Documentation
¶
Index ¶
- func AdminRoleCustom_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, ...) cdktf.ImportableResource
- func AdminRoleCustom_IsConstruct(x interface{}) *bool
- func AdminRoleCustom_IsTerraformElement(x interface{}) *bool
- func AdminRoleCustom_IsTerraformResource(x interface{}) *bool
- func AdminRoleCustom_TfResourceType() *string
- func NewAdminRoleCustom_Override(a AdminRoleCustom, scope constructs.Construct, id *string, ...)
- type AdminRoleCustom
- type AdminRoleCustomConfig
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func AdminRoleCustom_GenerateConfigForImport ¶
func AdminRoleCustom_GenerateConfigForImport(scope constructs.Construct, importToId *string, importFromId *string, provider cdktf.TerraformProvider) cdktf.ImportableResource
Generates CDKTF code for importing a AdminRoleCustom resource upon running "cdktf plan <stack-name>".
func AdminRoleCustom_IsConstruct ¶
func AdminRoleCustom_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func AdminRoleCustom_IsTerraformElement ¶
func AdminRoleCustom_IsTerraformElement(x interface{}) *bool
Experimental.
func AdminRoleCustom_IsTerraformResource ¶
func AdminRoleCustom_IsTerraformResource(x interface{}) *bool
Experimental.
func AdminRoleCustom_TfResourceType ¶
func AdminRoleCustom_TfResourceType() *string
func NewAdminRoleCustom_Override ¶
func NewAdminRoleCustom_Override(a AdminRoleCustom, scope constructs.Construct, id *string, config *AdminRoleCustomConfig)
Create a new {@link https://registry.terraform.io/providers/okta/okta/4.13.0/docs/resources/admin_role_custom okta_admin_role_custom} Resource.
Types ¶
type AdminRoleCustom ¶
type AdminRoleCustom interface { cdktf.TerraformResource // Experimental. CdktfStack() cdktf.TerraformStack // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) // Experimental. ConstructNodeMetadata() *map[string]interface{} // Experimental. Count() interface{} // Experimental. SetCount(val interface{}) // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) Description() *string SetDescription(val *string) DescriptionInput() *string // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string Id() *string SetId(val *string) IdInput() *string Label() *string SetLabel(val *string) LabelInput() *string // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) // The tree node. Node() constructs.Node Permissions() *[]*string SetPermissions(val *[]*string) PermissionsInput() *[]*string // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string // Adds a user defined moveTarget string to this resource to be later used in .moveTo(moveTarget) to resolve the location of the move. // Experimental. AddMoveTarget(moveTarget *string) // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. HasResourceMove() interface{} // Experimental. ImportFrom(id *string, provider cdktf.TerraformProvider) // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Move the resource corresponding to "id" to this resource. // // Note that the resource being moved from must be marked as moved using it's instance function. // Experimental. MoveFromId(id *string) // Moves this resource to the target resource given by moveTarget. // Experimental. MoveTo(moveTarget *string, index interface{}) // Moves this resource to the resource corresponding to "id". // Experimental. MoveToId(id *string) // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) ResetId() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() ResetPermissions() SynthesizeAttributes() *map[string]interface{} SynthesizeHclAttributes() *map[string]interface{} // Experimental. ToHclTerraform() interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://registry.terraform.io/providers/okta/okta/4.13.0/docs/resources/admin_role_custom okta_admin_role_custom}.
func NewAdminRoleCustom ¶
func NewAdminRoleCustom(scope constructs.Construct, id *string, config *AdminRoleCustomConfig) AdminRoleCustom
Create a new {@link https://registry.terraform.io/providers/okta/okta/4.13.0/docs/resources/admin_role_custom okta_admin_role_custom} Resource.
type AdminRoleCustomConfig ¶
type AdminRoleCustomConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count interface{} `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // A human-readable description of the new Role. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/okta/okta/4.13.0/docs/resources/admin_role_custom#description AdminRoleCustom#description} Description *string `field:"required" json:"description" yaml:"description"` // The name given to the new Role. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/okta/okta/4.13.0/docs/resources/admin_role_custom#label AdminRoleCustom#label} Label *string `field:"required" json:"label" yaml:"label"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/okta/okta/4.13.0/docs/resources/admin_role_custom#id AdminRoleCustom#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // The permissions that the new Role grants. // // At least one // permission must be specified when creating custom role. Valid values: "okta.users.manage", // "okta.users.create", // "okta.users.read", // "okta.users.credentials.manage", // "okta.users.credentials.resetFactors", // "okta.users.credentials.resetPassword", // "okta.users.credentials.expirePassword", // "okta.users.userprofile.manage", // "okta.users.lifecycle.manage", // "okta.users.lifecycle.activate", // "okta.users.lifecycle.deactivate", // "okta.users.lifecycle.suspend", // "okta.users.lifecycle.unsuspend", // "okta.users.lifecycle.delete", // "okta.users.lifecycle.unlock", // "okta.users.lifecycle.clearSessions", // "okta.users.groupMembership.manage", // "okta.users.appAssignment.manage", // "okta.users.apitokens.manage", // "okta.users.apitokens.read", // "okta.groups.manage", // "okta.groups.create", // "okta.groups.members.manage", // "okta.groups.read", // "okta.groups.appAssignment.manage", // "okta.apps.read", // "okta.apps.manage", // "okta.apps.assignment.manage", // "okta.profilesources.import.run", // "okta.authzServers.read", // "okta.users.userprofile.manage", // "okta.authzServers.manage", // "okta.customizations.read", // "okta.customizations.manage", // "okta.identityProviders.read", // "okta.identityProviders.manage", // "okta.workflows.read", // "okta.workflows.invoke". // "okta.governance.accessCertifications.manage", // "okta.governance.accessRequests.manage", // "okta.apps.manageFirstPartyApps", // "okta.agents.manage", // "okta.agents.register", // "okta.agents.view", // "okta.directories.manage", // "okta.directories.read", // "okta.devices.manage", // "okta.devices.lifecycle.manage", // "okta.devices.lifecycle.activate", // "okta.devices.lifecycle.deactivate", // "okta.devices.lifecycle.suspend", // "okta.devices.lifecycle.unsuspend", // "okta.devices.lifecycle.delete", // "okta.devices.read", // "okta.iam.read", // "okta.support.cases.manage"., // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/okta/okta/4.13.0/docs/resources/admin_role_custom#permissions AdminRoleCustom#permissions} Permissions *[]*string `field:"optional" json:"permissions" yaml:"permissions"` }