Documentation ¶
Index ¶
- func LdapSecretBackend_IsConstruct(x interface{}) *bool
- func LdapSecretBackend_IsTerraformElement(x interface{}) *bool
- func LdapSecretBackend_IsTerraformResource(x interface{}) *bool
- func LdapSecretBackend_TfResourceType() *string
- func NewLdapSecretBackend_Override(l LdapSecretBackend, scope constructs.Construct, id *string, ...)
- type LdapSecretBackend
- type LdapSecretBackendConfig
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func LdapSecretBackend_IsConstruct ¶
func LdapSecretBackend_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func LdapSecretBackend_IsTerraformElement ¶
func LdapSecretBackend_IsTerraformElement(x interface{}) *bool
Experimental.
func LdapSecretBackend_IsTerraformResource ¶
func LdapSecretBackend_IsTerraformResource(x interface{}) *bool
Experimental.
func LdapSecretBackend_TfResourceType ¶
func LdapSecretBackend_TfResourceType() *string
func NewLdapSecretBackend_Override ¶
func NewLdapSecretBackend_Override(l LdapSecretBackend, scope constructs.Construct, id *string, config *LdapSecretBackendConfig)
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend} Resource.
Types ¶
type LdapSecretBackend ¶
type LdapSecretBackend interface { cdktf.TerraformResource Accessor() *string AllowedManagedKeys() *[]*string SetAllowedManagedKeys(val *[]*string) AllowedManagedKeysInput() *[]*string AuditNonHmacRequestKeys() *[]*string SetAuditNonHmacRequestKeys(val *[]*string) AuditNonHmacRequestKeysInput() *[]*string AuditNonHmacResponseKeys() *[]*string SetAuditNonHmacResponseKeys(val *[]*string) AuditNonHmacResponseKeysInput() *[]*string Binddn() *string SetBinddn(val *string) BinddnInput() *string Bindpass() *string SetBindpass(val *string) BindpassInput() *string // Experimental. CdktfStack() cdktf.TerraformStack Certificate() *string SetCertificate(val *string) CertificateInput() *string ClientTlsCert() *string SetClientTlsCert(val *string) ClientTlsCertInput() *string ClientTlsKey() *string SetClientTlsKey(val *string) ClientTlsKeyInput() *string // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) ConnectionTimeout() *float64 SetConnectionTimeout(val *float64) ConnectionTimeoutInput() *float64 // Experimental. ConstructNodeMetadata() *map[string]interface{} // Experimental. Count() interface{} // Experimental. SetCount(val interface{}) DefaultLeaseTtlSeconds() *float64 SetDefaultLeaseTtlSeconds(val *float64) DefaultLeaseTtlSecondsInput() *float64 // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) Description() *string SetDescription(val *string) DescriptionInput() *string DisableRemount() interface{} SetDisableRemount(val interface{}) DisableRemountInput() interface{} ExternalEntropyAccess() interface{} SetExternalEntropyAccess(val interface{}) ExternalEntropyAccessInput() interface{} // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string Id() *string SetId(val *string) IdInput() *string InsecureTls() interface{} SetInsecureTls(val interface{}) InsecureTlsInput() interface{} Length() *float64 SetLength(val *float64) LengthInput() *float64 // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) Local() interface{} SetLocal(val interface{}) LocalInput() interface{} MaxLeaseTtlSeconds() *float64 SetMaxLeaseTtlSeconds(val *float64) MaxLeaseTtlSecondsInput() *float64 Namespace() *string SetNamespace(val *string) NamespaceInput() *string // The tree node. Node() constructs.Node Options() *map[string]*string SetOptions(val *map[string]*string) OptionsInput() *map[string]*string PasswordPolicy() *string SetPasswordPolicy(val *string) PasswordPolicyInput() *string Path() *string SetPath(val *string) PathInput() *string // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} RequestTimeout() *float64 SetRequestTimeout(val *float64) RequestTimeoutInput() *float64 Schema() *string SetSchema(val *string) SchemaInput() *string SealWrap() interface{} SetSealWrap(val interface{}) SealWrapInput() interface{} Starttls() interface{} SetStarttls(val interface{}) StarttlsInput() interface{} // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string Upndomain() *string SetUpndomain(val *string) UpndomainInput() *string Url() *string SetUrl(val *string) UrlInput() *string Userattr() *string SetUserattr(val *string) UserattrInput() *string Userdn() *string SetUserdn(val *string) UserdnInput() *string // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) ResetAllowedManagedKeys() ResetAuditNonHmacRequestKeys() ResetAuditNonHmacResponseKeys() ResetCertificate() ResetClientTlsCert() ResetClientTlsKey() ResetConnectionTimeout() ResetDefaultLeaseTtlSeconds() ResetDescription() ResetDisableRemount() ResetExternalEntropyAccess() ResetId() ResetInsecureTls() ResetLength() ResetLocal() ResetMaxLeaseTtlSeconds() ResetNamespace() ResetOptions() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() ResetPasswordPolicy() ResetPath() ResetRequestTimeout() ResetSchema() ResetSealWrap() ResetStarttls() ResetUpndomain() ResetUrl() ResetUserattr() ResetUserdn() SynthesizeAttributes() *map[string]interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend}.
func NewLdapSecretBackend ¶
func NewLdapSecretBackend(scope constructs.Construct, id *string, config *LdapSecretBackendConfig) LdapSecretBackend
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend vault_ldap_secret_backend} Resource.
type LdapSecretBackendConfig ¶
type LdapSecretBackendConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count interface{} `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Distinguished name of object to bind when performing user and group search. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#binddn LdapSecretBackend#binddn} Binddn *string `field:"required" json:"binddn" yaml:"binddn"` // LDAP password for searching for the user DN. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#bindpass LdapSecretBackend#bindpass} Bindpass *string `field:"required" json:"bindpass" yaml:"bindpass"` // List of managed key registry entry names that the mount in question is allowed to access. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#allowed_managed_keys LdapSecretBackend#allowed_managed_keys} AllowedManagedKeys *[]*string `field:"optional" json:"allowedManagedKeys" yaml:"allowedManagedKeys"` // Specifies the list of keys that will not be HMAC'd by audit devices in the request data object. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#audit_non_hmac_request_keys LdapSecretBackend#audit_non_hmac_request_keys} AuditNonHmacRequestKeys *[]*string `field:"optional" json:"auditNonHmacRequestKeys" yaml:"auditNonHmacRequestKeys"` // Specifies the list of keys that will not be HMAC'd by audit devices in the response data object. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#audit_non_hmac_response_keys LdapSecretBackend#audit_non_hmac_response_keys} AuditNonHmacResponseKeys *[]*string `field:"optional" json:"auditNonHmacResponseKeys" yaml:"auditNonHmacResponseKeys"` // CA certificate to use when verifying LDAP server certificate, must be x509 PEM encoded. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#certificate LdapSecretBackend#certificate} Certificate *string `field:"optional" json:"certificate" yaml:"certificate"` // Client certificate to provide to the LDAP server, must be x509 PEM encoded. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#client_tls_cert LdapSecretBackend#client_tls_cert} ClientTlsCert *string `field:"optional" json:"clientTlsCert" yaml:"clientTlsCert"` // Client certificate key to provide to the LDAP server, must be x509 PEM encoded. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#client_tls_key LdapSecretBackend#client_tls_key} ClientTlsKey *string `field:"optional" json:"clientTlsKey" yaml:"clientTlsKey"` // Timeout, in seconds, when attempting to connect to the LDAP server before trying the next URL in the configuration. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#connection_timeout LdapSecretBackend#connection_timeout} ConnectionTimeout *float64 `field:"optional" json:"connectionTimeout" yaml:"connectionTimeout"` // Default lease duration for tokens and secrets in seconds. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#default_lease_ttl_seconds LdapSecretBackend#default_lease_ttl_seconds} DefaultLeaseTtlSeconds *float64 `field:"optional" json:"defaultLeaseTtlSeconds" yaml:"defaultLeaseTtlSeconds"` // Human-friendly description of the mount. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#description LdapSecretBackend#description} Description *string `field:"optional" json:"description" yaml:"description"` // If set, opts out of mount migration on path updates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#disable_remount LdapSecretBackend#disable_remount} DisableRemount interface{} `field:"optional" json:"disableRemount" yaml:"disableRemount"` // Enable the secrets engine to access Vault's external entropy source. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#external_entropy_access LdapSecretBackend#external_entropy_access} ExternalEntropyAccess interface{} `field:"optional" json:"externalEntropyAccess" yaml:"externalEntropyAccess"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#id LdapSecretBackend#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Skip LDAP server SSL Certificate verification - insecure and not recommended for production use. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#insecure_tls LdapSecretBackend#insecure_tls} InsecureTls interface{} `field:"optional" json:"insecureTls" yaml:"insecureTls"` // The desired length of passwords that Vault generates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#length LdapSecretBackend#length} Length *float64 `field:"optional" json:"length" yaml:"length"` // Local mount flag that can be explicitly set to true to enforce local mount in HA environment. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#local LdapSecretBackend#local} Local interface{} `field:"optional" json:"local" yaml:"local"` // Maximum possible lease duration for tokens and secrets in seconds. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#max_lease_ttl_seconds LdapSecretBackend#max_lease_ttl_seconds} MaxLeaseTtlSeconds *float64 `field:"optional" json:"maxLeaseTtlSeconds" yaml:"maxLeaseTtlSeconds"` // Target namespace. (requires Enterprise). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#namespace LdapSecretBackend#namespace} Namespace *string `field:"optional" json:"namespace" yaml:"namespace"` // Specifies mount type specific options that are passed to the backend. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#options LdapSecretBackend#options} Options *map[string]*string `field:"optional" json:"options" yaml:"options"` // Name of the password policy to use to generate passwords. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#password_policy LdapSecretBackend#password_policy} PasswordPolicy *string `field:"optional" json:"passwordPolicy" yaml:"passwordPolicy"` // The path where the LDAP secrets backend is mounted. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#path LdapSecretBackend#path} Path *string `field:"optional" json:"path" yaml:"path"` // Timeout, in seconds, for the connection when making requests against the server before returning back an error. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#request_timeout LdapSecretBackend#request_timeout} RequestTimeout *float64 `field:"optional" json:"requestTimeout" yaml:"requestTimeout"` // The LDAP schema to use when storing entry passwords. Valid schemas include openldap, ad, and racf. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#schema LdapSecretBackend#schema} Schema *string `field:"optional" json:"schema" yaml:"schema"` // Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#seal_wrap LdapSecretBackend#seal_wrap} SealWrap interface{} `field:"optional" json:"sealWrap" yaml:"sealWrap"` // Issue a StartTLS command after establishing unencrypted connection. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#starttls LdapSecretBackend#starttls} Starttls interface{} `field:"optional" json:"starttls" yaml:"starttls"` // Enables userPrincipalDomain login with [username]@UPNDomain. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#upndomain LdapSecretBackend#upndomain} Upndomain *string `field:"optional" json:"upndomain" yaml:"upndomain"` // LDAP URL to connect to (default: ldap://127.0.0.1). Multiple URLs can be specified by concatenating them with commas; they will be tried in-order. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#url LdapSecretBackend#url} Url *string `field:"optional" json:"url" yaml:"url"` // Attribute used for users (default: cn). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#userattr LdapSecretBackend#userattr} Userattr *string `field:"optional" json:"userattr" yaml:"userattr"` // LDAP domain to use for users (eg: ou=People,dc=example,dc=org). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.16.0/docs/resources/ldap_secret_backend#userdn LdapSecretBackend#userdn} Userdn *string `field:"optional" json:"userdn" yaml:"userdn"` }