Documentation ¶
Index ¶
- func NewNomadSecretBackend_Override(n NomadSecretBackend, scope constructs.Construct, id *string, ...)
- func NomadSecretBackend_IsConstruct(x interface{}) *bool
- func NomadSecretBackend_IsTerraformElement(x interface{}) *bool
- func NomadSecretBackend_IsTerraformResource(x interface{}) *bool
- func NomadSecretBackend_TfResourceType() *string
- type NomadSecretBackend
- type NomadSecretBackendConfig
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewNomadSecretBackend_Override ¶
func NewNomadSecretBackend_Override(n NomadSecretBackend, scope constructs.Construct, id *string, config *NomadSecretBackendConfig)
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend} Resource.
func NomadSecretBackend_IsConstruct ¶
func NomadSecretBackend_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func NomadSecretBackend_IsTerraformElement ¶
func NomadSecretBackend_IsTerraformElement(x interface{}) *bool
Experimental.
func NomadSecretBackend_IsTerraformResource ¶
func NomadSecretBackend_IsTerraformResource(x interface{}) *bool
Experimental.
func NomadSecretBackend_TfResourceType ¶
func NomadSecretBackend_TfResourceType() *string
Types ¶
type NomadSecretBackend ¶
type NomadSecretBackend interface { cdktf.TerraformResource Address() *string SetAddress(val *string) AddressInput() *string Backend() *string SetBackend(val *string) BackendInput() *string CaCert() *string SetCaCert(val *string) CaCertInput() *string // Experimental. CdktfStack() cdktf.TerraformStack ClientCert() *string SetClientCert(val *string) ClientCertInput() *string ClientKey() *string SetClientKey(val *string) ClientKeyInput() *string // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) // Experimental. ConstructNodeMetadata() *map[string]interface{} // Experimental. Count() interface{} // Experimental. SetCount(val interface{}) DefaultLeaseTtlSeconds() *float64 SetDefaultLeaseTtlSeconds(val *float64) DefaultLeaseTtlSecondsInput() *float64 // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) Description() *string SetDescription(val *string) DescriptionInput() *string DisableRemount() interface{} SetDisableRemount(val interface{}) DisableRemountInput() interface{} // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string Id() *string SetId(val *string) IdInput() *string // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) Local() interface{} SetLocal(val interface{}) LocalInput() interface{} MaxLeaseTtlSeconds() *float64 SetMaxLeaseTtlSeconds(val *float64) MaxLeaseTtlSecondsInput() *float64 MaxTokenNameLength() *float64 SetMaxTokenNameLength(val *float64) MaxTokenNameLengthInput() *float64 MaxTtl() *float64 SetMaxTtl(val *float64) MaxTtlInput() *float64 Namespace() *string SetNamespace(val *string) NamespaceInput() *string // The tree node. Node() constructs.Node // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string Token() *string SetToken(val *string) TokenInput() *string Ttl() *float64 SetTtl(val *float64) TtlInput() *float64 // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) ResetAddress() ResetBackend() ResetCaCert() ResetClientCert() ResetClientKey() ResetDefaultLeaseTtlSeconds() ResetDescription() ResetDisableRemount() ResetId() ResetLocal() ResetMaxLeaseTtlSeconds() ResetMaxTokenNameLength() ResetMaxTtl() ResetNamespace() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() ResetToken() ResetTtl() SynthesizeAttributes() *map[string]interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend}.
func NewNomadSecretBackend ¶
func NewNomadSecretBackend(scope constructs.Construct, id *string, config *NomadSecretBackendConfig) NomadSecretBackend
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend vault_nomad_secret_backend} Resource.
type NomadSecretBackendConfig ¶
type NomadSecretBackendConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count interface{} `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // Specifies the address of the Nomad instance, provided as "protocol://host:port" like "http://127.0.0.1:4646". // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#address NomadSecretBackend#address} Address *string `field:"optional" json:"address" yaml:"address"` // The mount path for the Nomad backend. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#backend NomadSecretBackend#backend} Backend *string `field:"optional" json:"backend" yaml:"backend"` // CA certificate to use when verifying Nomad server certificate, must be x509 PEM encoded. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#ca_cert NomadSecretBackend#ca_cert} CaCert *string `field:"optional" json:"caCert" yaml:"caCert"` // Client certificate used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#client_cert NomadSecretBackend#client_cert} ClientCert *string `field:"optional" json:"clientCert" yaml:"clientCert"` // Client key used for Nomad's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#client_key NomadSecretBackend#client_key} ClientKey *string `field:"optional" json:"clientKey" yaml:"clientKey"` // Default lease duration for secrets in seconds. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#default_lease_ttl_seconds NomadSecretBackend#default_lease_ttl_seconds} DefaultLeaseTtlSeconds *float64 `field:"optional" json:"defaultLeaseTtlSeconds" yaml:"defaultLeaseTtlSeconds"` // Human-friendly description of the mount for the backend. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#description NomadSecretBackend#description} Description *string `field:"optional" json:"description" yaml:"description"` // If set, opts out of mount migration on path updates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#disable_remount NomadSecretBackend#disable_remount} DisableRemount interface{} `field:"optional" json:"disableRemount" yaml:"disableRemount"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#id NomadSecretBackend#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Mark the secrets engine as local-only. // // Local engines are not replicated or removed by replication. Tolerance duration to use when checking the last rotation time. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#local NomadSecretBackend#local} Local interface{} `field:"optional" json:"local" yaml:"local"` // Maximum possible lease duration for secrets in seconds. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#max_lease_ttl_seconds NomadSecretBackend#max_lease_ttl_seconds} MaxLeaseTtlSeconds *float64 `field:"optional" json:"maxLeaseTtlSeconds" yaml:"maxLeaseTtlSeconds"` // Specifies the maximum length to use for the name of the Nomad token generated with Generate Credential. // // If omitted, 0 is used and ignored, defaulting to the max value allowed by the Nomad version. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#max_token_name_length NomadSecretBackend#max_token_name_length} MaxTokenNameLength *float64 `field:"optional" json:"maxTokenNameLength" yaml:"maxTokenNameLength"` // Maximum possible lease duration for secrets in seconds. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#max_ttl NomadSecretBackend#max_ttl} MaxTtl *float64 `field:"optional" json:"maxTtl" yaml:"maxTtl"` // Target namespace. (requires Enterprise). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#namespace NomadSecretBackend#namespace} Namespace *string `field:"optional" json:"namespace" yaml:"namespace"` // Specifies the Nomad Management token to use. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#token NomadSecretBackend#token} Token *string `field:"optional" json:"token" yaml:"token"` // Maximum possible lease duration for secrets in seconds. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/nomad_secret_backend#ttl NomadSecretBackend#ttl} Ttl *float64 `field:"optional" json:"ttl" yaml:"ttl"` }