Documentation ¶
Index ¶
- func ConsulSecretBackendRole_IsConstruct(x interface{}) *bool
- func ConsulSecretBackendRole_IsTerraformElement(x interface{}) *bool
- func ConsulSecretBackendRole_IsTerraformResource(x interface{}) *bool
- func ConsulSecretBackendRole_TfResourceType() *string
- func NewConsulSecretBackendRole_Override(c ConsulSecretBackendRole, scope constructs.Construct, id *string, ...)
- type ConsulSecretBackendRole
- type ConsulSecretBackendRoleConfig
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func ConsulSecretBackendRole_IsConstruct ¶
func ConsulSecretBackendRole_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func ConsulSecretBackendRole_IsTerraformElement ¶
func ConsulSecretBackendRole_IsTerraformElement(x interface{}) *bool
Experimental.
func ConsulSecretBackendRole_IsTerraformResource ¶
func ConsulSecretBackendRole_IsTerraformResource(x interface{}) *bool
Experimental.
func ConsulSecretBackendRole_TfResourceType ¶
func ConsulSecretBackendRole_TfResourceType() *string
func NewConsulSecretBackendRole_Override ¶
func NewConsulSecretBackendRole_Override(c ConsulSecretBackendRole, scope constructs.Construct, id *string, config *ConsulSecretBackendRoleConfig)
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} Resource.
Types ¶
type ConsulSecretBackendRole ¶
type ConsulSecretBackendRole interface { cdktf.TerraformResource Backend() *string SetBackend(val *string) BackendInput() *string // Experimental. CdktfStack() cdktf.TerraformStack // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) // Experimental. ConstructNodeMetadata() *map[string]interface{} ConsulNamespace() *string SetConsulNamespace(val *string) ConsulNamespaceInput() *string ConsulPolicies() *[]*string SetConsulPolicies(val *[]*string) ConsulPoliciesInput() *[]*string ConsulRoles() *[]*string SetConsulRoles(val *[]*string) ConsulRolesInput() *[]*string // Experimental. Count() interface{} // Experimental. SetCount(val interface{}) // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string Id() *string SetId(val *string) IdInput() *string // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) Local() interface{} SetLocal(val interface{}) LocalInput() interface{} MaxTtl() *float64 SetMaxTtl(val *float64) MaxTtlInput() *float64 Name() *string SetName(val *string) NameInput() *string Namespace() *string SetNamespace(val *string) NamespaceInput() *string // The tree node. Node() constructs.Node NodeIdentities() *[]*string SetNodeIdentities(val *[]*string) NodeIdentitiesInput() *[]*string Partition() *string SetPartition(val *string) PartitionInput() *string Policies() *[]*string SetPolicies(val *[]*string) PoliciesInput() *[]*string // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} ServiceIdentities() *[]*string SetServiceIdentities(val *[]*string) ServiceIdentitiesInput() *[]*string // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string TokenType() *string SetTokenType(val *string) TokenTypeInput() *string Ttl() *float64 SetTtl(val *float64) TtlInput() *float64 // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) ResetBackend() ResetConsulNamespace() ResetConsulPolicies() ResetConsulRoles() ResetId() ResetLocal() ResetMaxTtl() ResetNamespace() ResetNodeIdentities() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() ResetPartition() ResetPolicies() ResetServiceIdentities() ResetTokenType() ResetTtl() SynthesizeAttributes() *map[string]interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role}.
func NewConsulSecretBackendRole ¶
func NewConsulSecretBackendRole(scope constructs.Construct, id *string, config *ConsulSecretBackendRoleConfig) ConsulSecretBackendRole
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role vault_consul_secret_backend_role} Resource.
type ConsulSecretBackendRoleConfig ¶
type ConsulSecretBackendRoleConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count interface{} `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The name of an existing role against which to create this Consul credential. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#name ConsulSecretBackendRole#name} Name *string `field:"required" json:"name" yaml:"name"` // The path of the Consul Secret Backend the role belongs to. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#backend ConsulSecretBackendRole#backend} Backend *string `field:"optional" json:"backend" yaml:"backend"` // The Consul namespace that the token will be created in. Applicable for Vault 1.10+ and Consul 1.7+. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#consul_namespace ConsulSecretBackendRole#consul_namespace} ConsulNamespace *string `field:"optional" json:"consulNamespace" yaml:"consulNamespace"` // List of Consul policies to associate with this role. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#consul_policies ConsulSecretBackendRole#consul_policies} ConsulPolicies *[]*string `field:"optional" json:"consulPolicies" yaml:"consulPolicies"` // Set of Consul roles to attach to the token. Applicable for Vault 1.10+ with Consul 1.5+. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#consul_roles ConsulSecretBackendRole#consul_roles} ConsulRoles *[]*string `field:"optional" json:"consulRoles" yaml:"consulRoles"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#id ConsulSecretBackendRole#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Indicates that the token should not be replicated globally and instead be local to the current datacenter. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#local ConsulSecretBackendRole#local} Local interface{} `field:"optional" json:"local" yaml:"local"` // Maximum TTL for leases associated with this role, in seconds. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#max_ttl ConsulSecretBackendRole#max_ttl} MaxTtl *float64 `field:"optional" json:"maxTtl" yaml:"maxTtl"` // Target namespace. (requires Enterprise). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#namespace ConsulSecretBackendRole#namespace} Namespace *string `field:"optional" json:"namespace" yaml:"namespace"` // Set of Consul node identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#node_identities ConsulSecretBackendRole#node_identities} NodeIdentities *[]*string `field:"optional" json:"nodeIdentities" yaml:"nodeIdentities"` // The Consul admin partition that the token will be created in. Applicable for Vault 1.10+ and Consul 1.11+. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#partition ConsulSecretBackendRole#partition} Partition *string `field:"optional" json:"partition" yaml:"partition"` // List of Consul policies to associate with this role. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#policies ConsulSecretBackendRole#policies} Policies *[]*string `field:"optional" json:"policies" yaml:"policies"` // Set of Consul service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#service_identities ConsulSecretBackendRole#service_identities} ServiceIdentities *[]*string `field:"optional" json:"serviceIdentities" yaml:"serviceIdentities"` // Specifies the type of token to create when using this role. Valid values are "client" or "management". // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#token_type ConsulSecretBackendRole#token_type} TokenType *string `field:"optional" json:"tokenType" yaml:"tokenType"` // Specifies the TTL for this role. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.15.0/docs/resources/consul_secret_backend_role#ttl ConsulSecretBackendRole#ttl} Ttl *float64 `field:"optional" json:"ttl" yaml:"ttl"` }