datavaultazureaccesscredentials

package
v9.0.2 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Aug 3, 2023 License: MPL-2.0 Imports: 7 Imported by: 0

README

data_vault_azure_access_credentials

Refer to the Terraform Registory for docs: data_vault_azure_access_credentials.

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func DataVaultAzureAccessCredentials_IsConstruct

func DataVaultAzureAccessCredentials_IsConstruct(x interface{}) *bool

Checks if `x` is a construct.

Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.

Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.

Returns: true if `x` is an object created from a class which extends `Construct`.

func DataVaultAzureAccessCredentials_IsTerraformDataSource

func DataVaultAzureAccessCredentials_IsTerraformDataSource(x interface{}) *bool

Experimental.

func DataVaultAzureAccessCredentials_IsTerraformElement

func DataVaultAzureAccessCredentials_IsTerraformElement(x interface{}) *bool

Experimental.

func DataVaultAzureAccessCredentials_TfResourceType

func DataVaultAzureAccessCredentials_TfResourceType() *string

func NewDataVaultAzureAccessCredentials_Override

func NewDataVaultAzureAccessCredentials_Override(d DataVaultAzureAccessCredentials, scope constructs.Construct, id *string, config *DataVaultAzureAccessCredentialsConfig)

Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials} Data Source.

Types

type DataVaultAzureAccessCredentials

type DataVaultAzureAccessCredentials interface {
	cdktf.TerraformDataSource
	Backend() *string
	SetBackend(val *string)
	BackendInput() *string
	// Experimental.
	CdktfStack() cdktf.TerraformStack
	ClientId() *string
	ClientSecret() *string
	// Experimental.
	ConstructNodeMetadata() *map[string]interface{}
	// Experimental.
	Count() interface{}
	// Experimental.
	SetCount(val interface{})
	// Experimental.
	DependsOn() *[]*string
	// Experimental.
	SetDependsOn(val *[]*string)
	Environment() *string
	SetEnvironment(val *string)
	EnvironmentInput() *string
	// Experimental.
	ForEach() cdktf.ITerraformIterator
	// Experimental.
	SetForEach(val cdktf.ITerraformIterator)
	// Experimental.
	Fqn() *string
	// Experimental.
	FriendlyUniqueId() *string
	Id() *string
	SetId(val *string)
	IdInput() *string
	LeaseDuration() *float64
	LeaseId() *string
	LeaseRenewable() cdktf.IResolvable
	LeaseStartTime() *string
	// Experimental.
	Lifecycle() *cdktf.TerraformResourceLifecycle
	// Experimental.
	SetLifecycle(val *cdktf.TerraformResourceLifecycle)
	MaxCredValidationSeconds() *float64
	SetMaxCredValidationSeconds(val *float64)
	MaxCredValidationSecondsInput() *float64
	Namespace() *string
	SetNamespace(val *string)
	NamespaceInput() *string
	// The tree node.
	Node() constructs.Node
	NumSecondsBetweenTests() *float64
	SetNumSecondsBetweenTests(val *float64)
	NumSecondsBetweenTestsInput() *float64
	NumSequentialSuccesses() *float64
	SetNumSequentialSuccesses(val *float64)
	NumSequentialSuccessesInput() *float64
	// Experimental.
	Provider() cdktf.TerraformProvider
	// Experimental.
	SetProvider(val cdktf.TerraformProvider)
	// Experimental.
	RawOverrides() interface{}
	Role() *string
	SetRole(val *string)
	RoleInput() *string
	SubscriptionId() *string
	SetSubscriptionId(val *string)
	SubscriptionIdInput() *string
	TenantId() *string
	SetTenantId(val *string)
	TenantIdInput() *string
	// Experimental.
	TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata
	// Experimental.
	TerraformMetaArguments() *map[string]interface{}
	// Experimental.
	TerraformResourceType() *string
	ValidateCreds() interface{}
	SetValidateCreds(val interface{})
	ValidateCredsInput() interface{}
	// Experimental.
	AddOverride(path *string, value interface{})
	// Experimental.
	GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{}
	// Experimental.
	GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable
	// Experimental.
	GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool
	// Experimental.
	GetListAttribute(terraformAttribute *string) *[]*string
	// Experimental.
	GetNumberAttribute(terraformAttribute *string) *float64
	// Experimental.
	GetNumberListAttribute(terraformAttribute *string) *[]*float64
	// Experimental.
	GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64
	// Experimental.
	GetStringAttribute(terraformAttribute *string) *string
	// Experimental.
	GetStringMapAttribute(terraformAttribute *string) *map[string]*string
	// Experimental.
	InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable
	// Overrides the auto-generated logical ID with a specific ID.
	// Experimental.
	OverrideLogicalId(newLogicalId *string)
	ResetEnvironment()
	ResetId()
	ResetMaxCredValidationSeconds()
	ResetNamespace()
	ResetNumSecondsBetweenTests()
	ResetNumSequentialSuccesses()
	// Resets a previously passed logical Id to use the auto-generated logical id again.
	// Experimental.
	ResetOverrideLogicalId()
	ResetSubscriptionId()
	ResetTenantId()
	ResetValidateCreds()
	SynthesizeAttributes() *map[string]interface{}
	// Experimental.
	ToMetadata() interface{}
	// Returns a string representation of this construct.
	ToString() *string
	// Adds this resource to the terraform JSON output.
	// Experimental.
	ToTerraform() interface{}
}

Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials}.

func NewDataVaultAzureAccessCredentials

func NewDataVaultAzureAccessCredentials(scope constructs.Construct, id *string, config *DataVaultAzureAccessCredentialsConfig) DataVaultAzureAccessCredentials

Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials vault_azure_access_credentials} Data Source.

type DataVaultAzureAccessCredentialsConfig

type DataVaultAzureAccessCredentialsConfig struct {
	// Experimental.
	Connection interface{} `field:"optional" json:"connection" yaml:"connection"`
	// Experimental.
	Count interface{} `field:"optional" json:"count" yaml:"count"`
	// Experimental.
	DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"`
	// Experimental.
	ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"`
	// Experimental.
	Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"`
	// Experimental.
	Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"`
	// Experimental.
	Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"`
	// Azure Secret Backend to read credentials from.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#backend DataVaultAzureAccessCredentials#backend}
	Backend *string `field:"required" json:"backend" yaml:"backend"`
	// Azure Secret Role to read credentials from.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#role DataVaultAzureAccessCredentials#role}
	Role *string `field:"required" json:"role" yaml:"role"`
	// The Azure environment to use during credential validation.
	//
	// Defaults to the environment configured in the Vault backend.
	// Some possible values: AzurePublicCloud, AzureUSGovernmentCloud
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#environment DataVaultAzureAccessCredentials#environment}
	Environment *string `field:"optional" json:"environment" yaml:"environment"`
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#id DataVaultAzureAccessCredentials#id}.
	//
	// Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
	// If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
	Id *string `field:"optional" json:"id" yaml:"id"`
	// If 'validate_creds' is true, the number of seconds after which to give up validating credentials.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#max_cred_validation_seconds DataVaultAzureAccessCredentials#max_cred_validation_seconds}
	MaxCredValidationSeconds *float64 `field:"optional" json:"maxCredValidationSeconds" yaml:"maxCredValidationSeconds"`
	// Target namespace. (requires Enterprise).
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#namespace DataVaultAzureAccessCredentials#namespace}
	Namespace *string `field:"optional" json:"namespace" yaml:"namespace"`
	// If 'validate_creds' is true, the number of seconds to wait between each test of generated credentials.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#num_seconds_between_tests DataVaultAzureAccessCredentials#num_seconds_between_tests}
	NumSecondsBetweenTests *float64 `field:"optional" json:"numSecondsBetweenTests" yaml:"numSecondsBetweenTests"`
	// If 'validate_creds' is true, the number of sequential successes required to validate generated credentials.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#num_sequential_successes DataVaultAzureAccessCredentials#num_sequential_successes}
	NumSequentialSuccesses *float64 `field:"optional" json:"numSequentialSuccesses" yaml:"numSequentialSuccesses"`
	// The subscription ID to use during credential validation. Defaults to the subscription ID configured in the Vault backend.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#subscription_id DataVaultAzureAccessCredentials#subscription_id}
	SubscriptionId *string `field:"optional" json:"subscriptionId" yaml:"subscriptionId"`
	// The tenant ID to use during credential validation. Defaults to the tenant ID configured in the Vault backend.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#tenant_id DataVaultAzureAccessCredentials#tenant_id}
	TenantId *string `field:"optional" json:"tenantId" yaml:"tenantId"`
	// Whether generated credentials should be validated before being returned.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/data-sources/azure_access_credentials#validate_creds DataVaultAzureAccessCredentials#validate_creds}
	ValidateCreds interface{} `field:"optional" json:"validateCreds" yaml:"validateCreds"`
}

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL