consulsecretbackendrole

package
v7.0.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 18, 2023 License: MPL-2.0 Imports: 7 Imported by: 0

README

vault_consul_secret_backend_role

Refer to the Terraform Registory for docs: vault_consul_secret_backend_role.

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func ConsulSecretBackendRole_IsConstruct

func ConsulSecretBackendRole_IsConstruct(x interface{}) *bool

Checks if `x` is a construct.

Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.

Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.

Returns: true if `x` is an object created from a class which extends `Construct`.

func ConsulSecretBackendRole_IsTerraformElement

func ConsulSecretBackendRole_IsTerraformElement(x interface{}) *bool

Experimental.

func ConsulSecretBackendRole_IsTerraformResource

func ConsulSecretBackendRole_IsTerraformResource(x interface{}) *bool

Experimental.

func ConsulSecretBackendRole_TfResourceType

func ConsulSecretBackendRole_TfResourceType() *string

func NewConsulSecretBackendRole_Override

func NewConsulSecretBackendRole_Override(c ConsulSecretBackendRole, scope constructs.Construct, id *string, config *ConsulSecretBackendRoleConfig)

Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} Resource.

Types

type ConsulSecretBackendRole

type ConsulSecretBackendRole interface {
	cdktf.TerraformResource
	Backend() *string
	SetBackend(val *string)
	BackendInput() *string
	// Experimental.
	CdktfStack() cdktf.TerraformStack
	// Experimental.
	Connection() interface{}
	// Experimental.
	SetConnection(val interface{})
	// Experimental.
	ConstructNodeMetadata() *map[string]interface{}
	ConsulNamespace() *string
	SetConsulNamespace(val *string)
	ConsulNamespaceInput() *string
	ConsulPolicies() *[]*string
	SetConsulPolicies(val *[]*string)
	ConsulPoliciesInput() *[]*string
	ConsulRoles() *[]*string
	SetConsulRoles(val *[]*string)
	ConsulRolesInput() *[]*string
	// Experimental.
	Count() interface{}
	// Experimental.
	SetCount(val interface{})
	// Experimental.
	DependsOn() *[]*string
	// Experimental.
	SetDependsOn(val *[]*string)
	// Experimental.
	ForEach() cdktf.ITerraformIterator
	// Experimental.
	SetForEach(val cdktf.ITerraformIterator)
	// Experimental.
	Fqn() *string
	// Experimental.
	FriendlyUniqueId() *string
	Id() *string
	SetId(val *string)
	IdInput() *string
	// Experimental.
	Lifecycle() *cdktf.TerraformResourceLifecycle
	// Experimental.
	SetLifecycle(val *cdktf.TerraformResourceLifecycle)
	Local() interface{}
	SetLocal(val interface{})
	LocalInput() interface{}
	MaxTtl() *float64
	SetMaxTtl(val *float64)
	MaxTtlInput() *float64
	Name() *string
	SetName(val *string)
	NameInput() *string
	Namespace() *string
	SetNamespace(val *string)
	NamespaceInput() *string
	// The tree node.
	Node() constructs.Node
	NodeIdentities() *[]*string
	SetNodeIdentities(val *[]*string)
	NodeIdentitiesInput() *[]*string
	Partition() *string
	SetPartition(val *string)
	PartitionInput() *string
	Policies() *[]*string
	SetPolicies(val *[]*string)
	PoliciesInput() *[]*string
	// Experimental.
	Provider() cdktf.TerraformProvider
	// Experimental.
	SetProvider(val cdktf.TerraformProvider)
	// Experimental.
	Provisioners() *[]interface{}
	// Experimental.
	SetProvisioners(val *[]interface{})
	// Experimental.
	RawOverrides() interface{}
	ServiceIdentities() *[]*string
	SetServiceIdentities(val *[]*string)
	ServiceIdentitiesInput() *[]*string
	// Experimental.
	TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata
	// Experimental.
	TerraformMetaArguments() *map[string]interface{}
	// Experimental.
	TerraformResourceType() *string
	TokenType() *string
	SetTokenType(val *string)
	TokenTypeInput() *string
	Ttl() *float64
	SetTtl(val *float64)
	TtlInput() *float64
	// Experimental.
	AddOverride(path *string, value interface{})
	// Experimental.
	GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{}
	// Experimental.
	GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable
	// Experimental.
	GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool
	// Experimental.
	GetListAttribute(terraformAttribute *string) *[]*string
	// Experimental.
	GetNumberAttribute(terraformAttribute *string) *float64
	// Experimental.
	GetNumberListAttribute(terraformAttribute *string) *[]*float64
	// Experimental.
	GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64
	// Experimental.
	GetStringAttribute(terraformAttribute *string) *string
	// Experimental.
	GetStringMapAttribute(terraformAttribute *string) *map[string]*string
	// Experimental.
	InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable
	// Overrides the auto-generated logical ID with a specific ID.
	// Experimental.
	OverrideLogicalId(newLogicalId *string)
	ResetBackend()
	ResetConsulNamespace()
	ResetConsulPolicies()
	ResetConsulRoles()
	ResetId()
	ResetLocal()
	ResetMaxTtl()
	ResetNamespace()
	ResetNodeIdentities()
	// Resets a previously passed logical Id to use the auto-generated logical id again.
	// Experimental.
	ResetOverrideLogicalId()
	ResetPartition()
	ResetPolicies()
	ResetServiceIdentities()
	ResetTokenType()
	ResetTtl()
	SynthesizeAttributes() *map[string]interface{}
	// Experimental.
	ToMetadata() interface{}
	// Returns a string representation of this construct.
	ToString() *string
	// Adds this resource to the terraform JSON output.
	// Experimental.
	ToTerraform() interface{}
}

Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.

func NewConsulSecretBackendRole

func NewConsulSecretBackendRole(scope constructs.Construct, id *string, config *ConsulSecretBackendRoleConfig) ConsulSecretBackendRole

Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} Resource.

type ConsulSecretBackendRoleConfig

type ConsulSecretBackendRoleConfig struct {
	// Experimental.
	Connection interface{} `field:"optional" json:"connection" yaml:"connection"`
	// Experimental.
	Count interface{} `field:"optional" json:"count" yaml:"count"`
	// Experimental.
	DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"`
	// Experimental.
	ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"`
	// Experimental.
	Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"`
	// Experimental.
	Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"`
	// Experimental.
	Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"`
	// The name of an existing role against which to create this Consul credential.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name}
	Name *string `field:"required" json:"name" yaml:"name"`
	// The path of the Consul Secret Backend the role belongs to.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend}
	Backend *string `field:"optional" json:"backend" yaml:"backend"`
	// The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace}
	ConsulNamespace *string `field:"optional" json:"consulNamespace" yaml:"consulNamespace"`
	// List of Consul policies to associate with this role.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies}
	ConsulPolicies *[]*string `field:"optional" json:"consulPolicies" yaml:"consulPolicies"`
	// Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles}
	ConsulRoles *[]*string `field:"optional" json:"consulRoles" yaml:"consulRoles"`
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}.
	//
	// Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
	// If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
	Id *string `field:"optional" json:"id" yaml:"id"`
	// Indicates that the token should not be replicated globally and instead be local to the current datacenter.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local}
	Local interface{} `field:"optional" json:"local" yaml:"local"`
	// Maximum TTL for leases associated with this role, in seconds.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl}
	MaxTtl *float64 `field:"optional" json:"maxTtl" yaml:"maxTtl"`
	// Target namespace. (requires Enterprise).
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace}
	Namespace *string `field:"optional" json:"namespace" yaml:"namespace"`
	// Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities}
	NodeIdentities *[]*string `field:"optional" json:"nodeIdentities" yaml:"nodeIdentities"`
	// The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition}
	Partition *string `field:"optional" json:"partition" yaml:"partition"`
	// List of Consul policies to associate with this role.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies}
	Policies *[]*string `field:"optional" json:"policies" yaml:"policies"`
	// Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities}
	ServiceIdentities *[]*string `field:"optional" json:"serviceIdentities" yaml:"serviceIdentities"`
	// Specifies the type of token to create when using this role. Valid values are "client" or "management".
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type}
	TokenType *string `field:"optional" json:"tokenType" yaml:"tokenType"`
	// Specifies the TTL for this role.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl}
	Ttl *float64 `field:"optional" json:"ttl" yaml:"ttl"`
}

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL