config *LogStreamingDestinationConfig) LogStreamingDestination { _init_.Initialize() @@ -410,7 +410,7 @@ func NewLogStreamingDestination(scope constructs.Construct, id *string, config * return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination hcp_log_streaming_destination} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination hcp_log_streaming_destination} Resource. func NewLogStreamingDestination_Override(l LogStreamingDestination, scope constructs.Construct, id *string, config *LogStreamingDestinationConfig) { _init_.Initialize() diff --git a/hcp/logstreamingdestination/LogStreamingDestinationCloudwatch.go b/hcp/logstreamingdestination/LogStreamingDestinationCloudwatch.go index 0d786d2c..847a7821 100644 --- a/hcp/logstreamingdestination/LogStreamingDestinationCloudwatch.go +++ b/hcp/logstreamingdestination/LogStreamingDestinationCloudwatch.go @@ -7,19 +7,19 @@ package logstreamingdestination type LogStreamingDestinationCloudwatch struct { // The external_id to provide when assuming the aws IAM role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#external_id LogStreamingDestination#external_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#external_id LogStreamingDestination#external_id} ExternalId *string `field:"required" json:"externalId" yaml:"externalId"` // The region the CloudWatch destination is set up to stream to. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#region LogStreamingDestination#region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#region LogStreamingDestination#region} Region *string `field:"required" json:"region" yaml:"region"` // The role_arn that will be assumed to stream logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#role_arn LogStreamingDestination#role_arn} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#role_arn LogStreamingDestination#role_arn} RoleArn *string `field:"required" json:"roleArn" yaml:"roleArn"` // The log_group_name of the CloudWatch destination. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#log_group_name LogStreamingDestination#log_group_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#log_group_name LogStreamingDestination#log_group_name} LogGroupName *string `field:"optional" json:"logGroupName" yaml:"logGroupName"` } diff --git a/hcp/logstreamingdestination/LogStreamingDestinationConfig.go b/hcp/logstreamingdestination/LogStreamingDestinationConfig.go index 84793fbc..a398ad8c 100644 --- a/hcp/logstreamingdestination/LogStreamingDestinationConfig.go +++ b/hcp/logstreamingdestination/LogStreamingDestinationConfig.go @@ -24,13 +24,13 @@ type LogStreamingDestinationConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The HCP Log Streaming Destination’s name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#name LogStreamingDestination#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#name LogStreamingDestination#name} Name *string `field:"required" json:"name" yaml:"name"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#cloudwatch LogStreamingDestination#cloudwatch}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#cloudwatch LogStreamingDestination#cloudwatch}. Cloudwatch *LogStreamingDestinationCloudwatch `field:"optional" json:"cloudwatch" yaml:"cloudwatch"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#datadog LogStreamingDestination#datadog}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#datadog LogStreamingDestination#datadog}. Datadog *LogStreamingDestinationDatadog `field:"optional" json:"datadog" yaml:"datadog"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#splunk_cloud LogStreamingDestination#splunk_cloud}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#splunk_cloud LogStreamingDestination#splunk_cloud}. SplunkCloud *LogStreamingDestinationSplunkCloud `field:"optional" json:"splunkCloud" yaml:"splunkCloud"` } diff --git a/hcp/logstreamingdestination/LogStreamingDestinationDatadog.go b/hcp/logstreamingdestination/LogStreamingDestinationDatadog.go index 2ffbe3ff..6feb81c7 100644 --- a/hcp/logstreamingdestination/LogStreamingDestinationDatadog.go +++ b/hcp/logstreamingdestination/LogStreamingDestinationDatadog.go @@ -7,15 +7,15 @@ package logstreamingdestination type LogStreamingDestinationDatadog struct { // The value for the DD-API-KEY to send when making requests to DataDog. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#api_key LogStreamingDestination#api_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#api_key LogStreamingDestination#api_key} ApiKey *string `field:"required" json:"apiKey" yaml:"apiKey"` // The Datadog endpoint to send logs to. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#endpoint LogStreamingDestination#endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#endpoint LogStreamingDestination#endpoint} Endpoint *string `field:"required" json:"endpoint" yaml:"endpoint"` // The value for the DD-APPLICATION-KEY to send when making requests to DataDog. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#application_key LogStreamingDestination#application_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#application_key LogStreamingDestination#application_key} ApplicationKey *string `field:"optional" json:"applicationKey" yaml:"applicationKey"` } diff --git a/hcp/logstreamingdestination/LogStreamingDestinationSplunkCloud.go b/hcp/logstreamingdestination/LogStreamingDestinationSplunkCloud.go index 4db710d3..aa8f4bbd 100644 --- a/hcp/logstreamingdestination/LogStreamingDestinationSplunkCloud.go +++ b/hcp/logstreamingdestination/LogStreamingDestinationSplunkCloud.go @@ -7,11 +7,11 @@ package logstreamingdestination type LogStreamingDestinationSplunkCloud struct { // The Splunk Cloud endpoint to send logs to. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#endpoint LogStreamingDestination#endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#endpoint LogStreamingDestination#endpoint} Endpoint *string `field:"required" json:"endpoint" yaml:"endpoint"` // The authentication token that will be used by the platform to access Splunk Cloud. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination#token LogStreamingDestination#token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination#token LogStreamingDestination#token} Token *string `field:"required" json:"token" yaml:"token"` } diff --git a/hcp/logstreamingdestination/README.md b/hcp/logstreamingdestination/README.md index 3ad8afd2..6994e247 100644 --- a/hcp/logstreamingdestination/README.md +++ b/hcp/logstreamingdestination/README.md @@ -1,3 +1,3 @@ # `hcp_log_streaming_destination` -Refer to the Terraform Registry for docs: [`hcp_log_streaming_destination`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/log_streaming_destination). +Refer to the Terraform Registry for docs: [`hcp_log_streaming_destination`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/log_streaming_destination). diff --git a/hcp/notificationswebhook/NotificationsWebhook.go b/hcp/notificationswebhook/NotificationsWebhook.go index 7ecfa160..a602f887 100644 --- a/hcp/notificationswebhook/NotificationsWebhook.go +++ b/hcp/notificationswebhook/NotificationsWebhook.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook hcp_notifications_webhook}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook hcp_notifications_webhook}. type NotificationsWebhook interface { cdktf.TerraformResource // Experimental. @@ -450,7 +450,7 @@ func (j *jsiiProxy_NotificationsWebhook) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook hcp_notifications_webhook} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook hcp_notifications_webhook} Resource. func NewNotificationsWebhook(scope constructs.Construct, id *string, config *NotificationsWebhookConfig) NotificationsWebhook { _init_.Initialize() @@ -468,7 +468,7 @@ func NewNotificationsWebhook(scope constructs.Construct, id *string, config *Not return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook hcp_notifications_webhook} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook hcp_notifications_webhook} Resource. func NewNotificationsWebhook_Override(n NotificationsWebhook, scope constructs.Construct, id *string, config *NotificationsWebhookConfig) { _init_.Initialize() diff --git a/hcp/notificationswebhook/NotificationsWebhookConfig.go b/hcp/notificationswebhook/NotificationsWebhookConfig.go index adf634f7..30ad0cc0 100644 --- a/hcp/notificationswebhook/NotificationsWebhookConfig.go +++ b/hcp/notificationswebhook/NotificationsWebhookConfig.go @@ -24,29 +24,29 @@ type NotificationsWebhookConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The webhook configuration used to deliver event payloads. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#config NotificationsWebhook#config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#config NotificationsWebhook#config} Config *NotificationsWebhookConfigA `field:"required" json:"config" yaml:"config"` // The webhook's name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#name NotificationsWebhook#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#name NotificationsWebhook#name} Name *string `field:"required" json:"name" yaml:"name"` // The webhook's description. Descriptions are useful for helping others understand the purpose of the webhook. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#description NotificationsWebhook#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#description NotificationsWebhook#description} Description *string `field:"optional" json:"description" yaml:"description"` // Indicates if the webhook should receive payloads for the subscribed events. Defaults to `true`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#enabled NotificationsWebhook#enabled} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#enabled NotificationsWebhook#enabled} Enabled interface{} `field:"optional" json:"enabled" yaml:"enabled"` // The ID of the project to create the webhook under. // // If unspecified, the webhook will be created in the project the provider is configured with. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#project_id NotificationsWebhook#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#project_id NotificationsWebhook#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // Set of events to subscribe the webhook to all resources or a specific resource in the project. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#subscriptions NotificationsWebhook#subscriptions} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#subscriptions NotificationsWebhook#subscriptions} Subscriptions interface{} `field:"optional" json:"subscriptions" yaml:"subscriptions"` } diff --git a/hcp/notificationswebhook/NotificationsWebhookConfigA.go b/hcp/notificationswebhook/NotificationsWebhookConfigA.go index 583f14a9..a777de20 100644 --- a/hcp/notificationswebhook/NotificationsWebhookConfigA.go +++ b/hcp/notificationswebhook/NotificationsWebhookConfigA.go @@ -10,13 +10,13 @@ type NotificationsWebhookConfigA struct { // The destination must be able to use the HCP webhook // [payload](https://developer.hashicorp.com/hcp/docs/hcp/admin/projects/webhooks#webhook-payload). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#url NotificationsWebhook#url} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#url NotificationsWebhook#url} Url *string `field:"required" json:"url" yaml:"url"` // The arbitrary secret that HCP uses to sign all its webhook requests. // // This is a write-only field, it is written once and not visible thereafter. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#hmac_key NotificationsWebhook#hmac_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#hmac_key NotificationsWebhook#hmac_key} HmacKey *string `field:"optional" json:"hmacKey" yaml:"hmacKey"` } diff --git a/hcp/notificationswebhook/NotificationsWebhookSubscriptions.go b/hcp/notificationswebhook/NotificationsWebhookSubscriptions.go index b60ef59b..fd3bde90 100644 --- a/hcp/notificationswebhook/NotificationsWebhookSubscriptions.go +++ b/hcp/notificationswebhook/NotificationsWebhookSubscriptions.go @@ -9,13 +9,13 @@ type NotificationsWebhookSubscriptions struct { // // The service that owns the resource is responsible for maintaining events. Refer to the service's webhook documentation for more information. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#events NotificationsWebhook#events} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#events NotificationsWebhook#events} Events interface{} `field:"required" json:"events" yaml:"events"` // Refers to the resource the webhook is subscribed to. // // If not set, the webhook subscribes to the emitted events listed in events for any resource in the webhook's project. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#resource_id NotificationsWebhook#resource_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#resource_id NotificationsWebhook#resource_id} ResourceId *string `field:"optional" json:"resourceId" yaml:"resourceId"` } diff --git a/hcp/notificationswebhook/NotificationsWebhookSubscriptionsEvents.go b/hcp/notificationswebhook/NotificationsWebhookSubscriptionsEvents.go index 00838860..ecd60168 100644 --- a/hcp/notificationswebhook/NotificationsWebhookSubscriptionsEvents.go +++ b/hcp/notificationswebhook/NotificationsWebhookSubscriptionsEvents.go @@ -9,13 +9,13 @@ type NotificationsWebhookSubscriptionsEvents struct { // // For example, `["create", "update"]`. When the action is '*', it means that the webhook is subscribed to all event actions for the event source. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#actions NotificationsWebhook#actions} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#actions NotificationsWebhook#actions} Actions *[]*string `field:"required" json:"actions" yaml:"actions"` // The resource type of the source of the event. // // For example, `hashicorp.packer.version`. Event source might not be the same type as the resource that the webhook is subscribed to ([resource_id](#resource_id)) if the event is from a descendant resource. For example, webhooks are subscribed to a `hashicorp.packer.registry` and receive events for descendent resources such as a `hashicorp.packer.version`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook#source NotificationsWebhook#source} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook#source NotificationsWebhook#source} Source *string `field:"required" json:"source" yaml:"source"` } diff --git a/hcp/notificationswebhook/README.md b/hcp/notificationswebhook/README.md index cd0bdd7d..1fba1f74 100644 --- a/hcp/notificationswebhook/README.md +++ b/hcp/notificationswebhook/README.md @@ -1,3 +1,3 @@ # `hcp_notifications_webhook` -Refer to the Terraform Registry for docs: [`hcp_notifications_webhook`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/notifications_webhook). +Refer to the Terraform Registry for docs: [`hcp_notifications_webhook`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/notifications_webhook). diff --git a/hcp/organizationiambinding/OrganizationIamBinding.go b/hcp/organizationiambinding/OrganizationIamBinding.go index 8a930494..9575915a 100644 --- a/hcp/organizationiambinding/OrganizationIamBinding.go +++ b/hcp/organizationiambinding/OrganizationIamBinding.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_binding hcp_organization_iam_binding}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_binding hcp_organization_iam_binding}. type OrganizationIamBinding interface { cdktf.TerraformResource // Experimental. @@ -332,7 +332,7 @@ func (j *jsiiProxy_OrganizationIamBinding) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_binding hcp_organization_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_binding hcp_organization_iam_binding} Resource. func NewOrganizationIamBinding(scope constructs.Construct, id *string, config *OrganizationIamBindingConfig) OrganizationIamBinding { _init_.Initialize() @@ -350,7 +350,7 @@ func NewOrganizationIamBinding(scope constructs.Construct, id *string, config *O return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_binding hcp_organization_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_binding hcp_organization_iam_binding} Resource. func NewOrganizationIamBinding_Override(o OrganizationIamBinding, scope constructs.Construct, id *string, config *OrganizationIamBindingConfig) { _init_.Initialize() diff --git a/hcp/organizationiambinding/OrganizationIamBindingConfig.go b/hcp/organizationiambinding/OrganizationIamBindingConfig.go index f022c7c3..9f69de85 100644 --- a/hcp/organizationiambinding/OrganizationIamBindingConfig.go +++ b/hcp/organizationiambinding/OrganizationIamBindingConfig.go @@ -24,11 +24,11 @@ type OrganizationIamBindingConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The principal to bind to the given role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_binding#principal_id OrganizationIamBinding#principal_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_binding#principal_id OrganizationIamBinding#principal_id} PrincipalId *string `field:"required" json:"principalId" yaml:"principalId"` // The role name to bind to the given principal. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_binding#role OrganizationIamBinding#role} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_binding#role OrganizationIamBinding#role} Role *string `field:"required" json:"role" yaml:"role"` } diff --git a/hcp/organizationiambinding/README.md b/hcp/organizationiambinding/README.md index a3b42be5..7336f30a 100644 --- a/hcp/organizationiambinding/README.md +++ b/hcp/organizationiambinding/README.md @@ -1,3 +1,3 @@ # `hcp_organization_iam_binding` -Refer to the Terraform Registry for docs: [`hcp_organization_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_binding). +Refer to the Terraform Registry for docs: [`hcp_organization_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_binding). diff --git a/hcp/organizationiampolicy/OrganizationIamPolicy.go b/hcp/organizationiampolicy/OrganizationIamPolicy.go index 40c9a19f..30fcf72d 100644 --- a/hcp/organizationiampolicy/OrganizationIamPolicy.go +++ b/hcp/organizationiampolicy/OrganizationIamPolicy.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_policy hcp_organization_iam_policy}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_policy hcp_organization_iam_policy}. type OrganizationIamPolicy interface { cdktf.TerraformResource // Experimental. @@ -320,7 +320,7 @@ func (j *jsiiProxy_OrganizationIamPolicy) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_policy hcp_organization_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_policy hcp_organization_iam_policy} Resource. func NewOrganizationIamPolicy(scope constructs.Construct, id *string, config *OrganizationIamPolicyConfig) OrganizationIamPolicy { _init_.Initialize() @@ -338,7 +338,7 @@ func NewOrganizationIamPolicy(scope constructs.Construct, id *string, config *Or return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_policy hcp_organization_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_policy hcp_organization_iam_policy} Resource. func NewOrganizationIamPolicy_Override(o OrganizationIamPolicy, scope constructs.Construct, id *string, config *OrganizationIamPolicyConfig) { _init_.Initialize() diff --git a/hcp/organizationiampolicy/OrganizationIamPolicyConfig.go b/hcp/organizationiampolicy/OrganizationIamPolicyConfig.go index cbd85261..97988d46 100644 --- a/hcp/organizationiampolicy/OrganizationIamPolicyConfig.go +++ b/hcp/organizationiampolicy/OrganizationIamPolicyConfig.go @@ -24,7 +24,7 @@ type OrganizationIamPolicyConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The policy to apply. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_policy#policy_data OrganizationIamPolicy#policy_data} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_policy#policy_data OrganizationIamPolicy#policy_data} PolicyData *string `field:"required" json:"policyData" yaml:"policyData"` } diff --git a/hcp/organizationiampolicy/README.md b/hcp/organizationiampolicy/README.md index 0e7b9641..250bcc10 100644 --- a/hcp/organizationiampolicy/README.md +++ b/hcp/organizationiampolicy/README.md @@ -1,3 +1,3 @@ # `hcp_organization_iam_policy` -Refer to the Terraform Registry for docs: [`hcp_organization_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/organization_iam_policy). +Refer to the Terraform Registry for docs: [`hcp_organization_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/organization_iam_policy). diff --git a/hcp/packerbucket/PackerBucket.go b/hcp/packerbucket/PackerBucket.go index f26f7300..c2703a91 100644 --- a/hcp/packerbucket/PackerBucket.go +++ b/hcp/packerbucket/PackerBucket.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket hcp_packer_bucket}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket hcp_packer_bucket}. type PackerBucket interface { cdktf.TerraformResource // Experimental. @@ -366,7 +366,7 @@ func (j *jsiiProxy_PackerBucket) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket hcp_packer_bucket} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket hcp_packer_bucket} Resource. func NewPackerBucket(scope constructs.Construct, id *string, config *PackerBucketConfig) PackerBucket { _init_.Initialize() @@ -384,7 +384,7 @@ func NewPackerBucket(scope constructs.Construct, id *string, config *PackerBucke return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket hcp_packer_bucket} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket hcp_packer_bucket} Resource. func NewPackerBucket_Override(p PackerBucket, scope constructs.Construct, id *string, config *PackerBucketConfig) { _init_.Initialize() diff --git a/hcp/packerbucket/PackerBucketConfig.go b/hcp/packerbucket/PackerBucketConfig.go index 7bd195bb..3e6194f5 100644 --- a/hcp/packerbucket/PackerBucketConfig.go +++ b/hcp/packerbucket/PackerBucketConfig.go @@ -24,13 +24,13 @@ type PackerBucketConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The bucket's name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket#name PackerBucket#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket#name PackerBucket#name} Name *string `field:"required" json:"name" yaml:"name"` // The ID of the project to create the bucket under. // // If unspecified, the bucket will be created in the project the provider is configured with. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket#project_id PackerBucket#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket#project_id PackerBucket#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/packerbucket/README.md b/hcp/packerbucket/README.md index 38fb4301..0100f7dc 100644 --- a/hcp/packerbucket/README.md +++ b/hcp/packerbucket/README.md @@ -1,3 +1,3 @@ # `hcp_packer_bucket` -Refer to the Terraform Registry for docs: [`hcp_packer_bucket`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket). +Refer to the Terraform Registry for docs: [`hcp_packer_bucket`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket). diff --git a/hcp/packerbucketiambinding/PackerBucketIamBinding.go b/hcp/packerbucketiambinding/PackerBucketIamBinding.go index 10ae0374..09ffd92d 100644 --- a/hcp/packerbucketiambinding/PackerBucketIamBinding.go +++ b/hcp/packerbucketiambinding/PackerBucketIamBinding.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_binding hcp_packer_bucket_iam_binding}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_binding hcp_packer_bucket_iam_binding}. type PackerBucketIamBinding interface { cdktf.TerraformResource // Experimental. @@ -355,7 +355,7 @@ func (j *jsiiProxy_PackerBucketIamBinding) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_binding hcp_packer_bucket_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_binding hcp_packer_bucket_iam_binding} Resource. func NewPackerBucketIamBinding(scope constructs.Construct, id *string, config *PackerBucketIamBindingConfig) PackerBucketIamBinding { _init_.Initialize() @@ -373,7 +373,7 @@ func NewPackerBucketIamBinding(scope constructs.Construct, id *string, config *P return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_binding hcp_packer_bucket_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_binding hcp_packer_bucket_iam_binding} Resource. func NewPackerBucketIamBinding_Override(p PackerBucketIamBinding, scope constructs.Construct, id *string, config *PackerBucketIamBindingConfig) { _init_.Initialize() diff --git a/hcp/packerbucketiambinding/PackerBucketIamBindingConfig.go b/hcp/packerbucketiambinding/PackerBucketIamBindingConfig.go index beae94a9..0c51bb93 100644 --- a/hcp/packerbucketiambinding/PackerBucketIamBindingConfig.go +++ b/hcp/packerbucketiambinding/PackerBucketIamBindingConfig.go @@ -24,15 +24,15 @@ type PackerBucketIamBindingConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The principal to bind to the given role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_binding#principal_id PackerBucketIamBinding#principal_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_binding#principal_id PackerBucketIamBinding#principal_id} PrincipalId *string `field:"required" json:"principalId" yaml:"principalId"` // The bucket's resource name in the format packer/project//bucket/. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_binding#resource_name PackerBucketIamBinding#resource_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_binding#resource_name PackerBucketIamBinding#resource_name} ResourceName *string `field:"required" json:"resourceName" yaml:"resourceName"` // The role name to bind to the given principal. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_binding#role PackerBucketIamBinding#role} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_binding#role PackerBucketIamBinding#role} Role *string `field:"required" json:"role" yaml:"role"` } diff --git a/hcp/packerbucketiambinding/README.md b/hcp/packerbucketiambinding/README.md index 6ffd81f4..3d032d11 100644 --- a/hcp/packerbucketiambinding/README.md +++ b/hcp/packerbucketiambinding/README.md @@ -1,3 +1,3 @@ # `hcp_packer_bucket_iam_binding` -Refer to the Terraform Registry for docs: [`hcp_packer_bucket_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_binding). +Refer to the Terraform Registry for docs: [`hcp_packer_bucket_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_binding). diff --git a/hcp/packerbucketiampolicy/PackerBucketIamPolicy.go b/hcp/packerbucketiampolicy/PackerBucketIamPolicy.go index ae705e97..5e08911e 100644 --- a/hcp/packerbucketiampolicy/PackerBucketIamPolicy.go +++ b/hcp/packerbucketiampolicy/PackerBucketIamPolicy.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_policy hcp_packer_bucket_iam_policy}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_policy hcp_packer_bucket_iam_policy}. type PackerBucketIamPolicy interface { cdktf.TerraformResource // Experimental. @@ -343,7 +343,7 @@ func (j *jsiiProxy_PackerBucketIamPolicy) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_policy hcp_packer_bucket_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_policy hcp_packer_bucket_iam_policy} Resource. func NewPackerBucketIamPolicy(scope constructs.Construct, id *string, config *PackerBucketIamPolicyConfig) PackerBucketIamPolicy { _init_.Initialize() @@ -361,7 +361,7 @@ func NewPackerBucketIamPolicy(scope constructs.Construct, id *string, config *Pa return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_policy hcp_packer_bucket_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_policy hcp_packer_bucket_iam_policy} Resource. func NewPackerBucketIamPolicy_Override(p PackerBucketIamPolicy, scope constructs.Construct, id *string, config *PackerBucketIamPolicyConfig) { _init_.Initialize() diff --git a/hcp/packerbucketiampolicy/PackerBucketIamPolicyConfig.go b/hcp/packerbucketiampolicy/PackerBucketIamPolicyConfig.go index 9dd96d96..52348cd6 100644 --- a/hcp/packerbucketiampolicy/PackerBucketIamPolicyConfig.go +++ b/hcp/packerbucketiampolicy/PackerBucketIamPolicyConfig.go @@ -24,11 +24,11 @@ type PackerBucketIamPolicyConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The policy to apply. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_policy#policy_data PackerBucketIamPolicy#policy_data} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_policy#policy_data PackerBucketIamPolicy#policy_data} PolicyData *string `field:"required" json:"policyData" yaml:"policyData"` // The bucket's resource name in the format packer/project//bucket/. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_policy#resource_name PackerBucketIamPolicy#resource_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_policy#resource_name PackerBucketIamPolicy#resource_name} ResourceName *string `field:"required" json:"resourceName" yaml:"resourceName"` } diff --git a/hcp/packerbucketiampolicy/README.md b/hcp/packerbucketiampolicy/README.md index 6110a1d7..b4a00b5b 100644 --- a/hcp/packerbucketiampolicy/README.md +++ b/hcp/packerbucketiampolicy/README.md @@ -1,3 +1,3 @@ # `hcp_packer_bucket_iam_policy` -Refer to the Terraform Registry for docs: [`hcp_packer_bucket_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_bucket_iam_policy). +Refer to the Terraform Registry for docs: [`hcp_packer_bucket_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_bucket_iam_policy). diff --git a/hcp/packerchannel/PackerChannel.go b/hcp/packerchannel/PackerChannel.go index b1498157..8a6aae1c 100644 --- a/hcp/packerchannel/PackerChannel.go +++ b/hcp/packerchannel/PackerChannel.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel hcp_packer_channel}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel hcp_packer_channel}. type PackerChannel interface { cdktf.TerraformResource AuthorId() *string @@ -483,7 +483,7 @@ func (j *jsiiProxy_PackerChannel) UpdatedAt() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel hcp_packer_channel} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel hcp_packer_channel} Resource. func NewPackerChannel(scope constructs.Construct, id *string, config *PackerChannelConfig) PackerChannel { _init_.Initialize() @@ -501,7 +501,7 @@ func NewPackerChannel(scope constructs.Construct, id *string, config *PackerChan return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel hcp_packer_channel} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel hcp_packer_channel} Resource. func NewPackerChannel_Override(p PackerChannel, scope constructs.Construct, id *string, config *PackerChannelConfig) { _init_.Initialize() diff --git a/hcp/packerchannel/PackerChannelConfig.go b/hcp/packerchannel/PackerChannelConfig.go index 921e46f5..1eb3bb71 100644 --- a/hcp/packerchannel/PackerChannelConfig.go +++ b/hcp/packerchannel/PackerChannelConfig.go @@ -24,13 +24,13 @@ type PackerChannelConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the HCP Packer Registry bucket where the channel should be created. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#bucket_name PackerChannel#bucket_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#bucket_name PackerChannel#bucket_name} BucketName *string `field:"required" json:"bucketName" yaml:"bucketName"` // The name of the channel being managed. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#name PackerChannel#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#name PackerChannel#name} Name *string `field:"required" json:"name" yaml:"name"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#id PackerChannel#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#id PackerChannel#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,17 +40,17 @@ type PackerChannelConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#project_id PackerChannel#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#project_id PackerChannel#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // If true, the channel is only visible to users with permission to create and manage it. // // If false, the channel is visible to every member of the organization. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#restricted PackerChannel#restricted} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#restricted PackerChannel#restricted} Restricted interface{} `field:"optional" json:"restricted" yaml:"restricted"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#timeouts PackerChannel#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#timeouts PackerChannel#timeouts} Timeouts *PackerChannelTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/packerchannel/PackerChannelTimeouts.go b/hcp/packerchannel/PackerChannelTimeouts.go index 491626a0..12b5234a 100644 --- a/hcp/packerchannel/PackerChannelTimeouts.go +++ b/hcp/packerchannel/PackerChannelTimeouts.go @@ -5,13 +5,13 @@ package packerchannel type PackerChannelTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#create PackerChannel#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#create PackerChannel#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#default PackerChannel#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#default PackerChannel#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#delete PackerChannel#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#delete PackerChannel#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel#update PackerChannel#update}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel#update PackerChannel#update}. Update *string `field:"optional" json:"update" yaml:"update"` } diff --git a/hcp/packerchannel/README.md b/hcp/packerchannel/README.md index f15a1912..b396f6a6 100644 --- a/hcp/packerchannel/README.md +++ b/hcp/packerchannel/README.md @@ -1,3 +1,3 @@ # `hcp_packer_channel` -Refer to the Terraform Registry for docs: [`hcp_packer_channel`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel). +Refer to the Terraform Registry for docs: [`hcp_packer_channel`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel). diff --git a/hcp/packerchannelassignment/PackerChannelAssignment.go b/hcp/packerchannelassignment/PackerChannelAssignment.go index 2a0cb68f..ad5f3db2 100644 --- a/hcp/packerchannelassignment/PackerChannelAssignment.go +++ b/hcp/packerchannelassignment/PackerChannelAssignment.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment hcp_packer_channel_assignment}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment hcp_packer_channel_assignment}. type PackerChannelAssignment interface { cdktf.TerraformResource BucketName() *string @@ -439,7 +439,7 @@ func (j *jsiiProxy_PackerChannelAssignment) VersionFingerprintInput() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment hcp_packer_channel_assignment} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment hcp_packer_channel_assignment} Resource. func NewPackerChannelAssignment(scope constructs.Construct, id *string, config *PackerChannelAssignmentConfig) PackerChannelAssignment { _init_.Initialize() @@ -457,7 +457,7 @@ func NewPackerChannelAssignment(scope constructs.Construct, id *string, config * return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment hcp_packer_channel_assignment} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment hcp_packer_channel_assignment} Resource. func NewPackerChannelAssignment_Override(p PackerChannelAssignment, scope constructs.Construct, id *string, config *PackerChannelAssignmentConfig) { _init_.Initialize() diff --git a/hcp/packerchannelassignment/PackerChannelAssignmentConfig.go b/hcp/packerchannelassignment/PackerChannelAssignmentConfig.go index 6c10ecff..4d6f708b 100644 --- a/hcp/packerchannelassignment/PackerChannelAssignmentConfig.go +++ b/hcp/packerchannelassignment/PackerChannelAssignmentConfig.go @@ -24,13 +24,13 @@ type PackerChannelAssignmentConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The slug of the HCP Packer bucket where the channel is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#bucket_name PackerChannelAssignment#bucket_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#bucket_name PackerChannelAssignment#bucket_name} BucketName *string `field:"required" json:"bucketName" yaml:"bucketName"` // The name of the HCP Packer channel being managed. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#channel_name PackerChannelAssignment#channel_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#channel_name PackerChannelAssignment#channel_name} ChannelName *string `field:"required" json:"channelName" yaml:"channelName"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#id PackerChannelAssignment#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#id PackerChannelAssignment#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -40,15 +40,15 @@ type PackerChannelAssignmentConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#project_id PackerChannelAssignment#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#project_id PackerChannelAssignment#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#timeouts PackerChannelAssignment#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#timeouts PackerChannelAssignment#timeouts} Timeouts *PackerChannelAssignmentTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` // The fingerprint of the version assigned to the channel. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#version_fingerprint PackerChannelAssignment#version_fingerprint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#version_fingerprint PackerChannelAssignment#version_fingerprint} VersionFingerprint *string `field:"optional" json:"versionFingerprint" yaml:"versionFingerprint"` } diff --git a/hcp/packerchannelassignment/PackerChannelAssignmentTimeouts.go b/hcp/packerchannelassignment/PackerChannelAssignmentTimeouts.go index 2e0dcbaa..4a0e3de3 100644 --- a/hcp/packerchannelassignment/PackerChannelAssignmentTimeouts.go +++ b/hcp/packerchannelassignment/PackerChannelAssignmentTimeouts.go @@ -5,13 +5,13 @@ package packerchannelassignment type PackerChannelAssignmentTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#create PackerChannelAssignment#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#create PackerChannelAssignment#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#default PackerChannelAssignment#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#default PackerChannelAssignment#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#delete PackerChannelAssignment#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#delete PackerChannelAssignment#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment#update PackerChannelAssignment#update}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment#update PackerChannelAssignment#update}. Update *string `field:"optional" json:"update" yaml:"update"` } diff --git a/hcp/packerchannelassignment/README.md b/hcp/packerchannelassignment/README.md index 7f7a7f7c..6184a78b 100644 --- a/hcp/packerchannelassignment/README.md +++ b/hcp/packerchannelassignment/README.md @@ -1,3 +1,3 @@ # `hcp_packer_channel_assignment` -Refer to the Terraform Registry for docs: [`hcp_packer_channel_assignment`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_channel_assignment). +Refer to the Terraform Registry for docs: [`hcp_packer_channel_assignment`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_channel_assignment). diff --git a/hcp/packerruntask/PackerRunTask.go b/hcp/packerruntask/PackerRunTask.go index d59fd20f..58e0d7d4 100644 --- a/hcp/packerruntask/PackerRunTask.go +++ b/hcp/packerruntask/PackerRunTask.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task hcp_packer_run_task}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task hcp_packer_run_task}. type PackerRunTask interface { cdktf.TerraformResource // Experimental. @@ -415,7 +415,7 @@ func (j *jsiiProxy_PackerRunTask) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task hcp_packer_run_task} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task hcp_packer_run_task} Resource. func NewPackerRunTask(scope constructs.Construct, id *string, config *PackerRunTaskConfig) PackerRunTask { _init_.Initialize() @@ -433,7 +433,7 @@ func NewPackerRunTask(scope constructs.Construct, id *string, config *PackerRunT return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task hcp_packer_run_task} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task hcp_packer_run_task} Resource. func NewPackerRunTask_Override(p PackerRunTask, scope constructs.Construct, id *string, config *PackerRunTaskConfig) { _init_.Initialize() diff --git a/hcp/packerruntask/PackerRunTaskConfig.go b/hcp/packerruntask/PackerRunTaskConfig.go index bf22b5ff..14beafae 100644 --- a/hcp/packerruntask/PackerRunTaskConfig.go +++ b/hcp/packerruntask/PackerRunTaskConfig.go @@ -22,7 +22,7 @@ type PackerRunTaskConfig struct { Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#id PackerRunTask#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#id PackerRunTask#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -32,17 +32,17 @@ type PackerRunTaskConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#project_id PackerRunTask#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#project_id PackerRunTask#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // If true, the HMAC Key (`hmac_key`) will be regenerated during `terraform apply`. // // While set to true, the key will be regenerated on every `terraform apply` until `regenerate_hmac` is set to false or removed from the config. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#regenerate_hmac PackerRunTask#regenerate_hmac} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#regenerate_hmac PackerRunTask#regenerate_hmac} RegenerateHmac interface{} `field:"optional" json:"regenerateHmac" yaml:"regenerateHmac"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#timeouts PackerRunTask#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#timeouts PackerRunTask#timeouts} Timeouts *PackerRunTaskTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/packerruntask/PackerRunTaskTimeouts.go b/hcp/packerruntask/PackerRunTaskTimeouts.go index 2eaa5bb2..ae8e96fe 100644 --- a/hcp/packerruntask/PackerRunTaskTimeouts.go +++ b/hcp/packerruntask/PackerRunTaskTimeouts.go @@ -5,13 +5,13 @@ package packerruntask type PackerRunTaskTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#create PackerRunTask#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#create PackerRunTask#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#default PackerRunTask#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#default PackerRunTask#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#delete PackerRunTask#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#delete PackerRunTask#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task#update PackerRunTask#update}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task#update PackerRunTask#update}. Update *string `field:"optional" json:"update" yaml:"update"` } diff --git a/hcp/packerruntask/README.md b/hcp/packerruntask/README.md index f6eba0d9..aed2bb7b 100644 --- a/hcp/packerruntask/README.md +++ b/hcp/packerruntask/README.md @@ -1,3 +1,3 @@ # `hcp_packer_run_task` -Refer to the Terraform Registry for docs: [`hcp_packer_run_task`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/packer_run_task). +Refer to the Terraform Registry for docs: [`hcp_packer_run_task`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/packer_run_task). diff --git a/hcp/project/Project.go b/hcp/project/Project.go index 82c8c392..f9597253 100644 --- a/hcp/project/Project.go +++ b/hcp/project/Project.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project hcp_project}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project hcp_project}. type Project interface { cdktf.TerraformResource // Experimental. @@ -355,7 +355,7 @@ func (j *jsiiProxy_Project) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project hcp_project} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project hcp_project} Resource. func NewProject(scope constructs.Construct, id *string, config *ProjectConfig) Project { _init_.Initialize() @@ -373,7 +373,7 @@ func NewProject(scope constructs.Construct, id *string, config *ProjectConfig) P return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project hcp_project} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project hcp_project} Resource. func NewProject_Override(p Project, scope constructs.Construct, id *string, config *ProjectConfig) { _init_.Initialize() diff --git a/hcp/project/ProjectConfig.go b/hcp/project/ProjectConfig.go index 3a9169f9..1c14aae1 100644 --- a/hcp/project/ProjectConfig.go +++ b/hcp/project/ProjectConfig.go @@ -24,11 +24,11 @@ type ProjectConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The project's name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project#name Project#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project#name Project#name} Name *string `field:"required" json:"name" yaml:"name"` // The project's description. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project#description Project#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project#description Project#description} Description *string `field:"optional" json:"description" yaml:"description"` } diff --git a/hcp/project/README.md b/hcp/project/README.md index a742f491..a5eba48e 100644 --- a/hcp/project/README.md +++ b/hcp/project/README.md @@ -1,3 +1,3 @@ # `hcp_project` -Refer to the Terraform Registry for docs: [`hcp_project`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project). +Refer to the Terraform Registry for docs: [`hcp_project`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project). diff --git a/hcp/projectiambinding/ProjectIamBinding.go b/hcp/projectiambinding/ProjectIamBinding.go index e668f69a..b237d032 100644 --- a/hcp/projectiambinding/ProjectIamBinding.go +++ b/hcp/projectiambinding/ProjectIamBinding.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_binding hcp_project_iam_binding}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_binding hcp_project_iam_binding}. type ProjectIamBinding interface { cdktf.TerraformResource // Experimental. @@ -356,7 +356,7 @@ func (j *jsiiProxy_ProjectIamBinding) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_binding hcp_project_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_binding hcp_project_iam_binding} Resource. func NewProjectIamBinding(scope constructs.Construct, id *string, config *ProjectIamBindingConfig) ProjectIamBinding { _init_.Initialize() @@ -374,7 +374,7 @@ func NewProjectIamBinding(scope constructs.Construct, id *string, config *Projec return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_binding hcp_project_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_binding hcp_project_iam_binding} Resource. func NewProjectIamBinding_Override(p ProjectIamBinding, scope constructs.Construct, id *string, config *ProjectIamBindingConfig) { _init_.Initialize() diff --git a/hcp/projectiambinding/ProjectIamBindingConfig.go b/hcp/projectiambinding/ProjectIamBindingConfig.go index b7456c15..bd86e9c2 100644 --- a/hcp/projectiambinding/ProjectIamBindingConfig.go +++ b/hcp/projectiambinding/ProjectIamBindingConfig.go @@ -24,17 +24,17 @@ type ProjectIamBindingConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The principal to bind to the given role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_binding#principal_id ProjectIamBinding#principal_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_binding#principal_id ProjectIamBinding#principal_id} PrincipalId *string `field:"required" json:"principalId" yaml:"principalId"` // The role name to bind to the given principal. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_binding#role ProjectIamBinding#role} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_binding#role ProjectIamBinding#role} Role *string `field:"required" json:"role" yaml:"role"` // The ID of the HCP project to apply the IAM Policy to. // // If unspecified, the project configured on the provider is used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_binding#project_id ProjectIamBinding#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_binding#project_id ProjectIamBinding#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/projectiambinding/README.md b/hcp/projectiambinding/README.md index 4eed1ae5..807a9a5a 100644 --- a/hcp/projectiambinding/README.md +++ b/hcp/projectiambinding/README.md @@ -1,3 +1,3 @@ # `hcp_project_iam_binding` -Refer to the Terraform Registry for docs: [`hcp_project_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_binding). +Refer to the Terraform Registry for docs: [`hcp_project_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_binding). diff --git a/hcp/projectiampolicy/ProjectIamPolicy.go b/hcp/projectiampolicy/ProjectIamPolicy.go index 562385bc..d8380092 100644 --- a/hcp/projectiampolicy/ProjectIamPolicy.go +++ b/hcp/projectiampolicy/ProjectIamPolicy.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_policy hcp_project_iam_policy}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_policy hcp_project_iam_policy}. type ProjectIamPolicy interface { cdktf.TerraformResource // Experimental. @@ -344,7 +344,7 @@ func (j *jsiiProxy_ProjectIamPolicy) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_policy hcp_project_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_policy hcp_project_iam_policy} Resource. func NewProjectIamPolicy(scope constructs.Construct, id *string, config *ProjectIamPolicyConfig) ProjectIamPolicy { _init_.Initialize() @@ -362,7 +362,7 @@ func NewProjectIamPolicy(scope constructs.Construct, id *string, config *Project return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_policy hcp_project_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_policy hcp_project_iam_policy} Resource. func NewProjectIamPolicy_Override(p ProjectIamPolicy, scope constructs.Construct, id *string, config *ProjectIamPolicyConfig) { _init_.Initialize() diff --git a/hcp/projectiampolicy/ProjectIamPolicyConfig.go b/hcp/projectiampolicy/ProjectIamPolicyConfig.go index 7486980d..d592fc53 100644 --- a/hcp/projectiampolicy/ProjectIamPolicyConfig.go +++ b/hcp/projectiampolicy/ProjectIamPolicyConfig.go @@ -24,13 +24,13 @@ type ProjectIamPolicyConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The policy to apply. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_policy#policy_data ProjectIamPolicy#policy_data} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_policy#policy_data ProjectIamPolicy#policy_data} PolicyData *string `field:"required" json:"policyData" yaml:"policyData"` // The ID of the HCP project to apply the IAM Policy to. // // If unspecified, the project configured on the provider is used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_policy#project_id ProjectIamPolicy#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_policy#project_id ProjectIamPolicy#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/projectiampolicy/README.md b/hcp/projectiampolicy/README.md index e9163d3b..b4a2faf9 100644 --- a/hcp/projectiampolicy/README.md +++ b/hcp/projectiampolicy/README.md @@ -1,3 +1,3 @@ # `hcp_project_iam_policy` -Refer to the Terraform Registry for docs: [`hcp_project_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/project_iam_policy). +Refer to the Terraform Registry for docs: [`hcp_project_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/project_iam_policy). diff --git a/hcp/provider/HcpProvider.go b/hcp/provider/HcpProvider.go index 2484a68f..8efb2df1 100644 --- a/hcp/provider/HcpProvider.go +++ b/hcp/provider/HcpProvider.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs hcp}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs hcp}. type HcpProvider interface { cdktf.TerraformProvider Alias() *string @@ -306,7 +306,7 @@ func (j *jsiiProxy_HcpProvider) WorkloadIdentityInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs hcp} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs hcp} Resource. func NewHcpProvider(scope constructs.Construct, id *string, config *HcpProviderConfig) HcpProvider { _init_.Initialize() @@ -324,7 +324,7 @@ func NewHcpProvider(scope constructs.Construct, id *string, config *HcpProviderC return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs hcp} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs hcp} Resource. func NewHcpProvider_Override(h HcpProvider, scope constructs.Construct, id *string, config *HcpProviderConfig) { _init_.Initialize() diff --git a/hcp/provider/HcpProviderConfig.go b/hcp/provider/HcpProviderConfig.go index d6b82fc3..40612013 100644 --- a/hcp/provider/HcpProviderConfig.go +++ b/hcp/provider/HcpProviderConfig.go @@ -7,29 +7,29 @@ package provider type HcpProviderConfig struct { // Alias name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#alias HcpProvider#alias} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#alias HcpProvider#alias} Alias *string `field:"optional" json:"alias" yaml:"alias"` // The OAuth2 Client ID for API operations. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#client_id HcpProvider#client_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#client_id HcpProvider#client_id} ClientId *string `field:"optional" json:"clientId" yaml:"clientId"` // The OAuth2 Client Secret for API operations. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#client_secret HcpProvider#client_secret} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#client_secret HcpProvider#client_secret} ClientSecret *string `field:"optional" json:"clientSecret" yaml:"clientSecret"` // The path to an HCP credential file to use to authenticate the provider to HCP. // // You can alternatively set the HCP_CRED_FILE environment variable to point at a credential file as well. Using a credential file allows you to authenticate the provider as a service principal via client credentials or dynamically based on Workload Identity Federation. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#credential_file HcpProvider#credential_file} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#credential_file HcpProvider#credential_file} CredentialFile *string `field:"optional" json:"credentialFile" yaml:"credentialFile"` // The default project in which resources should be created. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#project_id HcpProvider#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#project_id HcpProvider#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // workload_identity block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#workload_identity HcpProvider#workload_identity} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#workload_identity HcpProvider#workload_identity} WorkloadIdentity interface{} `field:"optional" json:"workloadIdentity" yaml:"workloadIdentity"` } diff --git a/hcp/provider/HcpProviderWorkloadIdentity.go b/hcp/provider/HcpProviderWorkloadIdentity.go index d073c2ef..9ce6ad53 100644 --- a/hcp/provider/HcpProviderWorkloadIdentity.go +++ b/hcp/provider/HcpProviderWorkloadIdentity.go @@ -7,19 +7,19 @@ package provider type HcpProviderWorkloadIdentity struct { // The resource_name of the Workload Identity Provider to exchange the token with. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#resource_name HcpProvider#resource_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#resource_name HcpProvider#resource_name} ResourceName *string `field:"required" json:"resourceName" yaml:"resourceName"` // The JWT token retrieved from an OpenID Connect (OIDC) or OAuth2 provider. // // At least one of `token_file` or `token` must be set, if both are set then `token` takes precedence. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#token HcpProvider#token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#token HcpProvider#token} Token *string `field:"optional" json:"token" yaml:"token"` // The path to a file containing a JWT token retrieved from an OpenID Connect (OIDC) or OAuth2 provider. // // At least one of `token_file` or `token` must be set, if both are set then `token` takes precedence. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs#token_file HcpProvider#token_file} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs#token_file HcpProvider#token_file} TokenFile *string `field:"optional" json:"tokenFile" yaml:"tokenFile"` } diff --git a/hcp/provider/README.md b/hcp/provider/README.md index 3051cf88..2dd1a881 100644 --- a/hcp/provider/README.md +++ b/hcp/provider/README.md @@ -1,3 +1,3 @@ # `provider` -Refer to the Terraform Registry for docs: [`hcp`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs). +Refer to the Terraform Registry for docs: [`hcp`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs). diff --git a/hcp/serviceprincipal/README.md b/hcp/serviceprincipal/README.md index ec3e4903..cd7da704 100644 --- a/hcp/serviceprincipal/README.md +++ b/hcp/serviceprincipal/README.md @@ -1,3 +1,3 @@ # `hcp_service_principal` -Refer to the Terraform Registry for docs: [`hcp_service_principal`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal). +Refer to the Terraform Registry for docs: [`hcp_service_principal`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal). diff --git a/hcp/serviceprincipal/ServicePrincipal.go b/hcp/serviceprincipal/ServicePrincipal.go index cfb0738b..d363f792 100644 --- a/hcp/serviceprincipal/ServicePrincipal.go +++ b/hcp/serviceprincipal/ServicePrincipal.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal hcp_service_principal}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal hcp_service_principal}. type ServicePrincipal interface { cdktf.TerraformResource // Experimental. @@ -355,7 +355,7 @@ func (j *jsiiProxy_ServicePrincipal) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal hcp_service_principal} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal hcp_service_principal} Resource. func NewServicePrincipal(scope constructs.Construct, id *string, config *ServicePrincipalConfig) ServicePrincipal { _init_.Initialize() @@ -373,7 +373,7 @@ func NewServicePrincipal(scope constructs.Construct, id *string, config *Service return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal hcp_service_principal} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal hcp_service_principal} Resource. func NewServicePrincipal_Override(s ServicePrincipal, scope constructs.Construct, id *string, config *ServicePrincipalConfig) { _init_.Initialize() diff --git a/hcp/serviceprincipal/ServicePrincipalConfig.go b/hcp/serviceprincipal/ServicePrincipalConfig.go index c35c0d68..074cb275 100644 --- a/hcp/serviceprincipal/ServicePrincipalConfig.go +++ b/hcp/serviceprincipal/ServicePrincipalConfig.go @@ -24,13 +24,13 @@ type ServicePrincipalConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The service principal's name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal#name ServicePrincipal#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal#name ServicePrincipal#name} Name *string `field:"required" json:"name" yaml:"name"` // The parent location to create the service principal under. // // If unspecified, the service principal will be created in the project the provider is configured with. If specified, the accepted values are "project/" or "organization/" // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal#parent ServicePrincipal#parent} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal#parent ServicePrincipal#parent} Parent *string `field:"optional" json:"parent" yaml:"parent"` } diff --git a/hcp/serviceprincipalkey/README.md b/hcp/serviceprincipalkey/README.md index 3103df96..1835a1a8 100644 --- a/hcp/serviceprincipalkey/README.md +++ b/hcp/serviceprincipalkey/README.md @@ -1,3 +1,3 @@ # `hcp_service_principal_key` -Refer to the Terraform Registry for docs: [`hcp_service_principal_key`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal_key). +Refer to the Terraform Registry for docs: [`hcp_service_principal_key`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal_key). diff --git a/hcp/serviceprincipalkey/ServicePrincipalKey.go b/hcp/serviceprincipalkey/ServicePrincipalKey.go index c779c777..bd0695d2 100644 --- a/hcp/serviceprincipalkey/ServicePrincipalKey.go +++ b/hcp/serviceprincipalkey/ServicePrincipalKey.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal_key hcp_service_principal_key}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal_key hcp_service_principal_key}. type ServicePrincipalKey interface { cdktf.TerraformResource // Experimental. @@ -366,7 +366,7 @@ func (j *jsiiProxy_ServicePrincipalKey) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal_key hcp_service_principal_key} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal_key hcp_service_principal_key} Resource. func NewServicePrincipalKey(scope constructs.Construct, id *string, config *ServicePrincipalKeyConfig) ServicePrincipalKey { _init_.Initialize() @@ -384,7 +384,7 @@ func NewServicePrincipalKey(scope constructs.Construct, id *string, config *Serv return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal_key hcp_service_principal_key} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal_key hcp_service_principal_key} Resource. func NewServicePrincipalKey_Override(s ServicePrincipalKey, scope constructs.Construct, id *string, config *ServicePrincipalKeyConfig) { _init_.Initialize() diff --git a/hcp/serviceprincipalkey/ServicePrincipalKeyConfig.go b/hcp/serviceprincipalkey/ServicePrincipalKeyConfig.go index eb6d4edb..34c28881 100644 --- a/hcp/serviceprincipalkey/ServicePrincipalKeyConfig.go +++ b/hcp/serviceprincipalkey/ServicePrincipalKeyConfig.go @@ -24,13 +24,13 @@ type ServicePrincipalKeyConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The service principal's resource name for which a key should be created. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal_key#service_principal ServicePrincipalKey#service_principal} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal_key#service_principal ServicePrincipalKey#service_principal} ServicePrincipal *string `field:"required" json:"servicePrincipal" yaml:"servicePrincipal"` // A map of arbitrary string key/value pairs that will force recreation of the key when they change, enabling key based on external conditions such as a rotating timestamp. // // Changing this forces a new resource to be created. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/service_principal_key#rotate_triggers ServicePrincipalKey#rotate_triggers} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/service_principal_key#rotate_triggers ServicePrincipalKey#rotate_triggers} RotateTriggers *map[string]*string `field:"optional" json:"rotateTriggers" yaml:"rotateTriggers"` } diff --git a/hcp/vaultcluster/README.md b/hcp/vaultcluster/README.md index fbb47a3e..29ee8743 100644 --- a/hcp/vaultcluster/README.md +++ b/hcp/vaultcluster/README.md @@ -1,3 +1,3 @@ # `hcp_vault_cluster` -Refer to the Terraform Registry for docs: [`hcp_vault_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster). +Refer to the Terraform Registry for docs: [`hcp_vault_cluster`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster). diff --git a/hcp/vaultcluster/VaultCluster.go b/hcp/vaultcluster/VaultCluster.go index a2981eb9..4838e170 100644 --- a/hcp/vaultcluster/VaultCluster.go +++ b/hcp/vaultcluster/VaultCluster.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster hcp_vault_cluster}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster hcp_vault_cluster}. type VaultCluster interface { cdktf.TerraformResource AuditLogConfig() VaultClusterAuditLogConfigOutputReference @@ -765,7 +765,7 @@ func (j *jsiiProxy_VaultCluster) VaultVersion() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster hcp_vault_cluster} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster hcp_vault_cluster} Resource. func NewVaultCluster(scope constructs.Construct, id *string, config *VaultClusterConfig) VaultCluster { _init_.Initialize() @@ -783,7 +783,7 @@ func NewVaultCluster(scope constructs.Construct, id *string, config *VaultCluste return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster hcp_vault_cluster} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster hcp_vault_cluster} Resource. func NewVaultCluster_Override(v VaultCluster, scope constructs.Construct, id *string, config *VaultClusterConfig) { _init_.Initialize() diff --git a/hcp/vaultcluster/VaultClusterAuditLogConfig.go b/hcp/vaultcluster/VaultClusterAuditLogConfig.go index 9ac3302e..14e4ad4d 100644 --- a/hcp/vaultcluster/VaultClusterAuditLogConfig.go +++ b/hcp/vaultcluster/VaultClusterAuditLogConfig.go @@ -7,107 +7,107 @@ package vaultcluster type VaultClusterAuditLogConfig struct { // CloudWatch access key ID for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#cloudwatch_access_key_id VaultCluster#cloudwatch_access_key_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#cloudwatch_access_key_id VaultCluster#cloudwatch_access_key_id} CloudwatchAccessKeyId *string `field:"optional" json:"cloudwatchAccessKeyId" yaml:"cloudwatchAccessKeyId"` // CloudWatch region for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#cloudwatch_region VaultCluster#cloudwatch_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#cloudwatch_region VaultCluster#cloudwatch_region} CloudwatchRegion *string `field:"optional" json:"cloudwatchRegion" yaml:"cloudwatchRegion"` // CloudWatch secret access key for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#cloudwatch_secret_access_key VaultCluster#cloudwatch_secret_access_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#cloudwatch_secret_access_key VaultCluster#cloudwatch_secret_access_key} CloudwatchSecretAccessKey *string `field:"optional" json:"cloudwatchSecretAccessKey" yaml:"cloudwatchSecretAccessKey"` // Datadog api key for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#datadog_api_key VaultCluster#datadog_api_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#datadog_api_key VaultCluster#datadog_api_key} DatadogApiKey *string `field:"optional" json:"datadogApiKey" yaml:"datadogApiKey"` // Datadog region for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#datadog_region VaultCluster#datadog_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#datadog_region VaultCluster#datadog_region} DatadogRegion *string `field:"optional" json:"datadogRegion" yaml:"datadogRegion"` // ElasticSearch endpoint for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#elasticsearch_endpoint VaultCluster#elasticsearch_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#elasticsearch_endpoint VaultCluster#elasticsearch_endpoint} ElasticsearchEndpoint *string `field:"optional" json:"elasticsearchEndpoint" yaml:"elasticsearchEndpoint"` // ElasticSearch password for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#elasticsearch_password VaultCluster#elasticsearch_password} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#elasticsearch_password VaultCluster#elasticsearch_password} ElasticsearchPassword *string `field:"optional" json:"elasticsearchPassword" yaml:"elasticsearchPassword"` // ElasticSearch user for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#elasticsearch_user VaultCluster#elasticsearch_user} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#elasticsearch_user VaultCluster#elasticsearch_user} ElasticsearchUser *string `field:"optional" json:"elasticsearchUser" yaml:"elasticsearchUser"` // Grafana endpoint for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#grafana_endpoint VaultCluster#grafana_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#grafana_endpoint VaultCluster#grafana_endpoint} GrafanaEndpoint *string `field:"optional" json:"grafanaEndpoint" yaml:"grafanaEndpoint"` // Grafana password for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#grafana_password VaultCluster#grafana_password} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#grafana_password VaultCluster#grafana_password} GrafanaPassword *string `field:"optional" json:"grafanaPassword" yaml:"grafanaPassword"` // Grafana user for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#grafana_user VaultCluster#grafana_user} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#grafana_user VaultCluster#grafana_user} GrafanaUser *string `field:"optional" json:"grafanaUser" yaml:"grafanaUser"` // HTTP basic authentication password for streaming audit logs, one of the two available authentication methods, can be specified only if http_basic_user is also provided. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_basic_password VaultCluster#http_basic_password} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_basic_password VaultCluster#http_basic_password} HttpBasicPassword *string `field:"optional" json:"httpBasicPassword" yaml:"httpBasicPassword"` // HTTP basic authentication username for streaming audit logs, one of the two available authentication methods, can be specified only if http_basic_password is also provided. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_basic_user VaultCluster#http_basic_user} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_basic_user VaultCluster#http_basic_user} HttpBasicUser *string `field:"optional" json:"httpBasicUser" yaml:"httpBasicUser"` // HTTP bearer authentication token for streaming audit logs, one of the two available authentication methods, can be specified only if http_basic_user and http_basic_password are not provided. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_bearer_token VaultCluster#http_bearer_token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_bearer_token VaultCluster#http_bearer_token} HttpBearerToken *string `field:"optional" json:"httpBearerToken" yaml:"httpBearerToken"` // HTTP codec for streaming audit logs, allowed values are JSON and NDJSON. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_codec VaultCluster#http_codec} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_codec VaultCluster#http_codec} HttpCodec *string `field:"optional" json:"httpCodec" yaml:"httpCodec"` // HTTP compression flag for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_compression VaultCluster#http_compression} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_compression VaultCluster#http_compression} HttpCompression interface{} `field:"optional" json:"httpCompression" yaml:"httpCompression"` // HTTP headers for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_headers VaultCluster#http_headers} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_headers VaultCluster#http_headers} HttpHeaders *map[string]*string `field:"optional" json:"httpHeaders" yaml:"httpHeaders"` // HTTP payload method for streaming audit logs, , allowed values are PATCH, POST, or PUT. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_method VaultCluster#http_method} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_method VaultCluster#http_method} HttpMethod *string `field:"optional" json:"httpMethod" yaml:"httpMethod"` // HTTP payload prefix for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_payload_prefix VaultCluster#http_payload_prefix} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_payload_prefix VaultCluster#http_payload_prefix} HttpPayloadPrefix *string `field:"optional" json:"httpPayloadPrefix" yaml:"httpPayloadPrefix"` // HTTP payload suffix for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_payload_suffix VaultCluster#http_payload_suffix} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_payload_suffix VaultCluster#http_payload_suffix} HttpPayloadSuffix *string `field:"optional" json:"httpPayloadSuffix" yaml:"httpPayloadSuffix"` // HTTP URI for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_uri VaultCluster#http_uri} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_uri VaultCluster#http_uri} HttpUri *string `field:"optional" json:"httpUri" yaml:"httpUri"` // NewRelic Account ID for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#newrelic_account_id VaultCluster#newrelic_account_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#newrelic_account_id VaultCluster#newrelic_account_id} NewrelicAccountId *string `field:"optional" json:"newrelicAccountId" yaml:"newrelicAccountId"` // NewRelic license key for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#newrelic_license_key VaultCluster#newrelic_license_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#newrelic_license_key VaultCluster#newrelic_license_key} NewrelicLicenseKey *string `field:"optional" json:"newrelicLicenseKey" yaml:"newrelicLicenseKey"` // NewRelic region for streaming audit logs, allowed values are "US" and "EU". // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#newrelic_region VaultCluster#newrelic_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#newrelic_region VaultCluster#newrelic_region} NewrelicRegion *string `field:"optional" json:"newrelicRegion" yaml:"newrelicRegion"` // Splunk endpoint for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#splunk_hecendpoint VaultCluster#splunk_hecendpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#splunk_hecendpoint VaultCluster#splunk_hecendpoint} SplunkHecendpoint *string `field:"optional" json:"splunkHecendpoint" yaml:"splunkHecendpoint"` // Splunk token for streaming audit logs. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#splunk_token VaultCluster#splunk_token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#splunk_token VaultCluster#splunk_token} SplunkToken *string `field:"optional" json:"splunkToken" yaml:"splunkToken"` } diff --git a/hcp/vaultcluster/VaultClusterConfig.go b/hcp/vaultcluster/VaultClusterConfig.go index c25470b4..5da70a01 100644 --- a/hcp/vaultcluster/VaultClusterConfig.go +++ b/hcp/vaultcluster/VaultClusterConfig.go @@ -24,73 +24,73 @@ type VaultClusterConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Vault cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#cluster_id VaultCluster#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#cluster_id VaultCluster#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // The ID of the HVN this HCP Vault cluster is associated to. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#hvn_id VaultCluster#hvn_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#hvn_id VaultCluster#hvn_id} HvnId *string `field:"required" json:"hvnId" yaml:"hvnId"` // audit_log_config block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#audit_log_config VaultCluster#audit_log_config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#audit_log_config VaultCluster#audit_log_config} AuditLogConfig *VaultClusterAuditLogConfig `field:"optional" json:"auditLogConfig" yaml:"auditLogConfig"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#id VaultCluster#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#id VaultCluster#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // ip_allowlist block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#ip_allowlist VaultCluster#ip_allowlist} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#ip_allowlist VaultCluster#ip_allowlist} IpAllowlist interface{} `field:"optional" json:"ipAllowlist" yaml:"ipAllowlist"` // major_version_upgrade_config block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#major_version_upgrade_config VaultCluster#major_version_upgrade_config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#major_version_upgrade_config VaultCluster#major_version_upgrade_config} MajorVersionUpgradeConfig *VaultClusterMajorVersionUpgradeConfig `field:"optional" json:"majorVersionUpgradeConfig" yaml:"majorVersionUpgradeConfig"` // metrics_config block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#metrics_config VaultCluster#metrics_config} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#metrics_config VaultCluster#metrics_config} MetricsConfig *VaultClusterMetricsConfig `field:"optional" json:"metricsConfig" yaml:"metricsConfig"` // The minimum Vault version to use when creating the cluster. // // If not specified, it is defaulted to the version that is currently recommended by HCP. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#min_vault_version VaultCluster#min_vault_version} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#min_vault_version VaultCluster#min_vault_version} MinVaultVersion *string `field:"optional" json:"minVaultVersion" yaml:"minVaultVersion"` // The performance replication [paths filter](https://developer.hashicorp.com/vault/tutorials/cloud-ops/vault-replication-terraform). Applies to performance replication secondaries only and operates in "deny" mode only. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#paths_filter VaultCluster#paths_filter} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#paths_filter VaultCluster#paths_filter} PathsFilter *[]*string `field:"optional" json:"pathsFilter" yaml:"pathsFilter"` // The `self_link` of the HCP Vault Plus tier cluster which is the primary in the performance replication setup with this HCP Vault Plus tier cluster. // // If not specified, it is a standalone Plus tier HCP Vault cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#primary_link VaultCluster#primary_link} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#primary_link VaultCluster#primary_link} PrimaryLink *string `field:"optional" json:"primaryLink" yaml:"primaryLink"` // The ID of the HCP project where the Vault cluster is located. // // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#project_id VaultCluster#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#project_id VaultCluster#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // Denotes that the cluster has a proxy endpoint. Valid options are `ENABLED`, `DISABLED`. Defaults to `DISABLED`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#proxy_endpoint VaultCluster#proxy_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#proxy_endpoint VaultCluster#proxy_endpoint} ProxyEndpoint *string `field:"optional" json:"proxyEndpoint" yaml:"proxyEndpoint"` // Denotes that the cluster has a public endpoint. Defaults to false. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#public_endpoint VaultCluster#public_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#public_endpoint VaultCluster#public_endpoint} PublicEndpoint interface{} `field:"optional" json:"publicEndpoint" yaml:"publicEndpoint"` // Tier of the HCP Vault cluster. // // Valid options for tiers - `dev`, `starter_small`, `standard_small`, `standard_medium`, `standard_large`, `plus_small`, `plus_medium`, `plus_large`. See [pricing information](https://www.hashicorp.com/products/vault/pricing). Changing a cluster's size or tier is only available to admins. See [Scale a cluster](https://registry.terraform.io/providers/hashicorp/hcp/latest/docs/guides/vault-scaling). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#tier VaultCluster#tier} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#tier VaultCluster#tier} Tier *string `field:"optional" json:"tier" yaml:"tier"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#timeouts VaultCluster#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#timeouts VaultCluster#timeouts} Timeouts *VaultClusterTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/vaultcluster/VaultClusterIpAllowlistStruct.go b/hcp/vaultcluster/VaultClusterIpAllowlistStruct.go index 5885f51e..039e0130 100644 --- a/hcp/vaultcluster/VaultClusterIpAllowlistStruct.go +++ b/hcp/vaultcluster/VaultClusterIpAllowlistStruct.go @@ -7,11 +7,11 @@ package vaultcluster type VaultClusterIpAllowlistStruct struct { // IP address range in CIDR notation. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#address VaultCluster#address} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#address VaultCluster#address} Address *string `field:"required" json:"address" yaml:"address"` // Description to help identify source (maximum 255 chars). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#description VaultCluster#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#description VaultCluster#description} Description *string `field:"optional" json:"description" yaml:"description"` } diff --git a/hcp/vaultcluster/VaultClusterMajorVersionUpgradeConfig.go b/hcp/vaultcluster/VaultClusterMajorVersionUpgradeConfig.go index ab64cbce..ae7bdd58 100644 --- a/hcp/vaultcluster/VaultClusterMajorVersionUpgradeConfig.go +++ b/hcp/vaultcluster/VaultClusterMajorVersionUpgradeConfig.go @@ -7,17 +7,17 @@ package vaultcluster type VaultClusterMajorVersionUpgradeConfig struct { // The major upgrade type for the cluster. Valid options for upgrade type - `AUTOMATIC`, `SCHEDULED`, `MANUAL`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#upgrade_type VaultCluster#upgrade_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#upgrade_type VaultCluster#upgrade_type} UpgradeType *string `field:"required" json:"upgradeType" yaml:"upgradeType"` // The maintenance day of the week for scheduled upgrades. // // Valid options for maintenance window day - `MONDAY`, `TUESDAY`, `WEDNESDAY`, `THURSDAY`, `FRIDAY`, `SATURDAY`, `SUNDAY` // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#maintenance_window_day VaultCluster#maintenance_window_day} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#maintenance_window_day VaultCluster#maintenance_window_day} MaintenanceWindowDay *string `field:"optional" json:"maintenanceWindowDay" yaml:"maintenanceWindowDay"` // The maintenance time frame for scheduled upgrades. Valid options for maintenance window time - `WINDOW_12AM_4AM`, `WINDOW_6AM_10AM`, `WINDOW_12PM_4PM`, `WINDOW_6PM_10PM`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#maintenance_window_time VaultCluster#maintenance_window_time} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#maintenance_window_time VaultCluster#maintenance_window_time} MaintenanceWindowTime *string `field:"optional" json:"maintenanceWindowTime" yaml:"maintenanceWindowTime"` } diff --git a/hcp/vaultcluster/VaultClusterMetricsConfig.go b/hcp/vaultcluster/VaultClusterMetricsConfig.go index d9daba1b..7ec7ff2e 100644 --- a/hcp/vaultcluster/VaultClusterMetricsConfig.go +++ b/hcp/vaultcluster/VaultClusterMetricsConfig.go @@ -7,107 +7,107 @@ package vaultcluster type VaultClusterMetricsConfig struct { // CloudWatch access key ID for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#cloudwatch_access_key_id VaultCluster#cloudwatch_access_key_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#cloudwatch_access_key_id VaultCluster#cloudwatch_access_key_id} CloudwatchAccessKeyId *string `field:"optional" json:"cloudwatchAccessKeyId" yaml:"cloudwatchAccessKeyId"` // CloudWatch region for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#cloudwatch_region VaultCluster#cloudwatch_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#cloudwatch_region VaultCluster#cloudwatch_region} CloudwatchRegion *string `field:"optional" json:"cloudwatchRegion" yaml:"cloudwatchRegion"` // CloudWatch secret access key for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#cloudwatch_secret_access_key VaultCluster#cloudwatch_secret_access_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#cloudwatch_secret_access_key VaultCluster#cloudwatch_secret_access_key} CloudwatchSecretAccessKey *string `field:"optional" json:"cloudwatchSecretAccessKey" yaml:"cloudwatchSecretAccessKey"` // Datadog api key for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#datadog_api_key VaultCluster#datadog_api_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#datadog_api_key VaultCluster#datadog_api_key} DatadogApiKey *string `field:"optional" json:"datadogApiKey" yaml:"datadogApiKey"` // Datadog region for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#datadog_region VaultCluster#datadog_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#datadog_region VaultCluster#datadog_region} DatadogRegion *string `field:"optional" json:"datadogRegion" yaml:"datadogRegion"` // ElasticSearch endpoint for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#elasticsearch_endpoint VaultCluster#elasticsearch_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#elasticsearch_endpoint VaultCluster#elasticsearch_endpoint} ElasticsearchEndpoint *string `field:"optional" json:"elasticsearchEndpoint" yaml:"elasticsearchEndpoint"` // ElasticSearch password for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#elasticsearch_password VaultCluster#elasticsearch_password} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#elasticsearch_password VaultCluster#elasticsearch_password} ElasticsearchPassword *string `field:"optional" json:"elasticsearchPassword" yaml:"elasticsearchPassword"` // ElasticSearch user for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#elasticsearch_user VaultCluster#elasticsearch_user} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#elasticsearch_user VaultCluster#elasticsearch_user} ElasticsearchUser *string `field:"optional" json:"elasticsearchUser" yaml:"elasticsearchUser"` // Grafana endpoint for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#grafana_endpoint VaultCluster#grafana_endpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#grafana_endpoint VaultCluster#grafana_endpoint} GrafanaEndpoint *string `field:"optional" json:"grafanaEndpoint" yaml:"grafanaEndpoint"` // Grafana password for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#grafana_password VaultCluster#grafana_password} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#grafana_password VaultCluster#grafana_password} GrafanaPassword *string `field:"optional" json:"grafanaPassword" yaml:"grafanaPassword"` // Grafana user for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#grafana_user VaultCluster#grafana_user} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#grafana_user VaultCluster#grafana_user} GrafanaUser *string `field:"optional" json:"grafanaUser" yaml:"grafanaUser"` // HTTP basic authentication password for streaming metrics, one of the two available authentication methods, can be specified only if http_basic_user is also specified. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_basic_password VaultCluster#http_basic_password} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_basic_password VaultCluster#http_basic_password} HttpBasicPassword *string `field:"optional" json:"httpBasicPassword" yaml:"httpBasicPassword"` // HTTP basic authentication username for streaming metrics, one of the two available authentication methods, can be specified only if http_basic_password is also specified. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_basic_user VaultCluster#http_basic_user} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_basic_user VaultCluster#http_basic_user} HttpBasicUser *string `field:"optional" json:"httpBasicUser" yaml:"httpBasicUser"` // HTTP bearer authentication token for streaming metrics, one of the two available authentication methods, can be specified only if http_basic_user and http_basic_password are not provided. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_bearer_token VaultCluster#http_bearer_token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_bearer_token VaultCluster#http_bearer_token} HttpBearerToken *string `field:"optional" json:"httpBearerToken" yaml:"httpBearerToken"` // HTTP codec for streaming metrics, allowed values are JSON and NDJSON. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_codec VaultCluster#http_codec} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_codec VaultCluster#http_codec} HttpCodec *string `field:"optional" json:"httpCodec" yaml:"httpCodec"` // HTTP compression flag for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_compression VaultCluster#http_compression} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_compression VaultCluster#http_compression} HttpCompression interface{} `field:"optional" json:"httpCompression" yaml:"httpCompression"` // HTTP headers for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_headers VaultCluster#http_headers} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_headers VaultCluster#http_headers} HttpHeaders *map[string]*string `field:"optional" json:"httpHeaders" yaml:"httpHeaders"` // HTTP payload method for streaming metrics, allowed values are PATCH, POST, or PUT. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_method VaultCluster#http_method} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_method VaultCluster#http_method} HttpMethod *string `field:"optional" json:"httpMethod" yaml:"httpMethod"` // HTTP payload prefix for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_payload_prefix VaultCluster#http_payload_prefix} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_payload_prefix VaultCluster#http_payload_prefix} HttpPayloadPrefix *string `field:"optional" json:"httpPayloadPrefix" yaml:"httpPayloadPrefix"` // HTTP payload suffix for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_payload_suffix VaultCluster#http_payload_suffix} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_payload_suffix VaultCluster#http_payload_suffix} HttpPayloadSuffix *string `field:"optional" json:"httpPayloadSuffix" yaml:"httpPayloadSuffix"` // HTTP URI for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#http_uri VaultCluster#http_uri} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#http_uri VaultCluster#http_uri} HttpUri *string `field:"optional" json:"httpUri" yaml:"httpUri"` // NewRelic Account ID for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#newrelic_account_id VaultCluster#newrelic_account_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#newrelic_account_id VaultCluster#newrelic_account_id} NewrelicAccountId *string `field:"optional" json:"newrelicAccountId" yaml:"newrelicAccountId"` // NewRelic license key for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#newrelic_license_key VaultCluster#newrelic_license_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#newrelic_license_key VaultCluster#newrelic_license_key} NewrelicLicenseKey *string `field:"optional" json:"newrelicLicenseKey" yaml:"newrelicLicenseKey"` // NewRelic region for streaming metrics, allowed values are "US" and "EU". // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#newrelic_region VaultCluster#newrelic_region} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#newrelic_region VaultCluster#newrelic_region} NewrelicRegion *string `field:"optional" json:"newrelicRegion" yaml:"newrelicRegion"` // Splunk endpoint for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#splunk_hecendpoint VaultCluster#splunk_hecendpoint} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#splunk_hecendpoint VaultCluster#splunk_hecendpoint} SplunkHecendpoint *string `field:"optional" json:"splunkHecendpoint" yaml:"splunkHecendpoint"` // Splunk token for streaming metrics. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#splunk_token VaultCluster#splunk_token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#splunk_token VaultCluster#splunk_token} SplunkToken *string `field:"optional" json:"splunkToken" yaml:"splunkToken"` } diff --git a/hcp/vaultcluster/VaultClusterTimeouts.go b/hcp/vaultcluster/VaultClusterTimeouts.go index 62184eed..0f53eec6 100644 --- a/hcp/vaultcluster/VaultClusterTimeouts.go +++ b/hcp/vaultcluster/VaultClusterTimeouts.go @@ -5,13 +5,13 @@ package vaultcluster type VaultClusterTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#create VaultCluster#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#create VaultCluster#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#default VaultCluster#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#default VaultCluster#default}. Default *string `field:"optional" json:"default" yaml:"default"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#delete VaultCluster#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#delete VaultCluster#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster#update VaultCluster#update}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster#update VaultCluster#update}. Update *string `field:"optional" json:"update" yaml:"update"` } diff --git a/hcp/vaultclusteradmintoken/README.md b/hcp/vaultclusteradmintoken/README.md index 347396e4..556c70a9 100644 --- a/hcp/vaultclusteradmintoken/README.md +++ b/hcp/vaultclusteradmintoken/README.md @@ -1,3 +1,3 @@ # `hcp_vault_cluster_admin_token` -Refer to the Terraform Registry for docs: [`hcp_vault_cluster_admin_token`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token). +Refer to the Terraform Registry for docs: [`hcp_vault_cluster_admin_token`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token). diff --git a/hcp/vaultclusteradmintoken/VaultClusterAdminToken.go b/hcp/vaultclusteradmintoken/VaultClusterAdminToken.go index 4c51ee3e..71c83aa5 100644 --- a/hcp/vaultclusteradmintoken/VaultClusterAdminToken.go +++ b/hcp/vaultclusteradmintoken/VaultClusterAdminToken.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token hcp_vault_cluster_admin_token}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token hcp_vault_cluster_admin_token}. type VaultClusterAdminToken interface { cdktf.TerraformResource // Experimental. @@ -403,7 +403,7 @@ func (j *jsiiProxy_VaultClusterAdminToken) Token() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token hcp_vault_cluster_admin_token} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token hcp_vault_cluster_admin_token} Resource. func NewVaultClusterAdminToken(scope constructs.Construct, id *string, config *VaultClusterAdminTokenConfig) VaultClusterAdminToken { _init_.Initialize() @@ -421,7 +421,7 @@ func NewVaultClusterAdminToken(scope constructs.Construct, id *string, config *V return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token hcp_vault_cluster_admin_token} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token hcp_vault_cluster_admin_token} Resource. func NewVaultClusterAdminToken_Override(v VaultClusterAdminToken, scope constructs.Construct, id *string, config *VaultClusterAdminTokenConfig) { _init_.Initialize() diff --git a/hcp/vaultclusteradmintoken/VaultClusterAdminTokenConfig.go b/hcp/vaultclusteradmintoken/VaultClusterAdminTokenConfig.go index 59efdb35..38ca3cd8 100644 --- a/hcp/vaultclusteradmintoken/VaultClusterAdminTokenConfig.go +++ b/hcp/vaultclusteradmintoken/VaultClusterAdminTokenConfig.go @@ -24,9 +24,9 @@ type VaultClusterAdminTokenConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Vault cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token#cluster_id VaultClusterAdminToken#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token#cluster_id VaultClusterAdminToken#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token#id VaultClusterAdminToken#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token#id VaultClusterAdminToken#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -36,11 +36,11 @@ type VaultClusterAdminTokenConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token#project_id VaultClusterAdminToken#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token#project_id VaultClusterAdminToken#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token#timeouts VaultClusterAdminToken#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token#timeouts VaultClusterAdminToken#timeouts} Timeouts *VaultClusterAdminTokenTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/vaultclusteradmintoken/VaultClusterAdminTokenTimeouts.go b/hcp/vaultclusteradmintoken/VaultClusterAdminTokenTimeouts.go index 96e211cd..e69b7fab 100644 --- a/hcp/vaultclusteradmintoken/VaultClusterAdminTokenTimeouts.go +++ b/hcp/vaultclusteradmintoken/VaultClusterAdminTokenTimeouts.go @@ -5,11 +5,11 @@ package vaultclusteradmintoken type VaultClusterAdminTokenTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token#create VaultClusterAdminToken#create}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token#create VaultClusterAdminToken#create}. Create *string `field:"optional" json:"create" yaml:"create"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token#delete VaultClusterAdminToken#delete}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token#delete VaultClusterAdminToken#delete}. Delete *string `field:"optional" json:"delete" yaml:"delete"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_cluster_admin_token#read VaultClusterAdminToken#read}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_cluster_admin_token#read VaultClusterAdminToken#read}. Read *string `field:"optional" json:"read" yaml:"read"` } diff --git a/hcp/vaultplugin/README.md b/hcp/vaultplugin/README.md index 48b7c897..7f67c962 100644 --- a/hcp/vaultplugin/README.md +++ b/hcp/vaultplugin/README.md @@ -1,3 +1,3 @@ # `hcp_vault_plugin` -Refer to the Terraform Registry for docs: [`hcp_vault_plugin`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin). +Refer to the Terraform Registry for docs: [`hcp_vault_plugin`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin). diff --git a/hcp/vaultplugin/VaultPlugin.go b/hcp/vaultplugin/VaultPlugin.go index c1cd2c44..b4d15e2a 100644 --- a/hcp/vaultplugin/VaultPlugin.go +++ b/hcp/vaultplugin/VaultPlugin.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin hcp_vault_plugin}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin hcp_vault_plugin}. type VaultPlugin interface { cdktf.TerraformResource // Experimental. @@ -427,7 +427,7 @@ func (j *jsiiProxy_VaultPlugin) TimeoutsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin hcp_vault_plugin} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin hcp_vault_plugin} Resource. func NewVaultPlugin(scope constructs.Construct, id *string, config *VaultPluginConfig) VaultPlugin { _init_.Initialize() @@ -445,7 +445,7 @@ func NewVaultPlugin(scope constructs.Construct, id *string, config *VaultPluginC return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin hcp_vault_plugin} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin hcp_vault_plugin} Resource. func NewVaultPlugin_Override(v VaultPlugin, scope constructs.Construct, id *string, config *VaultPluginConfig) { _init_.Initialize() diff --git a/hcp/vaultplugin/VaultPluginConfig.go b/hcp/vaultplugin/VaultPluginConfig.go index be336666..6bb9e9f7 100644 --- a/hcp/vaultplugin/VaultPluginConfig.go +++ b/hcp/vaultplugin/VaultPluginConfig.go @@ -24,17 +24,17 @@ type VaultPluginConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the HCP Vault cluster. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin#cluster_id VaultPlugin#cluster_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin#cluster_id VaultPlugin#cluster_id} ClusterId *string `field:"required" json:"clusterId" yaml:"clusterId"` // The name of the plugin - Valid options for plugin name - 'venafi-pki-backend'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin#plugin_name VaultPlugin#plugin_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin#plugin_name VaultPlugin#plugin_name} PluginName *string `field:"required" json:"pluginName" yaml:"pluginName"` // The type of the plugin - Valid options for plugin type - 'SECRET', 'AUTH', 'DATABASE'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin#plugin_type VaultPlugin#plugin_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin#plugin_type VaultPlugin#plugin_type} PluginType *string `field:"required" json:"pluginType" yaml:"pluginType"` - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin#id VaultPlugin#id}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin#id VaultPlugin#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. @@ -44,11 +44,11 @@ type VaultPluginConfig struct { // If not specified, the project specified in the HCP Provider config block will be used, if configured. // If a project is not configured in the HCP Provider config block, the oldest project in the organization will be used. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin#project_id VaultPlugin#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin#project_id VaultPlugin#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // timeouts block. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin#timeouts VaultPlugin#timeouts} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin#timeouts VaultPlugin#timeouts} Timeouts *VaultPluginTimeouts `field:"optional" json:"timeouts" yaml:"timeouts"` } diff --git a/hcp/vaultplugin/VaultPluginTimeouts.go b/hcp/vaultplugin/VaultPluginTimeouts.go index 9ae24286..3a41e992 100644 --- a/hcp/vaultplugin/VaultPluginTimeouts.go +++ b/hcp/vaultplugin/VaultPluginTimeouts.go @@ -5,7 +5,7 @@ package vaultplugin type VaultPluginTimeouts struct { - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_plugin#default VaultPlugin#default}. + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_plugin#default VaultPlugin#default}. Default *string `field:"optional" json:"default" yaml:"default"` } diff --git a/hcp/vaultradarintegrationjiraconnection/README.md b/hcp/vaultradarintegrationjiraconnection/README.md new file mode 100644 index 00000000..8542c7c2 --- /dev/null +++ b/hcp/vaultradarintegrationjiraconnection/README.md @@ -0,0 +1,3 @@ +# `hcp_vault_radar_integration_jira_connection` + +Refer to the Terraform Registry for docs: [`hcp_vault_radar_integration_jira_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection). diff --git a/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection.go b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection.go new file mode 100644 index 00000000..46cd3069 --- /dev/null +++ b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection.go @@ -0,0 +1,1014 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationjiraconnection + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultradarintegrationjiraconnection/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection hcp_vault_radar_integration_jira_connection}. +type VaultRadarIntegrationJiraConnection interface { + cdktf.TerraformResource + BaseUrl() *string + SetBaseUrl(val *string) + BaseUrlInput() *string + // Experimental. + CdktfStack() cdktf.TerraformStack + // Experimental. + Connection() interface{} + // Experimental. + SetConnection(val interface{}) + // Experimental. + ConstructNodeMetadata() *map[string]interface{} + // Experimental. + Count() interface{} + // Experimental. + SetCount(val interface{}) + // Experimental. + DependsOn() *[]*string + // Experimental. + SetDependsOn(val *[]*string) + Email() *string + SetEmail(val *string) + EmailInput() *string + // Experimental. + ForEach() cdktf.ITerraformIterator + // Experimental. + SetForEach(val cdktf.ITerraformIterator) + // Experimental. + Fqn() *string + // Experimental. + FriendlyUniqueId() *string + Id() *string + // Experimental. + Lifecycle() *cdktf.TerraformResourceLifecycle + // Experimental. + SetLifecycle(val *cdktf.TerraformResourceLifecycle) + Name() *string + SetName(val *string) + NameInput() *string + // The tree node. + Node() constructs.Node + ProjectId() *string + SetProjectId(val *string) + ProjectIdInput() *string + // Experimental. + Provider() cdktf.TerraformProvider + // Experimental. + SetProvider(val cdktf.TerraformProvider) + // Experimental. + Provisioners() *[]interface{} + // Experimental. + SetProvisioners(val *[]interface{}) + // Experimental. + RawOverrides() interface{} + // Experimental. + TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata + // Experimental. + TerraformMetaArguments() *map[string]interface{} + // Experimental. + TerraformResourceType() *string + Token() *string + SetToken(val *string) + TokenInput() *string + // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + // Experimental. + AddMoveTarget(moveTarget *string) + // Experimental. + AddOverride(path *string, value interface{}) + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + HasResourceMove() interface{} + // Experimental. + ImportFrom(id *string, provider cdktf.TerraformProvider) + // Experimental. + InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable + // Move the resource corresponding to "id" to this resource. + // + // Note that the resource being moved from must be marked as moved using it's instance function. + // Experimental. + MoveFromId(id *string) + // Moves this resource to the target resource given by moveTarget. + // Experimental. + MoveTo(moveTarget *string, index interface{}) + // Moves this resource to the resource corresponding to "id". + // Experimental. + MoveToId(id *string) + // Overrides the auto-generated logical ID with a specific ID. + // Experimental. + OverrideLogicalId(newLogicalId *string) + // Resets a previously passed logical Id to use the auto-generated logical id again. + // Experimental. + ResetOverrideLogicalId() + ResetProjectId() + SynthesizeAttributes() *map[string]interface{} + SynthesizeHclAttributes() *map[string]interface{} + // Experimental. + ToHclTerraform() interface{} + // Experimental. + ToMetadata() interface{} + // Returns a string representation of this construct. + ToString() *string + // Adds this resource to the terraform JSON output. + // Experimental. + ToTerraform() interface{} +} + +// The jsii proxy struct for VaultRadarIntegrationJiraConnection +type jsiiProxy_VaultRadarIntegrationJiraConnection struct { + internal.Type__cdktfTerraformResource +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) BaseUrl() *string { + var returns *string + _jsii_.Get( + j, + "baseUrl", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) BaseUrlInput() *string { + var returns *string + _jsii_.Get( + j, + "baseUrlInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) CdktfStack() cdktf.TerraformStack { + var returns cdktf.TerraformStack + _jsii_.Get( + j, + "cdktfStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Connection() interface{} { + var returns interface{} + _jsii_.Get( + j, + "connection", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) ConstructNodeMetadata() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "constructNodeMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Count() interface{} { + var returns interface{} + _jsii_.Get( + j, + "count", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) DependsOn() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "dependsOn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Email() *string { + var returns *string + _jsii_.Get( + j, + "email", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) EmailInput() *string { + var returns *string + _jsii_.Get( + j, + "emailInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) ForEach() cdktf.ITerraformIterator { + var returns cdktf.ITerraformIterator + _jsii_.Get( + j, + "forEach", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) FriendlyUniqueId() *string { + var returns *string + _jsii_.Get( + j, + "friendlyUniqueId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Id() *string { + var returns *string + _jsii_.Get( + j, + "id", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Lifecycle() *cdktf.TerraformResourceLifecycle { + var returns *cdktf.TerraformResourceLifecycle + _jsii_.Get( + j, + "lifecycle", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Name() *string { + var returns *string + _jsii_.Get( + j, + "name", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) NameInput() *string { + var returns *string + _jsii_.Get( + j, + "nameInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Node() constructs.Node { + var returns constructs.Node + _jsii_.Get( + j, + "node", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) ProjectId() *string { + var returns *string + _jsii_.Get( + j, + "projectId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) ProjectIdInput() *string { + var returns *string + _jsii_.Get( + j, + "projectIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Provider() cdktf.TerraformProvider { + var returns cdktf.TerraformProvider + _jsii_.Get( + j, + "provider", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Provisioners() *[]interface{} { + var returns *[]interface{} + _jsii_.Get( + j, + "provisioners", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) RawOverrides() interface{} { + var returns interface{} + _jsii_.Get( + j, + "rawOverrides", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata { + var returns *cdktf.TerraformProviderGeneratorMetadata + _jsii_.Get( + j, + "terraformGeneratorMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) TerraformMetaArguments() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "terraformMetaArguments", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) TerraformResourceType() *string { + var returns *string + _jsii_.Get( + j, + "terraformResourceType", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) Token() *string { + var returns *string + _jsii_.Get( + j, + "token", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) TokenInput() *string { + var returns *string + _jsii_.Get( + j, + "tokenInput", + &returns, + ) + return returns +} + + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection hcp_vault_radar_integration_jira_connection} Resource. +func NewVaultRadarIntegrationJiraConnection(scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraConnectionConfig) VaultRadarIntegrationJiraConnection { + _init_.Initialize() + + if err := validateNewVaultRadarIntegrationJiraConnectionParameters(scope, id, config); err != nil { + panic(err) + } + j := jsiiProxy_VaultRadarIntegrationJiraConnection{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + []interface{}{scope, id, config}, + &j, + ) + + return &j +} + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection hcp_vault_radar_integration_jira_connection} Resource. +func NewVaultRadarIntegrationJiraConnection_Override(v VaultRadarIntegrationJiraConnection, scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraConnectionConfig) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + []interface{}{scope, id, config}, + v, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetBaseUrl(val *string) { + if err := j.validateSetBaseUrlParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "baseUrl", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetConnection(val interface{}) { + if err := j.validateSetConnectionParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connection", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetCount(val interface{}) { + if err := j.validateSetCountParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "count", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetDependsOn(val *[]*string) { + _jsii_.Set( + j, + "dependsOn", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetEmail(val *string) { + if err := j.validateSetEmailParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "email", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetForEach(val cdktf.ITerraformIterator) { + _jsii_.Set( + j, + "forEach", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetLifecycle(val *cdktf.TerraformResourceLifecycle) { + if err := j.validateSetLifecycleParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "lifecycle", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetName(val *string) { + if err := j.validateSetNameParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "name", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetProjectId(val *string) { + if err := j.validateSetProjectIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "projectId", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetProvider(val cdktf.TerraformProvider) { + _jsii_.Set( + j, + "provider", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetProvisioners(val *[]interface{}) { + if err := j.validateSetProvisionersParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "provisioners", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection)SetToken(val *string) { + if err := j.validateSetTokenParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "token", + val, + ) +} + +// Generates CDKTF code for importing a VaultRadarIntegrationJiraConnection resource upon running "cdktf plan ". +func VaultRadarIntegrationJiraConnection_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraConnection_GenerateConfigForImportParameters(scope, importToId, importFromId); err != nil { + panic(err) + } + var returns cdktf.ImportableResource + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + "generateConfigForImport", + []interface{}{scope, importToId, importFromId, provider}, + &returns, + ) + + return returns +} + +// Checks if `x` is a construct. +// +// Use this method instead of `instanceof` to properly detect `Construct` +// instances, even when the construct library is symlinked. +// +// Explanation: in JavaScript, multiple copies of the `constructs` library on +// disk are seen as independent, completely different libraries. As a +// consequence, the class `Construct` in each copy of the `constructs` library +// is seen as a different class, and an instance of one class will not test as +// `instanceof` the other class. `npm install` will not create installations +// like this, but users may manually symlink construct libraries together or +// use a monorepo tool: in those cases, multiple copies of the `constructs` +// library can be accidentally installed, and `instanceof` will behave +// unpredictably. It is safest to avoid using `instanceof`, and using +// this type-testing method instead. +// +// Returns: true if `x` is an object created from a class which extends `Construct`. +func VaultRadarIntegrationJiraConnection_IsConstruct(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraConnection_IsConstructParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + "isConstruct", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationJiraConnection_IsTerraformElement(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraConnection_IsTerraformElementParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + "isTerraformElement", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationJiraConnection_IsTerraformResource(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraConnection_IsTerraformResourceParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + "isTerraformResource", + []interface{}{x}, + &returns, + ) + + return returns +} + +func VaultRadarIntegrationJiraConnection_TfResourceType() *string { + _init_.Initialize() + var returns *string + _jsii_.StaticGet( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + "tfResourceType", + &returns, + ) + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) AddMoveTarget(moveTarget *string) { + if err := v.validateAddMoveTargetParameters(moveTarget); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addMoveTarget", + []interface{}{moveTarget}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) AddOverride(path *string, value interface{}) { + if err := v.validateAddOverrideParameters(path, value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addOverride", + []interface{}{path, value}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) HasResourceMove() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "hasResourceMove", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) ImportFrom(id *string, provider cdktf.TerraformProvider) { + if err := v.validateImportFromParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "importFrom", + []interface{}{id, provider}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) MoveFromId(id *string) { + if err := v.validateMoveFromIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveFromId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) MoveTo(moveTarget *string, index interface{}) { + if err := v.validateMoveToParameters(moveTarget, index); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveTo", + []interface{}{moveTarget, index}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) MoveToId(id *string) { + if err := v.validateMoveToIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveToId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) OverrideLogicalId(newLogicalId *string) { + if err := v.validateOverrideLogicalIdParameters(newLogicalId); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "overrideLogicalId", + []interface{}{newLogicalId}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) ResetOverrideLogicalId() { + _jsii_.InvokeVoid( + v, + "resetOverrideLogicalId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) ResetProjectId() { + _jsii_.InvokeVoid( + v, + "resetProjectId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) SynthesizeAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) SynthesizeHclAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeHclAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) ToHclTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toHclTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) ToMetadata() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toMetadata", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) ToTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnectionConfig.go b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnectionConfig.go new file mode 100644 index 00000000..1d88146d --- /dev/null +++ b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnectionConfig.go @@ -0,0 +1,48 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationjiraconnection + +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultRadarIntegrationJiraConnectionConfig struct { + // Experimental. + Connection interface{} `field:"optional" json:"connection" yaml:"connection"` + // Experimental. + Count interface{} `field:"optional" json:"count" yaml:"count"` + // Experimental. + DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` + // Experimental. + ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` + // Experimental. + Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` + // Experimental. + Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` + // Experimental. + Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` + // The Jira base URL. Example: https://acme.atlassian.net. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection#base_url VaultRadarIntegrationJiraConnection#base_url} + BaseUrl *string `field:"required" json:"baseUrl" yaml:"baseUrl"` + // Jira user's email. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection#email VaultRadarIntegrationJiraConnection#email} + Email *string `field:"required" json:"email" yaml:"email"` + // Name of connection. Name must be unique. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection#name VaultRadarIntegrationJiraConnection#name} + Name *string `field:"required" json:"name" yaml:"name"` + // A Jira API token. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection#token VaultRadarIntegrationJiraConnection#token} + Token *string `field:"required" json:"token" yaml:"token"` + // The ID of the HCP project where Vault Radar is located. + // + // If not specified, the project specified in the HCP Provider config block will be used, if configured. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_connection#project_id VaultRadarIntegrationJiraConnection#project_id} + ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` +} + diff --git a/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection__checks.go b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection__checks.go new file mode 100644 index 00000000..a146b6a2 --- /dev/null +++ b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection__checks.go @@ -0,0 +1,452 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultradarintegrationjiraconnection + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateAddMoveTargetParameters(moveTarget *string) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateAddOverrideParameters(path *string, value interface{}) error { + if path == nil { + return fmt.Errorf("parameter path is required, but nil was provided") + } + + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateImportFromParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateMoveFromIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateMoveToParameters(moveTarget *string, index interface{}) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + switch index.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter index must be one of the allowed types: *string, *float64; received %#v (a %T)", index, index) + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateMoveToIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateOverrideLogicalIdParameters(newLogicalId *string) error { + if newLogicalId == nil { + return fmt.Errorf("parameter newLogicalId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraConnection_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if importToId == nil { + return fmt.Errorf("parameter importToId is required, but nil was provided") + } + + if importFromId == nil { + return fmt.Errorf("parameter importFromId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraConnection_IsConstructParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraConnection_IsTerraformElementParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraConnection_IsTerraformResourceParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetBaseUrlParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetConnectionParameters(val interface{}) error { + switch val.(type) { + case *cdktf.SSHProvisionerConnection: + val := val.(*cdktf.SSHProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.SSHProvisionerConnection: + val_ := val.(cdktf.SSHProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case *cdktf.WinrmProvisionerConnection: + val := val.(*cdktf.WinrmProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.WinrmProvisionerConnection: + val_ := val.(cdktf.WinrmProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *cdktf.SSHProvisionerConnection, *cdktf.WinrmProvisionerConnection; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetCountParameters(val interface{}) error { + switch val.(type) { + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + case cdktf.TerraformCount: + // ok + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *float64, cdktf.TerraformCount; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetEmailParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetNameParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetProjectIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetProvisionersParameters(val *[]interface{}) error { + for idx_97dfc6, v := range *val { + switch v.(type) { + case *cdktf.FileProvisioner: + v := v.(*cdktf.FileProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.FileProvisioner: + v_ := v.(cdktf.FileProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.LocalExecProvisioner: + v := v.(*cdktf.LocalExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.LocalExecProvisioner: + v_ := v.(cdktf.LocalExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.RemoteExecProvisioner: + v := v.(*cdktf.RemoteExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.RemoteExecProvisioner: + v_ := v.(cdktf.RemoteExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(v) { + return fmt.Errorf("parameter val[%#v] must be one of the allowed types: *cdktf.FileProvisioner, *cdktf.LocalExecProvisioner, *cdktf.RemoteExecProvisioner; received %#v (a %T)", idx_97dfc6, v, v) + } + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetTokenParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func validateNewVaultRadarIntegrationJiraConnectionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraConnectionConfig) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + if config == nil { + return fmt.Errorf("parameter config is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(config, func() string { return "parameter config" }); err != nil { + return err + } + + return nil +} + diff --git a/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection__no_checks.go b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection__no_checks.go new file mode 100644 index 00000000..6b2d31b7 --- /dev/null +++ b/hcp/vaultradarintegrationjiraconnection/VaultRadarIntegrationJiraConnection__no_checks.go @@ -0,0 +1,133 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultradarintegrationjiraconnection + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateAddMoveTargetParameters(moveTarget *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateAddOverrideParameters(path *string, value interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateImportFromParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateMoveFromIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateMoveToParameters(moveTarget *string, index interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateMoveToIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraConnection) validateOverrideLogicalIdParameters(newLogicalId *string) error { + return nil +} + +func validateVaultRadarIntegrationJiraConnection_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + return nil +} + +func validateVaultRadarIntegrationJiraConnection_IsConstructParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationJiraConnection_IsTerraformElementParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationJiraConnection_IsTerraformResourceParameters(x interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetBaseUrlParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetConnectionParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetCountParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetEmailParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetNameParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetProjectIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetProvisionersParameters(val *[]interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraConnection) validateSetTokenParameters(val *string) error { + return nil +} + +func validateNewVaultRadarIntegrationJiraConnectionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraConnectionConfig) error { + return nil +} + diff --git a/hcp/vaultradarintegrationjiraconnection/internal/types.go b/hcp/vaultradarintegrationjiraconnection/internal/types.go new file mode 100644 index 00000000..a60e1727 --- /dev/null +++ b/hcp/vaultradarintegrationjiraconnection/internal/types.go @@ -0,0 +1,8 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package internal +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) +type Type__cdktfTerraformResource = cdktf.TerraformResource diff --git a/hcp/vaultradarintegrationjiraconnection/main.go b/hcp/vaultradarintegrationjiraconnection/main.go new file mode 100644 index 00000000..1394b8eb --- /dev/null +++ b/hcp/vaultradarintegrationjiraconnection/main.go @@ -0,0 +1,81 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationjiraconnection + +import ( + "reflect" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" +) + +func init() { + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnection", + reflect.TypeOf((*VaultRadarIntegrationJiraConnection)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberMethod{JsiiMethod: "addMoveTarget", GoMethod: "AddMoveTarget"}, + _jsii_.MemberMethod{JsiiMethod: "addOverride", GoMethod: "AddOverride"}, + _jsii_.MemberProperty{JsiiProperty: "baseUrl", GoGetter: "BaseUrl"}, + _jsii_.MemberProperty{JsiiProperty: "baseUrlInput", GoGetter: "BaseUrlInput"}, + _jsii_.MemberProperty{JsiiProperty: "cdktfStack", GoGetter: "CdktfStack"}, + _jsii_.MemberProperty{JsiiProperty: "connection", GoGetter: "Connection"}, + _jsii_.MemberProperty{JsiiProperty: "constructNodeMetadata", GoGetter: "ConstructNodeMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "count", GoGetter: "Count"}, + _jsii_.MemberProperty{JsiiProperty: "dependsOn", GoGetter: "DependsOn"}, + _jsii_.MemberProperty{JsiiProperty: "email", GoGetter: "Email"}, + _jsii_.MemberProperty{JsiiProperty: "emailInput", GoGetter: "EmailInput"}, + _jsii_.MemberProperty{JsiiProperty: "forEach", GoGetter: "ForEach"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberProperty{JsiiProperty: "friendlyUniqueId", GoGetter: "FriendlyUniqueId"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "hasResourceMove", GoMethod: "HasResourceMove"}, + _jsii_.MemberProperty{JsiiProperty: "id", GoGetter: "Id"}, + _jsii_.MemberMethod{JsiiMethod: "importFrom", GoMethod: "ImportFrom"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "lifecycle", GoGetter: "Lifecycle"}, + _jsii_.MemberMethod{JsiiMethod: "moveFromId", GoMethod: "MoveFromId"}, + _jsii_.MemberMethod{JsiiMethod: "moveTo", GoMethod: "MoveTo"}, + _jsii_.MemberMethod{JsiiMethod: "moveToId", GoMethod: "MoveToId"}, + _jsii_.MemberProperty{JsiiProperty: "name", GoGetter: "Name"}, + _jsii_.MemberProperty{JsiiProperty: "nameInput", GoGetter: "NameInput"}, + _jsii_.MemberProperty{JsiiProperty: "node", GoGetter: "Node"}, + _jsii_.MemberMethod{JsiiMethod: "overrideLogicalId", GoMethod: "OverrideLogicalId"}, + _jsii_.MemberProperty{JsiiProperty: "projectId", GoGetter: "ProjectId"}, + _jsii_.MemberProperty{JsiiProperty: "projectIdInput", GoGetter: "ProjectIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "provider", GoGetter: "Provider"}, + _jsii_.MemberProperty{JsiiProperty: "provisioners", GoGetter: "Provisioners"}, + _jsii_.MemberProperty{JsiiProperty: "rawOverrides", GoGetter: "RawOverrides"}, + _jsii_.MemberMethod{JsiiMethod: "resetOverrideLogicalId", GoMethod: "ResetOverrideLogicalId"}, + _jsii_.MemberMethod{JsiiMethod: "resetProjectId", GoMethod: "ResetProjectId"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeAttributes", GoMethod: "SynthesizeAttributes"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeHclAttributes", GoMethod: "SynthesizeHclAttributes"}, + _jsii_.MemberProperty{JsiiProperty: "terraformGeneratorMetadata", GoGetter: "TerraformGeneratorMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "terraformMetaArguments", GoGetter: "TerraformMetaArguments"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResourceType", GoGetter: "TerraformResourceType"}, + _jsii_.MemberMethod{JsiiMethod: "toHclTerraform", GoMethod: "ToHclTerraform"}, + _jsii_.MemberProperty{JsiiProperty: "token", GoGetter: "Token"}, + _jsii_.MemberProperty{JsiiProperty: "tokenInput", GoGetter: "TokenInput"}, + _jsii_.MemberMethod{JsiiMethod: "toMetadata", GoMethod: "ToMetadata"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + _jsii_.MemberMethod{JsiiMethod: "toTerraform", GoMethod: "ToTerraform"}, + }, + func() interface{} { + j := jsiiProxy_VaultRadarIntegrationJiraConnection{} + _jsii_.InitJsiiProxy(&j.Type__cdktfTerraformResource) + return &j + }, + ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraConnection.VaultRadarIntegrationJiraConnectionConfig", + reflect.TypeOf((*VaultRadarIntegrationJiraConnectionConfig)(nil)).Elem(), + ) +} diff --git a/hcp/vaultradarintegrationjirasubscription/README.md b/hcp/vaultradarintegrationjirasubscription/README.md new file mode 100644 index 00000000..f9c0477e --- /dev/null +++ b/hcp/vaultradarintegrationjirasubscription/README.md @@ -0,0 +1,3 @@ +# `hcp_vault_radar_integration_jira_subscription` + +Refer to the Terraform Registry for docs: [`hcp_vault_radar_integration_jira_subscription`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription). diff --git a/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription.go b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription.go new file mode 100644 index 00000000..52c37a71 --- /dev/null +++ b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription.go @@ -0,0 +1,1100 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationjirasubscription + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultradarintegrationjirasubscription/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription hcp_vault_radar_integration_jira_subscription}. +type VaultRadarIntegrationJiraSubscription interface { + cdktf.TerraformResource + Assignee() *string + SetAssignee(val *string) + AssigneeInput() *string + // Experimental. + CdktfStack() cdktf.TerraformStack + // Experimental. + Connection() interface{} + // Experimental. + SetConnection(val interface{}) + ConnectionId() *string + SetConnectionId(val *string) + ConnectionIdInput() *string + // Experimental. + ConstructNodeMetadata() *map[string]interface{} + // Experimental. + Count() interface{} + // Experimental. + SetCount(val interface{}) + // Experimental. + DependsOn() *[]*string + // Experimental. + SetDependsOn(val *[]*string) + // Experimental. + ForEach() cdktf.ITerraformIterator + // Experimental. + SetForEach(val cdktf.ITerraformIterator) + // Experimental. + Fqn() *string + // Experimental. + FriendlyUniqueId() *string + Id() *string + IssueType() *string + SetIssueType(val *string) + IssueTypeInput() *string + JiraProjectKey() *string + SetJiraProjectKey(val *string) + JiraProjectKeyInput() *string + // Experimental. + Lifecycle() *cdktf.TerraformResourceLifecycle + // Experimental. + SetLifecycle(val *cdktf.TerraformResourceLifecycle) + Message() *string + SetMessage(val *string) + MessageInput() *string + Name() *string + SetName(val *string) + NameInput() *string + // The tree node. + Node() constructs.Node + ProjectId() *string + SetProjectId(val *string) + ProjectIdInput() *string + // Experimental. + Provider() cdktf.TerraformProvider + // Experimental. + SetProvider(val cdktf.TerraformProvider) + // Experimental. + Provisioners() *[]interface{} + // Experimental. + SetProvisioners(val *[]interface{}) + // Experimental. + RawOverrides() interface{} + // Experimental. + TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata + // Experimental. + TerraformMetaArguments() *map[string]interface{} + // Experimental. + TerraformResourceType() *string + // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + // Experimental. + AddMoveTarget(moveTarget *string) + // Experimental. + AddOverride(path *string, value interface{}) + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + HasResourceMove() interface{} + // Experimental. + ImportFrom(id *string, provider cdktf.TerraformProvider) + // Experimental. + InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable + // Move the resource corresponding to "id" to this resource. + // + // Note that the resource being moved from must be marked as moved using it's instance function. + // Experimental. + MoveFromId(id *string) + // Moves this resource to the target resource given by moveTarget. + // Experimental. + MoveTo(moveTarget *string, index interface{}) + // Moves this resource to the resource corresponding to "id". + // Experimental. + MoveToId(id *string) + // Overrides the auto-generated logical ID with a specific ID. + // Experimental. + OverrideLogicalId(newLogicalId *string) + ResetAssignee() + ResetMessage() + // Resets a previously passed logical Id to use the auto-generated logical id again. + // Experimental. + ResetOverrideLogicalId() + ResetProjectId() + SynthesizeAttributes() *map[string]interface{} + SynthesizeHclAttributes() *map[string]interface{} + // Experimental. + ToHclTerraform() interface{} + // Experimental. + ToMetadata() interface{} + // Returns a string representation of this construct. + ToString() *string + // Adds this resource to the terraform JSON output. + // Experimental. + ToTerraform() interface{} +} + +// The jsii proxy struct for VaultRadarIntegrationJiraSubscription +type jsiiProxy_VaultRadarIntegrationJiraSubscription struct { + internal.Type__cdktfTerraformResource +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Assignee() *string { + var returns *string + _jsii_.Get( + j, + "assignee", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) AssigneeInput() *string { + var returns *string + _jsii_.Get( + j, + "assigneeInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) CdktfStack() cdktf.TerraformStack { + var returns cdktf.TerraformStack + _jsii_.Get( + j, + "cdktfStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Connection() interface{} { + var returns interface{} + _jsii_.Get( + j, + "connection", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) ConnectionId() *string { + var returns *string + _jsii_.Get( + j, + "connectionId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) ConnectionIdInput() *string { + var returns *string + _jsii_.Get( + j, + "connectionIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) ConstructNodeMetadata() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "constructNodeMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Count() interface{} { + var returns interface{} + _jsii_.Get( + j, + "count", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) DependsOn() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "dependsOn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) ForEach() cdktf.ITerraformIterator { + var returns cdktf.ITerraformIterator + _jsii_.Get( + j, + "forEach", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) FriendlyUniqueId() *string { + var returns *string + _jsii_.Get( + j, + "friendlyUniqueId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Id() *string { + var returns *string + _jsii_.Get( + j, + "id", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) IssueType() *string { + var returns *string + _jsii_.Get( + j, + "issueType", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) IssueTypeInput() *string { + var returns *string + _jsii_.Get( + j, + "issueTypeInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) JiraProjectKey() *string { + var returns *string + _jsii_.Get( + j, + "jiraProjectKey", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) JiraProjectKeyInput() *string { + var returns *string + _jsii_.Get( + j, + "jiraProjectKeyInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Lifecycle() *cdktf.TerraformResourceLifecycle { + var returns *cdktf.TerraformResourceLifecycle + _jsii_.Get( + j, + "lifecycle", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Message() *string { + var returns *string + _jsii_.Get( + j, + "message", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) MessageInput() *string { + var returns *string + _jsii_.Get( + j, + "messageInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Name() *string { + var returns *string + _jsii_.Get( + j, + "name", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) NameInput() *string { + var returns *string + _jsii_.Get( + j, + "nameInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Node() constructs.Node { + var returns constructs.Node + _jsii_.Get( + j, + "node", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) ProjectId() *string { + var returns *string + _jsii_.Get( + j, + "projectId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) ProjectIdInput() *string { + var returns *string + _jsii_.Get( + j, + "projectIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Provider() cdktf.TerraformProvider { + var returns cdktf.TerraformProvider + _jsii_.Get( + j, + "provider", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) Provisioners() *[]interface{} { + var returns *[]interface{} + _jsii_.Get( + j, + "provisioners", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) RawOverrides() interface{} { + var returns interface{} + _jsii_.Get( + j, + "rawOverrides", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata { + var returns *cdktf.TerraformProviderGeneratorMetadata + _jsii_.Get( + j, + "terraformGeneratorMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) TerraformMetaArguments() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "terraformMetaArguments", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) TerraformResourceType() *string { + var returns *string + _jsii_.Get( + j, + "terraformResourceType", + &returns, + ) + return returns +} + + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription hcp_vault_radar_integration_jira_subscription} Resource. +func NewVaultRadarIntegrationJiraSubscription(scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraSubscriptionConfig) VaultRadarIntegrationJiraSubscription { + _init_.Initialize() + + if err := validateNewVaultRadarIntegrationJiraSubscriptionParameters(scope, id, config); err != nil { + panic(err) + } + j := jsiiProxy_VaultRadarIntegrationJiraSubscription{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + []interface{}{scope, id, config}, + &j, + ) + + return &j +} + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription hcp_vault_radar_integration_jira_subscription} Resource. +func NewVaultRadarIntegrationJiraSubscription_Override(v VaultRadarIntegrationJiraSubscription, scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraSubscriptionConfig) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + []interface{}{scope, id, config}, + v, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetAssignee(val *string) { + if err := j.validateSetAssigneeParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "assignee", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetConnection(val interface{}) { + if err := j.validateSetConnectionParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connection", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetConnectionId(val *string) { + if err := j.validateSetConnectionIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connectionId", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetCount(val interface{}) { + if err := j.validateSetCountParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "count", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetDependsOn(val *[]*string) { + _jsii_.Set( + j, + "dependsOn", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetForEach(val cdktf.ITerraformIterator) { + _jsii_.Set( + j, + "forEach", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetIssueType(val *string) { + if err := j.validateSetIssueTypeParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "issueType", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetJiraProjectKey(val *string) { + if err := j.validateSetJiraProjectKeyParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "jiraProjectKey", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetLifecycle(val *cdktf.TerraformResourceLifecycle) { + if err := j.validateSetLifecycleParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "lifecycle", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetMessage(val *string) { + if err := j.validateSetMessageParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "message", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetName(val *string) { + if err := j.validateSetNameParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "name", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetProjectId(val *string) { + if err := j.validateSetProjectIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "projectId", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetProvider(val cdktf.TerraformProvider) { + _jsii_.Set( + j, + "provider", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription)SetProvisioners(val *[]interface{}) { + if err := j.validateSetProvisionersParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "provisioners", + val, + ) +} + +// Generates CDKTF code for importing a VaultRadarIntegrationJiraSubscription resource upon running "cdktf plan ". +func VaultRadarIntegrationJiraSubscription_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraSubscription_GenerateConfigForImportParameters(scope, importToId, importFromId); err != nil { + panic(err) + } + var returns cdktf.ImportableResource + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + "generateConfigForImport", + []interface{}{scope, importToId, importFromId, provider}, + &returns, + ) + + return returns +} + +// Checks if `x` is a construct. +// +// Use this method instead of `instanceof` to properly detect `Construct` +// instances, even when the construct library is symlinked. +// +// Explanation: in JavaScript, multiple copies of the `constructs` library on +// disk are seen as independent, completely different libraries. As a +// consequence, the class `Construct` in each copy of the `constructs` library +// is seen as a different class, and an instance of one class will not test as +// `instanceof` the other class. `npm install` will not create installations +// like this, but users may manually symlink construct libraries together or +// use a monorepo tool: in those cases, multiple copies of the `constructs` +// library can be accidentally installed, and `instanceof` will behave +// unpredictably. It is safest to avoid using `instanceof`, and using +// this type-testing method instead. +// +// Returns: true if `x` is an object created from a class which extends `Construct`. +func VaultRadarIntegrationJiraSubscription_IsConstruct(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraSubscription_IsConstructParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + "isConstruct", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationJiraSubscription_IsTerraformElement(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraSubscription_IsTerraformElementParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + "isTerraformElement", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationJiraSubscription_IsTerraformResource(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationJiraSubscription_IsTerraformResourceParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + "isTerraformResource", + []interface{}{x}, + &returns, + ) + + return returns +} + +func VaultRadarIntegrationJiraSubscription_TfResourceType() *string { + _init_.Initialize() + var returns *string + _jsii_.StaticGet( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + "tfResourceType", + &returns, + ) + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) AddMoveTarget(moveTarget *string) { + if err := v.validateAddMoveTargetParameters(moveTarget); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addMoveTarget", + []interface{}{moveTarget}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) AddOverride(path *string, value interface{}) { + if err := v.validateAddOverrideParameters(path, value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addOverride", + []interface{}{path, value}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) HasResourceMove() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "hasResourceMove", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ImportFrom(id *string, provider cdktf.TerraformProvider) { + if err := v.validateImportFromParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "importFrom", + []interface{}{id, provider}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) MoveFromId(id *string) { + if err := v.validateMoveFromIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveFromId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) MoveTo(moveTarget *string, index interface{}) { + if err := v.validateMoveToParameters(moveTarget, index); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveTo", + []interface{}{moveTarget, index}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) MoveToId(id *string) { + if err := v.validateMoveToIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveToId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) OverrideLogicalId(newLogicalId *string) { + if err := v.validateOverrideLogicalIdParameters(newLogicalId); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "overrideLogicalId", + []interface{}{newLogicalId}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ResetAssignee() { + _jsii_.InvokeVoid( + v, + "resetAssignee", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ResetMessage() { + _jsii_.InvokeVoid( + v, + "resetMessage", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ResetOverrideLogicalId() { + _jsii_.InvokeVoid( + v, + "resetOverrideLogicalId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ResetProjectId() { + _jsii_.InvokeVoid( + v, + "resetProjectId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) SynthesizeAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) SynthesizeHclAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeHclAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ToHclTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toHclTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ToMetadata() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toMetadata", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) ToTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscriptionConfig.go b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscriptionConfig.go new file mode 100644 index 00000000..44f64eb6 --- /dev/null +++ b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscriptionConfig.go @@ -0,0 +1,58 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationjirasubscription + +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultRadarIntegrationJiraSubscriptionConfig struct { + // Experimental. + Connection interface{} `field:"optional" json:"connection" yaml:"connection"` + // Experimental. + Count interface{} `field:"optional" json:"count" yaml:"count"` + // Experimental. + DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` + // Experimental. + ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` + // Experimental. + Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` + // Experimental. + Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` + // Experimental. + Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` + // id of the integration jira connection to use for the subscription. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription#connection_id VaultRadarIntegrationJiraSubscription#connection_id} + ConnectionId *string `field:"required" json:"connectionId" yaml:"connectionId"` + // The type of issue to be created from the event(s). Example: Task. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription#issue_type VaultRadarIntegrationJiraSubscription#issue_type} + IssueType *string `field:"required" json:"issueType" yaml:"issueType"` + // The name of the project under which the jira issue will be created. Example: OPS. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription#jira_project_key VaultRadarIntegrationJiraSubscription#jira_project_key} + JiraProjectKey *string `field:"required" json:"jiraProjectKey" yaml:"jiraProjectKey"` + // Name of subscription. Name must be unique. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription#name VaultRadarIntegrationJiraSubscription#name} + Name *string `field:"required" json:"name" yaml:"name"` + // The identifier of the Jira user who will be assigned the ticket. + // + // In case of Jira Cloud, this will be the Atlassian Account ID of the user. Example: 71509:11bb945b-c0de-4bac-9d57-9f09db2f7bc9 + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription#assignee VaultRadarIntegrationJiraSubscription#assignee} + Assignee *string `field:"optional" json:"assignee" yaml:"assignee"` + // This message will be included in the ticket description. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription#message VaultRadarIntegrationJiraSubscription#message} + Message *string `field:"optional" json:"message" yaml:"message"` + // The ID of the HCP project where Vault Radar is located. + // + // If not specified, the project specified in the HCP Provider config block will be used, if configured. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_jira_subscription#project_id VaultRadarIntegrationJiraSubscription#project_id} + ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` +} + diff --git a/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription__checks.go b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription__checks.go new file mode 100644 index 00000000..31705f5a --- /dev/null +++ b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription__checks.go @@ -0,0 +1,468 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultradarintegrationjirasubscription + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateAddMoveTargetParameters(moveTarget *string) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateAddOverrideParameters(path *string, value interface{}) error { + if path == nil { + return fmt.Errorf("parameter path is required, but nil was provided") + } + + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateImportFromParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateMoveFromIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateMoveToParameters(moveTarget *string, index interface{}) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + switch index.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter index must be one of the allowed types: *string, *float64; received %#v (a %T)", index, index) + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateMoveToIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateOverrideLogicalIdParameters(newLogicalId *string) error { + if newLogicalId == nil { + return fmt.Errorf("parameter newLogicalId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if importToId == nil { + return fmt.Errorf("parameter importToId is required, but nil was provided") + } + + if importFromId == nil { + return fmt.Errorf("parameter importFromId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_IsConstructParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_IsTerraformElementParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_IsTerraformResourceParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetAssigneeParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetConnectionParameters(val interface{}) error { + switch val.(type) { + case *cdktf.SSHProvisionerConnection: + val := val.(*cdktf.SSHProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.SSHProvisionerConnection: + val_ := val.(cdktf.SSHProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case *cdktf.WinrmProvisionerConnection: + val := val.(*cdktf.WinrmProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.WinrmProvisionerConnection: + val_ := val.(cdktf.WinrmProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *cdktf.SSHProvisionerConnection, *cdktf.WinrmProvisionerConnection; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetConnectionIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetCountParameters(val interface{}) error { + switch val.(type) { + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + case cdktf.TerraformCount: + // ok + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *float64, cdktf.TerraformCount; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetIssueTypeParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetJiraProjectKeyParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetMessageParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetNameParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetProjectIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetProvisionersParameters(val *[]interface{}) error { + for idx_97dfc6, v := range *val { + switch v.(type) { + case *cdktf.FileProvisioner: + v := v.(*cdktf.FileProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.FileProvisioner: + v_ := v.(cdktf.FileProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.LocalExecProvisioner: + v := v.(*cdktf.LocalExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.LocalExecProvisioner: + v_ := v.(cdktf.LocalExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.RemoteExecProvisioner: + v := v.(*cdktf.RemoteExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.RemoteExecProvisioner: + v_ := v.(cdktf.RemoteExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(v) { + return fmt.Errorf("parameter val[%#v] must be one of the allowed types: *cdktf.FileProvisioner, *cdktf.LocalExecProvisioner, *cdktf.RemoteExecProvisioner; received %#v (a %T)", idx_97dfc6, v, v) + } + } + } + + return nil +} + +func validateNewVaultRadarIntegrationJiraSubscriptionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraSubscriptionConfig) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + if config == nil { + return fmt.Errorf("parameter config is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(config, func() string { return "parameter config" }); err != nil { + return err + } + + return nil +} + diff --git a/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription__no_checks.go b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription__no_checks.go new file mode 100644 index 00000000..64a4b125 --- /dev/null +++ b/hcp/vaultradarintegrationjirasubscription/VaultRadarIntegrationJiraSubscription__no_checks.go @@ -0,0 +1,141 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultradarintegrationjirasubscription + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateAddMoveTargetParameters(moveTarget *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateAddOverrideParameters(path *string, value interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateImportFromParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateMoveFromIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateMoveToParameters(moveTarget *string, index interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateMoveToIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateOverrideLogicalIdParameters(newLogicalId *string) error { + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_IsConstructParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_IsTerraformElementParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationJiraSubscription_IsTerraformResourceParameters(x interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetAssigneeParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetConnectionParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetConnectionIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetCountParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetIssueTypeParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetJiraProjectKeyParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetMessageParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetNameParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetProjectIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationJiraSubscription) validateSetProvisionersParameters(val *[]interface{}) error { + return nil +} + +func validateNewVaultRadarIntegrationJiraSubscriptionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationJiraSubscriptionConfig) error { + return nil +} + diff --git a/hcp/vaultradarintegrationjirasubscription/internal/types.go b/hcp/vaultradarintegrationjirasubscription/internal/types.go new file mode 100644 index 00000000..a60e1727 --- /dev/null +++ b/hcp/vaultradarintegrationjirasubscription/internal/types.go @@ -0,0 +1,8 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package internal +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) +type Type__cdktfTerraformResource = cdktf.TerraformResource diff --git a/hcp/vaultradarintegrationjirasubscription/main.go b/hcp/vaultradarintegrationjirasubscription/main.go new file mode 100644 index 00000000..1fbe246e --- /dev/null +++ b/hcp/vaultradarintegrationjirasubscription/main.go @@ -0,0 +1,87 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationjirasubscription + +import ( + "reflect" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" +) + +func init() { + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscription", + reflect.TypeOf((*VaultRadarIntegrationJiraSubscription)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberMethod{JsiiMethod: "addMoveTarget", GoMethod: "AddMoveTarget"}, + _jsii_.MemberMethod{JsiiMethod: "addOverride", GoMethod: "AddOverride"}, + _jsii_.MemberProperty{JsiiProperty: "assignee", GoGetter: "Assignee"}, + _jsii_.MemberProperty{JsiiProperty: "assigneeInput", GoGetter: "AssigneeInput"}, + _jsii_.MemberProperty{JsiiProperty: "cdktfStack", GoGetter: "CdktfStack"}, + _jsii_.MemberProperty{JsiiProperty: "connection", GoGetter: "Connection"}, + _jsii_.MemberProperty{JsiiProperty: "connectionId", GoGetter: "ConnectionId"}, + _jsii_.MemberProperty{JsiiProperty: "connectionIdInput", GoGetter: "ConnectionIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "constructNodeMetadata", GoGetter: "ConstructNodeMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "count", GoGetter: "Count"}, + _jsii_.MemberProperty{JsiiProperty: "dependsOn", GoGetter: "DependsOn"}, + _jsii_.MemberProperty{JsiiProperty: "forEach", GoGetter: "ForEach"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberProperty{JsiiProperty: "friendlyUniqueId", GoGetter: "FriendlyUniqueId"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "hasResourceMove", GoMethod: "HasResourceMove"}, + _jsii_.MemberProperty{JsiiProperty: "id", GoGetter: "Id"}, + _jsii_.MemberMethod{JsiiMethod: "importFrom", GoMethod: "ImportFrom"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "issueType", GoGetter: "IssueType"}, + _jsii_.MemberProperty{JsiiProperty: "issueTypeInput", GoGetter: "IssueTypeInput"}, + _jsii_.MemberProperty{JsiiProperty: "jiraProjectKey", GoGetter: "JiraProjectKey"}, + _jsii_.MemberProperty{JsiiProperty: "jiraProjectKeyInput", GoGetter: "JiraProjectKeyInput"}, + _jsii_.MemberProperty{JsiiProperty: "lifecycle", GoGetter: "Lifecycle"}, + _jsii_.MemberProperty{JsiiProperty: "message", GoGetter: "Message"}, + _jsii_.MemberProperty{JsiiProperty: "messageInput", GoGetter: "MessageInput"}, + _jsii_.MemberMethod{JsiiMethod: "moveFromId", GoMethod: "MoveFromId"}, + _jsii_.MemberMethod{JsiiMethod: "moveTo", GoMethod: "MoveTo"}, + _jsii_.MemberMethod{JsiiMethod: "moveToId", GoMethod: "MoveToId"}, + _jsii_.MemberProperty{JsiiProperty: "name", GoGetter: "Name"}, + _jsii_.MemberProperty{JsiiProperty: "nameInput", GoGetter: "NameInput"}, + _jsii_.MemberProperty{JsiiProperty: "node", GoGetter: "Node"}, + _jsii_.MemberMethod{JsiiMethod: "overrideLogicalId", GoMethod: "OverrideLogicalId"}, + _jsii_.MemberProperty{JsiiProperty: "projectId", GoGetter: "ProjectId"}, + _jsii_.MemberProperty{JsiiProperty: "projectIdInput", GoGetter: "ProjectIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "provider", GoGetter: "Provider"}, + _jsii_.MemberProperty{JsiiProperty: "provisioners", GoGetter: "Provisioners"}, + _jsii_.MemberProperty{JsiiProperty: "rawOverrides", GoGetter: "RawOverrides"}, + _jsii_.MemberMethod{JsiiMethod: "resetAssignee", GoMethod: "ResetAssignee"}, + _jsii_.MemberMethod{JsiiMethod: "resetMessage", GoMethod: "ResetMessage"}, + _jsii_.MemberMethod{JsiiMethod: "resetOverrideLogicalId", GoMethod: "ResetOverrideLogicalId"}, + _jsii_.MemberMethod{JsiiMethod: "resetProjectId", GoMethod: "ResetProjectId"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeAttributes", GoMethod: "SynthesizeAttributes"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeHclAttributes", GoMethod: "SynthesizeHclAttributes"}, + _jsii_.MemberProperty{JsiiProperty: "terraformGeneratorMetadata", GoGetter: "TerraformGeneratorMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "terraformMetaArguments", GoGetter: "TerraformMetaArguments"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResourceType", GoGetter: "TerraformResourceType"}, + _jsii_.MemberMethod{JsiiMethod: "toHclTerraform", GoMethod: "ToHclTerraform"}, + _jsii_.MemberMethod{JsiiMethod: "toMetadata", GoMethod: "ToMetadata"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + _jsii_.MemberMethod{JsiiMethod: "toTerraform", GoMethod: "ToTerraform"}, + }, + func() interface{} { + j := jsiiProxy_VaultRadarIntegrationJiraSubscription{} + _jsii_.InitJsiiProxy(&j.Type__cdktfTerraformResource) + return &j + }, + ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultRadarIntegrationJiraSubscription.VaultRadarIntegrationJiraSubscriptionConfig", + reflect.TypeOf((*VaultRadarIntegrationJiraSubscriptionConfig)(nil)).Elem(), + ) +} diff --git a/hcp/vaultradarintegrationslackconnection/README.md b/hcp/vaultradarintegrationslackconnection/README.md new file mode 100644 index 00000000..1b1d60a3 --- /dev/null +++ b/hcp/vaultradarintegrationslackconnection/README.md @@ -0,0 +1,3 @@ +# `hcp_vault_radar_integration_slack_connection` + +Refer to the Terraform Registry for docs: [`hcp_vault_radar_integration_slack_connection`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_connection). diff --git a/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection.go b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection.go new file mode 100644 index 00000000..53bf2a4a --- /dev/null +++ b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection.go @@ -0,0 +1,946 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationslackconnection + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultradarintegrationslackconnection/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_connection hcp_vault_radar_integration_slack_connection}. +type VaultRadarIntegrationSlackConnection interface { + cdktf.TerraformResource + // Experimental. + CdktfStack() cdktf.TerraformStack + // Experimental. + Connection() interface{} + // Experimental. + SetConnection(val interface{}) + // Experimental. + ConstructNodeMetadata() *map[string]interface{} + // Experimental. + Count() interface{} + // Experimental. + SetCount(val interface{}) + // Experimental. + DependsOn() *[]*string + // Experimental. + SetDependsOn(val *[]*string) + // Experimental. + ForEach() cdktf.ITerraformIterator + // Experimental. + SetForEach(val cdktf.ITerraformIterator) + // Experimental. + Fqn() *string + // Experimental. + FriendlyUniqueId() *string + Id() *string + // Experimental. + Lifecycle() *cdktf.TerraformResourceLifecycle + // Experimental. + SetLifecycle(val *cdktf.TerraformResourceLifecycle) + Name() *string + SetName(val *string) + NameInput() *string + // The tree node. + Node() constructs.Node + ProjectId() *string + SetProjectId(val *string) + ProjectIdInput() *string + // Experimental. + Provider() cdktf.TerraformProvider + // Experimental. + SetProvider(val cdktf.TerraformProvider) + // Experimental. + Provisioners() *[]interface{} + // Experimental. + SetProvisioners(val *[]interface{}) + // Experimental. + RawOverrides() interface{} + // Experimental. + TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata + // Experimental. + TerraformMetaArguments() *map[string]interface{} + // Experimental. + TerraformResourceType() *string + Token() *string + SetToken(val *string) + TokenInput() *string + // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + // Experimental. + AddMoveTarget(moveTarget *string) + // Experimental. + AddOverride(path *string, value interface{}) + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + HasResourceMove() interface{} + // Experimental. + ImportFrom(id *string, provider cdktf.TerraformProvider) + // Experimental. + InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable + // Move the resource corresponding to "id" to this resource. + // + // Note that the resource being moved from must be marked as moved using it's instance function. + // Experimental. + MoveFromId(id *string) + // Moves this resource to the target resource given by moveTarget. + // Experimental. + MoveTo(moveTarget *string, index interface{}) + // Moves this resource to the resource corresponding to "id". + // Experimental. + MoveToId(id *string) + // Overrides the auto-generated logical ID with a specific ID. + // Experimental. + OverrideLogicalId(newLogicalId *string) + // Resets a previously passed logical Id to use the auto-generated logical id again. + // Experimental. + ResetOverrideLogicalId() + ResetProjectId() + SynthesizeAttributes() *map[string]interface{} + SynthesizeHclAttributes() *map[string]interface{} + // Experimental. + ToHclTerraform() interface{} + // Experimental. + ToMetadata() interface{} + // Returns a string representation of this construct. + ToString() *string + // Adds this resource to the terraform JSON output. + // Experimental. + ToTerraform() interface{} +} + +// The jsii proxy struct for VaultRadarIntegrationSlackConnection +type jsiiProxy_VaultRadarIntegrationSlackConnection struct { + internal.Type__cdktfTerraformResource +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) CdktfStack() cdktf.TerraformStack { + var returns cdktf.TerraformStack + _jsii_.Get( + j, + "cdktfStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Connection() interface{} { + var returns interface{} + _jsii_.Get( + j, + "connection", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) ConstructNodeMetadata() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "constructNodeMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Count() interface{} { + var returns interface{} + _jsii_.Get( + j, + "count", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) DependsOn() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "dependsOn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) ForEach() cdktf.ITerraformIterator { + var returns cdktf.ITerraformIterator + _jsii_.Get( + j, + "forEach", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) FriendlyUniqueId() *string { + var returns *string + _jsii_.Get( + j, + "friendlyUniqueId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Id() *string { + var returns *string + _jsii_.Get( + j, + "id", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Lifecycle() *cdktf.TerraformResourceLifecycle { + var returns *cdktf.TerraformResourceLifecycle + _jsii_.Get( + j, + "lifecycle", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Name() *string { + var returns *string + _jsii_.Get( + j, + "name", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) NameInput() *string { + var returns *string + _jsii_.Get( + j, + "nameInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Node() constructs.Node { + var returns constructs.Node + _jsii_.Get( + j, + "node", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) ProjectId() *string { + var returns *string + _jsii_.Get( + j, + "projectId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) ProjectIdInput() *string { + var returns *string + _jsii_.Get( + j, + "projectIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Provider() cdktf.TerraformProvider { + var returns cdktf.TerraformProvider + _jsii_.Get( + j, + "provider", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Provisioners() *[]interface{} { + var returns *[]interface{} + _jsii_.Get( + j, + "provisioners", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) RawOverrides() interface{} { + var returns interface{} + _jsii_.Get( + j, + "rawOverrides", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata { + var returns *cdktf.TerraformProviderGeneratorMetadata + _jsii_.Get( + j, + "terraformGeneratorMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) TerraformMetaArguments() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "terraformMetaArguments", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) TerraformResourceType() *string { + var returns *string + _jsii_.Get( + j, + "terraformResourceType", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) Token() *string { + var returns *string + _jsii_.Get( + j, + "token", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) TokenInput() *string { + var returns *string + _jsii_.Get( + j, + "tokenInput", + &returns, + ) + return returns +} + + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_connection hcp_vault_radar_integration_slack_connection} Resource. +func NewVaultRadarIntegrationSlackConnection(scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackConnectionConfig) VaultRadarIntegrationSlackConnection { + _init_.Initialize() + + if err := validateNewVaultRadarIntegrationSlackConnectionParameters(scope, id, config); err != nil { + panic(err) + } + j := jsiiProxy_VaultRadarIntegrationSlackConnection{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + []interface{}{scope, id, config}, + &j, + ) + + return &j +} + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_connection hcp_vault_radar_integration_slack_connection} Resource. +func NewVaultRadarIntegrationSlackConnection_Override(v VaultRadarIntegrationSlackConnection, scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackConnectionConfig) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + []interface{}{scope, id, config}, + v, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetConnection(val interface{}) { + if err := j.validateSetConnectionParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connection", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetCount(val interface{}) { + if err := j.validateSetCountParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "count", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetDependsOn(val *[]*string) { + _jsii_.Set( + j, + "dependsOn", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetForEach(val cdktf.ITerraformIterator) { + _jsii_.Set( + j, + "forEach", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetLifecycle(val *cdktf.TerraformResourceLifecycle) { + if err := j.validateSetLifecycleParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "lifecycle", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetName(val *string) { + if err := j.validateSetNameParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "name", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetProjectId(val *string) { + if err := j.validateSetProjectIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "projectId", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetProvider(val cdktf.TerraformProvider) { + _jsii_.Set( + j, + "provider", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetProvisioners(val *[]interface{}) { + if err := j.validateSetProvisionersParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "provisioners", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection)SetToken(val *string) { + if err := j.validateSetTokenParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "token", + val, + ) +} + +// Generates CDKTF code for importing a VaultRadarIntegrationSlackConnection resource upon running "cdktf plan ". +func VaultRadarIntegrationSlackConnection_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackConnection_GenerateConfigForImportParameters(scope, importToId, importFromId); err != nil { + panic(err) + } + var returns cdktf.ImportableResource + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + "generateConfigForImport", + []interface{}{scope, importToId, importFromId, provider}, + &returns, + ) + + return returns +} + +// Checks if `x` is a construct. +// +// Use this method instead of `instanceof` to properly detect `Construct` +// instances, even when the construct library is symlinked. +// +// Explanation: in JavaScript, multiple copies of the `constructs` library on +// disk are seen as independent, completely different libraries. As a +// consequence, the class `Construct` in each copy of the `constructs` library +// is seen as a different class, and an instance of one class will not test as +// `instanceof` the other class. `npm install` will not create installations +// like this, but users may manually symlink construct libraries together or +// use a monorepo tool: in those cases, multiple copies of the `constructs` +// library can be accidentally installed, and `instanceof` will behave +// unpredictably. It is safest to avoid using `instanceof`, and using +// this type-testing method instead. +// +// Returns: true if `x` is an object created from a class which extends `Construct`. +func VaultRadarIntegrationSlackConnection_IsConstruct(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackConnection_IsConstructParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + "isConstruct", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationSlackConnection_IsTerraformElement(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackConnection_IsTerraformElementParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + "isTerraformElement", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationSlackConnection_IsTerraformResource(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackConnection_IsTerraformResourceParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + "isTerraformResource", + []interface{}{x}, + &returns, + ) + + return returns +} + +func VaultRadarIntegrationSlackConnection_TfResourceType() *string { + _init_.Initialize() + var returns *string + _jsii_.StaticGet( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + "tfResourceType", + &returns, + ) + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) AddMoveTarget(moveTarget *string) { + if err := v.validateAddMoveTargetParameters(moveTarget); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addMoveTarget", + []interface{}{moveTarget}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) AddOverride(path *string, value interface{}) { + if err := v.validateAddOverrideParameters(path, value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addOverride", + []interface{}{path, value}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) HasResourceMove() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "hasResourceMove", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) ImportFrom(id *string, provider cdktf.TerraformProvider) { + if err := v.validateImportFromParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "importFrom", + []interface{}{id, provider}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) MoveFromId(id *string) { + if err := v.validateMoveFromIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveFromId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) MoveTo(moveTarget *string, index interface{}) { + if err := v.validateMoveToParameters(moveTarget, index); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveTo", + []interface{}{moveTarget, index}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) MoveToId(id *string) { + if err := v.validateMoveToIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveToId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) OverrideLogicalId(newLogicalId *string) { + if err := v.validateOverrideLogicalIdParameters(newLogicalId); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "overrideLogicalId", + []interface{}{newLogicalId}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) ResetOverrideLogicalId() { + _jsii_.InvokeVoid( + v, + "resetOverrideLogicalId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) ResetProjectId() { + _jsii_.InvokeVoid( + v, + "resetProjectId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) SynthesizeAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) SynthesizeHclAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeHclAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) ToHclTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toHclTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) ToMetadata() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toMetadata", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) ToTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnectionConfig.go b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnectionConfig.go new file mode 100644 index 00000000..2e17aa99 --- /dev/null +++ b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnectionConfig.go @@ -0,0 +1,40 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationslackconnection + +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultRadarIntegrationSlackConnectionConfig struct { + // Experimental. + Connection interface{} `field:"optional" json:"connection" yaml:"connection"` + // Experimental. + Count interface{} `field:"optional" json:"count" yaml:"count"` + // Experimental. + DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` + // Experimental. + ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` + // Experimental. + Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` + // Experimental. + Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` + // Experimental. + Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` + // Name of connection. Name must be unique. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_connection#name VaultRadarIntegrationSlackConnection#name} + Name *string `field:"required" json:"name" yaml:"name"` + // Slack bot user OAuth token. Example: Bot token strings begin with 'xoxb'. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_connection#token VaultRadarIntegrationSlackConnection#token} + Token *string `field:"required" json:"token" yaml:"token"` + // The ID of the HCP project where Vault Radar is located. + // + // If not specified, the project specified in the HCP Provider config block will be used, if configured. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_connection#project_id VaultRadarIntegrationSlackConnection#project_id} + ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` +} + diff --git a/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection__checks.go b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection__checks.go new file mode 100644 index 00000000..8632d3dd --- /dev/null +++ b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection__checks.go @@ -0,0 +1,436 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultradarintegrationslackconnection + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateAddMoveTargetParameters(moveTarget *string) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateAddOverrideParameters(path *string, value interface{}) error { + if path == nil { + return fmt.Errorf("parameter path is required, but nil was provided") + } + + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateImportFromParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateMoveFromIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateMoveToParameters(moveTarget *string, index interface{}) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + switch index.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter index must be one of the allowed types: *string, *float64; received %#v (a %T)", index, index) + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateMoveToIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateOverrideLogicalIdParameters(newLogicalId *string) error { + if newLogicalId == nil { + return fmt.Errorf("parameter newLogicalId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackConnection_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if importToId == nil { + return fmt.Errorf("parameter importToId is required, but nil was provided") + } + + if importFromId == nil { + return fmt.Errorf("parameter importFromId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackConnection_IsConstructParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackConnection_IsTerraformElementParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackConnection_IsTerraformResourceParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetConnectionParameters(val interface{}) error { + switch val.(type) { + case *cdktf.SSHProvisionerConnection: + val := val.(*cdktf.SSHProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.SSHProvisionerConnection: + val_ := val.(cdktf.SSHProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case *cdktf.WinrmProvisionerConnection: + val := val.(*cdktf.WinrmProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.WinrmProvisionerConnection: + val_ := val.(cdktf.WinrmProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *cdktf.SSHProvisionerConnection, *cdktf.WinrmProvisionerConnection; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetCountParameters(val interface{}) error { + switch val.(type) { + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + case cdktf.TerraformCount: + // ok + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *float64, cdktf.TerraformCount; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetNameParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetProjectIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetProvisionersParameters(val *[]interface{}) error { + for idx_97dfc6, v := range *val { + switch v.(type) { + case *cdktf.FileProvisioner: + v := v.(*cdktf.FileProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.FileProvisioner: + v_ := v.(cdktf.FileProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.LocalExecProvisioner: + v := v.(*cdktf.LocalExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.LocalExecProvisioner: + v_ := v.(cdktf.LocalExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.RemoteExecProvisioner: + v := v.(*cdktf.RemoteExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.RemoteExecProvisioner: + v_ := v.(cdktf.RemoteExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(v) { + return fmt.Errorf("parameter val[%#v] must be one of the allowed types: *cdktf.FileProvisioner, *cdktf.LocalExecProvisioner, *cdktf.RemoteExecProvisioner; received %#v (a %T)", idx_97dfc6, v, v) + } + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetTokenParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func validateNewVaultRadarIntegrationSlackConnectionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackConnectionConfig) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + if config == nil { + return fmt.Errorf("parameter config is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(config, func() string { return "parameter config" }); err != nil { + return err + } + + return nil +} + diff --git a/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection__no_checks.go b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection__no_checks.go new file mode 100644 index 00000000..c5466701 --- /dev/null +++ b/hcp/vaultradarintegrationslackconnection/VaultRadarIntegrationSlackConnection__no_checks.go @@ -0,0 +1,125 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultradarintegrationslackconnection + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateAddMoveTargetParameters(moveTarget *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateAddOverrideParameters(path *string, value interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateImportFromParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateMoveFromIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateMoveToParameters(moveTarget *string, index interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateMoveToIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackConnection) validateOverrideLogicalIdParameters(newLogicalId *string) error { + return nil +} + +func validateVaultRadarIntegrationSlackConnection_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + return nil +} + +func validateVaultRadarIntegrationSlackConnection_IsConstructParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationSlackConnection_IsTerraformElementParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationSlackConnection_IsTerraformResourceParameters(x interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetConnectionParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetCountParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetNameParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetProjectIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetProvisionersParameters(val *[]interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackConnection) validateSetTokenParameters(val *string) error { + return nil +} + +func validateNewVaultRadarIntegrationSlackConnectionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackConnectionConfig) error { + return nil +} + diff --git a/hcp/vaultradarintegrationslackconnection/internal/types.go b/hcp/vaultradarintegrationslackconnection/internal/types.go new file mode 100644 index 00000000..a60e1727 --- /dev/null +++ b/hcp/vaultradarintegrationslackconnection/internal/types.go @@ -0,0 +1,8 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package internal +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) +type Type__cdktfTerraformResource = cdktf.TerraformResource diff --git a/hcp/vaultradarintegrationslackconnection/main.go b/hcp/vaultradarintegrationslackconnection/main.go new file mode 100644 index 00000000..2c26c060 --- /dev/null +++ b/hcp/vaultradarintegrationslackconnection/main.go @@ -0,0 +1,77 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationslackconnection + +import ( + "reflect" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" +) + +func init() { + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnection", + reflect.TypeOf((*VaultRadarIntegrationSlackConnection)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberMethod{JsiiMethod: "addMoveTarget", GoMethod: "AddMoveTarget"}, + _jsii_.MemberMethod{JsiiMethod: "addOverride", GoMethod: "AddOverride"}, + _jsii_.MemberProperty{JsiiProperty: "cdktfStack", GoGetter: "CdktfStack"}, + _jsii_.MemberProperty{JsiiProperty: "connection", GoGetter: "Connection"}, + _jsii_.MemberProperty{JsiiProperty: "constructNodeMetadata", GoGetter: "ConstructNodeMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "count", GoGetter: "Count"}, + _jsii_.MemberProperty{JsiiProperty: "dependsOn", GoGetter: "DependsOn"}, + _jsii_.MemberProperty{JsiiProperty: "forEach", GoGetter: "ForEach"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberProperty{JsiiProperty: "friendlyUniqueId", GoGetter: "FriendlyUniqueId"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "hasResourceMove", GoMethod: "HasResourceMove"}, + _jsii_.MemberProperty{JsiiProperty: "id", GoGetter: "Id"}, + _jsii_.MemberMethod{JsiiMethod: "importFrom", GoMethod: "ImportFrom"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "lifecycle", GoGetter: "Lifecycle"}, + _jsii_.MemberMethod{JsiiMethod: "moveFromId", GoMethod: "MoveFromId"}, + _jsii_.MemberMethod{JsiiMethod: "moveTo", GoMethod: "MoveTo"}, + _jsii_.MemberMethod{JsiiMethod: "moveToId", GoMethod: "MoveToId"}, + _jsii_.MemberProperty{JsiiProperty: "name", GoGetter: "Name"}, + _jsii_.MemberProperty{JsiiProperty: "nameInput", GoGetter: "NameInput"}, + _jsii_.MemberProperty{JsiiProperty: "node", GoGetter: "Node"}, + _jsii_.MemberMethod{JsiiMethod: "overrideLogicalId", GoMethod: "OverrideLogicalId"}, + _jsii_.MemberProperty{JsiiProperty: "projectId", GoGetter: "ProjectId"}, + _jsii_.MemberProperty{JsiiProperty: "projectIdInput", GoGetter: "ProjectIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "provider", GoGetter: "Provider"}, + _jsii_.MemberProperty{JsiiProperty: "provisioners", GoGetter: "Provisioners"}, + _jsii_.MemberProperty{JsiiProperty: "rawOverrides", GoGetter: "RawOverrides"}, + _jsii_.MemberMethod{JsiiMethod: "resetOverrideLogicalId", GoMethod: "ResetOverrideLogicalId"}, + _jsii_.MemberMethod{JsiiMethod: "resetProjectId", GoMethod: "ResetProjectId"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeAttributes", GoMethod: "SynthesizeAttributes"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeHclAttributes", GoMethod: "SynthesizeHclAttributes"}, + _jsii_.MemberProperty{JsiiProperty: "terraformGeneratorMetadata", GoGetter: "TerraformGeneratorMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "terraformMetaArguments", GoGetter: "TerraformMetaArguments"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResourceType", GoGetter: "TerraformResourceType"}, + _jsii_.MemberMethod{JsiiMethod: "toHclTerraform", GoMethod: "ToHclTerraform"}, + _jsii_.MemberProperty{JsiiProperty: "token", GoGetter: "Token"}, + _jsii_.MemberProperty{JsiiProperty: "tokenInput", GoGetter: "TokenInput"}, + _jsii_.MemberMethod{JsiiMethod: "toMetadata", GoMethod: "ToMetadata"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + _jsii_.MemberMethod{JsiiMethod: "toTerraform", GoMethod: "ToTerraform"}, + }, + func() interface{} { + j := jsiiProxy_VaultRadarIntegrationSlackConnection{} + _jsii_.InitJsiiProxy(&j.Type__cdktfTerraformResource) + return &j + }, + ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackConnection.VaultRadarIntegrationSlackConnectionConfig", + reflect.TypeOf((*VaultRadarIntegrationSlackConnectionConfig)(nil)).Elem(), + ) +} diff --git a/hcp/vaultradarintegrationslacksubscription/README.md b/hcp/vaultradarintegrationslacksubscription/README.md new file mode 100644 index 00000000..659d0462 --- /dev/null +++ b/hcp/vaultradarintegrationslacksubscription/README.md @@ -0,0 +1,3 @@ +# `hcp_vault_radar_integration_slack_subscription` + +Refer to the Terraform Registry for docs: [`hcp_vault_radar_integration_slack_subscription`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription). diff --git a/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription.go b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription.go new file mode 100644 index 00000000..b303b551 --- /dev/null +++ b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription.go @@ -0,0 +1,980 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationslacksubscription + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultradarintegrationslacksubscription/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription hcp_vault_radar_integration_slack_subscription}. +type VaultRadarIntegrationSlackSubscription interface { + cdktf.TerraformResource + // Experimental. + CdktfStack() cdktf.TerraformStack + Channel() *string + SetChannel(val *string) + ChannelInput() *string + // Experimental. + Connection() interface{} + // Experimental. + SetConnection(val interface{}) + ConnectionId() *string + SetConnectionId(val *string) + ConnectionIdInput() *string + // Experimental. + ConstructNodeMetadata() *map[string]interface{} + // Experimental. + Count() interface{} + // Experimental. + SetCount(val interface{}) + // Experimental. + DependsOn() *[]*string + // Experimental. + SetDependsOn(val *[]*string) + // Experimental. + ForEach() cdktf.ITerraformIterator + // Experimental. + SetForEach(val cdktf.ITerraformIterator) + // Experimental. + Fqn() *string + // Experimental. + FriendlyUniqueId() *string + Id() *string + // Experimental. + Lifecycle() *cdktf.TerraformResourceLifecycle + // Experimental. + SetLifecycle(val *cdktf.TerraformResourceLifecycle) + Name() *string + SetName(val *string) + NameInput() *string + // The tree node. + Node() constructs.Node + ProjectId() *string + SetProjectId(val *string) + ProjectIdInput() *string + // Experimental. + Provider() cdktf.TerraformProvider + // Experimental. + SetProvider(val cdktf.TerraformProvider) + // Experimental. + Provisioners() *[]interface{} + // Experimental. + SetProvisioners(val *[]interface{}) + // Experimental. + RawOverrides() interface{} + // Experimental. + TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata + // Experimental. + TerraformMetaArguments() *map[string]interface{} + // Experimental. + TerraformResourceType() *string + // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + // Experimental. + AddMoveTarget(moveTarget *string) + // Experimental. + AddOverride(path *string, value interface{}) + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + HasResourceMove() interface{} + // Experimental. + ImportFrom(id *string, provider cdktf.TerraformProvider) + // Experimental. + InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable + // Move the resource corresponding to "id" to this resource. + // + // Note that the resource being moved from must be marked as moved using it's instance function. + // Experimental. + MoveFromId(id *string) + // Moves this resource to the target resource given by moveTarget. + // Experimental. + MoveTo(moveTarget *string, index interface{}) + // Moves this resource to the resource corresponding to "id". + // Experimental. + MoveToId(id *string) + // Overrides the auto-generated logical ID with a specific ID. + // Experimental. + OverrideLogicalId(newLogicalId *string) + // Resets a previously passed logical Id to use the auto-generated logical id again. + // Experimental. + ResetOverrideLogicalId() + ResetProjectId() + SynthesizeAttributes() *map[string]interface{} + SynthesizeHclAttributes() *map[string]interface{} + // Experimental. + ToHclTerraform() interface{} + // Experimental. + ToMetadata() interface{} + // Returns a string representation of this construct. + ToString() *string + // Adds this resource to the terraform JSON output. + // Experimental. + ToTerraform() interface{} +} + +// The jsii proxy struct for VaultRadarIntegrationSlackSubscription +type jsiiProxy_VaultRadarIntegrationSlackSubscription struct { + internal.Type__cdktfTerraformResource +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) CdktfStack() cdktf.TerraformStack { + var returns cdktf.TerraformStack + _jsii_.Get( + j, + "cdktfStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Channel() *string { + var returns *string + _jsii_.Get( + j, + "channel", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) ChannelInput() *string { + var returns *string + _jsii_.Get( + j, + "channelInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Connection() interface{} { + var returns interface{} + _jsii_.Get( + j, + "connection", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) ConnectionId() *string { + var returns *string + _jsii_.Get( + j, + "connectionId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) ConnectionIdInput() *string { + var returns *string + _jsii_.Get( + j, + "connectionIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) ConstructNodeMetadata() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "constructNodeMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Count() interface{} { + var returns interface{} + _jsii_.Get( + j, + "count", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) DependsOn() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "dependsOn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) ForEach() cdktf.ITerraformIterator { + var returns cdktf.ITerraformIterator + _jsii_.Get( + j, + "forEach", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) FriendlyUniqueId() *string { + var returns *string + _jsii_.Get( + j, + "friendlyUniqueId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Id() *string { + var returns *string + _jsii_.Get( + j, + "id", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Lifecycle() *cdktf.TerraformResourceLifecycle { + var returns *cdktf.TerraformResourceLifecycle + _jsii_.Get( + j, + "lifecycle", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Name() *string { + var returns *string + _jsii_.Get( + j, + "name", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) NameInput() *string { + var returns *string + _jsii_.Get( + j, + "nameInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Node() constructs.Node { + var returns constructs.Node + _jsii_.Get( + j, + "node", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) ProjectId() *string { + var returns *string + _jsii_.Get( + j, + "projectId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) ProjectIdInput() *string { + var returns *string + _jsii_.Get( + j, + "projectIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Provider() cdktf.TerraformProvider { + var returns cdktf.TerraformProvider + _jsii_.Get( + j, + "provider", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) Provisioners() *[]interface{} { + var returns *[]interface{} + _jsii_.Get( + j, + "provisioners", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) RawOverrides() interface{} { + var returns interface{} + _jsii_.Get( + j, + "rawOverrides", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata { + var returns *cdktf.TerraformProviderGeneratorMetadata + _jsii_.Get( + j, + "terraformGeneratorMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) TerraformMetaArguments() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "terraformMetaArguments", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) TerraformResourceType() *string { + var returns *string + _jsii_.Get( + j, + "terraformResourceType", + &returns, + ) + return returns +} + + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription hcp_vault_radar_integration_slack_subscription} Resource. +func NewVaultRadarIntegrationSlackSubscription(scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackSubscriptionConfig) VaultRadarIntegrationSlackSubscription { + _init_.Initialize() + + if err := validateNewVaultRadarIntegrationSlackSubscriptionParameters(scope, id, config); err != nil { + panic(err) + } + j := jsiiProxy_VaultRadarIntegrationSlackSubscription{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + []interface{}{scope, id, config}, + &j, + ) + + return &j +} + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription hcp_vault_radar_integration_slack_subscription} Resource. +func NewVaultRadarIntegrationSlackSubscription_Override(v VaultRadarIntegrationSlackSubscription, scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackSubscriptionConfig) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + []interface{}{scope, id, config}, + v, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetChannel(val *string) { + if err := j.validateSetChannelParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "channel", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetConnection(val interface{}) { + if err := j.validateSetConnectionParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connection", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetConnectionId(val *string) { + if err := j.validateSetConnectionIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connectionId", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetCount(val interface{}) { + if err := j.validateSetCountParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "count", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetDependsOn(val *[]*string) { + _jsii_.Set( + j, + "dependsOn", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetForEach(val cdktf.ITerraformIterator) { + _jsii_.Set( + j, + "forEach", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetLifecycle(val *cdktf.TerraformResourceLifecycle) { + if err := j.validateSetLifecycleParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "lifecycle", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetName(val *string) { + if err := j.validateSetNameParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "name", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetProjectId(val *string) { + if err := j.validateSetProjectIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "projectId", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetProvider(val cdktf.TerraformProvider) { + _jsii_.Set( + j, + "provider", + val, + ) +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription)SetProvisioners(val *[]interface{}) { + if err := j.validateSetProvisionersParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "provisioners", + val, + ) +} + +// Generates CDKTF code for importing a VaultRadarIntegrationSlackSubscription resource upon running "cdktf plan ". +func VaultRadarIntegrationSlackSubscription_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackSubscription_GenerateConfigForImportParameters(scope, importToId, importFromId); err != nil { + panic(err) + } + var returns cdktf.ImportableResource + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + "generateConfigForImport", + []interface{}{scope, importToId, importFromId, provider}, + &returns, + ) + + return returns +} + +// Checks if `x` is a construct. +// +// Use this method instead of `instanceof` to properly detect `Construct` +// instances, even when the construct library is symlinked. +// +// Explanation: in JavaScript, multiple copies of the `constructs` library on +// disk are seen as independent, completely different libraries. As a +// consequence, the class `Construct` in each copy of the `constructs` library +// is seen as a different class, and an instance of one class will not test as +// `instanceof` the other class. `npm install` will not create installations +// like this, but users may manually symlink construct libraries together or +// use a monorepo tool: in those cases, multiple copies of the `constructs` +// library can be accidentally installed, and `instanceof` will behave +// unpredictably. It is safest to avoid using `instanceof`, and using +// this type-testing method instead. +// +// Returns: true if `x` is an object created from a class which extends `Construct`. +func VaultRadarIntegrationSlackSubscription_IsConstruct(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackSubscription_IsConstructParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + "isConstruct", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationSlackSubscription_IsTerraformElement(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackSubscription_IsTerraformElementParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + "isTerraformElement", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarIntegrationSlackSubscription_IsTerraformResource(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarIntegrationSlackSubscription_IsTerraformResourceParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + "isTerraformResource", + []interface{}{x}, + &returns, + ) + + return returns +} + +func VaultRadarIntegrationSlackSubscription_TfResourceType() *string { + _init_.Initialize() + var returns *string + _jsii_.StaticGet( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + "tfResourceType", + &returns, + ) + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) AddMoveTarget(moveTarget *string) { + if err := v.validateAddMoveTargetParameters(moveTarget); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addMoveTarget", + []interface{}{moveTarget}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) AddOverride(path *string, value interface{}) { + if err := v.validateAddOverrideParameters(path, value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addOverride", + []interface{}{path, value}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) HasResourceMove() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "hasResourceMove", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) ImportFrom(id *string, provider cdktf.TerraformProvider) { + if err := v.validateImportFromParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "importFrom", + []interface{}{id, provider}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) MoveFromId(id *string) { + if err := v.validateMoveFromIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveFromId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) MoveTo(moveTarget *string, index interface{}) { + if err := v.validateMoveToParameters(moveTarget, index); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveTo", + []interface{}{moveTarget, index}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) MoveToId(id *string) { + if err := v.validateMoveToIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveToId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) OverrideLogicalId(newLogicalId *string) { + if err := v.validateOverrideLogicalIdParameters(newLogicalId); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "overrideLogicalId", + []interface{}{newLogicalId}, + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) ResetOverrideLogicalId() { + _jsii_.InvokeVoid( + v, + "resetOverrideLogicalId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) ResetProjectId() { + _jsii_.InvokeVoid( + v, + "resetProjectId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) SynthesizeAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) SynthesizeHclAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeHclAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) ToHclTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toHclTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) ToMetadata() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toMetadata", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) ToTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscriptionConfig.go b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscriptionConfig.go new file mode 100644 index 00000000..8e53dde1 --- /dev/null +++ b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscriptionConfig.go @@ -0,0 +1,46 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationslacksubscription + +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultRadarIntegrationSlackSubscriptionConfig struct { + // Experimental. + Connection interface{} `field:"optional" json:"connection" yaml:"connection"` + // Experimental. + Count interface{} `field:"optional" json:"count" yaml:"count"` + // Experimental. + DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` + // Experimental. + ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` + // Experimental. + Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` + // Experimental. + Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` + // Experimental. + Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` + // Name of the Slack channel that messages should be sent to. + // + // Note that HashiCorp Vault Radar will send a test message to verify the channel. Example: dev-ops-team + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription#channel VaultRadarIntegrationSlackSubscription#channel} + Channel *string `field:"required" json:"channel" yaml:"channel"` + // id of the integration slack connection to use for the subscription. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription#connection_id VaultRadarIntegrationSlackSubscription#connection_id} + ConnectionId *string `field:"required" json:"connectionId" yaml:"connectionId"` + // Name of subscription. Name must be unique. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription#name VaultRadarIntegrationSlackSubscription#name} + Name *string `field:"required" json:"name" yaml:"name"` + // The ID of the HCP project where Vault Radar is located. + // + // If not specified, the project specified in the HCP Provider config block will be used, if configured. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_integration_slack_subscription#project_id VaultRadarIntegrationSlackSubscription#project_id} + ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` +} + diff --git a/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription__checks.go b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription__checks.go new file mode 100644 index 00000000..12d11d71 --- /dev/null +++ b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription__checks.go @@ -0,0 +1,444 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultradarintegrationslacksubscription + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateAddMoveTargetParameters(moveTarget *string) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateAddOverrideParameters(path *string, value interface{}) error { + if path == nil { + return fmt.Errorf("parameter path is required, but nil was provided") + } + + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateImportFromParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateMoveFromIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateMoveToParameters(moveTarget *string, index interface{}) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + switch index.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter index must be one of the allowed types: *string, *float64; received %#v (a %T)", index, index) + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateMoveToIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateOverrideLogicalIdParameters(newLogicalId *string) error { + if newLogicalId == nil { + return fmt.Errorf("parameter newLogicalId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if importToId == nil { + return fmt.Errorf("parameter importToId is required, but nil was provided") + } + + if importFromId == nil { + return fmt.Errorf("parameter importFromId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_IsConstructParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_IsTerraformElementParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_IsTerraformResourceParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetChannelParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetConnectionParameters(val interface{}) error { + switch val.(type) { + case *cdktf.SSHProvisionerConnection: + val := val.(*cdktf.SSHProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.SSHProvisionerConnection: + val_ := val.(cdktf.SSHProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case *cdktf.WinrmProvisionerConnection: + val := val.(*cdktf.WinrmProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.WinrmProvisionerConnection: + val_ := val.(cdktf.WinrmProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *cdktf.SSHProvisionerConnection, *cdktf.WinrmProvisionerConnection; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetConnectionIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetCountParameters(val interface{}) error { + switch val.(type) { + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + case cdktf.TerraformCount: + // ok + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *float64, cdktf.TerraformCount; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetNameParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetProjectIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetProvisionersParameters(val *[]interface{}) error { + for idx_97dfc6, v := range *val { + switch v.(type) { + case *cdktf.FileProvisioner: + v := v.(*cdktf.FileProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.FileProvisioner: + v_ := v.(cdktf.FileProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.LocalExecProvisioner: + v := v.(*cdktf.LocalExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.LocalExecProvisioner: + v_ := v.(cdktf.LocalExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.RemoteExecProvisioner: + v := v.(*cdktf.RemoteExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.RemoteExecProvisioner: + v_ := v.(cdktf.RemoteExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(v) { + return fmt.Errorf("parameter val[%#v] must be one of the allowed types: *cdktf.FileProvisioner, *cdktf.LocalExecProvisioner, *cdktf.RemoteExecProvisioner; received %#v (a %T)", idx_97dfc6, v, v) + } + } + } + + return nil +} + +func validateNewVaultRadarIntegrationSlackSubscriptionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackSubscriptionConfig) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + if config == nil { + return fmt.Errorf("parameter config is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(config, func() string { return "parameter config" }); err != nil { + return err + } + + return nil +} + diff --git a/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription__no_checks.go b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription__no_checks.go new file mode 100644 index 00000000..3e109a61 --- /dev/null +++ b/hcp/vaultradarintegrationslacksubscription/VaultRadarIntegrationSlackSubscription__no_checks.go @@ -0,0 +1,129 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultradarintegrationslacksubscription + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateAddMoveTargetParameters(moveTarget *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateAddOverrideParameters(path *string, value interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateImportFromParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateMoveFromIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateMoveToParameters(moveTarget *string, index interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateMoveToIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateOverrideLogicalIdParameters(newLogicalId *string) error { + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_IsConstructParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_IsTerraformElementParameters(x interface{}) error { + return nil +} + +func validateVaultRadarIntegrationSlackSubscription_IsTerraformResourceParameters(x interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetChannelParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetConnectionParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetConnectionIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetCountParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetNameParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetProjectIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarIntegrationSlackSubscription) validateSetProvisionersParameters(val *[]interface{}) error { + return nil +} + +func validateNewVaultRadarIntegrationSlackSubscriptionParameters(scope constructs.Construct, id *string, config *VaultRadarIntegrationSlackSubscriptionConfig) error { + return nil +} + diff --git a/hcp/vaultradarintegrationslacksubscription/internal/types.go b/hcp/vaultradarintegrationslacksubscription/internal/types.go new file mode 100644 index 00000000..a60e1727 --- /dev/null +++ b/hcp/vaultradarintegrationslacksubscription/internal/types.go @@ -0,0 +1,8 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package internal +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) +type Type__cdktfTerraformResource = cdktf.TerraformResource diff --git a/hcp/vaultradarintegrationslacksubscription/main.go b/hcp/vaultradarintegrationslacksubscription/main.go new file mode 100644 index 00000000..1a1e2e50 --- /dev/null +++ b/hcp/vaultradarintegrationslacksubscription/main.go @@ -0,0 +1,79 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarintegrationslacksubscription + +import ( + "reflect" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" +) + +func init() { + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscription", + reflect.TypeOf((*VaultRadarIntegrationSlackSubscription)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberMethod{JsiiMethod: "addMoveTarget", GoMethod: "AddMoveTarget"}, + _jsii_.MemberMethod{JsiiMethod: "addOverride", GoMethod: "AddOverride"}, + _jsii_.MemberProperty{JsiiProperty: "cdktfStack", GoGetter: "CdktfStack"}, + _jsii_.MemberProperty{JsiiProperty: "channel", GoGetter: "Channel"}, + _jsii_.MemberProperty{JsiiProperty: "channelInput", GoGetter: "ChannelInput"}, + _jsii_.MemberProperty{JsiiProperty: "connection", GoGetter: "Connection"}, + _jsii_.MemberProperty{JsiiProperty: "connectionId", GoGetter: "ConnectionId"}, + _jsii_.MemberProperty{JsiiProperty: "connectionIdInput", GoGetter: "ConnectionIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "constructNodeMetadata", GoGetter: "ConstructNodeMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "count", GoGetter: "Count"}, + _jsii_.MemberProperty{JsiiProperty: "dependsOn", GoGetter: "DependsOn"}, + _jsii_.MemberProperty{JsiiProperty: "forEach", GoGetter: "ForEach"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberProperty{JsiiProperty: "friendlyUniqueId", GoGetter: "FriendlyUniqueId"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "hasResourceMove", GoMethod: "HasResourceMove"}, + _jsii_.MemberProperty{JsiiProperty: "id", GoGetter: "Id"}, + _jsii_.MemberMethod{JsiiMethod: "importFrom", GoMethod: "ImportFrom"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "lifecycle", GoGetter: "Lifecycle"}, + _jsii_.MemberMethod{JsiiMethod: "moveFromId", GoMethod: "MoveFromId"}, + _jsii_.MemberMethod{JsiiMethod: "moveTo", GoMethod: "MoveTo"}, + _jsii_.MemberMethod{JsiiMethod: "moveToId", GoMethod: "MoveToId"}, + _jsii_.MemberProperty{JsiiProperty: "name", GoGetter: "Name"}, + _jsii_.MemberProperty{JsiiProperty: "nameInput", GoGetter: "NameInput"}, + _jsii_.MemberProperty{JsiiProperty: "node", GoGetter: "Node"}, + _jsii_.MemberMethod{JsiiMethod: "overrideLogicalId", GoMethod: "OverrideLogicalId"}, + _jsii_.MemberProperty{JsiiProperty: "projectId", GoGetter: "ProjectId"}, + _jsii_.MemberProperty{JsiiProperty: "projectIdInput", GoGetter: "ProjectIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "provider", GoGetter: "Provider"}, + _jsii_.MemberProperty{JsiiProperty: "provisioners", GoGetter: "Provisioners"}, + _jsii_.MemberProperty{JsiiProperty: "rawOverrides", GoGetter: "RawOverrides"}, + _jsii_.MemberMethod{JsiiMethod: "resetOverrideLogicalId", GoMethod: "ResetOverrideLogicalId"}, + _jsii_.MemberMethod{JsiiMethod: "resetProjectId", GoMethod: "ResetProjectId"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeAttributes", GoMethod: "SynthesizeAttributes"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeHclAttributes", GoMethod: "SynthesizeHclAttributes"}, + _jsii_.MemberProperty{JsiiProperty: "terraformGeneratorMetadata", GoGetter: "TerraformGeneratorMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "terraformMetaArguments", GoGetter: "TerraformMetaArguments"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResourceType", GoGetter: "TerraformResourceType"}, + _jsii_.MemberMethod{JsiiMethod: "toHclTerraform", GoMethod: "ToHclTerraform"}, + _jsii_.MemberMethod{JsiiMethod: "toMetadata", GoMethod: "ToMetadata"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + _jsii_.MemberMethod{JsiiMethod: "toTerraform", GoMethod: "ToTerraform"}, + }, + func() interface{} { + j := jsiiProxy_VaultRadarIntegrationSlackSubscription{} + _jsii_.InitJsiiProxy(&j.Type__cdktfTerraformResource) + return &j + }, + ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultRadarIntegrationSlackSubscription.VaultRadarIntegrationSlackSubscriptionConfig", + reflect.TypeOf((*VaultRadarIntegrationSlackSubscriptionConfig)(nil)).Elem(), + ) +} diff --git a/hcp/vaultradarsourcegithubcloud/README.md b/hcp/vaultradarsourcegithubcloud/README.md new file mode 100644 index 00000000..ab39ebf2 --- /dev/null +++ b/hcp/vaultradarsourcegithubcloud/README.md @@ -0,0 +1,3 @@ +# `hcp_vault_radar_source_github_cloud` + +Refer to the Terraform Registry for docs: [`hcp_vault_radar_source_github_cloud`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_cloud). diff --git a/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud.go b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud.go new file mode 100644 index 00000000..f4fdb47d --- /dev/null +++ b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud.go @@ -0,0 +1,946 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarsourcegithubcloud + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultradarsourcegithubcloud/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_cloud hcp_vault_radar_source_github_cloud}. +type VaultRadarSourceGithubCloud interface { + cdktf.TerraformResource + // Experimental. + CdktfStack() cdktf.TerraformStack + // Experimental. + Connection() interface{} + // Experimental. + SetConnection(val interface{}) + // Experimental. + ConstructNodeMetadata() *map[string]interface{} + // Experimental. + Count() interface{} + // Experimental. + SetCount(val interface{}) + // Experimental. + DependsOn() *[]*string + // Experimental. + SetDependsOn(val *[]*string) + // Experimental. + ForEach() cdktf.ITerraformIterator + // Experimental. + SetForEach(val cdktf.ITerraformIterator) + // Experimental. + Fqn() *string + // Experimental. + FriendlyUniqueId() *string + GithubOrganization() *string + SetGithubOrganization(val *string) + GithubOrganizationInput() *string + Id() *string + // Experimental. + Lifecycle() *cdktf.TerraformResourceLifecycle + // Experimental. + SetLifecycle(val *cdktf.TerraformResourceLifecycle) + // The tree node. + Node() constructs.Node + ProjectId() *string + SetProjectId(val *string) + ProjectIdInput() *string + // Experimental. + Provider() cdktf.TerraformProvider + // Experimental. + SetProvider(val cdktf.TerraformProvider) + // Experimental. + Provisioners() *[]interface{} + // Experimental. + SetProvisioners(val *[]interface{}) + // Experimental. + RawOverrides() interface{} + // Experimental. + TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata + // Experimental. + TerraformMetaArguments() *map[string]interface{} + // Experimental. + TerraformResourceType() *string + Token() *string + SetToken(val *string) + TokenInput() *string + // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + // Experimental. + AddMoveTarget(moveTarget *string) + // Experimental. + AddOverride(path *string, value interface{}) + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + HasResourceMove() interface{} + // Experimental. + ImportFrom(id *string, provider cdktf.TerraformProvider) + // Experimental. + InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable + // Move the resource corresponding to "id" to this resource. + // + // Note that the resource being moved from must be marked as moved using it's instance function. + // Experimental. + MoveFromId(id *string) + // Moves this resource to the target resource given by moveTarget. + // Experimental. + MoveTo(moveTarget *string, index interface{}) + // Moves this resource to the resource corresponding to "id". + // Experimental. + MoveToId(id *string) + // Overrides the auto-generated logical ID with a specific ID. + // Experimental. + OverrideLogicalId(newLogicalId *string) + // Resets a previously passed logical Id to use the auto-generated logical id again. + // Experimental. + ResetOverrideLogicalId() + ResetProjectId() + SynthesizeAttributes() *map[string]interface{} + SynthesizeHclAttributes() *map[string]interface{} + // Experimental. + ToHclTerraform() interface{} + // Experimental. + ToMetadata() interface{} + // Returns a string representation of this construct. + ToString() *string + // Adds this resource to the terraform JSON output. + // Experimental. + ToTerraform() interface{} +} + +// The jsii proxy struct for VaultRadarSourceGithubCloud +type jsiiProxy_VaultRadarSourceGithubCloud struct { + internal.Type__cdktfTerraformResource +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) CdktfStack() cdktf.TerraformStack { + var returns cdktf.TerraformStack + _jsii_.Get( + j, + "cdktfStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Connection() interface{} { + var returns interface{} + _jsii_.Get( + j, + "connection", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) ConstructNodeMetadata() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "constructNodeMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Count() interface{} { + var returns interface{} + _jsii_.Get( + j, + "count", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) DependsOn() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "dependsOn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) ForEach() cdktf.ITerraformIterator { + var returns cdktf.ITerraformIterator + _jsii_.Get( + j, + "forEach", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) FriendlyUniqueId() *string { + var returns *string + _jsii_.Get( + j, + "friendlyUniqueId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) GithubOrganization() *string { + var returns *string + _jsii_.Get( + j, + "githubOrganization", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) GithubOrganizationInput() *string { + var returns *string + _jsii_.Get( + j, + "githubOrganizationInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Id() *string { + var returns *string + _jsii_.Get( + j, + "id", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Lifecycle() *cdktf.TerraformResourceLifecycle { + var returns *cdktf.TerraformResourceLifecycle + _jsii_.Get( + j, + "lifecycle", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Node() constructs.Node { + var returns constructs.Node + _jsii_.Get( + j, + "node", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) ProjectId() *string { + var returns *string + _jsii_.Get( + j, + "projectId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) ProjectIdInput() *string { + var returns *string + _jsii_.Get( + j, + "projectIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Provider() cdktf.TerraformProvider { + var returns cdktf.TerraformProvider + _jsii_.Get( + j, + "provider", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Provisioners() *[]interface{} { + var returns *[]interface{} + _jsii_.Get( + j, + "provisioners", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) RawOverrides() interface{} { + var returns interface{} + _jsii_.Get( + j, + "rawOverrides", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata { + var returns *cdktf.TerraformProviderGeneratorMetadata + _jsii_.Get( + j, + "terraformGeneratorMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) TerraformMetaArguments() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "terraformMetaArguments", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) TerraformResourceType() *string { + var returns *string + _jsii_.Get( + j, + "terraformResourceType", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) Token() *string { + var returns *string + _jsii_.Get( + j, + "token", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) TokenInput() *string { + var returns *string + _jsii_.Get( + j, + "tokenInput", + &returns, + ) + return returns +} + + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_cloud hcp_vault_radar_source_github_cloud} Resource. +func NewVaultRadarSourceGithubCloud(scope constructs.Construct, id *string, config *VaultRadarSourceGithubCloudConfig) VaultRadarSourceGithubCloud { + _init_.Initialize() + + if err := validateNewVaultRadarSourceGithubCloudParameters(scope, id, config); err != nil { + panic(err) + } + j := jsiiProxy_VaultRadarSourceGithubCloud{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + []interface{}{scope, id, config}, + &j, + ) + + return &j +} + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_cloud hcp_vault_radar_source_github_cloud} Resource. +func NewVaultRadarSourceGithubCloud_Override(v VaultRadarSourceGithubCloud, scope constructs.Construct, id *string, config *VaultRadarSourceGithubCloudConfig) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + []interface{}{scope, id, config}, + v, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetConnection(val interface{}) { + if err := j.validateSetConnectionParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connection", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetCount(val interface{}) { + if err := j.validateSetCountParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "count", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetDependsOn(val *[]*string) { + _jsii_.Set( + j, + "dependsOn", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetForEach(val cdktf.ITerraformIterator) { + _jsii_.Set( + j, + "forEach", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetGithubOrganization(val *string) { + if err := j.validateSetGithubOrganizationParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "githubOrganization", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetLifecycle(val *cdktf.TerraformResourceLifecycle) { + if err := j.validateSetLifecycleParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "lifecycle", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetProjectId(val *string) { + if err := j.validateSetProjectIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "projectId", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetProvider(val cdktf.TerraformProvider) { + _jsii_.Set( + j, + "provider", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetProvisioners(val *[]interface{}) { + if err := j.validateSetProvisionersParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "provisioners", + val, + ) +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud)SetToken(val *string) { + if err := j.validateSetTokenParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "token", + val, + ) +} + +// Generates CDKTF code for importing a VaultRadarSourceGithubCloud resource upon running "cdktf plan ". +func VaultRadarSourceGithubCloud_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource { + _init_.Initialize() + + if err := validateVaultRadarSourceGithubCloud_GenerateConfigForImportParameters(scope, importToId, importFromId); err != nil { + panic(err) + } + var returns cdktf.ImportableResource + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + "generateConfigForImport", + []interface{}{scope, importToId, importFromId, provider}, + &returns, + ) + + return returns +} + +// Checks if `x` is a construct. +// +// Use this method instead of `instanceof` to properly detect `Construct` +// instances, even when the construct library is symlinked. +// +// Explanation: in JavaScript, multiple copies of the `constructs` library on +// disk are seen as independent, completely different libraries. As a +// consequence, the class `Construct` in each copy of the `constructs` library +// is seen as a different class, and an instance of one class will not test as +// `instanceof` the other class. `npm install` will not create installations +// like this, but users may manually symlink construct libraries together or +// use a monorepo tool: in those cases, multiple copies of the `constructs` +// library can be accidentally installed, and `instanceof` will behave +// unpredictably. It is safest to avoid using `instanceof`, and using +// this type-testing method instead. +// +// Returns: true if `x` is an object created from a class which extends `Construct`. +func VaultRadarSourceGithubCloud_IsConstruct(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarSourceGithubCloud_IsConstructParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + "isConstruct", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarSourceGithubCloud_IsTerraformElement(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarSourceGithubCloud_IsTerraformElementParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + "isTerraformElement", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultRadarSourceGithubCloud_IsTerraformResource(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultRadarSourceGithubCloud_IsTerraformResourceParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + "isTerraformResource", + []interface{}{x}, + &returns, + ) + + return returns +} + +func VaultRadarSourceGithubCloud_TfResourceType() *string { + _init_.Initialize() + var returns *string + _jsii_.StaticGet( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + "tfResourceType", + &returns, + ) + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) AddMoveTarget(moveTarget *string) { + if err := v.validateAddMoveTargetParameters(moveTarget); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addMoveTarget", + []interface{}{moveTarget}, + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) AddOverride(path *string, value interface{}) { + if err := v.validateAddOverrideParameters(path, value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addOverride", + []interface{}{path, value}, + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) HasResourceMove() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "hasResourceMove", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) ImportFrom(id *string, provider cdktf.TerraformProvider) { + if err := v.validateImportFromParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "importFrom", + []interface{}{id, provider}, + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) MoveFromId(id *string) { + if err := v.validateMoveFromIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveFromId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) MoveTo(moveTarget *string, index interface{}) { + if err := v.validateMoveToParameters(moveTarget, index); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveTo", + []interface{}{moveTarget, index}, + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) MoveToId(id *string) { + if err := v.validateMoveToIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveToId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) OverrideLogicalId(newLogicalId *string) { + if err := v.validateOverrideLogicalIdParameters(newLogicalId); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "overrideLogicalId", + []interface{}{newLogicalId}, + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) ResetOverrideLogicalId() { + _jsii_.InvokeVoid( + v, + "resetOverrideLogicalId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) ResetProjectId() { + _jsii_.InvokeVoid( + v, + "resetProjectId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) SynthesizeAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) SynthesizeHclAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeHclAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) ToHclTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toHclTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) ToMetadata() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toMetadata", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) ToTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloudConfig.go b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloudConfig.go new file mode 100644 index 00000000..698524ea --- /dev/null +++ b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloudConfig.go @@ -0,0 +1,40 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarsourcegithubcloud + +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultRadarSourceGithubCloudConfig struct { + // Experimental. + Connection interface{} `field:"optional" json:"connection" yaml:"connection"` + // Experimental. + Count interface{} `field:"optional" json:"count" yaml:"count"` + // Experimental. + DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` + // Experimental. + ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` + // Experimental. + Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` + // Experimental. + Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` + // Experimental. + Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` + // GitHub organization Vault Radar will monitor. Example: type "octocat" for the org https://github.com/octocat. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_cloud#github_organization VaultRadarSourceGithubCloud#github_organization} + GithubOrganization *string `field:"required" json:"githubOrganization" yaml:"githubOrganization"` + // GitHub personal access token. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_cloud#token VaultRadarSourceGithubCloud#token} + Token *string `field:"required" json:"token" yaml:"token"` + // The ID of the HCP project where Vault Radar is located. + // + // If not specified, the project specified in the HCP Provider config block will be used, if configured. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_cloud#project_id VaultRadarSourceGithubCloud#project_id} + ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` +} + diff --git a/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud__checks.go b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud__checks.go new file mode 100644 index 00000000..471784ba --- /dev/null +++ b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud__checks.go @@ -0,0 +1,436 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultradarsourcegithubcloud + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateAddMoveTargetParameters(moveTarget *string) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateAddOverrideParameters(path *string, value interface{}) error { + if path == nil { + return fmt.Errorf("parameter path is required, but nil was provided") + } + + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateImportFromParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateMoveFromIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateMoveToParameters(moveTarget *string, index interface{}) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + switch index.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter index must be one of the allowed types: *string, *float64; received %#v (a %T)", index, index) + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateMoveToIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateOverrideLogicalIdParameters(newLogicalId *string) error { + if newLogicalId == nil { + return fmt.Errorf("parameter newLogicalId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarSourceGithubCloud_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if importToId == nil { + return fmt.Errorf("parameter importToId is required, but nil was provided") + } + + if importFromId == nil { + return fmt.Errorf("parameter importFromId is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarSourceGithubCloud_IsConstructParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarSourceGithubCloud_IsTerraformElementParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultRadarSourceGithubCloud_IsTerraformResourceParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetConnectionParameters(val interface{}) error { + switch val.(type) { + case *cdktf.SSHProvisionerConnection: + val := val.(*cdktf.SSHProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.SSHProvisionerConnection: + val_ := val.(cdktf.SSHProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case *cdktf.WinrmProvisionerConnection: + val := val.(*cdktf.WinrmProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.WinrmProvisionerConnection: + val_ := val.(cdktf.WinrmProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *cdktf.SSHProvisionerConnection, *cdktf.WinrmProvisionerConnection; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetCountParameters(val interface{}) error { + switch val.(type) { + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + case cdktf.TerraformCount: + // ok + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *float64, cdktf.TerraformCount; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetGithubOrganizationParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetProjectIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetProvisionersParameters(val *[]interface{}) error { + for idx_97dfc6, v := range *val { + switch v.(type) { + case *cdktf.FileProvisioner: + v := v.(*cdktf.FileProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.FileProvisioner: + v_ := v.(cdktf.FileProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.LocalExecProvisioner: + v := v.(*cdktf.LocalExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.LocalExecProvisioner: + v_ := v.(cdktf.LocalExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.RemoteExecProvisioner: + v := v.(*cdktf.RemoteExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.RemoteExecProvisioner: + v_ := v.(cdktf.RemoteExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(v) { + return fmt.Errorf("parameter val[%#v] must be one of the allowed types: *cdktf.FileProvisioner, *cdktf.LocalExecProvisioner, *cdktf.RemoteExecProvisioner; received %#v (a %T)", idx_97dfc6, v, v) + } + } + } + + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetTokenParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func validateNewVaultRadarSourceGithubCloudParameters(scope constructs.Construct, id *string, config *VaultRadarSourceGithubCloudConfig) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + if config == nil { + return fmt.Errorf("parameter config is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(config, func() string { return "parameter config" }); err != nil { + return err + } + + return nil +} + diff --git a/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud__no_checks.go b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud__no_checks.go new file mode 100644 index 00000000..3feb83ff --- /dev/null +++ b/hcp/vaultradarsourcegithubcloud/VaultRadarSourceGithubCloud__no_checks.go @@ -0,0 +1,125 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultradarsourcegithubcloud + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateAddMoveTargetParameters(moveTarget *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateAddOverrideParameters(path *string, value interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateImportFromParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateMoveFromIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateMoveToParameters(moveTarget *string, index interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateMoveToIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultRadarSourceGithubCloud) validateOverrideLogicalIdParameters(newLogicalId *string) error { + return nil +} + +func validateVaultRadarSourceGithubCloud_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + return nil +} + +func validateVaultRadarSourceGithubCloud_IsConstructParameters(x interface{}) error { + return nil +} + +func validateVaultRadarSourceGithubCloud_IsTerraformElementParameters(x interface{}) error { + return nil +} + +func validateVaultRadarSourceGithubCloud_IsTerraformResourceParameters(x interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetConnectionParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetCountParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetGithubOrganizationParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetProjectIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetProvisionersParameters(val *[]interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultRadarSourceGithubCloud) validateSetTokenParameters(val *string) error { + return nil +} + +func validateNewVaultRadarSourceGithubCloudParameters(scope constructs.Construct, id *string, config *VaultRadarSourceGithubCloudConfig) error { + return nil +} + diff --git a/hcp/vaultradarsourcegithubcloud/internal/types.go b/hcp/vaultradarsourcegithubcloud/internal/types.go new file mode 100644 index 00000000..a60e1727 --- /dev/null +++ b/hcp/vaultradarsourcegithubcloud/internal/types.go @@ -0,0 +1,8 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package internal +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) +type Type__cdktfTerraformResource = cdktf.TerraformResource diff --git a/hcp/vaultradarsourcegithubcloud/main.go b/hcp/vaultradarsourcegithubcloud/main.go new file mode 100644 index 00000000..e889be82 --- /dev/null +++ b/hcp/vaultradarsourcegithubcloud/main.go @@ -0,0 +1,77 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultradarsourcegithubcloud + +import ( + "reflect" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" +) + +func init() { + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloud", + reflect.TypeOf((*VaultRadarSourceGithubCloud)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberMethod{JsiiMethod: "addMoveTarget", GoMethod: "AddMoveTarget"}, + _jsii_.MemberMethod{JsiiMethod: "addOverride", GoMethod: "AddOverride"}, + _jsii_.MemberProperty{JsiiProperty: "cdktfStack", GoGetter: "CdktfStack"}, + _jsii_.MemberProperty{JsiiProperty: "connection", GoGetter: "Connection"}, + _jsii_.MemberProperty{JsiiProperty: "constructNodeMetadata", GoGetter: "ConstructNodeMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "count", GoGetter: "Count"}, + _jsii_.MemberProperty{JsiiProperty: "dependsOn", GoGetter: "DependsOn"}, + _jsii_.MemberProperty{JsiiProperty: "forEach", GoGetter: "ForEach"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberProperty{JsiiProperty: "friendlyUniqueId", GoGetter: "FriendlyUniqueId"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "githubOrganization", GoGetter: "GithubOrganization"}, + _jsii_.MemberProperty{JsiiProperty: "githubOrganizationInput", GoGetter: "GithubOrganizationInput"}, + _jsii_.MemberMethod{JsiiMethod: "hasResourceMove", GoMethod: "HasResourceMove"}, + _jsii_.MemberProperty{JsiiProperty: "id", GoGetter: "Id"}, + _jsii_.MemberMethod{JsiiMethod: "importFrom", GoMethod: "ImportFrom"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "lifecycle", GoGetter: "Lifecycle"}, + _jsii_.MemberMethod{JsiiMethod: "moveFromId", GoMethod: "MoveFromId"}, + _jsii_.MemberMethod{JsiiMethod: "moveTo", GoMethod: "MoveTo"}, + _jsii_.MemberMethod{JsiiMethod: "moveToId", GoMethod: "MoveToId"}, + _jsii_.MemberProperty{JsiiProperty: "node", GoGetter: "Node"}, + _jsii_.MemberMethod{JsiiMethod: "overrideLogicalId", GoMethod: "OverrideLogicalId"}, + _jsii_.MemberProperty{JsiiProperty: "projectId", GoGetter: "ProjectId"}, + _jsii_.MemberProperty{JsiiProperty: "projectIdInput", GoGetter: "ProjectIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "provider", GoGetter: "Provider"}, + _jsii_.MemberProperty{JsiiProperty: "provisioners", GoGetter: "Provisioners"}, + _jsii_.MemberProperty{JsiiProperty: "rawOverrides", GoGetter: "RawOverrides"}, + _jsii_.MemberMethod{JsiiMethod: "resetOverrideLogicalId", GoMethod: "ResetOverrideLogicalId"}, + _jsii_.MemberMethod{JsiiMethod: "resetProjectId", GoMethod: "ResetProjectId"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeAttributes", GoMethod: "SynthesizeAttributes"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeHclAttributes", GoMethod: "SynthesizeHclAttributes"}, + _jsii_.MemberProperty{JsiiProperty: "terraformGeneratorMetadata", GoGetter: "TerraformGeneratorMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "terraformMetaArguments", GoGetter: "TerraformMetaArguments"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResourceType", GoGetter: "TerraformResourceType"}, + _jsii_.MemberMethod{JsiiMethod: "toHclTerraform", GoMethod: "ToHclTerraform"}, + _jsii_.MemberProperty{JsiiProperty: "token", GoGetter: "Token"}, + _jsii_.MemberProperty{JsiiProperty: "tokenInput", GoGetter: "TokenInput"}, + _jsii_.MemberMethod{JsiiMethod: "toMetadata", GoMethod: "ToMetadata"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + _jsii_.MemberMethod{JsiiMethod: "toTerraform", GoMethod: "ToTerraform"}, + }, + func() interface{} { + j := jsiiProxy_VaultRadarSourceGithubCloud{} + _jsii_.InitJsiiProxy(&j.Type__cdktfTerraformResource) + return &j + }, + ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultRadarSourceGithubCloud.VaultRadarSourceGithubCloudConfig", + reflect.TypeOf((*VaultRadarSourceGithubCloudConfig)(nil)).Elem(), + ) +} diff --git a/hcp/vaultradarsourcegithubenterprise/README.md b/hcp/vaultradarsourcegithubenterprise/README.md index 777847f0..0e10b2fc 100644 --- a/hcp/vaultradarsourcegithubenterprise/README.md +++ b/hcp/vaultradarsourcegithubenterprise/README.md @@ -1,3 +1,3 @@ # `hcp_vault_radar_source_github_enterprise` -Refer to the Terraform Registry for docs: [`hcp_vault_radar_source_github_enterprise`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise). +Refer to the Terraform Registry for docs: [`hcp_vault_radar_source_github_enterprise`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise). diff --git a/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterprise.go b/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterprise.go index 8ef2386f..dfa7fb68 100644 --- a/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterprise.go +++ b/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterprise.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise hcp_vault_radar_source_github_enterprise}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise hcp_vault_radar_source_github_enterprise}. type VaultRadarSourceGithubEnterprise interface { cdktf.TerraformResource // Experimental. @@ -390,7 +390,7 @@ func (j *jsiiProxy_VaultRadarSourceGithubEnterprise) TokenInput() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise hcp_vault_radar_source_github_enterprise} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise hcp_vault_radar_source_github_enterprise} Resource. func NewVaultRadarSourceGithubEnterprise(scope constructs.Construct, id *string, config *VaultRadarSourceGithubEnterpriseConfig) VaultRadarSourceGithubEnterprise { _init_.Initialize() @@ -408,7 +408,7 @@ func NewVaultRadarSourceGithubEnterprise(scope constructs.Construct, id *string, return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise hcp_vault_radar_source_github_enterprise} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise hcp_vault_radar_source_github_enterprise} Resource. func NewVaultRadarSourceGithubEnterprise_Override(v VaultRadarSourceGithubEnterprise, scope constructs.Construct, id *string, config *VaultRadarSourceGithubEnterpriseConfig) { _init_.Initialize() diff --git a/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterpriseConfig.go b/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterpriseConfig.go index 07245769..5226e0d0 100644 --- a/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterpriseConfig.go +++ b/hcp/vaultradarsourcegithubenterprise/VaultRadarSourceGithubEnterpriseConfig.go @@ -24,21 +24,21 @@ type VaultRadarSourceGithubEnterpriseConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Fully qualified domain name of the server. (Example: myserver.acme.com). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise#domain_name VaultRadarSourceGithubEnterprise#domain_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise#domain_name VaultRadarSourceGithubEnterprise#domain_name} DomainName *string `field:"required" json:"domainName" yaml:"domainName"` // GitHub organization Vault Radar will monitor. Example: "octocat" for the org https://yourcodeserver.com/octocat. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise#github_organization VaultRadarSourceGithubEnterprise#github_organization} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise#github_organization VaultRadarSourceGithubEnterprise#github_organization} GithubOrganization *string `field:"required" json:"githubOrganization" yaml:"githubOrganization"` // GitHub personal access token. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise#token VaultRadarSourceGithubEnterprise#token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise#token VaultRadarSourceGithubEnterprise#token} Token *string `field:"required" json:"token" yaml:"token"` // The ID of the HCP project where Vault Radar is located. // // If not specified, the project specified in the HCP Provider config block will be used, if configured. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_radar_source_github_enterprise#project_id VaultRadarSourceGithubEnterprise#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_radar_source_github_enterprise#project_id VaultRadarSourceGithubEnterprise#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/vaultsecretsapp/README.md b/hcp/vaultsecretsapp/README.md index d19a637a..a1ae731f 100644 --- a/hcp/vaultsecretsapp/README.md +++ b/hcp/vaultsecretsapp/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_app` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_app`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_app`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app). diff --git a/hcp/vaultsecretsapp/VaultSecretsApp.go b/hcp/vaultsecretsapp/VaultSecretsApp.go index c9a8cf2b..c2b972f8 100644 --- a/hcp/vaultsecretsapp/VaultSecretsApp.go +++ b/hcp/vaultsecretsapp/VaultSecretsApp.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app hcp_vault_secrets_app}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app hcp_vault_secrets_app}. type VaultSecretsApp interface { cdktf.TerraformResource AppName() *string @@ -390,7 +390,7 @@ func (j *jsiiProxy_VaultSecretsApp) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app hcp_vault_secrets_app} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app hcp_vault_secrets_app} Resource. func NewVaultSecretsApp(scope constructs.Construct, id *string, config *VaultSecretsAppConfig) VaultSecretsApp { _init_.Initialize() @@ -408,7 +408,7 @@ func NewVaultSecretsApp(scope constructs.Construct, id *string, config *VaultSec return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app hcp_vault_secrets_app} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app hcp_vault_secrets_app} Resource. func NewVaultSecretsApp_Override(v VaultSecretsApp, scope constructs.Construct, id *string, config *VaultSecretsAppConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsapp/VaultSecretsAppConfig.go b/hcp/vaultsecretsapp/VaultSecretsAppConfig.go index 9f2c68d8..c75103b4 100644 --- a/hcp/vaultsecretsapp/VaultSecretsAppConfig.go +++ b/hcp/vaultsecretsapp/VaultSecretsAppConfig.go @@ -24,15 +24,15 @@ type VaultSecretsAppConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The Vault Secrets App name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app#app_name VaultSecretsApp#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app#app_name VaultSecretsApp#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` // The Vault Secrets app description. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app#description VaultSecretsApp#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app#description VaultSecretsApp#description} Description *string `field:"optional" json:"description" yaml:"description"` // The ID of the HCP project where the HCP Vault Secrets app is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app#project_id VaultSecretsApp#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app#project_id VaultSecretsApp#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/vaultsecretsappiambinding/README.md b/hcp/vaultsecretsappiambinding/README.md index b129bad7..6ef8ae14 100644 --- a/hcp/vaultsecretsappiambinding/README.md +++ b/hcp/vaultsecretsappiambinding/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_app_iam_binding` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_app_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_binding). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_app_iam_binding`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_binding). diff --git a/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBinding.go b/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBinding.go index 13254d88..fbe43a31 100644 --- a/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBinding.go +++ b/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBinding.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_binding hcp_vault_secrets_app_iam_binding}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_binding hcp_vault_secrets_app_iam_binding}. type VaultSecretsAppIamBinding interface { cdktf.TerraformResource // Experimental. @@ -355,7 +355,7 @@ func (j *jsiiProxy_VaultSecretsAppIamBinding) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_binding hcp_vault_secrets_app_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_binding hcp_vault_secrets_app_iam_binding} Resource. func NewVaultSecretsAppIamBinding(scope constructs.Construct, id *string, config *VaultSecretsAppIamBindingConfig) VaultSecretsAppIamBinding { _init_.Initialize() @@ -373,7 +373,7 @@ func NewVaultSecretsAppIamBinding(scope constructs.Construct, id *string, config return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_binding hcp_vault_secrets_app_iam_binding} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_binding hcp_vault_secrets_app_iam_binding} Resource. func NewVaultSecretsAppIamBinding_Override(v VaultSecretsAppIamBinding, scope constructs.Construct, id *string, config *VaultSecretsAppIamBindingConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBindingConfig.go b/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBindingConfig.go index b2905aa3..eaf19041 100644 --- a/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBindingConfig.go +++ b/hcp/vaultsecretsappiambinding/VaultSecretsAppIamBindingConfig.go @@ -24,15 +24,15 @@ type VaultSecretsAppIamBindingConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The principal to bind to the given role. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_binding#principal_id VaultSecretsAppIamBinding#principal_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_binding#principal_id VaultSecretsAppIamBinding#principal_id} PrincipalId *string `field:"required" json:"principalId" yaml:"principalId"` // The app's resource name in the format secrets/project//app/. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_binding#resource_name VaultSecretsAppIamBinding#resource_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_binding#resource_name VaultSecretsAppIamBinding#resource_name} ResourceName *string `field:"required" json:"resourceName" yaml:"resourceName"` // The role name to bind to the given principal. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_binding#role VaultSecretsAppIamBinding#role} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_binding#role VaultSecretsAppIamBinding#role} Role *string `field:"required" json:"role" yaml:"role"` } diff --git a/hcp/vaultsecretsappiampolicy/README.md b/hcp/vaultsecretsappiampolicy/README.md index ea16991c..1e91a7a6 100644 --- a/hcp/vaultsecretsappiampolicy/README.md +++ b/hcp/vaultsecretsappiampolicy/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_app_iam_policy` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_app_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_policy). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_app_iam_policy`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_policy). diff --git a/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicy.go b/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicy.go index 30b1fdec..4efb7a6d 100644 --- a/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicy.go +++ b/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicy.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_policy hcp_vault_secrets_app_iam_policy}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_policy hcp_vault_secrets_app_iam_policy}. type VaultSecretsAppIamPolicy interface { cdktf.TerraformResource // Experimental. @@ -343,7 +343,7 @@ func (j *jsiiProxy_VaultSecretsAppIamPolicy) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_policy hcp_vault_secrets_app_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_policy hcp_vault_secrets_app_iam_policy} Resource. func NewVaultSecretsAppIamPolicy(scope constructs.Construct, id *string, config *VaultSecretsAppIamPolicyConfig) VaultSecretsAppIamPolicy { _init_.Initialize() @@ -361,7 +361,7 @@ func NewVaultSecretsAppIamPolicy(scope constructs.Construct, id *string, config return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_policy hcp_vault_secrets_app_iam_policy} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_policy hcp_vault_secrets_app_iam_policy} Resource. func NewVaultSecretsAppIamPolicy_Override(v VaultSecretsAppIamPolicy, scope constructs.Construct, id *string, config *VaultSecretsAppIamPolicyConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicyConfig.go b/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicyConfig.go index 9e0d58f3..c723dcdb 100644 --- a/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicyConfig.go +++ b/hcp/vaultsecretsappiampolicy/VaultSecretsAppIamPolicyConfig.go @@ -24,11 +24,11 @@ type VaultSecretsAppIamPolicyConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The policy to apply. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_policy#policy_data VaultSecretsAppIamPolicy#policy_data} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_policy#policy_data VaultSecretsAppIamPolicy#policy_data} PolicyData *string `field:"required" json:"policyData" yaml:"policyData"` // The app's resource name in the format secrets/project//app/. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_app_iam_policy#resource_name VaultSecretsAppIamPolicy#resource_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_app_iam_policy#resource_name VaultSecretsAppIamPolicy#resource_name} ResourceName *string `field:"required" json:"resourceName" yaml:"resourceName"` } diff --git a/hcp/vaultsecretsdynamicsecret/README.md b/hcp/vaultsecretsdynamicsecret/README.md index 413b01e7..17a57b95 100644 --- a/hcp/vaultsecretsdynamicsecret/README.md +++ b/hcp/vaultsecretsdynamicsecret/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_dynamic_secret` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_dynamic_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_dynamic_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret). diff --git a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecret.go b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecret.go index 484f8a89..020bbc47 100644 --- a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecret.go +++ b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecret.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret}. type VaultSecretsDynamicSecret interface { cdktf.TerraformResource AppName() *string @@ -485,7 +485,7 @@ func (j *jsiiProxy_VaultSecretsDynamicSecret) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Resource. func NewVaultSecretsDynamicSecret(scope constructs.Construct, id *string, config *VaultSecretsDynamicSecretConfig) VaultSecretsDynamicSecret { _init_.Initialize() @@ -503,7 +503,7 @@ func NewVaultSecretsDynamicSecret(scope constructs.Construct, id *string, config return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret hcp_vault_secrets_dynamic_secret} Resource. func NewVaultSecretsDynamicSecret_Override(v VaultSecretsDynamicSecret, scope constructs.Construct, id *string, config *VaultSecretsDynamicSecretConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretAwsAssumeRole.go b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretAwsAssumeRole.go index 102963e9..02fe5048 100644 --- a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretAwsAssumeRole.go +++ b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretAwsAssumeRole.go @@ -7,7 +7,7 @@ package vaultsecretsdynamicsecret type VaultSecretsDynamicSecretAwsAssumeRole struct { // AWS IAM role ARN to assume when generating credentials. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#iam_role_arn VaultSecretsDynamicSecret#iam_role_arn} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#iam_role_arn VaultSecretsDynamicSecret#iam_role_arn} IamRoleArn *string `field:"required" json:"iamRoleArn" yaml:"iamRoleArn"` } diff --git a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretConfig.go b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretConfig.go index 18c18186..4e8b80eb 100644 --- a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretConfig.go +++ b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretConfig.go @@ -24,35 +24,35 @@ type VaultSecretsDynamicSecretConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Vault Secrets application name that owns the secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#app_name VaultSecretsDynamicSecret#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#app_name VaultSecretsDynamicSecret#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` // The Vault Secrets integration name with the capability to manage the secret's lifecycle. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#integration_name VaultSecretsDynamicSecret#integration_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#integration_name VaultSecretsDynamicSecret#integration_name} IntegrationName *string `field:"required" json:"integrationName" yaml:"integrationName"` // The Vault Secrets secret name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#name VaultSecretsDynamicSecret#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#name VaultSecretsDynamicSecret#name} Name *string `field:"required" json:"name" yaml:"name"` // The third party platform the dynamic credentials give access to. One of `aws` or `gcp`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#secret_provider VaultSecretsDynamicSecret#secret_provider} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#secret_provider VaultSecretsDynamicSecret#secret_provider} SecretProvider *string `field:"required" json:"secretProvider" yaml:"secretProvider"` // AWS configuration to generate dynamic credentials by assuming an IAM role. Required if `secret_provider` is `aws`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#aws_assume_role VaultSecretsDynamicSecret#aws_assume_role} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#aws_assume_role VaultSecretsDynamicSecret#aws_assume_role} AwsAssumeRole *VaultSecretsDynamicSecretAwsAssumeRole `field:"optional" json:"awsAssumeRole" yaml:"awsAssumeRole"` // TTL the generated credentials will be valid for. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#default_ttl VaultSecretsDynamicSecret#default_ttl} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#default_ttl VaultSecretsDynamicSecret#default_ttl} DefaultTtl *string `field:"optional" json:"defaultTtl" yaml:"defaultTtl"` // GCP configuration to generate dynamic credentials by impersonating a service account. Required if `secret_provider` is `gcp`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#gcp_impersonate_service_account VaultSecretsDynamicSecret#gcp_impersonate_service_account} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#gcp_impersonate_service_account VaultSecretsDynamicSecret#gcp_impersonate_service_account} GcpImpersonateServiceAccount *VaultSecretsDynamicSecretGcpImpersonateServiceAccount `field:"optional" json:"gcpImpersonateServiceAccount" yaml:"gcpImpersonateServiceAccount"` // HCP project ID that owns the HCP Vault Secrets integration. Inferred from the provider configuration if omitted. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#project_id VaultSecretsDynamicSecret#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#project_id VaultSecretsDynamicSecret#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretGcpImpersonateServiceAccount.go b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretGcpImpersonateServiceAccount.go index 9a9a6e20..a3ed05f1 100644 --- a/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretGcpImpersonateServiceAccount.go +++ b/hcp/vaultsecretsdynamicsecret/VaultSecretsDynamicSecretGcpImpersonateServiceAccount.go @@ -7,7 +7,7 @@ package vaultsecretsdynamicsecret type VaultSecretsDynamicSecretGcpImpersonateServiceAccount struct { // GCP service account email to impersonate. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_dynamic_secret#service_account_email VaultSecretsDynamicSecret#service_account_email} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_dynamic_secret#service_account_email VaultSecretsDynamicSecret#service_account_email} ServiceAccountEmail *string `field:"required" json:"serviceAccountEmail" yaml:"serviceAccountEmail"` } diff --git a/hcp/vaultsecretsintegrationaws/README.md b/hcp/vaultsecretsintegrationaws/README.md index faec9e41..e870c2fb 100644 --- a/hcp/vaultsecretsintegrationaws/README.md +++ b/hcp/vaultsecretsintegrationaws/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_integration_aws` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_aws`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_aws`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws). diff --git a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAws.go b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAws.go index 2d2e4708..2cb4cae5 100644 --- a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAws.go +++ b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAws.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws hcp_vault_secrets_integration_aws}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws hcp_vault_secrets_integration_aws}. type VaultSecretsIntegrationAws interface { cdktf.TerraformResource AccessKeys() VaultSecretsIntegrationAwsAccessKeysOutputReference @@ -437,7 +437,7 @@ func (j *jsiiProxy_VaultSecretsIntegrationAws) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws hcp_vault_secrets_integration_aws} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws hcp_vault_secrets_integration_aws} Resource. func NewVaultSecretsIntegrationAws(scope constructs.Construct, id *string, config *VaultSecretsIntegrationAwsConfig) VaultSecretsIntegrationAws { _init_.Initialize() @@ -455,7 +455,7 @@ func NewVaultSecretsIntegrationAws(scope constructs.Construct, id *string, confi return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws hcp_vault_secrets_integration_aws} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws hcp_vault_secrets_integration_aws} Resource. func NewVaultSecretsIntegrationAws_Override(v VaultSecretsIntegrationAws, scope constructs.Construct, id *string, config *VaultSecretsIntegrationAwsConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsAccessKeys.go b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsAccessKeys.go index 4769c07c..4ee22ffd 100644 --- a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsAccessKeys.go +++ b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsAccessKeys.go @@ -7,11 +7,11 @@ package vaultsecretsintegrationaws type VaultSecretsIntegrationAwsAccessKeys struct { // Key ID used with the secret key to authenticate against the target AWS account. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#access_key_id VaultSecretsIntegrationAws#access_key_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#access_key_id VaultSecretsIntegrationAws#access_key_id} AccessKeyId *string `field:"required" json:"accessKeyId" yaml:"accessKeyId"` // Secret key used with the key ID to authenticate against the target AWS account. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#secret_access_key VaultSecretsIntegrationAws#secret_access_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#secret_access_key VaultSecretsIntegrationAws#secret_access_key} SecretAccessKey *string `field:"required" json:"secretAccessKey" yaml:"secretAccessKey"` } diff --git a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsConfig.go b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsConfig.go index 08d24ae6..e8ebf9e8 100644 --- a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsConfig.go +++ b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsConfig.go @@ -24,23 +24,23 @@ type VaultSecretsIntegrationAwsConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Capabilities enabled for the integration. See the Vault Secrets documentation for the list of supported capabilities per provider. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#capabilities VaultSecretsIntegrationAws#capabilities} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#capabilities VaultSecretsIntegrationAws#capabilities} Capabilities *[]*string `field:"required" json:"capabilities" yaml:"capabilities"` // The Vault Secrets integration name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#name VaultSecretsIntegrationAws#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#name VaultSecretsIntegrationAws#name} Name *string `field:"required" json:"name" yaml:"name"` // AWS IAM key pair used to authenticate against the target AWS account. Cannot be used with `federated_workload_identity`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#access_keys VaultSecretsIntegrationAws#access_keys} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#access_keys VaultSecretsIntegrationAws#access_keys} AccessKeys *VaultSecretsIntegrationAwsAccessKeys `field:"optional" json:"accessKeys" yaml:"accessKeys"` // (Recommended) Federated identity configuration to authenticate against the target AWS account. Cannot be used with `access_keys`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#federated_workload_identity VaultSecretsIntegrationAws#federated_workload_identity} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#federated_workload_identity VaultSecretsIntegrationAws#federated_workload_identity} FederatedWorkloadIdentity *VaultSecretsIntegrationAwsFederatedWorkloadIdentity `field:"optional" json:"federatedWorkloadIdentity" yaml:"federatedWorkloadIdentity"` // HCP project ID that owns the HCP Vault Secrets integration. Inferred from the provider configuration if omitted. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#project_id VaultSecretsIntegrationAws#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#project_id VaultSecretsIntegrationAws#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsFederatedWorkloadIdentity.go b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsFederatedWorkloadIdentity.go index 2b0cd40a..fcb3fe88 100644 --- a/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsFederatedWorkloadIdentity.go +++ b/hcp/vaultsecretsintegrationaws/VaultSecretsIntegrationAwsFederatedWorkloadIdentity.go @@ -7,11 +7,11 @@ package vaultsecretsintegrationaws type VaultSecretsIntegrationAwsFederatedWorkloadIdentity struct { // Audience configured on the AWS IAM identity provider to federate access with HCP. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#audience VaultSecretsIntegrationAws#audience} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#audience VaultSecretsIntegrationAws#audience} Audience *string `field:"required" json:"audience" yaml:"audience"` // AWS IAM role ARN the integration will assume to carry operations for the appropriate capabilities. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_aws#role_arn VaultSecretsIntegrationAws#role_arn} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_aws#role_arn VaultSecretsIntegrationAws#role_arn} RoleArn *string `field:"required" json:"roleArn" yaml:"roleArn"` } diff --git a/hcp/vaultsecretsintegrationconfluent/README.md b/hcp/vaultsecretsintegrationconfluent/README.md new file mode 100644 index 00000000..54e588c9 --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/README.md @@ -0,0 +1,3 @@ +# `hcp_vault_secrets_integration_confluent` + +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_confluent`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent). diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent.go new file mode 100644 index 00000000..3d8fbb3f --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent.go @@ -0,0 +1,1011 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultsecretsintegrationconfluent + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultsecretsintegrationconfluent/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent hcp_vault_secrets_integration_confluent}. +type VaultSecretsIntegrationConfluent interface { + cdktf.TerraformResource + Capabilities() *[]*string + SetCapabilities(val *[]*string) + CapabilitiesInput() *[]*string + // Experimental. + CdktfStack() cdktf.TerraformStack + // Experimental. + Connection() interface{} + // Experimental. + SetConnection(val interface{}) + // Experimental. + ConstructNodeMetadata() *map[string]interface{} + // Experimental. + Count() interface{} + // Experimental. + SetCount(val interface{}) + // Experimental. + DependsOn() *[]*string + // Experimental. + SetDependsOn(val *[]*string) + // Experimental. + ForEach() cdktf.ITerraformIterator + // Experimental. + SetForEach(val cdktf.ITerraformIterator) + // Experimental. + Fqn() *string + // Experimental. + FriendlyUniqueId() *string + // Experimental. + Lifecycle() *cdktf.TerraformResourceLifecycle + // Experimental. + SetLifecycle(val *cdktf.TerraformResourceLifecycle) + Name() *string + SetName(val *string) + NameInput() *string + // The tree node. + Node() constructs.Node + OrganizationId() *string + ProjectId() *string + SetProjectId(val *string) + ProjectIdInput() *string + // Experimental. + Provider() cdktf.TerraformProvider + // Experimental. + SetProvider(val cdktf.TerraformProvider) + // Experimental. + Provisioners() *[]interface{} + // Experimental. + SetProvisioners(val *[]interface{}) + // Experimental. + RawOverrides() interface{} + ResourceId() *string + ResourceName() *string + StaticCredentialDetails() VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference + StaticCredentialDetailsInput() interface{} + // Experimental. + TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata + // Experimental. + TerraformMetaArguments() *map[string]interface{} + // Experimental. + TerraformResourceType() *string + // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. + // Experimental. + AddMoveTarget(moveTarget *string) + // Experimental. + AddOverride(path *string, value interface{}) + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + HasResourceMove() interface{} + // Experimental. + ImportFrom(id *string, provider cdktf.TerraformProvider) + // Experimental. + InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable + // Move the resource corresponding to "id" to this resource. + // + // Note that the resource being moved from must be marked as moved using it's instance function. + // Experimental. + MoveFromId(id *string) + // Moves this resource to the target resource given by moveTarget. + // Experimental. + MoveTo(moveTarget *string, index interface{}) + // Moves this resource to the resource corresponding to "id". + // Experimental. + MoveToId(id *string) + // Overrides the auto-generated logical ID with a specific ID. + // Experimental. + OverrideLogicalId(newLogicalId *string) + PutStaticCredentialDetails(value *VaultSecretsIntegrationConfluentStaticCredentialDetails) + // Resets a previously passed logical Id to use the auto-generated logical id again. + // Experimental. + ResetOverrideLogicalId() + ResetProjectId() + ResetStaticCredentialDetails() + SynthesizeAttributes() *map[string]interface{} + SynthesizeHclAttributes() *map[string]interface{} + // Experimental. + ToHclTerraform() interface{} + // Experimental. + ToMetadata() interface{} + // Returns a string representation of this construct. + ToString() *string + // Adds this resource to the terraform JSON output. + // Experimental. + ToTerraform() interface{} +} + +// The jsii proxy struct for VaultSecretsIntegrationConfluent +type jsiiProxy_VaultSecretsIntegrationConfluent struct { + internal.Type__cdktfTerraformResource +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Capabilities() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "capabilities", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) CapabilitiesInput() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "capabilitiesInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) CdktfStack() cdktf.TerraformStack { + var returns cdktf.TerraformStack + _jsii_.Get( + j, + "cdktfStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Connection() interface{} { + var returns interface{} + _jsii_.Get( + j, + "connection", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) ConstructNodeMetadata() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "constructNodeMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Count() interface{} { + var returns interface{} + _jsii_.Get( + j, + "count", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) DependsOn() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "dependsOn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) ForEach() cdktf.ITerraformIterator { + var returns cdktf.ITerraformIterator + _jsii_.Get( + j, + "forEach", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) FriendlyUniqueId() *string { + var returns *string + _jsii_.Get( + j, + "friendlyUniqueId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Lifecycle() *cdktf.TerraformResourceLifecycle { + var returns *cdktf.TerraformResourceLifecycle + _jsii_.Get( + j, + "lifecycle", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Name() *string { + var returns *string + _jsii_.Get( + j, + "name", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) NameInput() *string { + var returns *string + _jsii_.Get( + j, + "nameInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Node() constructs.Node { + var returns constructs.Node + _jsii_.Get( + j, + "node", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) OrganizationId() *string { + var returns *string + _jsii_.Get( + j, + "organizationId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) ProjectId() *string { + var returns *string + _jsii_.Get( + j, + "projectId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) ProjectIdInput() *string { + var returns *string + _jsii_.Get( + j, + "projectIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Provider() cdktf.TerraformProvider { + var returns cdktf.TerraformProvider + _jsii_.Get( + j, + "provider", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) Provisioners() *[]interface{} { + var returns *[]interface{} + _jsii_.Get( + j, + "provisioners", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) RawOverrides() interface{} { + var returns interface{} + _jsii_.Get( + j, + "rawOverrides", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) ResourceId() *string { + var returns *string + _jsii_.Get( + j, + "resourceId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) ResourceName() *string { + var returns *string + _jsii_.Get( + j, + "resourceName", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) StaticCredentialDetails() VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference { + var returns VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference + _jsii_.Get( + j, + "staticCredentialDetails", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) StaticCredentialDetailsInput() interface{} { + var returns interface{} + _jsii_.Get( + j, + "staticCredentialDetailsInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata { + var returns *cdktf.TerraformProviderGeneratorMetadata + _jsii_.Get( + j, + "terraformGeneratorMetadata", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) TerraformMetaArguments() *map[string]interface{} { + var returns *map[string]interface{} + _jsii_.Get( + j, + "terraformMetaArguments", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) TerraformResourceType() *string { + var returns *string + _jsii_.Get( + j, + "terraformResourceType", + &returns, + ) + return returns +} + + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent hcp_vault_secrets_integration_confluent} Resource. +func NewVaultSecretsIntegrationConfluent(scope constructs.Construct, id *string, config *VaultSecretsIntegrationConfluentConfig) VaultSecretsIntegrationConfluent { + _init_.Initialize() + + if err := validateNewVaultSecretsIntegrationConfluentParameters(scope, id, config); err != nil { + panic(err) + } + j := jsiiProxy_VaultSecretsIntegrationConfluent{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + []interface{}{scope, id, config}, + &j, + ) + + return &j +} + +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent hcp_vault_secrets_integration_confluent} Resource. +func NewVaultSecretsIntegrationConfluent_Override(v VaultSecretsIntegrationConfluent, scope constructs.Construct, id *string, config *VaultSecretsIntegrationConfluentConfig) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + []interface{}{scope, id, config}, + v, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetCapabilities(val *[]*string) { + if err := j.validateSetCapabilitiesParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "capabilities", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetConnection(val interface{}) { + if err := j.validateSetConnectionParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "connection", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetCount(val interface{}) { + if err := j.validateSetCountParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "count", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetDependsOn(val *[]*string) { + _jsii_.Set( + j, + "dependsOn", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetForEach(val cdktf.ITerraformIterator) { + _jsii_.Set( + j, + "forEach", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetLifecycle(val *cdktf.TerraformResourceLifecycle) { + if err := j.validateSetLifecycleParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "lifecycle", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetName(val *string) { + if err := j.validateSetNameParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "name", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetProjectId(val *string) { + if err := j.validateSetProjectIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "projectId", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetProvider(val cdktf.TerraformProvider) { + _jsii_.Set( + j, + "provider", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent)SetProvisioners(val *[]interface{}) { + if err := j.validateSetProvisionersParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "provisioners", + val, + ) +} + +// Generates CDKTF code for importing a VaultSecretsIntegrationConfluent resource upon running "cdktf plan ". +func VaultSecretsIntegrationConfluent_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource { + _init_.Initialize() + + if err := validateVaultSecretsIntegrationConfluent_GenerateConfigForImportParameters(scope, importToId, importFromId); err != nil { + panic(err) + } + var returns cdktf.ImportableResource + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + "generateConfigForImport", + []interface{}{scope, importToId, importFromId, provider}, + &returns, + ) + + return returns +} + +// Checks if `x` is a construct. +// +// Use this method instead of `instanceof` to properly detect `Construct` +// instances, even when the construct library is symlinked. +// +// Explanation: in JavaScript, multiple copies of the `constructs` library on +// disk are seen as independent, completely different libraries. As a +// consequence, the class `Construct` in each copy of the `constructs` library +// is seen as a different class, and an instance of one class will not test as +// `instanceof` the other class. `npm install` will not create installations +// like this, but users may manually symlink construct libraries together or +// use a monorepo tool: in those cases, multiple copies of the `constructs` +// library can be accidentally installed, and `instanceof` will behave +// unpredictably. It is safest to avoid using `instanceof`, and using +// this type-testing method instead. +// +// Returns: true if `x` is an object created from a class which extends `Construct`. +func VaultSecretsIntegrationConfluent_IsConstruct(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultSecretsIntegrationConfluent_IsConstructParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + "isConstruct", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultSecretsIntegrationConfluent_IsTerraformElement(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultSecretsIntegrationConfluent_IsTerraformElementParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + "isTerraformElement", + []interface{}{x}, + &returns, + ) + + return returns +} + +// Experimental. +func VaultSecretsIntegrationConfluent_IsTerraformResource(x interface{}) *bool { + _init_.Initialize() + + if err := validateVaultSecretsIntegrationConfluent_IsTerraformResourceParameters(x); err != nil { + panic(err) + } + var returns *bool + + _jsii_.StaticInvoke( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + "isTerraformResource", + []interface{}{x}, + &returns, + ) + + return returns +} + +func VaultSecretsIntegrationConfluent_TfResourceType() *string { + _init_.Initialize() + var returns *string + _jsii_.StaticGet( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + "tfResourceType", + &returns, + ) + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) AddMoveTarget(moveTarget *string) { + if err := v.validateAddMoveTargetParameters(moveTarget); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addMoveTarget", + []interface{}{moveTarget}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) AddOverride(path *string, value interface{}) { + if err := v.validateAddOverrideParameters(path, value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "addOverride", + []interface{}{path, value}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) HasResourceMove() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "hasResourceMove", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ImportFrom(id *string, provider cdktf.TerraformProvider) { + if err := v.validateImportFromParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "importFrom", + []interface{}{id, provider}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) MoveFromId(id *string) { + if err := v.validateMoveFromIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveFromId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) MoveTo(moveTarget *string, index interface{}) { + if err := v.validateMoveToParameters(moveTarget, index); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveTo", + []interface{}{moveTarget, index}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) MoveToId(id *string) { + if err := v.validateMoveToIdParameters(id); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "moveToId", + []interface{}{id}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) OverrideLogicalId(newLogicalId *string) { + if err := v.validateOverrideLogicalIdParameters(newLogicalId); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "overrideLogicalId", + []interface{}{newLogicalId}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) PutStaticCredentialDetails(value *VaultSecretsIntegrationConfluentStaticCredentialDetails) { + if err := v.validatePutStaticCredentialDetailsParameters(value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "putStaticCredentialDetails", + []interface{}{value}, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ResetOverrideLogicalId() { + _jsii_.InvokeVoid( + v, + "resetOverrideLogicalId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ResetProjectId() { + _jsii_.InvokeVoid( + v, + "resetProjectId", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ResetStaticCredentialDetails() { + _jsii_.InvokeVoid( + v, + "resetStaticCredentialDetails", + nil, // no parameters + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) SynthesizeAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) SynthesizeHclAttributes() *map[string]interface{} { + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "synthesizeHclAttributes", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ToHclTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toHclTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ToMetadata() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toMetadata", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) ToTerraform() interface{} { + var returns interface{} + + _jsii_.Invoke( + v, + "toTerraform", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentConfig.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentConfig.go new file mode 100644 index 00000000..c6295b6c --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentConfig.go @@ -0,0 +1,42 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultsecretsintegrationconfluent + +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultSecretsIntegrationConfluentConfig struct { + // Experimental. + Connection interface{} `field:"optional" json:"connection" yaml:"connection"` + // Experimental. + Count interface{} `field:"optional" json:"count" yaml:"count"` + // Experimental. + DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` + // Experimental. + ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` + // Experimental. + Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` + // Experimental. + Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` + // Experimental. + Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` + // Capabilities enabled for the integration. See the Vault Secrets documentation for the list of supported capabilities per provider. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent#capabilities VaultSecretsIntegrationConfluent#capabilities} + Capabilities *[]*string `field:"required" json:"capabilities" yaml:"capabilities"` + // The Vault Secrets integration name. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent#name VaultSecretsIntegrationConfluent#name} + Name *string `field:"required" json:"name" yaml:"name"` + // HCP project ID that owns the HCP Vault Secrets integration. Inferred from the provider configuration if omitted. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent#project_id VaultSecretsIntegrationConfluent#project_id} + ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` + // Confluent API key used to authenticate for cloud apis. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent#static_credential_details VaultSecretsIntegrationConfluent#static_credential_details} + StaticCredentialDetails *VaultSecretsIntegrationConfluentStaticCredentialDetails `field:"optional" json:"staticCredentialDetails" yaml:"staticCredentialDetails"` +} + diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetails.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetails.go new file mode 100644 index 00000000..91486a80 --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetails.go @@ -0,0 +1,17 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultsecretsintegrationconfluent + + +type VaultSecretsIntegrationConfluentStaticCredentialDetails struct { + // Public key used alongside the private key to authenticate for cloud apis. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent#cloud_api_key_id VaultSecretsIntegrationConfluent#cloud_api_key_id} + CloudApiKeyId *string `field:"required" json:"cloudApiKeyId" yaml:"cloudApiKeyId"` + // Private key used alongside the public key to authenticate for cloud apis. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_confluent#cloud_api_secret VaultSecretsIntegrationConfluent#cloud_api_secret} + CloudApiSecret *string `field:"required" json:"cloudApiSecret" yaml:"cloudApiSecret"` +} + diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference.go new file mode 100644 index 00000000..cda579bf --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference.go @@ -0,0 +1,517 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultsecretsintegrationconfluent + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultsecretsintegrationconfluent/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference interface { + cdktf.ComplexObject + CloudApiKeyId() *string + SetCloudApiKeyId(val *string) + CloudApiKeyIdInput() *string + CloudApiSecret() *string + SetCloudApiSecret(val *string) + CloudApiSecretInput() *string + // the index of the complex object in a list. + // Experimental. + ComplexObjectIndex() interface{} + // Experimental. + SetComplexObjectIndex(val interface{}) + // set to true if this item is from inside a set and needs tolist() for accessing it set to "0" for single list items. + // Experimental. + ComplexObjectIsFromSet() *bool + // Experimental. + SetComplexObjectIsFromSet(val *bool) + // The creation stack of this resolvable which will be appended to errors thrown during resolution. + // + // If this returns an empty array the stack will not be attached. + // Experimental. + CreationStack() *[]*string + // Experimental. + Fqn() *string + InternalValue() interface{} + SetInternalValue(val interface{}) + // Experimental. + TerraformAttribute() *string + // Experimental. + SetTerraformAttribute(val *string) + // Experimental. + TerraformResource() cdktf.IInterpolatingParent + // Experimental. + SetTerraformResource(val cdktf.IInterpolatingParent) + // Experimental. + ComputeFqn() *string + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + InterpolationAsList() cdktf.IResolvable + // Experimental. + InterpolationForAttribute(property *string) cdktf.IResolvable + // Produce the Token's value at resolution time. + // Experimental. + Resolve(_context cdktf.IResolveContext) interface{} + // Return a string representation of this resolvable object. + // + // Returns a reversible string representation. + // Experimental. + ToString() *string +} + +// The jsii proxy struct for VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference +type jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference struct { + internal.Type__cdktfComplexObject +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) CloudApiKeyId() *string { + var returns *string + _jsii_.Get( + j, + "cloudApiKeyId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) CloudApiKeyIdInput() *string { + var returns *string + _jsii_.Get( + j, + "cloudApiKeyIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) CloudApiSecret() *string { + var returns *string + _jsii_.Get( + j, + "cloudApiSecret", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) CloudApiSecretInput() *string { + var returns *string + _jsii_.Get( + j, + "cloudApiSecretInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) ComplexObjectIndex() interface{} { + var returns interface{} + _jsii_.Get( + j, + "complexObjectIndex", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) ComplexObjectIsFromSet() *bool { + var returns *bool + _jsii_.Get( + j, + "complexObjectIsFromSet", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) CreationStack() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "creationStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) InternalValue() interface{} { + var returns interface{} + _jsii_.Get( + j, + "internalValue", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) TerraformAttribute() *string { + var returns *string + _jsii_.Get( + j, + "terraformAttribute", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) TerraformResource() cdktf.IInterpolatingParent { + var returns cdktf.IInterpolatingParent + _jsii_.Get( + j, + "terraformResource", + &returns, + ) + return returns +} + + +func NewVaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference { + _init_.Initialize() + + if err := validateNewVaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReferenceParameters(terraformResource, terraformAttribute); err != nil { + panic(err) + } + j := jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference", + []interface{}{terraformResource, terraformAttribute}, + &j, + ) + + return &j +} + +func NewVaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference_Override(v VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference, terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference", + []interface{}{terraformResource, terraformAttribute}, + v, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)SetCloudApiKeyId(val *string) { + if err := j.validateSetCloudApiKeyIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "cloudApiKeyId", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)SetCloudApiSecret(val *string) { + if err := j.validateSetCloudApiSecretParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "cloudApiSecret", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)SetComplexObjectIndex(val interface{}) { + if err := j.validateSetComplexObjectIndexParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "complexObjectIndex", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)SetComplexObjectIsFromSet(val *bool) { + if err := j.validateSetComplexObjectIsFromSetParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "complexObjectIsFromSet", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)SetInternalValue(val interface{}) { + if err := j.validateSetInternalValueParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "internalValue", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)SetTerraformAttribute(val *string) { + if err := j.validateSetTerraformAttributeParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "terraformAttribute", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)SetTerraformResource(val cdktf.IInterpolatingParent) { + if err := j.validateSetTerraformResourceParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "terraformResource", + val, + ) +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) ComputeFqn() *string { + var returns *string + + _jsii_.Invoke( + v, + "computeFqn", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) InterpolationAsList() cdktf.IResolvable { + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationAsList", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) InterpolationForAttribute(property *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(property); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{property}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) Resolve(_context cdktf.IResolveContext) interface{} { + if err := v.validateResolveParameters(_context); err != nil { + panic(err) + } + var returns interface{} + + _jsii_.Invoke( + v, + "resolve", + []interface{}{_context}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference__checks.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference__checks.go new file mode 100644 index 00000000..b3f41e29 --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference__checks.go @@ -0,0 +1,236 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultsecretsintegrationconfluent + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateInterpolationForAttributeParameters(property *string) error { + if property == nil { + return fmt.Errorf("parameter property is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateResolveParameters(_context cdktf.IResolveContext) error { + if _context == nil { + return fmt.Errorf("parameter _context is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetCloudApiKeyIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetCloudApiSecretParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetComplexObjectIndexParameters(val interface{}) error { + switch val.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter val must be one of the allowed types: *string, *float64; received %#v (a %T)", val, val) + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetComplexObjectIsFromSetParameters(val *bool) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetInternalValueParameters(val interface{}) error { + switch val.(type) { + case cdktf.IResolvable: + // ok + case *VaultSecretsIntegrationConfluentStaticCredentialDetails: + val := val.(*VaultSecretsIntegrationConfluentStaticCredentialDetails) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case VaultSecretsIntegrationConfluentStaticCredentialDetails: + val_ := val.(VaultSecretsIntegrationConfluentStaticCredentialDetails) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: cdktf.IResolvable, *VaultSecretsIntegrationConfluentStaticCredentialDetails; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetTerraformAttributeParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetTerraformResourceParameters(val cdktf.IInterpolatingParent) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func validateNewVaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReferenceParameters(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) error { + if terraformResource == nil { + return fmt.Errorf("parameter terraformResource is required, but nil was provided") + } + + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference__no_checks.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference__no_checks.go new file mode 100644 index 00000000..b82386a5 --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference__no_checks.go @@ -0,0 +1,85 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultsecretsintegrationconfluent + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateInterpolationForAttributeParameters(property *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateResolveParameters(_context cdktf.IResolveContext) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetCloudApiKeyIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetCloudApiSecretParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetComplexObjectIndexParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetComplexObjectIsFromSetParameters(val *bool) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetInternalValueParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetTerraformAttributeParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference) validateSetTerraformResourceParameters(val cdktf.IInterpolatingParent) error { + return nil +} + +func validateNewVaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReferenceParameters(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) error { + return nil +} + diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent__checks.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent__checks.go new file mode 100644 index 00000000..0b9d888a --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent__checks.go @@ -0,0 +1,447 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultsecretsintegrationconfluent + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/aws/constructs-go/constructs/v10" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateAddMoveTargetParameters(moveTarget *string) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateAddOverrideParameters(path *string, value interface{}) error { + if path == nil { + return fmt.Errorf("parameter path is required, but nil was provided") + } + + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateImportFromParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateMoveFromIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateMoveToParameters(moveTarget *string, index interface{}) error { + if moveTarget == nil { + return fmt.Errorf("parameter moveTarget is required, but nil was provided") + } + + switch index.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter index must be one of the allowed types: *string, *float64; received %#v (a %T)", index, index) + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateMoveToIdParameters(id *string) error { + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateOverrideLogicalIdParameters(newLogicalId *string) error { + if newLogicalId == nil { + return fmt.Errorf("parameter newLogicalId is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validatePutStaticCredentialDetailsParameters(value *VaultSecretsIntegrationConfluentStaticCredentialDetails) error { + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(value, func() string { return "parameter value" }); err != nil { + return err + } + + return nil +} + +func validateVaultSecretsIntegrationConfluent_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if importToId == nil { + return fmt.Errorf("parameter importToId is required, but nil was provided") + } + + if importFromId == nil { + return fmt.Errorf("parameter importFromId is required, but nil was provided") + } + + return nil +} + +func validateVaultSecretsIntegrationConfluent_IsConstructParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultSecretsIntegrationConfluent_IsTerraformElementParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func validateVaultSecretsIntegrationConfluent_IsTerraformResourceParameters(x interface{}) error { + if x == nil { + return fmt.Errorf("parameter x is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetCapabilitiesParameters(val *[]*string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetConnectionParameters(val interface{}) error { + switch val.(type) { + case *cdktf.SSHProvisionerConnection: + val := val.(*cdktf.SSHProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.SSHProvisionerConnection: + val_ := val.(cdktf.SSHProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case *cdktf.WinrmProvisionerConnection: + val := val.(*cdktf.WinrmProvisionerConnection) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case cdktf.WinrmProvisionerConnection: + val_ := val.(cdktf.WinrmProvisionerConnection) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *cdktf.SSHProvisionerConnection, *cdktf.WinrmProvisionerConnection; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetCountParameters(val interface{}) error { + switch val.(type) { + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + case cdktf.TerraformCount: + // ok + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: *float64, cdktf.TerraformCount; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetNameParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetProjectIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetProvisionersParameters(val *[]interface{}) error { + for idx_97dfc6, v := range *val { + switch v.(type) { + case *cdktf.FileProvisioner: + v := v.(*cdktf.FileProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.FileProvisioner: + v_ := v.(cdktf.FileProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.LocalExecProvisioner: + v := v.(*cdktf.LocalExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.LocalExecProvisioner: + v_ := v.(cdktf.LocalExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case *cdktf.RemoteExecProvisioner: + v := v.(*cdktf.RemoteExecProvisioner) + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + case cdktf.RemoteExecProvisioner: + v_ := v.(cdktf.RemoteExecProvisioner) + v := &v_ + if err := _jsii_.ValidateStruct(v, func() string { return fmt.Sprintf("parameter val[%#v]", idx_97dfc6) }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(v) { + return fmt.Errorf("parameter val[%#v] must be one of the allowed types: *cdktf.FileProvisioner, *cdktf.LocalExecProvisioner, *cdktf.RemoteExecProvisioner; received %#v (a %T)", idx_97dfc6, v, v) + } + } + } + + return nil +} + +func validateNewVaultSecretsIntegrationConfluentParameters(scope constructs.Construct, id *string, config *VaultSecretsIntegrationConfluentConfig) error { + if scope == nil { + return fmt.Errorf("parameter scope is required, but nil was provided") + } + + if id == nil { + return fmt.Errorf("parameter id is required, but nil was provided") + } + + if config == nil { + return fmt.Errorf("parameter config is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(config, func() string { return "parameter config" }); err != nil { + return err + } + + return nil +} + diff --git a/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent__no_checks.go b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent__no_checks.go new file mode 100644 index 00000000..a8e61433 --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/VaultSecretsIntegrationConfluent__no_checks.go @@ -0,0 +1,129 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultsecretsintegrationconfluent + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateAddMoveTargetParameters(moveTarget *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateAddOverrideParameters(path *string, value interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateImportFromParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateInterpolationForAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateMoveFromIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateMoveToParameters(moveTarget *string, index interface{}) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateMoveToIdParameters(id *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validateOverrideLogicalIdParameters(newLogicalId *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsIntegrationConfluent) validatePutStaticCredentialDetailsParameters(value *VaultSecretsIntegrationConfluentStaticCredentialDetails) error { + return nil +} + +func validateVaultSecretsIntegrationConfluent_GenerateConfigForImportParameters(scope constructs.Construct, importToId *string, importFromId *string) error { + return nil +} + +func validateVaultSecretsIntegrationConfluent_IsConstructParameters(x interface{}) error { + return nil +} + +func validateVaultSecretsIntegrationConfluent_IsTerraformElementParameters(x interface{}) error { + return nil +} + +func validateVaultSecretsIntegrationConfluent_IsTerraformResourceParameters(x interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetCapabilitiesParameters(val *[]*string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetConnectionParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetCountParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetLifecycleParameters(val *cdktf.TerraformResourceLifecycle) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetNameParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetProjectIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsIntegrationConfluent) validateSetProvisionersParameters(val *[]interface{}) error { + return nil +} + +func validateNewVaultSecretsIntegrationConfluentParameters(scope constructs.Construct, id *string, config *VaultSecretsIntegrationConfluentConfig) error { + return nil +} + diff --git a/hcp/vaultsecretsintegrationconfluent/internal/types.go b/hcp/vaultsecretsintegrationconfluent/internal/types.go new file mode 100644 index 00000000..9c4a2937 --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/internal/types.go @@ -0,0 +1,9 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package internal +import ( + "github.com/hashicorp/terraform-cdk-go/cdktf" +) +type Type__cdktfTerraformResource = cdktf.TerraformResource +type Type__cdktfComplexObject = cdktf.ComplexObject diff --git a/hcp/vaultsecretsintegrationconfluent/main.go b/hcp/vaultsecretsintegrationconfluent/main.go new file mode 100644 index 00000000..390fac82 --- /dev/null +++ b/hcp/vaultsecretsintegrationconfluent/main.go @@ -0,0 +1,123 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultsecretsintegrationconfluent + +import ( + "reflect" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" +) + +func init() { + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluent", + reflect.TypeOf((*VaultSecretsIntegrationConfluent)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberMethod{JsiiMethod: "addMoveTarget", GoMethod: "AddMoveTarget"}, + _jsii_.MemberMethod{JsiiMethod: "addOverride", GoMethod: "AddOverride"}, + _jsii_.MemberProperty{JsiiProperty: "capabilities", GoGetter: "Capabilities"}, + _jsii_.MemberProperty{JsiiProperty: "capabilitiesInput", GoGetter: "CapabilitiesInput"}, + _jsii_.MemberProperty{JsiiProperty: "cdktfStack", GoGetter: "CdktfStack"}, + _jsii_.MemberProperty{JsiiProperty: "connection", GoGetter: "Connection"}, + _jsii_.MemberProperty{JsiiProperty: "constructNodeMetadata", GoGetter: "ConstructNodeMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "count", GoGetter: "Count"}, + _jsii_.MemberProperty{JsiiProperty: "dependsOn", GoGetter: "DependsOn"}, + _jsii_.MemberProperty{JsiiProperty: "forEach", GoGetter: "ForEach"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberProperty{JsiiProperty: "friendlyUniqueId", GoGetter: "FriendlyUniqueId"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "hasResourceMove", GoMethod: "HasResourceMove"}, + _jsii_.MemberMethod{JsiiMethod: "importFrom", GoMethod: "ImportFrom"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "lifecycle", GoGetter: "Lifecycle"}, + _jsii_.MemberMethod{JsiiMethod: "moveFromId", GoMethod: "MoveFromId"}, + _jsii_.MemberMethod{JsiiMethod: "moveTo", GoMethod: "MoveTo"}, + _jsii_.MemberMethod{JsiiMethod: "moveToId", GoMethod: "MoveToId"}, + _jsii_.MemberProperty{JsiiProperty: "name", GoGetter: "Name"}, + _jsii_.MemberProperty{JsiiProperty: "nameInput", GoGetter: "NameInput"}, + _jsii_.MemberProperty{JsiiProperty: "node", GoGetter: "Node"}, + _jsii_.MemberProperty{JsiiProperty: "organizationId", GoGetter: "OrganizationId"}, + _jsii_.MemberMethod{JsiiMethod: "overrideLogicalId", GoMethod: "OverrideLogicalId"}, + _jsii_.MemberProperty{JsiiProperty: "projectId", GoGetter: "ProjectId"}, + _jsii_.MemberProperty{JsiiProperty: "projectIdInput", GoGetter: "ProjectIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "provider", GoGetter: "Provider"}, + _jsii_.MemberProperty{JsiiProperty: "provisioners", GoGetter: "Provisioners"}, + _jsii_.MemberMethod{JsiiMethod: "putStaticCredentialDetails", GoMethod: "PutStaticCredentialDetails"}, + _jsii_.MemberProperty{JsiiProperty: "rawOverrides", GoGetter: "RawOverrides"}, + _jsii_.MemberMethod{JsiiMethod: "resetOverrideLogicalId", GoMethod: "ResetOverrideLogicalId"}, + _jsii_.MemberMethod{JsiiMethod: "resetProjectId", GoMethod: "ResetProjectId"}, + _jsii_.MemberMethod{JsiiMethod: "resetStaticCredentialDetails", GoMethod: "ResetStaticCredentialDetails"}, + _jsii_.MemberProperty{JsiiProperty: "resourceId", GoGetter: "ResourceId"}, + _jsii_.MemberProperty{JsiiProperty: "resourceName", GoGetter: "ResourceName"}, + _jsii_.MemberProperty{JsiiProperty: "staticCredentialDetails", GoGetter: "StaticCredentialDetails"}, + _jsii_.MemberProperty{JsiiProperty: "staticCredentialDetailsInput", GoGetter: "StaticCredentialDetailsInput"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeAttributes", GoMethod: "SynthesizeAttributes"}, + _jsii_.MemberMethod{JsiiMethod: "synthesizeHclAttributes", GoMethod: "SynthesizeHclAttributes"}, + _jsii_.MemberProperty{JsiiProperty: "terraformGeneratorMetadata", GoGetter: "TerraformGeneratorMetadata"}, + _jsii_.MemberProperty{JsiiProperty: "terraformMetaArguments", GoGetter: "TerraformMetaArguments"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResourceType", GoGetter: "TerraformResourceType"}, + _jsii_.MemberMethod{JsiiMethod: "toHclTerraform", GoMethod: "ToHclTerraform"}, + _jsii_.MemberMethod{JsiiMethod: "toMetadata", GoMethod: "ToMetadata"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + _jsii_.MemberMethod{JsiiMethod: "toTerraform", GoMethod: "ToTerraform"}, + }, + func() interface{} { + j := jsiiProxy_VaultSecretsIntegrationConfluent{} + _jsii_.InitJsiiProxy(&j.Type__cdktfTerraformResource) + return &j + }, + ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluentConfig", + reflect.TypeOf((*VaultSecretsIntegrationConfluentConfig)(nil)).Elem(), + ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluentStaticCredentialDetails", + reflect.TypeOf((*VaultSecretsIntegrationConfluentStaticCredentialDetails)(nil)).Elem(), + ) + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultSecretsIntegrationConfluent.VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference", + reflect.TypeOf((*VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberProperty{JsiiProperty: "cloudApiKeyId", GoGetter: "CloudApiKeyId"}, + _jsii_.MemberProperty{JsiiProperty: "cloudApiKeyIdInput", GoGetter: "CloudApiKeyIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "cloudApiSecret", GoGetter: "CloudApiSecret"}, + _jsii_.MemberProperty{JsiiProperty: "cloudApiSecretInput", GoGetter: "CloudApiSecretInput"}, + _jsii_.MemberProperty{JsiiProperty: "complexObjectIndex", GoGetter: "ComplexObjectIndex"}, + _jsii_.MemberProperty{JsiiProperty: "complexObjectIsFromSet", GoGetter: "ComplexObjectIsFromSet"}, + _jsii_.MemberMethod{JsiiMethod: "computeFqn", GoMethod: "ComputeFqn"}, + _jsii_.MemberProperty{JsiiProperty: "creationStack", GoGetter: "CreationStack"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "internalValue", GoGetter: "InternalValue"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationAsList", GoMethod: "InterpolationAsList"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "resolve", GoMethod: "Resolve"}, + _jsii_.MemberProperty{JsiiProperty: "terraformAttribute", GoGetter: "TerraformAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResource", GoGetter: "TerraformResource"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + }, + func() interface{} { + j := jsiiProxy_VaultSecretsIntegrationConfluentStaticCredentialDetailsOutputReference{} + _jsii_.InitJsiiProxy(&j.Type__cdktfComplexObject) + return &j + }, + ) +} diff --git a/hcp/vaultsecretsintegrationgcp/README.md b/hcp/vaultsecretsintegrationgcp/README.md index 6b460c89..2f094645 100644 --- a/hcp/vaultsecretsintegrationgcp/README.md +++ b/hcp/vaultsecretsintegrationgcp/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_integration_gcp` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_gcp`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_gcp`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp). diff --git a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcp.go b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcp.go index f4d17f64..e3b628b0 100644 --- a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcp.go +++ b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcp.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp hcp_vault_secrets_integration_gcp}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp hcp_vault_secrets_integration_gcp}. type VaultSecretsIntegrationGcp interface { cdktf.TerraformResource Capabilities() *[]*string @@ -437,7 +437,7 @@ func (j *jsiiProxy_VaultSecretsIntegrationGcp) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp hcp_vault_secrets_integration_gcp} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp hcp_vault_secrets_integration_gcp} Resource. func NewVaultSecretsIntegrationGcp(scope constructs.Construct, id *string, config *VaultSecretsIntegrationGcpConfig) VaultSecretsIntegrationGcp { _init_.Initialize() @@ -455,7 +455,7 @@ func NewVaultSecretsIntegrationGcp(scope constructs.Construct, id *string, confi return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp hcp_vault_secrets_integration_gcp} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp hcp_vault_secrets_integration_gcp} Resource. func NewVaultSecretsIntegrationGcp_Override(v VaultSecretsIntegrationGcp, scope constructs.Construct, id *string, config *VaultSecretsIntegrationGcpConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpConfig.go b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpConfig.go index 732afe87..41c1e078 100644 --- a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpConfig.go +++ b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpConfig.go @@ -24,23 +24,23 @@ type VaultSecretsIntegrationGcpConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Capabilities enabled for the integration. See the Vault Secrets documentation for the list of supported capabilities per provider. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#capabilities VaultSecretsIntegrationGcp#capabilities} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#capabilities VaultSecretsIntegrationGcp#capabilities} Capabilities *[]*string `field:"required" json:"capabilities" yaml:"capabilities"` // The Vault Secrets integration name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#name VaultSecretsIntegrationGcp#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#name VaultSecretsIntegrationGcp#name} Name *string `field:"required" json:"name" yaml:"name"` // (Recommended) Federated identity configuration to authenticate against the target GCP project. Cannot be used with `service_account_key`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#federated_workload_identity VaultSecretsIntegrationGcp#federated_workload_identity} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#federated_workload_identity VaultSecretsIntegrationGcp#federated_workload_identity} FederatedWorkloadIdentity *VaultSecretsIntegrationGcpFederatedWorkloadIdentity `field:"optional" json:"federatedWorkloadIdentity" yaml:"federatedWorkloadIdentity"` // HCP project ID that owns the HCP Vault Secrets integration. Inferred from the provider configuration if omitted. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#project_id VaultSecretsIntegrationGcp#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#project_id VaultSecretsIntegrationGcp#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // GCP service account key used to authenticate against the target GCP project. Cannot be used with `federated_workload_identity`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#service_account_key VaultSecretsIntegrationGcp#service_account_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#service_account_key VaultSecretsIntegrationGcp#service_account_key} ServiceAccountKey *VaultSecretsIntegrationGcpServiceAccountKey `field:"optional" json:"serviceAccountKey" yaml:"serviceAccountKey"` } diff --git a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpFederatedWorkloadIdentity.go b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpFederatedWorkloadIdentity.go index 14094310..cd9ee120 100644 --- a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpFederatedWorkloadIdentity.go +++ b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpFederatedWorkloadIdentity.go @@ -7,11 +7,11 @@ package vaultsecretsintegrationgcp type VaultSecretsIntegrationGcpFederatedWorkloadIdentity struct { // Audience configured on the GCP identity provider to federate access with HCP. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#audience VaultSecretsIntegrationGcp#audience} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#audience VaultSecretsIntegrationGcp#audience} Audience *string `field:"required" json:"audience" yaml:"audience"` // GCP service account email that HVS will impersonate to carry operations for the appropriate capabilities. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#service_account_email VaultSecretsIntegrationGcp#service_account_email} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#service_account_email VaultSecretsIntegrationGcp#service_account_email} ServiceAccountEmail *string `field:"required" json:"serviceAccountEmail" yaml:"serviceAccountEmail"` } diff --git a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpServiceAccountKey.go b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpServiceAccountKey.go index e8566545..5d4dc76d 100644 --- a/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpServiceAccountKey.go +++ b/hcp/vaultsecretsintegrationgcp/VaultSecretsIntegrationGcpServiceAccountKey.go @@ -7,7 +7,7 @@ package vaultsecretsintegrationgcp type VaultSecretsIntegrationGcpServiceAccountKey struct { // JSON or base64 encoded service account key received from GCP. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_gcp#credentials VaultSecretsIntegrationGcp#credentials} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_gcp#credentials VaultSecretsIntegrationGcp#credentials} Credentials *string `field:"required" json:"credentials" yaml:"credentials"` } diff --git a/hcp/vaultsecretsintegrationmongodbatlas/README.md b/hcp/vaultsecretsintegrationmongodbatlas/README.md index c1516d1e..c86c0358 100644 --- a/hcp/vaultsecretsintegrationmongodbatlas/README.md +++ b/hcp/vaultsecretsintegrationmongodbatlas/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_integration_mongodbatlas` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_mongodbatlas`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_mongodbatlas`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas). diff --git a/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlas.go b/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlas.go index 5148e3b8..9a099ad7 100644 --- a/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlas.go +++ b/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlas.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas hcp_vault_secrets_integration_mongodbatlas}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas hcp_vault_secrets_integration_mongodbatlas}. type VaultSecretsIntegrationMongodbatlas interface { cdktf.TerraformResource Capabilities() *[]*string @@ -413,7 +413,7 @@ func (j *jsiiProxy_VaultSecretsIntegrationMongodbatlas) TerraformResourceType() } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas hcp_vault_secrets_integration_mongodbatlas} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas hcp_vault_secrets_integration_mongodbatlas} Resource. func NewVaultSecretsIntegrationMongodbatlas(scope constructs.Construct, id *string, config *VaultSecretsIntegrationMongodbatlasConfig) VaultSecretsIntegrationMongodbatlas { _init_.Initialize() @@ -431,7 +431,7 @@ func NewVaultSecretsIntegrationMongodbatlas(scope constructs.Construct, id *stri return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas hcp_vault_secrets_integration_mongodbatlas} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas hcp_vault_secrets_integration_mongodbatlas} Resource. func NewVaultSecretsIntegrationMongodbatlas_Override(v VaultSecretsIntegrationMongodbatlas, scope constructs.Construct, id *string, config *VaultSecretsIntegrationMongodbatlasConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasConfig.go b/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasConfig.go index 49f234ea..915b18a6 100644 --- a/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasConfig.go +++ b/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasConfig.go @@ -24,19 +24,19 @@ type VaultSecretsIntegrationMongodbatlasConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Capabilities enabled for the integration. See the Vault Secrets documentation for the list of supported capabilities per provider. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas#capabilities VaultSecretsIntegrationMongodbatlas#capabilities} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas#capabilities VaultSecretsIntegrationMongodbatlas#capabilities} Capabilities *[]*string `field:"required" json:"capabilities" yaml:"capabilities"` // The Vault Secrets integration name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas#name VaultSecretsIntegrationMongodbatlas#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas#name VaultSecretsIntegrationMongodbatlas#name} Name *string `field:"required" json:"name" yaml:"name"` // HCP project ID that owns the HCP Vault Secrets integration. Inferred from the provider configuration if omitted. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas#project_id VaultSecretsIntegrationMongodbatlas#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas#project_id VaultSecretsIntegrationMongodbatlas#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // MongoDB Atlas API key used to authenticate against the target project. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas#static_credential_details VaultSecretsIntegrationMongodbatlas#static_credential_details} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas#static_credential_details VaultSecretsIntegrationMongodbatlas#static_credential_details} StaticCredentialDetails *VaultSecretsIntegrationMongodbatlasStaticCredentialDetails `field:"optional" json:"staticCredentialDetails" yaml:"staticCredentialDetails"` } diff --git a/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasStaticCredentialDetails.go b/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasStaticCredentialDetails.go index ba9c0c66..0629109f 100644 --- a/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasStaticCredentialDetails.go +++ b/hcp/vaultsecretsintegrationmongodbatlas/VaultSecretsIntegrationMongodbatlasStaticCredentialDetails.go @@ -7,11 +7,11 @@ package vaultsecretsintegrationmongodbatlas type VaultSecretsIntegrationMongodbatlasStaticCredentialDetails struct { // Private key used alongside the public key to authenticate against the target project. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas#api_private_key VaultSecretsIntegrationMongodbatlas#api_private_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas#api_private_key VaultSecretsIntegrationMongodbatlas#api_private_key} ApiPrivateKey *string `field:"required" json:"apiPrivateKey" yaml:"apiPrivateKey"` // Public key used alongside the private key to authenticate against the target project. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_mongodbatlas#api_public_key VaultSecretsIntegrationMongodbatlas#api_public_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_mongodbatlas#api_public_key VaultSecretsIntegrationMongodbatlas#api_public_key} ApiPublicKey *string `field:"required" json:"apiPublicKey" yaml:"apiPublicKey"` } diff --git a/hcp/vaultsecretsintegrationtwilio/README.md b/hcp/vaultsecretsintegrationtwilio/README.md index ae97a67b..71366e3a 100644 --- a/hcp/vaultsecretsintegrationtwilio/README.md +++ b/hcp/vaultsecretsintegrationtwilio/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_integration_twilio` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_twilio`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_integration_twilio`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio). diff --git a/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilio.go b/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilio.go index 5fddca9d..58de4819 100644 --- a/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilio.go +++ b/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilio.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio hcp_vault_secrets_integration_twilio}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio hcp_vault_secrets_integration_twilio}. type VaultSecretsIntegrationTwilio interface { cdktf.TerraformResource Capabilities() *[]*string @@ -413,7 +413,7 @@ func (j *jsiiProxy_VaultSecretsIntegrationTwilio) TerraformResourceType() *strin } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio hcp_vault_secrets_integration_twilio} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio hcp_vault_secrets_integration_twilio} Resource. func NewVaultSecretsIntegrationTwilio(scope constructs.Construct, id *string, config *VaultSecretsIntegrationTwilioConfig) VaultSecretsIntegrationTwilio { _init_.Initialize() @@ -431,7 +431,7 @@ func NewVaultSecretsIntegrationTwilio(scope constructs.Construct, id *string, co return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio hcp_vault_secrets_integration_twilio} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio hcp_vault_secrets_integration_twilio} Resource. func NewVaultSecretsIntegrationTwilio_Override(v VaultSecretsIntegrationTwilio, scope constructs.Construct, id *string, config *VaultSecretsIntegrationTwilioConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioConfig.go b/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioConfig.go index b4f80bf8..a268b038 100644 --- a/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioConfig.go +++ b/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioConfig.go @@ -24,19 +24,19 @@ type VaultSecretsIntegrationTwilioConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Capabilities enabled for the integration. See the Vault Secrets documentation for the list of supported capabilities per provider. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio#capabilities VaultSecretsIntegrationTwilio#capabilities} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio#capabilities VaultSecretsIntegrationTwilio#capabilities} Capabilities *[]*string `field:"required" json:"capabilities" yaml:"capabilities"` // The Vault Secrets integration name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio#name VaultSecretsIntegrationTwilio#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio#name VaultSecretsIntegrationTwilio#name} Name *string `field:"required" json:"name" yaml:"name"` // HCP project ID that owns the HCP Vault Secrets integration. Inferred from the provider configuration if omitted. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio#project_id VaultSecretsIntegrationTwilio#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio#project_id VaultSecretsIntegrationTwilio#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // Twilio API key parts used to authenticate against the target Twilio account. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio#static_credential_details VaultSecretsIntegrationTwilio#static_credential_details} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio#static_credential_details VaultSecretsIntegrationTwilio#static_credential_details} StaticCredentialDetails *VaultSecretsIntegrationTwilioStaticCredentialDetails `field:"optional" json:"staticCredentialDetails" yaml:"staticCredentialDetails"` } diff --git a/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioStaticCredentialDetails.go b/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioStaticCredentialDetails.go index 79975df2..f72983ae 100644 --- a/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioStaticCredentialDetails.go +++ b/hcp/vaultsecretsintegrationtwilio/VaultSecretsIntegrationTwilioStaticCredentialDetails.go @@ -7,15 +7,15 @@ package vaultsecretsintegrationtwilio type VaultSecretsIntegrationTwilioStaticCredentialDetails struct { // Account SID for the target Twilio account. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio#account_sid VaultSecretsIntegrationTwilio#account_sid} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio#account_sid VaultSecretsIntegrationTwilio#account_sid} AccountSid *string `field:"required" json:"accountSid" yaml:"accountSid"` // Api key secret used with the api key SID to authenticate against the target Twilio account. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio#api_key_secret VaultSecretsIntegrationTwilio#api_key_secret} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio#api_key_secret VaultSecretsIntegrationTwilio#api_key_secret} ApiKeySecret *string `field:"required" json:"apiKeySecret" yaml:"apiKeySecret"` // Api key SID to authenticate against the target Twilio account. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_integration_twilio#api_key_sid VaultSecretsIntegrationTwilio#api_key_sid} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_integration_twilio#api_key_sid VaultSecretsIntegrationTwilio#api_key_sid} ApiKeySid *string `field:"required" json:"apiKeySid" yaml:"apiKeySid"` } diff --git a/hcp/vaultsecretsrotatingsecret/README.md b/hcp/vaultsecretsrotatingsecret/README.md index e677b07f..dee126fb 100644 --- a/hcp/vaultsecretsrotatingsecret/README.md +++ b/hcp/vaultsecretsrotatingsecret/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_rotating_secret` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_rotating_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_rotating_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret). diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret.go index 73e912ee..5801dedf 100644 --- a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret.go +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret}. type VaultSecretsRotatingSecret interface { cdktf.TerraformResource AppName() *string @@ -22,6 +22,8 @@ type VaultSecretsRotatingSecret interface { AwsAccessKeysInput() interface{} // Experimental. CdktfStack() cdktf.TerraformStack + ConfluentServiceAccount() VaultSecretsRotatingSecretConfluentServiceAccountOutputReference + ConfluentServiceAccountInput() interface{} // Experimental. Connection() interface{} // Experimental. @@ -132,10 +134,12 @@ type VaultSecretsRotatingSecret interface { // Experimental. OverrideLogicalId(newLogicalId *string) PutAwsAccessKeys(value *VaultSecretsRotatingSecretAwsAccessKeys) + PutConfluentServiceAccount(value *VaultSecretsRotatingSecretConfluentServiceAccount) PutGcpServiceAccountKey(value *VaultSecretsRotatingSecretGcpServiceAccountKey) PutMongodbAtlasUser(value *VaultSecretsRotatingSecretMongodbAtlasUser) PutTwilioApiKey(value *VaultSecretsRotatingSecretTwilioApiKey) ResetAwsAccessKeys() + ResetConfluentServiceAccount() ResetGcpServiceAccountKey() ResetMongodbAtlasUser() // Resets a previously passed logical Id to use the auto-generated logical id again. @@ -211,6 +215,26 @@ func (j *jsiiProxy_VaultSecretsRotatingSecret) CdktfStack() cdktf.TerraformStack return returns } +func (j *jsiiProxy_VaultSecretsRotatingSecret) ConfluentServiceAccount() VaultSecretsRotatingSecretConfluentServiceAccountOutputReference { + var returns VaultSecretsRotatingSecretConfluentServiceAccountOutputReference + _jsii_.Get( + j, + "confluentServiceAccount", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecret) ConfluentServiceAccountInput() interface{} { + var returns interface{} + _jsii_.Get( + j, + "confluentServiceAccountInput", + &returns, + ) + return returns +} + func (j *jsiiProxy_VaultSecretsRotatingSecret) Connection() interface{} { var returns interface{} _jsii_.Get( @@ -532,7 +556,7 @@ func (j *jsiiProxy_VaultSecretsRotatingSecret) TwilioApiKeyInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Resource. func NewVaultSecretsRotatingSecret(scope constructs.Construct, id *string, config *VaultSecretsRotatingSecretConfig) VaultSecretsRotatingSecret { _init_.Initialize() @@ -550,7 +574,7 @@ func NewVaultSecretsRotatingSecret(scope constructs.Construct, id *string, confi return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret hcp_vault_secrets_rotating_secret} Resource. func NewVaultSecretsRotatingSecret_Override(v VaultSecretsRotatingSecret, scope constructs.Construct, id *string, config *VaultSecretsRotatingSecretConfig) { _init_.Initialize() @@ -1059,6 +1083,17 @@ func (v *jsiiProxy_VaultSecretsRotatingSecret) PutAwsAccessKeys(value *VaultSecr ) } +func (v *jsiiProxy_VaultSecretsRotatingSecret) PutConfluentServiceAccount(value *VaultSecretsRotatingSecretConfluentServiceAccount) { + if err := v.validatePutConfluentServiceAccountParameters(value); err != nil { + panic(err) + } + _jsii_.InvokeVoid( + v, + "putConfluentServiceAccount", + []interface{}{value}, + ) +} + func (v *jsiiProxy_VaultSecretsRotatingSecret) PutGcpServiceAccountKey(value *VaultSecretsRotatingSecretGcpServiceAccountKey) { if err := v.validatePutGcpServiceAccountKeyParameters(value); err != nil { panic(err) @@ -1100,6 +1135,14 @@ func (v *jsiiProxy_VaultSecretsRotatingSecret) ResetAwsAccessKeys() { ) } +func (v *jsiiProxy_VaultSecretsRotatingSecret) ResetConfluentServiceAccount() { + _jsii_.InvokeVoid( + v, + "resetConfluentServiceAccount", + nil, // no parameters + ) +} + func (v *jsiiProxy_VaultSecretsRotatingSecret) ResetGcpServiceAccountKey() { _jsii_.InvokeVoid( v, diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretAwsAccessKeys.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretAwsAccessKeys.go index 4154576f..310c4bc9 100644 --- a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretAwsAccessKeys.go +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretAwsAccessKeys.go @@ -7,7 +7,7 @@ package vaultsecretsrotatingsecret type VaultSecretsRotatingSecretAwsAccessKeys struct { // AWS IAM username to rotate the access keys for. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#iam_username VaultSecretsRotatingSecret#iam_username} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#iam_username VaultSecretsRotatingSecret#iam_username} IamUsername *string `field:"required" json:"iamUsername" yaml:"iamUsername"` } diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfig.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfig.go index f3206411..ecd7fa6c 100644 --- a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfig.go +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfig.go @@ -24,43 +24,47 @@ type VaultSecretsRotatingSecretConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Vault Secrets application name that owns the secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#app_name VaultSecretsRotatingSecret#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#app_name VaultSecretsRotatingSecret#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` // The Vault Secrets integration name with the capability to manage the secret's lifecycle. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#integration_name VaultSecretsRotatingSecret#integration_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#integration_name VaultSecretsRotatingSecret#integration_name} IntegrationName *string `field:"required" json:"integrationName" yaml:"integrationName"` // The Vault Secrets secret name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#name VaultSecretsRotatingSecret#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#name VaultSecretsRotatingSecret#name} Name *string `field:"required" json:"name" yaml:"name"` // Name of the rotation policy that governs the rotation of the secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#rotation_policy_name VaultSecretsRotatingSecret#rotation_policy_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#rotation_policy_name VaultSecretsRotatingSecret#rotation_policy_name} RotationPolicyName *string `field:"required" json:"rotationPolicyName" yaml:"rotationPolicyName"` // The third party platform the dynamic credentials give access to. One of `aws` or `gcp`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#secret_provider VaultSecretsRotatingSecret#secret_provider} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#secret_provider VaultSecretsRotatingSecret#secret_provider} SecretProvider *string `field:"required" json:"secretProvider" yaml:"secretProvider"` // AWS configuration to manage the access key rotation for the given IAM user. Required if `secret_provider` is `aws`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#aws_access_keys VaultSecretsRotatingSecret#aws_access_keys} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#aws_access_keys VaultSecretsRotatingSecret#aws_access_keys} AwsAccessKeys *VaultSecretsRotatingSecretAwsAccessKeys `field:"optional" json:"awsAccessKeys" yaml:"awsAccessKeys"` + // Confluent configuration to manage the cloud api key rotation for the given service account. Required if `secret_provider` is `confluent`. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#confluent_service_account VaultSecretsRotatingSecret#confluent_service_account} + ConfluentServiceAccount *VaultSecretsRotatingSecretConfluentServiceAccount `field:"optional" json:"confluentServiceAccount" yaml:"confluentServiceAccount"` // GCP configuration to manage the service account key rotation for the given service account. Required if `secret_provider` is `gcp`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#gcp_service_account_key VaultSecretsRotatingSecret#gcp_service_account_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#gcp_service_account_key VaultSecretsRotatingSecret#gcp_service_account_key} GcpServiceAccountKey *VaultSecretsRotatingSecretGcpServiceAccountKey `field:"optional" json:"gcpServiceAccountKey" yaml:"gcpServiceAccountKey"` // MongoDB Atlas configuration to manage the user password rotation on the given database. Required if `secret_provider` is `mongodb_atlas`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#mongodb_atlas_user VaultSecretsRotatingSecret#mongodb_atlas_user} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#mongodb_atlas_user VaultSecretsRotatingSecret#mongodb_atlas_user} MongodbAtlasUser *VaultSecretsRotatingSecretMongodbAtlasUser `field:"optional" json:"mongodbAtlasUser" yaml:"mongodbAtlasUser"` // HCP project ID that owns the HCP Vault Secrets integration. Inferred from the provider configuration if omitted. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#project_id VaultSecretsRotatingSecret#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#project_id VaultSecretsRotatingSecret#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // Twilio configuration to manage the api key rotation on the given account. Required if `secret_provider` is `twilio`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#twilio_api_key VaultSecretsRotatingSecret#twilio_api_key} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#twilio_api_key VaultSecretsRotatingSecret#twilio_api_key} TwilioApiKey *VaultSecretsRotatingSecretTwilioApiKey `field:"optional" json:"twilioApiKey" yaml:"twilioApiKey"` } diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccount.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccount.go new file mode 100644 index 00000000..fbf1afd3 --- /dev/null +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccount.go @@ -0,0 +1,13 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultsecretsrotatingsecret + + +type VaultSecretsRotatingSecretConfluentServiceAccount struct { + // Confluent service account to rotate the cloud api key for. + // + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#service_account_id VaultSecretsRotatingSecret#service_account_id} + ServiceAccountId *string `field:"required" json:"serviceAccountId" yaml:"serviceAccountId"` +} + diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference.go new file mode 100644 index 00000000..60582130 --- /dev/null +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference.go @@ -0,0 +1,483 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +package vaultsecretsrotatingsecret + +import ( + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + _init_ "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/jsii" + + "github.com/cdktf/cdktf-provider-hcp-go/hcp/v9/vaultsecretsrotatingsecret/internal" + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +type VaultSecretsRotatingSecretConfluentServiceAccountOutputReference interface { + cdktf.ComplexObject + // the index of the complex object in a list. + // Experimental. + ComplexObjectIndex() interface{} + // Experimental. + SetComplexObjectIndex(val interface{}) + // set to true if this item is from inside a set and needs tolist() for accessing it set to "0" for single list items. + // Experimental. + ComplexObjectIsFromSet() *bool + // Experimental. + SetComplexObjectIsFromSet(val *bool) + // The creation stack of this resolvable which will be appended to errors thrown during resolution. + // + // If this returns an empty array the stack will not be attached. + // Experimental. + CreationStack() *[]*string + // Experimental. + Fqn() *string + InternalValue() interface{} + SetInternalValue(val interface{}) + ServiceAccountId() *string + SetServiceAccountId(val *string) + ServiceAccountIdInput() *string + // Experimental. + TerraformAttribute() *string + // Experimental. + SetTerraformAttribute(val *string) + // Experimental. + TerraformResource() cdktf.IInterpolatingParent + // Experimental. + SetTerraformResource(val cdktf.IInterpolatingParent) + // Experimental. + ComputeFqn() *string + // Experimental. + GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} + // Experimental. + GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable + // Experimental. + GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool + // Experimental. + GetListAttribute(terraformAttribute *string) *[]*string + // Experimental. + GetNumberAttribute(terraformAttribute *string) *float64 + // Experimental. + GetNumberListAttribute(terraformAttribute *string) *[]*float64 + // Experimental. + GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 + // Experimental. + GetStringAttribute(terraformAttribute *string) *string + // Experimental. + GetStringMapAttribute(terraformAttribute *string) *map[string]*string + // Experimental. + InterpolationAsList() cdktf.IResolvable + // Experimental. + InterpolationForAttribute(property *string) cdktf.IResolvable + // Produce the Token's value at resolution time. + // Experimental. + Resolve(_context cdktf.IResolveContext) interface{} + // Return a string representation of this resolvable object. + // + // Returns a reversible string representation. + // Experimental. + ToString() *string +} + +// The jsii proxy struct for VaultSecretsRotatingSecretConfluentServiceAccountOutputReference +type jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference struct { + internal.Type__cdktfComplexObject +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) ComplexObjectIndex() interface{} { + var returns interface{} + _jsii_.Get( + j, + "complexObjectIndex", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) ComplexObjectIsFromSet() *bool { + var returns *bool + _jsii_.Get( + j, + "complexObjectIsFromSet", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) CreationStack() *[]*string { + var returns *[]*string + _jsii_.Get( + j, + "creationStack", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) Fqn() *string { + var returns *string + _jsii_.Get( + j, + "fqn", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) InternalValue() interface{} { + var returns interface{} + _jsii_.Get( + j, + "internalValue", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) ServiceAccountId() *string { + var returns *string + _jsii_.Get( + j, + "serviceAccountId", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) ServiceAccountIdInput() *string { + var returns *string + _jsii_.Get( + j, + "serviceAccountIdInput", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) TerraformAttribute() *string { + var returns *string + _jsii_.Get( + j, + "terraformAttribute", + &returns, + ) + return returns +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) TerraformResource() cdktf.IInterpolatingParent { + var returns cdktf.IInterpolatingParent + _jsii_.Get( + j, + "terraformResource", + &returns, + ) + return returns +} + + +func NewVaultSecretsRotatingSecretConfluentServiceAccountOutputReference(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) VaultSecretsRotatingSecretConfluentServiceAccountOutputReference { + _init_.Initialize() + + if err := validateNewVaultSecretsRotatingSecretConfluentServiceAccountOutputReferenceParameters(terraformResource, terraformAttribute); err != nil { + panic(err) + } + j := jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference{} + + _jsii_.Create( + "@cdktf/provider-hcp.vaultSecretsRotatingSecret.VaultSecretsRotatingSecretConfluentServiceAccountOutputReference", + []interface{}{terraformResource, terraformAttribute}, + &j, + ) + + return &j +} + +func NewVaultSecretsRotatingSecretConfluentServiceAccountOutputReference_Override(v VaultSecretsRotatingSecretConfluentServiceAccountOutputReference, terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) { + _init_.Initialize() + + _jsii_.Create( + "@cdktf/provider-hcp.vaultSecretsRotatingSecret.VaultSecretsRotatingSecretConfluentServiceAccountOutputReference", + []interface{}{terraformResource, terraformAttribute}, + v, + ) +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference)SetComplexObjectIndex(val interface{}) { + if err := j.validateSetComplexObjectIndexParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "complexObjectIndex", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference)SetComplexObjectIsFromSet(val *bool) { + if err := j.validateSetComplexObjectIsFromSetParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "complexObjectIsFromSet", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference)SetInternalValue(val interface{}) { + if err := j.validateSetInternalValueParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "internalValue", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference)SetServiceAccountId(val *string) { + if err := j.validateSetServiceAccountIdParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "serviceAccountId", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference)SetTerraformAttribute(val *string) { + if err := j.validateSetTerraformAttributeParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "terraformAttribute", + val, + ) +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference)SetTerraformResource(val cdktf.IInterpolatingParent) { + if err := j.validateSetTerraformResourceParameters(val); err != nil { + panic(err) + } + _jsii_.Set( + j, + "terraformResource", + val, + ) +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) ComputeFqn() *string { + var returns *string + + _jsii_.Invoke( + v, + "computeFqn", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} { + if err := v.validateGetAnyMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]interface{} + + _jsii_.Invoke( + v, + "getAnyMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable { + if err := v.validateGetBooleanAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "getBooleanAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool { + if err := v.validateGetBooleanMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*bool + + _jsii_.Invoke( + v, + "getBooleanMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetListAttribute(terraformAttribute *string) *[]*string { + if err := v.validateGetListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*string + + _jsii_.Invoke( + v, + "getListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetNumberAttribute(terraformAttribute *string) *float64 { + if err := v.validateGetNumberAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *float64 + + _jsii_.Invoke( + v, + "getNumberAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetNumberListAttribute(terraformAttribute *string) *[]*float64 { + if err := v.validateGetNumberListAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *[]*float64 + + _jsii_.Invoke( + v, + "getNumberListAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 { + if err := v.validateGetNumberMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*float64 + + _jsii_.Invoke( + v, + "getNumberMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetStringAttribute(terraformAttribute *string) *string { + if err := v.validateGetStringAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *string + + _jsii_.Invoke( + v, + "getStringAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) GetStringMapAttribute(terraformAttribute *string) *map[string]*string { + if err := v.validateGetStringMapAttributeParameters(terraformAttribute); err != nil { + panic(err) + } + var returns *map[string]*string + + _jsii_.Invoke( + v, + "getStringMapAttribute", + []interface{}{terraformAttribute}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) InterpolationAsList() cdktf.IResolvable { + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationAsList", + nil, // no parameters + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) InterpolationForAttribute(property *string) cdktf.IResolvable { + if err := v.validateInterpolationForAttributeParameters(property); err != nil { + panic(err) + } + var returns cdktf.IResolvable + + _jsii_.Invoke( + v, + "interpolationForAttribute", + []interface{}{property}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) Resolve(_context cdktf.IResolveContext) interface{} { + if err := v.validateResolveParameters(_context); err != nil { + panic(err) + } + var returns interface{} + + _jsii_.Invoke( + v, + "resolve", + []interface{}{_context}, + &returns, + ) + + return returns +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) ToString() *string { + var returns *string + + _jsii_.Invoke( + v, + "toString", + nil, // no parameters + &returns, + ) + + return returns +} + diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference__checks.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference__checks.go new file mode 100644 index 00000000..1a2f4ace --- /dev/null +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference__checks.go @@ -0,0 +1,228 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build !no_runtime_type_checking + +package vaultsecretsrotatingsecret + +import ( + "fmt" + + _jsii_ "github.com/aws/jsii-runtime-go/runtime" + + "github.com/hashicorp/terraform-cdk-go/cdktf" +) + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetNumberAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetStringAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateInterpolationForAttributeParameters(property *string) error { + if property == nil { + return fmt.Errorf("parameter property is required, but nil was provided") + } + + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateResolveParameters(_context cdktf.IResolveContext) error { + if _context == nil { + return fmt.Errorf("parameter _context is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetComplexObjectIndexParameters(val interface{}) error { + switch val.(type) { + case *string: + // ok + case string: + // ok + case *float64: + // ok + case float64: + // ok + case *int: + // ok + case int: + // ok + case *uint: + // ok + case uint: + // ok + case *int8: + // ok + case int8: + // ok + case *int16: + // ok + case int16: + // ok + case *int32: + // ok + case int32: + // ok + case *int64: + // ok + case int64: + // ok + case *uint8: + // ok + case uint8: + // ok + case *uint16: + // ok + case uint16: + // ok + case *uint32: + // ok + case uint32: + // ok + case *uint64: + // ok + case uint64: + // ok + default: + return fmt.Errorf("parameter val must be one of the allowed types: *string, *float64; received %#v (a %T)", val, val) + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetComplexObjectIsFromSetParameters(val *bool) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetInternalValueParameters(val interface{}) error { + switch val.(type) { + case cdktf.IResolvable: + // ok + case *VaultSecretsRotatingSecretConfluentServiceAccount: + val := val.(*VaultSecretsRotatingSecretConfluentServiceAccount) + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + case VaultSecretsRotatingSecretConfluentServiceAccount: + val_ := val.(VaultSecretsRotatingSecretConfluentServiceAccount) + val := &val_ + if err := _jsii_.ValidateStruct(val, func() string { return "parameter val" }); err != nil { + return err + } + default: + if !_jsii_.IsAnonymousProxy(val) { + return fmt.Errorf("parameter val must be one of the allowed types: cdktf.IResolvable, *VaultSecretsRotatingSecretConfluentServiceAccount; received %#v (a %T)", val, val) + } + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetServiceAccountIdParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetTerraformAttributeParameters(val *string) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetTerraformResourceParameters(val cdktf.IInterpolatingParent) error { + if val == nil { + return fmt.Errorf("parameter val is required, but nil was provided") + } + + return nil +} + +func validateNewVaultSecretsRotatingSecretConfluentServiceAccountOutputReferenceParameters(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) error { + if terraformResource == nil { + return fmt.Errorf("parameter terraformResource is required, but nil was provided") + } + + if terraformAttribute == nil { + return fmt.Errorf("parameter terraformAttribute is required, but nil was provided") + } + + return nil +} + diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference__no_checks.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference__no_checks.go new file mode 100644 index 00000000..82c0cbb1 --- /dev/null +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretConfluentServiceAccountOutputReference__no_checks.go @@ -0,0 +1,81 @@ +// Copyright (c) HashiCorp, Inc. +// SPDX-License-Identifier: MPL-2.0 + +//go:build no_runtime_type_checking + +package vaultsecretsrotatingsecret + +// Building without runtime type checking enabled, so all the below just return nil + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetAnyMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetBooleanAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetBooleanMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetNumberAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetNumberListAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetNumberMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetStringAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateGetStringMapAttributeParameters(terraformAttribute *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateInterpolationForAttributeParameters(property *string) error { + return nil +} + +func (v *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateResolveParameters(_context cdktf.IResolveContext) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetComplexObjectIndexParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetComplexObjectIsFromSetParameters(val *bool) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetInternalValueParameters(val interface{}) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetServiceAccountIdParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetTerraformAttributeParameters(val *string) error { + return nil +} + +func (j *jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference) validateSetTerraformResourceParameters(val cdktf.IInterpolatingParent) error { + return nil +} + +func validateNewVaultSecretsRotatingSecretConfluentServiceAccountOutputReferenceParameters(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string) error { + return nil +} + diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretGcpServiceAccountKey.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretGcpServiceAccountKey.go index 0450ef54..0f47eacf 100644 --- a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretGcpServiceAccountKey.go +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretGcpServiceAccountKey.go @@ -7,7 +7,7 @@ package vaultsecretsrotatingsecret type VaultSecretsRotatingSecretGcpServiceAccountKey struct { // GCP service account email to impersonate. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#service_account_email VaultSecretsRotatingSecret#service_account_email} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#service_account_email VaultSecretsRotatingSecret#service_account_email} ServiceAccountEmail *string `field:"required" json:"serviceAccountEmail" yaml:"serviceAccountEmail"` } diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretMongodbAtlasUser.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretMongodbAtlasUser.go index dc2dbf38..fd16d4bd 100644 --- a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretMongodbAtlasUser.go +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecretMongodbAtlasUser.go @@ -7,15 +7,15 @@ package vaultsecretsrotatingsecret type VaultSecretsRotatingSecretMongodbAtlasUser struct { // MongoDB Atlas database or cluster name to rotate the username and password for. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#database_name VaultSecretsRotatingSecret#database_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#database_name VaultSecretsRotatingSecret#database_name} DatabaseName *string `field:"required" json:"databaseName" yaml:"databaseName"` // MongoDB Atlas project ID to rotate the username and password for. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#project_id VaultSecretsRotatingSecret#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#project_id VaultSecretsRotatingSecret#project_id} ProjectId *string `field:"required" json:"projectId" yaml:"projectId"` // MongoDB Atlas roles to assign to the rotating user. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_rotating_secret#roles VaultSecretsRotatingSecret#roles} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_rotating_secret#roles VaultSecretsRotatingSecret#roles} Roles *[]*string `field:"required" json:"roles" yaml:"roles"` } diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__checks.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__checks.go index 6caaf8a4..68002e47 100644 --- a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__checks.go +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__checks.go @@ -218,6 +218,17 @@ func (v *jsiiProxy_VaultSecretsRotatingSecret) validatePutAwsAccessKeysParameter return nil } +func (v *jsiiProxy_VaultSecretsRotatingSecret) validatePutConfluentServiceAccountParameters(value *VaultSecretsRotatingSecretConfluentServiceAccount) error { + if value == nil { + return fmt.Errorf("parameter value is required, but nil was provided") + } + if err := _jsii_.ValidateStruct(value, func() string { return "parameter value" }); err != nil { + return err + } + + return nil +} + func (v *jsiiProxy_VaultSecretsRotatingSecret) validatePutGcpServiceAccountKeyParameters(value *VaultSecretsRotatingSecretGcpServiceAccountKey) error { if value == nil { return fmt.Errorf("parameter value is required, but nil was provided") diff --git a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__no_checks.go b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__no_checks.go index 704d85cc..bda4a9b3 100644 --- a/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__no_checks.go +++ b/hcp/vaultsecretsrotatingsecret/VaultSecretsRotatingSecret__no_checks.go @@ -79,6 +79,10 @@ func (v *jsiiProxy_VaultSecretsRotatingSecret) validatePutAwsAccessKeysParameter return nil } +func (v *jsiiProxy_VaultSecretsRotatingSecret) validatePutConfluentServiceAccountParameters(value *VaultSecretsRotatingSecretConfluentServiceAccount) error { + return nil +} + func (v *jsiiProxy_VaultSecretsRotatingSecret) validatePutGcpServiceAccountKeyParameters(value *VaultSecretsRotatingSecretGcpServiceAccountKey) error { return nil } diff --git a/hcp/vaultsecretsrotatingsecret/main.go b/hcp/vaultsecretsrotatingsecret/main.go index 7847f43e..fef67d7c 100644 --- a/hcp/vaultsecretsrotatingsecret/main.go +++ b/hcp/vaultsecretsrotatingsecret/main.go @@ -21,6 +21,8 @@ func init() { _jsii_.MemberProperty{JsiiProperty: "awsAccessKeys", GoGetter: "AwsAccessKeys"}, _jsii_.MemberProperty{JsiiProperty: "awsAccessKeysInput", GoGetter: "AwsAccessKeysInput"}, _jsii_.MemberProperty{JsiiProperty: "cdktfStack", GoGetter: "CdktfStack"}, + _jsii_.MemberProperty{JsiiProperty: "confluentServiceAccount", GoGetter: "ConfluentServiceAccount"}, + _jsii_.MemberProperty{JsiiProperty: "confluentServiceAccountInput", GoGetter: "ConfluentServiceAccountInput"}, _jsii_.MemberProperty{JsiiProperty: "connection", GoGetter: "Connection"}, _jsii_.MemberProperty{JsiiProperty: "constructNodeMetadata", GoGetter: "ConstructNodeMetadata"}, _jsii_.MemberProperty{JsiiProperty: "count", GoGetter: "Count"}, @@ -60,11 +62,13 @@ func init() { _jsii_.MemberProperty{JsiiProperty: "provider", GoGetter: "Provider"}, _jsii_.MemberProperty{JsiiProperty: "provisioners", GoGetter: "Provisioners"}, _jsii_.MemberMethod{JsiiMethod: "putAwsAccessKeys", GoMethod: "PutAwsAccessKeys"}, + _jsii_.MemberMethod{JsiiMethod: "putConfluentServiceAccount", GoMethod: "PutConfluentServiceAccount"}, _jsii_.MemberMethod{JsiiMethod: "putGcpServiceAccountKey", GoMethod: "PutGcpServiceAccountKey"}, _jsii_.MemberMethod{JsiiMethod: "putMongodbAtlasUser", GoMethod: "PutMongodbAtlasUser"}, _jsii_.MemberMethod{JsiiMethod: "putTwilioApiKey", GoMethod: "PutTwilioApiKey"}, _jsii_.MemberProperty{JsiiProperty: "rawOverrides", GoGetter: "RawOverrides"}, _jsii_.MemberMethod{JsiiMethod: "resetAwsAccessKeys", GoMethod: "ResetAwsAccessKeys"}, + _jsii_.MemberMethod{JsiiMethod: "resetConfluentServiceAccount", GoMethod: "ResetConfluentServiceAccount"}, _jsii_.MemberMethod{JsiiMethod: "resetGcpServiceAccountKey", GoMethod: "ResetGcpServiceAccountKey"}, _jsii_.MemberMethod{JsiiMethod: "resetMongodbAtlasUser", GoMethod: "ResetMongodbAtlasUser"}, _jsii_.MemberMethod{JsiiMethod: "resetOverrideLogicalId", GoMethod: "ResetOverrideLogicalId"}, @@ -134,6 +138,44 @@ func init() { "@cdktf/provider-hcp.vaultSecretsRotatingSecret.VaultSecretsRotatingSecretConfig", reflect.TypeOf((*VaultSecretsRotatingSecretConfig)(nil)).Elem(), ) + _jsii_.RegisterStruct( + "@cdktf/provider-hcp.vaultSecretsRotatingSecret.VaultSecretsRotatingSecretConfluentServiceAccount", + reflect.TypeOf((*VaultSecretsRotatingSecretConfluentServiceAccount)(nil)).Elem(), + ) + _jsii_.RegisterClass( + "@cdktf/provider-hcp.vaultSecretsRotatingSecret.VaultSecretsRotatingSecretConfluentServiceAccountOutputReference", + reflect.TypeOf((*VaultSecretsRotatingSecretConfluentServiceAccountOutputReference)(nil)).Elem(), + []_jsii_.Member{ + _jsii_.MemberProperty{JsiiProperty: "complexObjectIndex", GoGetter: "ComplexObjectIndex"}, + _jsii_.MemberProperty{JsiiProperty: "complexObjectIsFromSet", GoGetter: "ComplexObjectIsFromSet"}, + _jsii_.MemberMethod{JsiiMethod: "computeFqn", GoMethod: "ComputeFqn"}, + _jsii_.MemberProperty{JsiiProperty: "creationStack", GoGetter: "CreationStack"}, + _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, + _jsii_.MemberMethod{JsiiMethod: "getAnyMapAttribute", GoMethod: "GetAnyMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanAttribute", GoMethod: "GetBooleanAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getBooleanMapAttribute", GoMethod: "GetBooleanMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getListAttribute", GoMethod: "GetListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberAttribute", GoMethod: "GetNumberAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberListAttribute", GoMethod: "GetNumberListAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getNumberMapAttribute", GoMethod: "GetNumberMapAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringAttribute", GoMethod: "GetStringAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "getStringMapAttribute", GoMethod: "GetStringMapAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "internalValue", GoGetter: "InternalValue"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationAsList", GoMethod: "InterpolationAsList"}, + _jsii_.MemberMethod{JsiiMethod: "interpolationForAttribute", GoMethod: "InterpolationForAttribute"}, + _jsii_.MemberMethod{JsiiMethod: "resolve", GoMethod: "Resolve"}, + _jsii_.MemberProperty{JsiiProperty: "serviceAccountId", GoGetter: "ServiceAccountId"}, + _jsii_.MemberProperty{JsiiProperty: "serviceAccountIdInput", GoGetter: "ServiceAccountIdInput"}, + _jsii_.MemberProperty{JsiiProperty: "terraformAttribute", GoGetter: "TerraformAttribute"}, + _jsii_.MemberProperty{JsiiProperty: "terraformResource", GoGetter: "TerraformResource"}, + _jsii_.MemberMethod{JsiiMethod: "toString", GoMethod: "ToString"}, + }, + func() interface{} { + j := jsiiProxy_VaultSecretsRotatingSecretConfluentServiceAccountOutputReference{} + _jsii_.InitJsiiProxy(&j.Type__cdktfComplexObject) + return &j + }, + ) _jsii_.RegisterStruct( "@cdktf/provider-hcp.vaultSecretsRotatingSecret.VaultSecretsRotatingSecretGcpServiceAccountKey", reflect.TypeOf((*VaultSecretsRotatingSecretGcpServiceAccountKey)(nil)).Elem(), diff --git a/hcp/vaultsecretssecret/README.md b/hcp/vaultsecretssecret/README.md index 6d580b60..8ba0e6be 100644 --- a/hcp/vaultsecretssecret/README.md +++ b/hcp/vaultsecretssecret/README.md @@ -1,3 +1,3 @@ # `hcp_vault_secrets_secret` -Refer to the Terraform Registry for docs: [`hcp_vault_secrets_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret). +Refer to the Terraform Registry for docs: [`hcp_vault_secrets_secret`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret). diff --git a/hcp/vaultsecretssecret/VaultSecretsSecret.go b/hcp/vaultsecretssecret/VaultSecretsSecret.go index 911c939f..8f4823fe 100644 --- a/hcp/vaultsecretssecret/VaultSecretsSecret.go +++ b/hcp/vaultsecretssecret/VaultSecretsSecret.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret hcp_vault_secrets_secret}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret hcp_vault_secrets_secret}. type VaultSecretsSecret interface { cdktf.TerraformResource AppName() *string @@ -401,7 +401,7 @@ func (j *jsiiProxy_VaultSecretsSecret) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret hcp_vault_secrets_secret} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret hcp_vault_secrets_secret} Resource. func NewVaultSecretsSecret(scope constructs.Construct, id *string, config *VaultSecretsSecretConfig) VaultSecretsSecret { _init_.Initialize() @@ -419,7 +419,7 @@ func NewVaultSecretsSecret(scope constructs.Construct, id *string, config *Vault return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret hcp_vault_secrets_secret} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret hcp_vault_secrets_secret} Resource. func NewVaultSecretsSecret_Override(v VaultSecretsSecret, scope constructs.Construct, id *string, config *VaultSecretsSecretConfig) { _init_.Initialize() diff --git a/hcp/vaultsecretssecret/VaultSecretsSecretConfig.go b/hcp/vaultsecretssecret/VaultSecretsSecretConfig.go index 597c8d65..17b21c07 100644 --- a/hcp/vaultsecretssecret/VaultSecretsSecretConfig.go +++ b/hcp/vaultsecretssecret/VaultSecretsSecretConfig.go @@ -24,19 +24,19 @@ type VaultSecretsSecretConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the application the secret can be found in. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret#app_name VaultSecretsSecret#app_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret#app_name VaultSecretsSecret#app_name} AppName *string `field:"required" json:"appName" yaml:"appName"` // The name of the secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret#secret_name VaultSecretsSecret#secret_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret#secret_name VaultSecretsSecret#secret_name} SecretName *string `field:"required" json:"secretName" yaml:"secretName"` // The value of the secret. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret#secret_value VaultSecretsSecret#secret_value} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret#secret_value VaultSecretsSecret#secret_value} SecretValue *string `field:"required" json:"secretValue" yaml:"secretValue"` // The ID of the HCP project where the HCP Vault Secrets secret is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/vault_secrets_secret#project_id VaultSecretsSecret#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/vault_secrets_secret#project_id VaultSecretsSecret#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/version b/hcp/version index 48f3ef68..0f667927 100644 --- a/hcp/version +++ b/hcp/version @@ -1 +1 @@ -9.17.0 +9.18.0 diff --git a/hcp/waypointaction/README.md b/hcp/waypointaction/README.md index be8de3e4..ea38732a 100644 --- a/hcp/waypointaction/README.md +++ b/hcp/waypointaction/README.md @@ -1,3 +1,3 @@ # `hcp_waypoint_action` -Refer to the Terraform Registry for docs: [`hcp_waypoint_action`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action). +Refer to the Terraform Registry for docs: [`hcp_waypoint_action`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action). diff --git a/hcp/waypointaction/WaypointAction.go b/hcp/waypointaction/WaypointAction.go index 9e993797..d9d3cbe9 100644 --- a/hcp/waypointaction/WaypointAction.go +++ b/hcp/waypointaction/WaypointAction.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action hcp_waypoint_action}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action hcp_waypoint_action}. type WaypointAction interface { cdktf.TerraformResource // Experimental. @@ -402,7 +402,7 @@ func (j *jsiiProxy_WaypointAction) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action hcp_waypoint_action} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action hcp_waypoint_action} Resource. func NewWaypointAction(scope constructs.Construct, id *string, config *WaypointActionConfig) WaypointAction { _init_.Initialize() @@ -420,7 +420,7 @@ func NewWaypointAction(scope constructs.Construct, id *string, config *WaypointA return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action hcp_waypoint_action} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action hcp_waypoint_action} Resource. func NewWaypointAction_Override(w WaypointAction, scope constructs.Construct, id *string, config *WaypointActionConfig) { _init_.Initialize() diff --git a/hcp/waypointaction/WaypointActionConfig.go b/hcp/waypointaction/WaypointActionConfig.go index 468fcfe4..0d117717 100644 --- a/hcp/waypointaction/WaypointActionConfig.go +++ b/hcp/waypointaction/WaypointActionConfig.go @@ -24,19 +24,19 @@ type WaypointActionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the Action. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#name WaypointAction#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#name WaypointAction#name} Name *string `field:"required" json:"name" yaml:"name"` // The kind of HTTP request this should trigger. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#request WaypointAction#request} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#request WaypointAction#request} Request *WaypointActionRequest `field:"required" json:"request" yaml:"request"` // A description of the Action. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#description WaypointAction#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#description WaypointAction#description} Description *string `field:"optional" json:"description" yaml:"description"` // The ID of the HCP project where the Action is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#project_id WaypointAction#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#project_id WaypointAction#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/waypointaction/WaypointActionRequest.go b/hcp/waypointaction/WaypointActionRequest.go index ea86e9ca..e385ba69 100644 --- a/hcp/waypointaction/WaypointActionRequest.go +++ b/hcp/waypointaction/WaypointActionRequest.go @@ -7,7 +7,7 @@ package waypointaction type WaypointActionRequest struct { // Custom mode allows users to define the HTTP method, the request body, etc. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#custom WaypointAction#custom} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#custom WaypointAction#custom} Custom *WaypointActionRequestCustom `field:"optional" json:"custom" yaml:"custom"` } diff --git a/hcp/waypointaction/WaypointActionRequestCustom.go b/hcp/waypointaction/WaypointActionRequestCustom.go index 908ffd67..294acede 100644 --- a/hcp/waypointaction/WaypointActionRequestCustom.go +++ b/hcp/waypointaction/WaypointActionRequestCustom.go @@ -7,19 +7,19 @@ package waypointaction type WaypointActionRequestCustom struct { // The HTTP method to use for the request. Must be one of: 'GET', 'POST', 'PUT', 'DELETE', or 'PATCH'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#method WaypointAction#method} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#method WaypointAction#method} Method *string `field:"required" json:"method" yaml:"method"` // The body to be submitted with the request. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#body WaypointAction#body} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#body WaypointAction#body} Body *string `field:"optional" json:"body" yaml:"body"` // Key value headers to send with the request. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#headers WaypointAction#headers} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#headers WaypointAction#headers} Headers *map[string]*string `field:"optional" json:"headers" yaml:"headers"` // The full URL this request should make when invoked. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_action#url WaypointAction#url} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_action#url WaypointAction#url} Url *string `field:"optional" json:"url" yaml:"url"` } diff --git a/hcp/waypointaddon/README.md b/hcp/waypointaddon/README.md index 7fd972ce..d8c40609 100644 --- a/hcp/waypointaddon/README.md +++ b/hcp/waypointaddon/README.md @@ -1,3 +1,3 @@ # `hcp_waypoint_add_on` -Refer to the Terraform Registry for docs: [`hcp_waypoint_add_on`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on). +Refer to the Terraform Registry for docs: [`hcp_waypoint_add_on`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on). diff --git a/hcp/waypointaddon/WaypointAddOn.go b/hcp/waypointaddon/WaypointAddOn.go index e63894f1..c7e16d9e 100644 --- a/hcp/waypointaddon/WaypointAddOn.go +++ b/hcp/waypointaddon/WaypointAddOn.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on hcp_waypoint_add_on}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on hcp_waypoint_add_on}. type WaypointAddOn interface { cdktf.TerraformResource AddOnDefinitionInputVariables() WaypointAddOnAddOnDefinitionInputVariablesList @@ -535,7 +535,7 @@ func (j *jsiiProxy_WaypointAddOn) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on hcp_waypoint_add_on} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on hcp_waypoint_add_on} Resource. func NewWaypointAddOn(scope constructs.Construct, id *string, config *WaypointAddOnConfig) WaypointAddOn { _init_.Initialize() @@ -553,7 +553,7 @@ func NewWaypointAddOn(scope constructs.Construct, id *string, config *WaypointAd return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on hcp_waypoint_add_on} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on hcp_waypoint_add_on} Resource. func NewWaypointAddOn_Override(w WaypointAddOn, scope constructs.Construct, id *string, config *WaypointAddOnConfig) { _init_.Initialize() diff --git a/hcp/waypointaddon/WaypointAddOnAddOnDefinitionInputVariables.go b/hcp/waypointaddon/WaypointAddOnAddOnDefinitionInputVariables.go index 5589fcb8..a36879f9 100644 --- a/hcp/waypointaddon/WaypointAddOnAddOnDefinitionInputVariables.go +++ b/hcp/waypointaddon/WaypointAddOnAddOnDefinitionInputVariables.go @@ -7,15 +7,15 @@ package waypointaddon type WaypointAddOnAddOnDefinitionInputVariables struct { // Variable name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#name WaypointAddOn#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#name WaypointAddOn#name} Name *string `field:"required" json:"name" yaml:"name"` // Variable value. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#value WaypointAddOn#value} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#value WaypointAddOn#value} Value *string `field:"required" json:"value" yaml:"value"` // Variable type. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#variable_type WaypointAddOn#variable_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#variable_type WaypointAddOn#variable_type} VariableType *string `field:"optional" json:"variableType" yaml:"variableType"` } diff --git a/hcp/waypointaddon/WaypointAddOnAddOnInputVariables.go b/hcp/waypointaddon/WaypointAddOnAddOnInputVariables.go index 005fa618..a00b1ab6 100644 --- a/hcp/waypointaddon/WaypointAddOnAddOnInputVariables.go +++ b/hcp/waypointaddon/WaypointAddOnAddOnInputVariables.go @@ -7,15 +7,15 @@ package waypointaddon type WaypointAddOnAddOnInputVariables struct { // Variable name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#name WaypointAddOn#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#name WaypointAddOn#name} Name *string `field:"required" json:"name" yaml:"name"` // Variable value. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#value WaypointAddOn#value} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#value WaypointAddOn#value} Value *string `field:"required" json:"value" yaml:"value"` // Variable type. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#variable_type WaypointAddOn#variable_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#variable_type WaypointAddOn#variable_type} VariableType *string `field:"required" json:"variableType" yaml:"variableType"` } diff --git a/hcp/waypointaddon/WaypointAddOnConfig.go b/hcp/waypointaddon/WaypointAddOnConfig.go index c3715632..0e0b6490 100644 --- a/hcp/waypointaddon/WaypointAddOnConfig.go +++ b/hcp/waypointaddon/WaypointAddOnConfig.go @@ -24,23 +24,23 @@ type WaypointAddOnConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The ID of the Application that this Add-on is created for. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#application_id WaypointAddOn#application_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#application_id WaypointAddOn#application_id} ApplicationId *string `field:"required" json:"applicationId" yaml:"applicationId"` // The ID of the Add-on Definition that this Add-on is created from. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#definition_id WaypointAddOn#definition_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#definition_id WaypointAddOn#definition_id} DefinitionId *string `field:"required" json:"definitionId" yaml:"definitionId"` // The name of the Add-on. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#name WaypointAddOn#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#name WaypointAddOn#name} Name *string `field:"required" json:"name" yaml:"name"` // Input variables set for the add-on. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#add_on_input_variables WaypointAddOn#add_on_input_variables} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#add_on_input_variables WaypointAddOn#add_on_input_variables} AddOnInputVariables interface{} `field:"optional" json:"addOnInputVariables" yaml:"addOnInputVariables"` // The ID of the HCP project where the Waypoint AddOn is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on#project_id WaypointAddOn#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on#project_id WaypointAddOn#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` } diff --git a/hcp/waypointaddondefinition/README.md b/hcp/waypointaddondefinition/README.md index 6fa12473..c7f0927a 100644 --- a/hcp/waypointaddondefinition/README.md +++ b/hcp/waypointaddondefinition/README.md @@ -1,3 +1,3 @@ # `hcp_waypoint_add_on_definition` -Refer to the Terraform Registry for docs: [`hcp_waypoint_add_on_definition`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition). +Refer to the Terraform Registry for docs: [`hcp_waypoint_add_on_definition`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition). diff --git a/hcp/waypointaddondefinition/WaypointAddOnDefinition.go b/hcp/waypointaddondefinition/WaypointAddOnDefinition.go index 31cf9cd3..f381eab9 100644 --- a/hcp/waypointaddondefinition/WaypointAddOnDefinition.go +++ b/hcp/waypointaddondefinition/WaypointAddOnDefinition.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition hcp_waypoint_add_on_definition}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition hcp_waypoint_add_on_definition}. type WaypointAddOnDefinition interface { cdktf.TerraformResource // Experimental. @@ -591,7 +591,7 @@ func (j *jsiiProxy_WaypointAddOnDefinition) VariableOptionsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Resource. func NewWaypointAddOnDefinition(scope constructs.Construct, id *string, config *WaypointAddOnDefinitionConfig) WaypointAddOnDefinition { _init_.Initialize() @@ -609,7 +609,7 @@ func NewWaypointAddOnDefinition(scope constructs.Construct, id *string, config * return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition hcp_waypoint_add_on_definition} Resource. func NewWaypointAddOnDefinition_Override(w WaypointAddOnDefinition, scope constructs.Construct, id *string, config *WaypointAddOnDefinitionConfig) { _init_.Initialize() diff --git a/hcp/waypointaddondefinition/WaypointAddOnDefinitionConfig.go b/hcp/waypointaddondefinition/WaypointAddOnDefinitionConfig.go index 0fc2236c..4b93e69a 100644 --- a/hcp/waypointaddondefinition/WaypointAddOnDefinitionConfig.go +++ b/hcp/waypointaddondefinition/WaypointAddOnDefinitionConfig.go @@ -24,55 +24,55 @@ type WaypointAddOnDefinitionConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // A longer description of the Add-on Definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#description WaypointAddOnDefinition#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#description WaypointAddOnDefinition#description} Description *string `field:"required" json:"description" yaml:"description"` // The name of the Add-on Definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#name WaypointAddOnDefinition#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#name WaypointAddOnDefinition#name} Name *string `field:"required" json:"name" yaml:"name"` // A short summary of the Add-on Definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#summary WaypointAddOnDefinition#summary} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#summary WaypointAddOnDefinition#summary} Summary *string `field:"required" json:"summary" yaml:"summary"` // Terraform Cloud no-code Module Source, expected to be in one of the following formats: "app.terraform.io/hcp_waypoint_example/ecs-advanced-microservice/aws" or "private/hcp_waypoint_example/ecs-advanced-microservice/aws". // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#terraform_no_code_module_source WaypointAddOnDefinition#terraform_no_code_module_source} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#terraform_no_code_module_source WaypointAddOnDefinition#terraform_no_code_module_source} TerraformNoCodeModuleSource *string `field:"required" json:"terraformNoCodeModuleSource" yaml:"terraformNoCodeModuleSource"` // The ID of the Terraform Cloud Project to create workspaces in. // // The ID is found on the Terraform Cloud Project settings page. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#terraform_project_id WaypointAddOnDefinition#terraform_project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#terraform_project_id WaypointAddOnDefinition#terraform_project_id} TerraformProjectId *string `field:"required" json:"terraformProjectId" yaml:"terraformProjectId"` // List of labels attached to this Add-on Definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#labels WaypointAddOnDefinition#labels} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#labels WaypointAddOnDefinition#labels} Labels *[]*string `field:"optional" json:"labels" yaml:"labels"` // The ID of the HCP project where the Waypoint Add-on Definition is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#project_id WaypointAddOnDefinition#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#project_id WaypointAddOnDefinition#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // The markdown template for the Add-on Definition README (markdown format supported). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#readme_markdown_template WaypointAddOnDefinition#readme_markdown_template} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#readme_markdown_template WaypointAddOnDefinition#readme_markdown_template} ReadmeMarkdownTemplate *string `field:"optional" json:"readmeMarkdownTemplate" yaml:"readmeMarkdownTemplate"` // The ID of the Terraform agent pool to use for running Terraform operations. // // This is only applicable when the execution mode is set to 'agent'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#terraform_agent_pool_id WaypointAddOnDefinition#terraform_agent_pool_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#terraform_agent_pool_id WaypointAddOnDefinition#terraform_agent_pool_id} TerraformAgentPoolId *string `field:"optional" json:"terraformAgentPoolId" yaml:"terraformAgentPoolId"` // Terraform Cloud Workspace details. If not provided, defaults to the HCP Terraform project of the associated application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#terraform_cloud_workspace_details WaypointAddOnDefinition#terraform_cloud_workspace_details} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#terraform_cloud_workspace_details WaypointAddOnDefinition#terraform_cloud_workspace_details} TerraformCloudWorkspaceDetails *WaypointAddOnDefinitionTerraformCloudWorkspaceDetails `field:"optional" json:"terraformCloudWorkspaceDetails" yaml:"terraformCloudWorkspaceDetails"` // The execution mode of the HCP Terraform workspaces for add-ons using this add-on definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#terraform_execution_mode WaypointAddOnDefinition#terraform_execution_mode} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#terraform_execution_mode WaypointAddOnDefinition#terraform_execution_mode} TerraformExecutionMode *string `field:"optional" json:"terraformExecutionMode" yaml:"terraformExecutionMode"` // List of variable options for the Add-on Definition. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#variable_options WaypointAddOnDefinition#variable_options} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#variable_options WaypointAddOnDefinition#variable_options} VariableOptions interface{} `field:"optional" json:"variableOptions" yaml:"variableOptions"` } diff --git a/hcp/waypointaddondefinition/WaypointAddOnDefinitionTerraformCloudWorkspaceDetails.go b/hcp/waypointaddondefinition/WaypointAddOnDefinitionTerraformCloudWorkspaceDetails.go index 7b882458..872b217b 100644 --- a/hcp/waypointaddondefinition/WaypointAddOnDefinitionTerraformCloudWorkspaceDetails.go +++ b/hcp/waypointaddondefinition/WaypointAddOnDefinitionTerraformCloudWorkspaceDetails.go @@ -7,11 +7,11 @@ package waypointaddondefinition type WaypointAddOnDefinitionTerraformCloudWorkspaceDetails struct { // Name of the Terraform Cloud Project. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#name WaypointAddOnDefinition#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#name WaypointAddOnDefinition#name} Name *string `field:"required" json:"name" yaml:"name"` // Terraform Cloud Project ID. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#terraform_project_id WaypointAddOnDefinition#terraform_project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#terraform_project_id WaypointAddOnDefinition#terraform_project_id} TerraformProjectId *string `field:"required" json:"terraformProjectId" yaml:"terraformProjectId"` } diff --git a/hcp/waypointaddondefinition/WaypointAddOnDefinitionVariableOptions.go b/hcp/waypointaddondefinition/WaypointAddOnDefinitionVariableOptions.go index 3aadb142..30bc6cf2 100644 --- a/hcp/waypointaddondefinition/WaypointAddOnDefinitionVariableOptions.go +++ b/hcp/waypointaddondefinition/WaypointAddOnDefinitionVariableOptions.go @@ -7,21 +7,21 @@ package waypointaddondefinition type WaypointAddOnDefinitionVariableOptions struct { // Variable name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#name WaypointAddOnDefinition#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#name WaypointAddOnDefinition#name} Name *string `field:"required" json:"name" yaml:"name"` // List of options. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#options WaypointAddOnDefinition#options} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#options WaypointAddOnDefinition#options} Options *[]*string `field:"required" json:"options" yaml:"options"` // Variable type. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#variable_type WaypointAddOnDefinition#variable_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#variable_type WaypointAddOnDefinition#variable_type} VariableType *string `field:"required" json:"variableType" yaml:"variableType"` // Whether the variable is editable by the user creating an add-on. // // If options are provided, then the user may only use those options, regardless of this setting. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_add_on_definition#user_editable WaypointAddOnDefinition#user_editable} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_add_on_definition#user_editable WaypointAddOnDefinition#user_editable} UserEditable interface{} `field:"optional" json:"userEditable" yaml:"userEditable"` } diff --git a/hcp/waypointapplication/README.md b/hcp/waypointapplication/README.md index da8ecd69..a6e8b340 100644 --- a/hcp/waypointapplication/README.md +++ b/hcp/waypointapplication/README.md @@ -1,3 +1,3 @@ # `hcp_waypoint_application` -Refer to the Terraform Registry for docs: [`hcp_waypoint_application`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application). +Refer to the Terraform Registry for docs: [`hcp_waypoint_application`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application). diff --git a/hcp/waypointapplication/WaypointApplication.go b/hcp/waypointapplication/WaypointApplication.go index 572f9286..301f5e36 100644 --- a/hcp/waypointapplication/WaypointApplication.go +++ b/hcp/waypointapplication/WaypointApplication.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application hcp_waypoint_application}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application hcp_waypoint_application}. type WaypointApplication interface { cdktf.TerraformResource ApplicationInputVariables() WaypointApplicationApplicationInputVariablesList @@ -470,7 +470,7 @@ func (j *jsiiProxy_WaypointApplication) TerraformResourceType() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application hcp_waypoint_application} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application hcp_waypoint_application} Resource. func NewWaypointApplication(scope constructs.Construct, id *string, config *WaypointApplicationConfig) WaypointApplication { _init_.Initialize() @@ -488,7 +488,7 @@ func NewWaypointApplication(scope constructs.Construct, id *string, config *Wayp return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application hcp_waypoint_application} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application hcp_waypoint_application} Resource. func NewWaypointApplication_Override(w WaypointApplication, scope constructs.Construct, id *string, config *WaypointApplicationConfig) { _init_.Initialize() diff --git a/hcp/waypointapplication/WaypointApplicationApplicationInputVariables.go b/hcp/waypointapplication/WaypointApplicationApplicationInputVariables.go index 979d7cca..3f3f16e5 100644 --- a/hcp/waypointapplication/WaypointApplicationApplicationInputVariables.go +++ b/hcp/waypointapplication/WaypointApplicationApplicationInputVariables.go @@ -7,15 +7,15 @@ package waypointapplication type WaypointApplicationApplicationInputVariables struct { // Variable name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#name WaypointApplication#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#name WaypointApplication#name} Name *string `field:"required" json:"name" yaml:"name"` // Variable value. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#value WaypointApplication#value} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#value WaypointApplication#value} Value *string `field:"required" json:"value" yaml:"value"` // Variable type. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#variable_type WaypointApplication#variable_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#variable_type WaypointApplication#variable_type} VariableType *string `field:"required" json:"variableType" yaml:"variableType"` } diff --git a/hcp/waypointapplication/WaypointApplicationConfig.go b/hcp/waypointapplication/WaypointApplicationConfig.go index 161d4135..e4a5666e 100644 --- a/hcp/waypointapplication/WaypointApplicationConfig.go +++ b/hcp/waypointapplication/WaypointApplicationConfig.go @@ -24,25 +24,25 @@ type WaypointApplicationConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the Application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#name WaypointApplication#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#name WaypointApplication#name} Name *string `field:"required" json:"name" yaml:"name"` // ID of the Template this Application is based on. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#template_id WaypointApplication#template_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#template_id WaypointApplication#template_id} TemplateId *string `field:"required" json:"templateId" yaml:"templateId"` // Input variables set for the application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#application_input_variables WaypointApplication#application_input_variables} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#application_input_variables WaypointApplication#application_input_variables} ApplicationInputVariables interface{} `field:"optional" json:"applicationInputVariables" yaml:"applicationInputVariables"` // The ID of the HCP project where the Waypoint Application is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#project_id WaypointApplication#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#project_id WaypointApplication#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // Instructions for using the Application (markdown format supported). // // Note: this is a base64 encoded string, and can only be set in configuration after initial creation. The initial version of the README is generated from the README Template from source Template. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#readme_markdown WaypointApplication#readme_markdown} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#readme_markdown WaypointApplication#readme_markdown} ReadmeMarkdown *string `field:"optional" json:"readmeMarkdown" yaml:"readmeMarkdown"` } diff --git a/hcp/waypointapplication/WaypointApplicationTemplateInputVariables.go b/hcp/waypointapplication/WaypointApplicationTemplateInputVariables.go index 2aa8bd3c..421b9a9a 100644 --- a/hcp/waypointapplication/WaypointApplicationTemplateInputVariables.go +++ b/hcp/waypointapplication/WaypointApplicationTemplateInputVariables.go @@ -7,15 +7,15 @@ package waypointapplication type WaypointApplicationTemplateInputVariables struct { // Variable name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#name WaypointApplication#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#name WaypointApplication#name} Name *string `field:"required" json:"name" yaml:"name"` // Variable value. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#value WaypointApplication#value} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#value WaypointApplication#value} Value *string `field:"required" json:"value" yaml:"value"` // Variable type. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_application#variable_type WaypointApplication#variable_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_application#variable_type WaypointApplication#variable_type} VariableType *string `field:"optional" json:"variableType" yaml:"variableType"` } diff --git a/hcp/waypointtemplate/README.md b/hcp/waypointtemplate/README.md index 5a3d798c..37cc116d 100644 --- a/hcp/waypointtemplate/README.md +++ b/hcp/waypointtemplate/README.md @@ -1,3 +1,3 @@ # `hcp_waypoint_template` -Refer to the Terraform Registry for docs: [`hcp_waypoint_template`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template). +Refer to the Terraform Registry for docs: [`hcp_waypoint_template`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template). diff --git a/hcp/waypointtemplate/WaypointTemplate.go b/hcp/waypointtemplate/WaypointTemplate.go index 98bc96cc..9ea0a32f 100644 --- a/hcp/waypointtemplate/WaypointTemplate.go +++ b/hcp/waypointtemplate/WaypointTemplate.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template hcp_waypoint_template}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template hcp_waypoint_template}. type WaypointTemplate interface { cdktf.TerraformResource // Experimental. @@ -616,7 +616,7 @@ func (j *jsiiProxy_WaypointTemplate) VariableOptionsInput() interface{} { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template hcp_waypoint_template} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template hcp_waypoint_template} Resource. func NewWaypointTemplate(scope constructs.Construct, id *string, config *WaypointTemplateConfig) WaypointTemplate { _init_.Initialize() @@ -634,7 +634,7 @@ func NewWaypointTemplate(scope constructs.Construct, id *string, config *Waypoin return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template hcp_waypoint_template} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template hcp_waypoint_template} Resource. func NewWaypointTemplate_Override(w WaypointTemplate, scope constructs.Construct, id *string, config *WaypointTemplateConfig) { _init_.Initialize() diff --git a/hcp/waypointtemplate/WaypointTemplateConfig.go b/hcp/waypointtemplate/WaypointTemplateConfig.go index 9a9ed346..2d4099c5 100644 --- a/hcp/waypointtemplate/WaypointTemplateConfig.go +++ b/hcp/waypointtemplate/WaypointTemplateConfig.go @@ -24,61 +24,61 @@ type WaypointTemplateConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of the Template. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#name WaypointTemplate#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#name WaypointTemplate#name} Name *string `field:"required" json:"name" yaml:"name"` // A brief description of the template, up to 110 characters. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#summary WaypointTemplate#summary} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#summary WaypointTemplate#summary} Summary *string `field:"required" json:"summary" yaml:"summary"` // Terraform Cloud No-Code Module details. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#terraform_no_code_module_source WaypointTemplate#terraform_no_code_module_source} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#terraform_no_code_module_source WaypointTemplate#terraform_no_code_module_source} TerraformNoCodeModuleSource *string `field:"required" json:"terraformNoCodeModuleSource" yaml:"terraformNoCodeModuleSource"` // The ID of the Terraform Cloud Project to create workspaces in. // // The ID is found on the Terraform Cloud Project settings page. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#terraform_project_id WaypointTemplate#terraform_project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#terraform_project_id WaypointTemplate#terraform_project_id} TerraformProjectId *string `field:"required" json:"terraformProjectId" yaml:"terraformProjectId"` // A description of the template, along with when and why it should be used, up to 500 characters. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#description WaypointTemplate#description} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#description WaypointTemplate#description} Description *string `field:"optional" json:"description" yaml:"description"` // List of labels attached to this Template. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#labels WaypointTemplate#labels} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#labels WaypointTemplate#labels} Labels *[]*string `field:"optional" json:"labels" yaml:"labels"` // The ID of the HCP project where the Waypoint Template is located. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#project_id WaypointTemplate#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#project_id WaypointTemplate#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` // Instructions for using the template (markdown format supported). // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#readme_markdown_template WaypointTemplate#readme_markdown_template} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#readme_markdown_template WaypointTemplate#readme_markdown_template} ReadmeMarkdownTemplate *string `field:"optional" json:"readmeMarkdownTemplate" yaml:"readmeMarkdownTemplate"` // The ID of the agent pool to use for Terraform operations, for workspaces created for applications using this template. // // Required if terraform_execution_mode is set to 'agent'. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#terraform_agent_pool_id WaypointTemplate#terraform_agent_pool_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#terraform_agent_pool_id WaypointTemplate#terraform_agent_pool_id} TerraformAgentPoolId *string `field:"optional" json:"terraformAgentPoolId" yaml:"terraformAgentPoolId"` // Terraform Cloud Workspace details. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#terraform_cloud_workspace_details WaypointTemplate#terraform_cloud_workspace_details} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#terraform_cloud_workspace_details WaypointTemplate#terraform_cloud_workspace_details} TerraformCloudWorkspaceDetails *WaypointTemplateTerraformCloudWorkspaceDetails `field:"optional" json:"terraformCloudWorkspaceDetails" yaml:"terraformCloudWorkspaceDetails"` // The execution mode of the HCP Terraform workspaces created for applications using this template. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#terraform_execution_mode WaypointTemplate#terraform_execution_mode} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#terraform_execution_mode WaypointTemplate#terraform_execution_mode} TerraformExecutionMode *string `field:"optional" json:"terraformExecutionMode" yaml:"terraformExecutionMode"` // If true, will auto-import the readme form the Terraform odule used. // // If this is set to true, users should not also set `readme_markdown_template`. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#use_module_readme WaypointTemplate#use_module_readme} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#use_module_readme WaypointTemplate#use_module_readme} UseModuleReadme interface{} `field:"optional" json:"useModuleReadme" yaml:"useModuleReadme"` // List of variable options for the template. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#variable_options WaypointTemplate#variable_options} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#variable_options WaypointTemplate#variable_options} VariableOptions interface{} `field:"optional" json:"variableOptions" yaml:"variableOptions"` } diff --git a/hcp/waypointtemplate/WaypointTemplateTerraformCloudWorkspaceDetails.go b/hcp/waypointtemplate/WaypointTemplateTerraformCloudWorkspaceDetails.go index 3bd0bd91..85212902 100644 --- a/hcp/waypointtemplate/WaypointTemplateTerraformCloudWorkspaceDetails.go +++ b/hcp/waypointtemplate/WaypointTemplateTerraformCloudWorkspaceDetails.go @@ -7,11 +7,11 @@ package waypointtemplate type WaypointTemplateTerraformCloudWorkspaceDetails struct { // Name of the Terraform Cloud Project. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#name WaypointTemplate#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#name WaypointTemplate#name} Name *string `field:"required" json:"name" yaml:"name"` // Terraform Cloud Project ID. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#terraform_project_id WaypointTemplate#terraform_project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#terraform_project_id WaypointTemplate#terraform_project_id} TerraformProjectId *string `field:"required" json:"terraformProjectId" yaml:"terraformProjectId"` } diff --git a/hcp/waypointtemplate/WaypointTemplateVariableOptions.go b/hcp/waypointtemplate/WaypointTemplateVariableOptions.go index 7a1ada61..d7e0e6f6 100644 --- a/hcp/waypointtemplate/WaypointTemplateVariableOptions.go +++ b/hcp/waypointtemplate/WaypointTemplateVariableOptions.go @@ -7,19 +7,19 @@ package waypointtemplate type WaypointTemplateVariableOptions struct { // Variable name. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#name WaypointTemplate#name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#name WaypointTemplate#name} Name *string `field:"required" json:"name" yaml:"name"` // Variable type. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#variable_type WaypointTemplate#variable_type} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#variable_type WaypointTemplate#variable_type} VariableType *string `field:"required" json:"variableType" yaml:"variableType"` // List of options. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#options WaypointTemplate#options} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#options WaypointTemplate#options} Options *[]*string `field:"optional" json:"options" yaml:"options"` // Whether the variable is editable by the user creating an application. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_template#user_editable WaypointTemplate#user_editable} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_template#user_editable WaypointTemplate#user_editable} UserEditable interface{} `field:"optional" json:"userEditable" yaml:"userEditable"` } diff --git a/hcp/waypointtfcconfig/README.md b/hcp/waypointtfcconfig/README.md index 0009bf81..7ff1c662 100644 --- a/hcp/waypointtfcconfig/README.md +++ b/hcp/waypointtfcconfig/README.md @@ -1,3 +1,3 @@ # `hcp_waypoint_tfc_config` -Refer to the Terraform Registry for docs: [`hcp_waypoint_tfc_config`](https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_tfc_config). +Refer to the Terraform Registry for docs: [`hcp_waypoint_tfc_config`](https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_tfc_config). diff --git a/hcp/waypointtfcconfig/WaypointTfcConfig.go b/hcp/waypointtfcconfig/WaypointTfcConfig.go index 4716dfd8..1655be4a 100644 --- a/hcp/waypointtfcconfig/WaypointTfcConfig.go +++ b/hcp/waypointtfcconfig/WaypointTfcConfig.go @@ -12,7 +12,7 @@ import ( "github.com/hashicorp/terraform-cdk-go/cdktf" ) -// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_tfc_config hcp_waypoint_tfc_config}. +// Represents a {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_tfc_config hcp_waypoint_tfc_config}. type WaypointTfcConfig interface { cdktf.TerraformResource // Experimental. @@ -367,7 +367,7 @@ func (j *jsiiProxy_WaypointTfcConfig) TokenInput() *string { } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_tfc_config hcp_waypoint_tfc_config} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_tfc_config hcp_waypoint_tfc_config} Resource. func NewWaypointTfcConfig(scope constructs.Construct, id *string, config *WaypointTfcConfigConfig) WaypointTfcConfig { _init_.Initialize() @@ -385,7 +385,7 @@ func NewWaypointTfcConfig(scope constructs.Construct, id *string, config *Waypoi return &j } -// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_tfc_config hcp_waypoint_tfc_config} Resource. +// Create a new {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_tfc_config hcp_waypoint_tfc_config} Resource. func NewWaypointTfcConfig_Override(w WaypointTfcConfig, scope constructs.Construct, id *string, config *WaypointTfcConfigConfig) { _init_.Initialize() diff --git a/hcp/waypointtfcconfig/WaypointTfcConfigConfig.go b/hcp/waypointtfcconfig/WaypointTfcConfigConfig.go index 27a649f6..72fbb101 100644 --- a/hcp/waypointtfcconfig/WaypointTfcConfigConfig.go +++ b/hcp/waypointtfcconfig/WaypointTfcConfigConfig.go @@ -24,15 +24,15 @@ type WaypointTfcConfigConfig struct { Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The Terraform Cloud Organization with which the token is associated. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_tfc_config#tfc_org_name WaypointTfcConfig#tfc_org_name} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_tfc_config#tfc_org_name WaypointTfcConfig#tfc_org_name} TfcOrgName *string `field:"required" json:"tfcOrgName" yaml:"tfcOrgName"` // Terraform Cloud team token. The token must include permissions to manage workspaces and applications. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_tfc_config#token WaypointTfcConfig#token} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_tfc_config#token WaypointTfcConfig#token} Token *string `field:"required" json:"token" yaml:"token"` // Waypoint Project ID to associate with the TFC config. // - // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.97.0/docs/resources/waypoint_tfc_config#project_id WaypointTfcConfig#project_id} + // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/hcp/0.98.1/docs/resources/waypoint_tfc_config#project_id WaypointTfcConfig#project_id} ProjectId *string `field:"optional" json:"projectId" yaml:"projectId"` }