Documentation ¶
Index ¶
- func ApproleAuthBackendRoleSecretId_IsConstruct(x interface{}) *bool
- func ApproleAuthBackendRoleSecretId_IsTerraformElement(x interface{}) *bool
- func ApproleAuthBackendRoleSecretId_IsTerraformResource(x interface{}) *bool
- func ApproleAuthBackendRoleSecretId_TfResourceType() *string
- func NewApproleAuthBackendRoleSecretId_Override(a ApproleAuthBackendRoleSecretId, scope constructs.Construct, id *string, ...)
- type ApproleAuthBackendRoleSecretId
- type ApproleAuthBackendRoleSecretIdConfig
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func ApproleAuthBackendRoleSecretId_IsConstruct ¶
func ApproleAuthBackendRoleSecretId_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func ApproleAuthBackendRoleSecretId_IsTerraformElement ¶
func ApproleAuthBackendRoleSecretId_IsTerraformElement(x interface{}) *bool
Experimental.
func ApproleAuthBackendRoleSecretId_IsTerraformResource ¶
func ApproleAuthBackendRoleSecretId_IsTerraformResource(x interface{}) *bool
Experimental.
func ApproleAuthBackendRoleSecretId_TfResourceType ¶
func ApproleAuthBackendRoleSecretId_TfResourceType() *string
func NewApproleAuthBackendRoleSecretId_Override ¶
func NewApproleAuthBackendRoleSecretId_Override(a ApproleAuthBackendRoleSecretId, scope constructs.Construct, id *string, config *ApproleAuthBackendRoleSecretIdConfig)
Create a new {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id} Resource.
Types ¶
type ApproleAuthBackendRoleSecretId ¶
type ApproleAuthBackendRoleSecretId interface { cdktf.TerraformResource Accessor() *string Backend() *string SetBackend(val *string) BackendInput() *string // Experimental. CdktfStack() cdktf.TerraformStack CidrList() *[]*string SetCidrList(val *[]*string) CidrListInput() *[]*string // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) // Experimental. ConstructNodeMetadata() *map[string]interface{} // Experimental. Count() *float64 // Experimental. SetCount(val *float64) // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string Id() *string SetId(val *string) IdInput() *string // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) Metadata() *string SetMetadata(val *string) MetadataInput() *string Namespace() *string SetNamespace(val *string) NamespaceInput() *string // The tree node. Node() constructs.Node // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} RoleName() *string SetRoleName(val *string) RoleNameInput() *string SecretId() *string SetSecretId(val *string) SecretIdInput() *string // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string WithWrappedAccessor() interface{} SetWithWrappedAccessor(val interface{}) WithWrappedAccessorInput() interface{} WrappingAccessor() *string WrappingToken() *string WrappingTtl() *string SetWrappingTtl(val *string) WrappingTtlInput() *string // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) ResetBackend() ResetCidrList() ResetId() ResetMetadata() ResetNamespace() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() ResetSecretId() ResetWithWrappedAccessor() ResetWrappingTtl() SynthesizeAttributes() *map[string]interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id}.
func NewApproleAuthBackendRoleSecretId ¶
func NewApproleAuthBackendRoleSecretId(scope constructs.Construct, id *string, config *ApproleAuthBackendRoleSecretIdConfig) ApproleAuthBackendRoleSecretId
Create a new {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id vault_approle_auth_backend_role_secret_id} Resource.
type ApproleAuthBackendRoleSecretIdConfig ¶
type ApproleAuthBackendRoleSecretIdConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count *float64 `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Name of the role. // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#role_name ApproleAuthBackendRoleSecretId#role_name} RoleName *string `field:"required" json:"roleName" yaml:"roleName"` // Unique name of the auth backend to configure. // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#backend ApproleAuthBackendRoleSecretId#backend} Backend *string `field:"optional" json:"backend" yaml:"backend"` // List of CIDR blocks that can log in using the SecretID. // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#cidr_list ApproleAuthBackendRoleSecretId#cidr_list} CidrList *[]*string `field:"optional" json:"cidrList" yaml:"cidrList"` // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#id ApproleAuthBackendRoleSecretId#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // JSON-encoded secret data to write. // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#metadata ApproleAuthBackendRoleSecretId#metadata} Metadata *string `field:"optional" json:"metadata" yaml:"metadata"` // Target namespace. (requires Enterprise). // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#namespace ApproleAuthBackendRoleSecretId#namespace} Namespace *string `field:"optional" json:"namespace" yaml:"namespace"` // The SecretID to be managed. If not specified, Vault auto-generates one. // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#secret_id ApproleAuthBackendRoleSecretId#secret_id} SecretId *string `field:"optional" json:"secretId" yaml:"secretId"` // Use the wrapped secret-id accessor as the id of this resource. // // If false, a fresh secret-id will be regenerated whenever the wrapping token is expired or invalidated through unwrapping. // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#with_wrapped_accessor ApproleAuthBackendRoleSecretId#with_wrapped_accessor} WithWrappedAccessor interface{} `field:"optional" json:"withWrappedAccessor" yaml:"withWrappedAccessor"` // The TTL duration of the wrapped SecretID. // // Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id#wrapping_ttl ApproleAuthBackendRoleSecretId#wrapping_ttl} WrappingTtl *string `field:"optional" json:"wrappingTtl" yaml:"wrappingTtl"` }