pkisecretbackendrole

package
v9.0.2 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Aug 3, 2023 License: MPL-2.0 Imports: 7 Imported by: 0

README

vault_pki_secret_backend_role

Refer to the Terraform Registory for docs: vault_pki_secret_backend_role.

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func NewPkiSecretBackendRolePolicyIdentifierList_Override

func NewPkiSecretBackendRolePolicyIdentifierList_Override(p PkiSecretBackendRolePolicyIdentifierList, terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, wrapsSet *bool)

func NewPkiSecretBackendRolePolicyIdentifierOutputReference_Override

func NewPkiSecretBackendRolePolicyIdentifierOutputReference_Override(p PkiSecretBackendRolePolicyIdentifierOutputReference, terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, complexObjectIndex *float64, complexObjectIsFromSet *bool)

func NewPkiSecretBackendRole_Override

func NewPkiSecretBackendRole_Override(p PkiSecretBackendRole, scope constructs.Construct, id *string, config *PkiSecretBackendRoleConfig)

Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} Resource.

func PkiSecretBackendRole_IsConstruct

func PkiSecretBackendRole_IsConstruct(x interface{}) *bool

Checks if `x` is a construct.

Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.

Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.

Returns: true if `x` is an object created from a class which extends `Construct`.

func PkiSecretBackendRole_IsTerraformElement

func PkiSecretBackendRole_IsTerraformElement(x interface{}) *bool

Experimental.

func PkiSecretBackendRole_IsTerraformResource

func PkiSecretBackendRole_IsTerraformResource(x interface{}) *bool

Experimental.

func PkiSecretBackendRole_TfResourceType

func PkiSecretBackendRole_TfResourceType() *string

Types

type PkiSecretBackendRole

type PkiSecretBackendRole interface {
	cdktf.TerraformResource
	AllowAnyName() interface{}
	SetAllowAnyName(val interface{})
	AllowAnyNameInput() interface{}
	AllowBareDomains() interface{}
	SetAllowBareDomains(val interface{})
	AllowBareDomainsInput() interface{}
	AllowedDomains() *[]*string
	SetAllowedDomains(val *[]*string)
	AllowedDomainsInput() *[]*string
	AllowedDomainsTemplate() interface{}
	SetAllowedDomainsTemplate(val interface{})
	AllowedDomainsTemplateInput() interface{}
	AllowedOtherSans() *[]*string
	SetAllowedOtherSans(val *[]*string)
	AllowedOtherSansInput() *[]*string
	AllowedSerialNumbers() *[]*string
	SetAllowedSerialNumbers(val *[]*string)
	AllowedSerialNumbersInput() *[]*string
	AllowedUriSans() *[]*string
	SetAllowedUriSans(val *[]*string)
	AllowedUriSansInput() *[]*string
	AllowedUriSansTemplate() interface{}
	SetAllowedUriSansTemplate(val interface{})
	AllowedUriSansTemplateInput() interface{}
	AllowedUserIds() *[]*string
	SetAllowedUserIds(val *[]*string)
	AllowedUserIdsInput() *[]*string
	AllowGlobDomains() interface{}
	SetAllowGlobDomains(val interface{})
	AllowGlobDomainsInput() interface{}
	AllowIpSans() interface{}
	SetAllowIpSans(val interface{})
	AllowIpSansInput() interface{}
	AllowLocalhost() interface{}
	SetAllowLocalhost(val interface{})
	AllowLocalhostInput() interface{}
	AllowSubdomains() interface{}
	SetAllowSubdomains(val interface{})
	AllowSubdomainsInput() interface{}
	AllowWildcardCertificates() interface{}
	SetAllowWildcardCertificates(val interface{})
	AllowWildcardCertificatesInput() interface{}
	Backend() *string
	SetBackend(val *string)
	BackendInput() *string
	BasicConstraintsValidForNonCa() interface{}
	SetBasicConstraintsValidForNonCa(val interface{})
	BasicConstraintsValidForNonCaInput() interface{}
	// Experimental.
	CdktfStack() cdktf.TerraformStack
	ClientFlag() interface{}
	SetClientFlag(val interface{})
	ClientFlagInput() interface{}
	CodeSigningFlag() interface{}
	SetCodeSigningFlag(val interface{})
	CodeSigningFlagInput() interface{}
	// Experimental.
	Connection() interface{}
	// Experimental.
	SetConnection(val interface{})
	// Experimental.
	ConstructNodeMetadata() *map[string]interface{}
	// Experimental.
	Count() interface{}
	// Experimental.
	SetCount(val interface{})
	Country() *[]*string
	SetCountry(val *[]*string)
	CountryInput() *[]*string
	// Experimental.
	DependsOn() *[]*string
	// Experimental.
	SetDependsOn(val *[]*string)
	EmailProtectionFlag() interface{}
	SetEmailProtectionFlag(val interface{})
	EmailProtectionFlagInput() interface{}
	EnforceHostnames() interface{}
	SetEnforceHostnames(val interface{})
	EnforceHostnamesInput() interface{}
	ExtKeyUsage() *[]*string
	SetExtKeyUsage(val *[]*string)
	ExtKeyUsageInput() *[]*string
	// Experimental.
	ForEach() cdktf.ITerraformIterator
	// Experimental.
	SetForEach(val cdktf.ITerraformIterator)
	// Experimental.
	Fqn() *string
	// Experimental.
	FriendlyUniqueId() *string
	GenerateLease() interface{}
	SetGenerateLease(val interface{})
	GenerateLeaseInput() interface{}
	Id() *string
	SetId(val *string)
	IdInput() *string
	IssuerRef() *string
	SetIssuerRef(val *string)
	IssuerRefInput() *string
	KeyBits() *float64
	SetKeyBits(val *float64)
	KeyBitsInput() *float64
	KeyType() *string
	SetKeyType(val *string)
	KeyTypeInput() *string
	KeyUsage() *[]*string
	SetKeyUsage(val *[]*string)
	KeyUsageInput() *[]*string
	// Experimental.
	Lifecycle() *cdktf.TerraformResourceLifecycle
	// Experimental.
	SetLifecycle(val *cdktf.TerraformResourceLifecycle)
	Locality() *[]*string
	SetLocality(val *[]*string)
	LocalityInput() *[]*string
	MaxTtl() *string
	SetMaxTtl(val *string)
	MaxTtlInput() *string
	Name() *string
	SetName(val *string)
	NameInput() *string
	Namespace() *string
	SetNamespace(val *string)
	NamespaceInput() *string
	// The tree node.
	Node() constructs.Node
	NoStore() interface{}
	SetNoStore(val interface{})
	NoStoreInput() interface{}
	NotBeforeDuration() *string
	SetNotBeforeDuration(val *string)
	NotBeforeDurationInput() *string
	Organization() *[]*string
	SetOrganization(val *[]*string)
	OrganizationInput() *[]*string
	Ou() *[]*string
	SetOu(val *[]*string)
	OuInput() *[]*string
	PolicyIdentifier() PkiSecretBackendRolePolicyIdentifierList
	PolicyIdentifierInput() interface{}
	PolicyIdentifiers() *[]*string
	SetPolicyIdentifiers(val *[]*string)
	PolicyIdentifiersInput() *[]*string
	PostalCode() *[]*string
	SetPostalCode(val *[]*string)
	PostalCodeInput() *[]*string
	// Experimental.
	Provider() cdktf.TerraformProvider
	// Experimental.
	SetProvider(val cdktf.TerraformProvider)
	Province() *[]*string
	SetProvince(val *[]*string)
	ProvinceInput() *[]*string
	// Experimental.
	Provisioners() *[]interface{}
	// Experimental.
	SetProvisioners(val *[]interface{})
	// Experimental.
	RawOverrides() interface{}
	RequireCn() interface{}
	SetRequireCn(val interface{})
	RequireCnInput() interface{}
	ServerFlag() interface{}
	SetServerFlag(val interface{})
	ServerFlagInput() interface{}
	StreetAddress() *[]*string
	SetStreetAddress(val *[]*string)
	StreetAddressInput() *[]*string
	// Experimental.
	TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata
	// Experimental.
	TerraformMetaArguments() *map[string]interface{}
	// Experimental.
	TerraformResourceType() *string
	Ttl() *string
	SetTtl(val *string)
	TtlInput() *string
	UseCsrCommonName() interface{}
	SetUseCsrCommonName(val interface{})
	UseCsrCommonNameInput() interface{}
	UseCsrSans() interface{}
	SetUseCsrSans(val interface{})
	UseCsrSansInput() interface{}
	// Experimental.
	AddOverride(path *string, value interface{})
	// Experimental.
	GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{}
	// Experimental.
	GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable
	// Experimental.
	GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool
	// Experimental.
	GetListAttribute(terraformAttribute *string) *[]*string
	// Experimental.
	GetNumberAttribute(terraformAttribute *string) *float64
	// Experimental.
	GetNumberListAttribute(terraformAttribute *string) *[]*float64
	// Experimental.
	GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64
	// Experimental.
	GetStringAttribute(terraformAttribute *string) *string
	// Experimental.
	GetStringMapAttribute(terraformAttribute *string) *map[string]*string
	// Experimental.
	InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable
	// Overrides the auto-generated logical ID with a specific ID.
	// Experimental.
	OverrideLogicalId(newLogicalId *string)
	PutPolicyIdentifier(value interface{})
	ResetAllowAnyName()
	ResetAllowBareDomains()
	ResetAllowedDomains()
	ResetAllowedDomainsTemplate()
	ResetAllowedOtherSans()
	ResetAllowedSerialNumbers()
	ResetAllowedUriSans()
	ResetAllowedUriSansTemplate()
	ResetAllowedUserIds()
	ResetAllowGlobDomains()
	ResetAllowIpSans()
	ResetAllowLocalhost()
	ResetAllowSubdomains()
	ResetAllowWildcardCertificates()
	ResetBasicConstraintsValidForNonCa()
	ResetClientFlag()
	ResetCodeSigningFlag()
	ResetCountry()
	ResetEmailProtectionFlag()
	ResetEnforceHostnames()
	ResetExtKeyUsage()
	ResetGenerateLease()
	ResetId()
	ResetIssuerRef()
	ResetKeyBits()
	ResetKeyType()
	ResetKeyUsage()
	ResetLocality()
	ResetMaxTtl()
	ResetNamespace()
	ResetNoStore()
	ResetNotBeforeDuration()
	ResetOrganization()
	ResetOu()
	// Resets a previously passed logical Id to use the auto-generated logical id again.
	// Experimental.
	ResetOverrideLogicalId()
	ResetPolicyIdentifier()
	ResetPolicyIdentifiers()
	ResetPostalCode()
	ResetProvince()
	ResetRequireCn()
	ResetServerFlag()
	ResetStreetAddress()
	ResetTtl()
	ResetUseCsrCommonName()
	ResetUseCsrSans()
	SynthesizeAttributes() *map[string]interface{}
	// Experimental.
	ToMetadata() interface{}
	// Returns a string representation of this construct.
	ToString() *string
	// Adds this resource to the terraform JSON output.
	// Experimental.
	ToTerraform() interface{}
}

Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}.

func NewPkiSecretBackendRole

func NewPkiSecretBackendRole(scope constructs.Construct, id *string, config *PkiSecretBackendRoleConfig) PkiSecretBackendRole

Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} Resource.

type PkiSecretBackendRoleConfig

type PkiSecretBackendRoleConfig struct {
	// Experimental.
	Connection interface{} `field:"optional" json:"connection" yaml:"connection"`
	// Experimental.
	Count interface{} `field:"optional" json:"count" yaml:"count"`
	// Experimental.
	DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"`
	// Experimental.
	ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"`
	// Experimental.
	Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"`
	// Experimental.
	Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"`
	// Experimental.
	Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"`
	// The path of the PKI secret backend the resource belongs to.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend}
	Backend *string `field:"required" json:"backend" yaml:"backend"`
	// Unique name for the role.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name}
	Name *string `field:"required" json:"name" yaml:"name"`
	// Flag to allow any name.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name}
	AllowAnyName interface{} `field:"optional" json:"allowAnyName" yaml:"allowAnyName"`
	// Flag to allow certificates matching the actual domain.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains}
	AllowBareDomains interface{} `field:"optional" json:"allowBareDomains" yaml:"allowBareDomains"`
	// The domains of the role.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains}
	AllowedDomains *[]*string `field:"optional" json:"allowedDomains" yaml:"allowedDomains"`
	// Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}}).
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template}
	AllowedDomainsTemplate interface{} `field:"optional" json:"allowedDomainsTemplate" yaml:"allowedDomainsTemplate"`
	// Defines allowed custom SANs.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans}
	AllowedOtherSans *[]*string `field:"optional" json:"allowedOtherSans" yaml:"allowedOtherSans"`
	// Defines allowed Subject serial numbers.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers}
	AllowedSerialNumbers *[]*string `field:"optional" json:"allowedSerialNumbers" yaml:"allowedSerialNumbers"`
	// Defines allowed URI SANs.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans}
	AllowedUriSans *[]*string `field:"optional" json:"allowedUriSans" yaml:"allowedUriSans"`
	// Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}}).
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template}
	AllowedUriSansTemplate interface{} `field:"optional" json:"allowedUriSansTemplate" yaml:"allowedUriSansTemplate"`
	// The allowed User ID's.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids}
	AllowedUserIds *[]*string `field:"optional" json:"allowedUserIds" yaml:"allowedUserIds"`
	// Flag to allow names containing glob patterns.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains}
	AllowGlobDomains interface{} `field:"optional" json:"allowGlobDomains" yaml:"allowGlobDomains"`
	// Flag to allow IP SANs.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans}
	AllowIpSans interface{} `field:"optional" json:"allowIpSans" yaml:"allowIpSans"`
	// Flag to allow certificates for localhost.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost}
	AllowLocalhost interface{} `field:"optional" json:"allowLocalhost" yaml:"allowLocalhost"`
	// Flag to allow certificates matching subdomains.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains}
	AllowSubdomains interface{} `field:"optional" json:"allowSubdomains" yaml:"allowSubdomains"`
	// Flag to allow wildcard certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates}
	AllowWildcardCertificates interface{} `field:"optional" json:"allowWildcardCertificates" yaml:"allowWildcardCertificates"`
	// Flag to mark basic constraints valid when issuing non-CA certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca}
	BasicConstraintsValidForNonCa interface{} `field:"optional" json:"basicConstraintsValidForNonCa" yaml:"basicConstraintsValidForNonCa"`
	// Flag to specify certificates for client use.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag}
	ClientFlag interface{} `field:"optional" json:"clientFlag" yaml:"clientFlag"`
	// Flag to specify certificates for code signing use.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag}
	CodeSigningFlag interface{} `field:"optional" json:"codeSigningFlag" yaml:"codeSigningFlag"`
	// The country of generated certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country}
	Country *[]*string `field:"optional" json:"country" yaml:"country"`
	// Flag to specify certificates for email protection use.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag}
	EmailProtectionFlag interface{} `field:"optional" json:"emailProtectionFlag" yaml:"emailProtectionFlag"`
	// Flag to allow only valid host names.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames}
	EnforceHostnames interface{} `field:"optional" json:"enforceHostnames" yaml:"enforceHostnames"`
	// Specify the allowed extended key usage constraint on issued certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage}
	ExtKeyUsage *[]*string `field:"optional" json:"extKeyUsage" yaml:"extKeyUsage"`
	// Flag to generate leases with certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease}
	GenerateLease interface{} `field:"optional" json:"generateLease" yaml:"generateLease"`
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}.
	//
	// Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
	// If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
	Id *string `field:"optional" json:"id" yaml:"id"`
	// Specifies the default issuer of this request.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref}
	IssuerRef *string `field:"optional" json:"issuerRef" yaml:"issuerRef"`
	// The number of bits of generated keys.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits}
	KeyBits *float64 `field:"optional" json:"keyBits" yaml:"keyBits"`
	// The generated key type.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type}
	KeyType *string `field:"optional" json:"keyType" yaml:"keyType"`
	// Specify the allowed key usage constraint on issued certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage}
	KeyUsage *[]*string `field:"optional" json:"keyUsage" yaml:"keyUsage"`
	// The locality of generated certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality}
	Locality *[]*string `field:"optional" json:"locality" yaml:"locality"`
	// The maximum TTL.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl}
	MaxTtl *string `field:"optional" json:"maxTtl" yaml:"maxTtl"`
	// Target namespace. (requires Enterprise).
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace}
	Namespace *string `field:"optional" json:"namespace" yaml:"namespace"`
	// Flag to not store certificates in the storage backend.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store}
	NoStore interface{} `field:"optional" json:"noStore" yaml:"noStore"`
	// Specifies the duration by which to backdate the NotBefore property.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration}
	NotBeforeDuration *string `field:"optional" json:"notBeforeDuration" yaml:"notBeforeDuration"`
	// The organization of generated certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization}
	Organization *[]*string `field:"optional" json:"organization" yaml:"organization"`
	// The organization unit of generated certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou}
	Ou *[]*string `field:"optional" json:"ou" yaml:"ou"`
	// policy_identifier block.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier}
	PolicyIdentifier interface{} `field:"optional" json:"policyIdentifier" yaml:"policyIdentifier"`
	// Specify the list of allowed policies OIDs.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers}
	PolicyIdentifiers *[]*string `field:"optional" json:"policyIdentifiers" yaml:"policyIdentifiers"`
	// The postal code of generated certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code}
	PostalCode *[]*string `field:"optional" json:"postalCode" yaml:"postalCode"`
	// The province of generated certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province}
	Province *[]*string `field:"optional" json:"province" yaml:"province"`
	// Flag to force CN usage.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn}
	RequireCn interface{} `field:"optional" json:"requireCn" yaml:"requireCn"`
	// Flag to specify certificates for server use.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag}
	ServerFlag interface{} `field:"optional" json:"serverFlag" yaml:"serverFlag"`
	// The street address of generated certificates.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address}
	StreetAddress *[]*string `field:"optional" json:"streetAddress" yaml:"streetAddress"`
	// The TTL.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl}
	Ttl *string `field:"optional" json:"ttl" yaml:"ttl"`
	// Flag to use the CN in the CSR.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name}
	UseCsrCommonName interface{} `field:"optional" json:"useCsrCommonName" yaml:"useCsrCommonName"`
	// Flag to use the SANs in the CSR.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans}
	UseCsrSans interface{} `field:"optional" json:"useCsrSans" yaml:"useCsrSans"`
}

type PkiSecretBackendRolePolicyIdentifier

type PkiSecretBackendRolePolicyIdentifier struct {
	// OID.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid}
	Oid *string `field:"required" json:"oid" yaml:"oid"`
	// Optional CPS URL.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps}
	Cps *string `field:"optional" json:"cps" yaml:"cps"`
	// Optional notice.
	//
	// Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice}
	Notice *string `field:"optional" json:"notice" yaml:"notice"`
}

type PkiSecretBackendRolePolicyIdentifierList

type PkiSecretBackendRolePolicyIdentifierList interface {
	cdktf.ComplexList
	// The creation stack of this resolvable which will be appended to errors thrown during resolution.
	//
	// If this returns an empty array the stack will not be attached.
	// Experimental.
	CreationStack() *[]*string
	// Experimental.
	Fqn() *string
	InternalValue() interface{}
	SetInternalValue(val interface{})
	// The attribute on the parent resource this class is referencing.
	TerraformAttribute() *string
	SetTerraformAttribute(val *string)
	// The parent resource.
	TerraformResource() cdktf.IInterpolatingParent
	SetTerraformResource(val cdktf.IInterpolatingParent)
	// whether the list is wrapping a set (will add tolist() to be able to access an item via an index).
	WrapsSet() *bool
	SetWrapsSet(val *bool)
	// Experimental.
	ComputeFqn() *string
	Get(index *float64) PkiSecretBackendRolePolicyIdentifierOutputReference
	// Produce the Token's value at resolution time.
	// Experimental.
	Resolve(_context cdktf.IResolveContext) interface{}
	// Return a string representation of this resolvable object.
	//
	// Returns a reversible string representation.
	// Experimental.
	ToString() *string
}

func NewPkiSecretBackendRolePolicyIdentifierList

func NewPkiSecretBackendRolePolicyIdentifierList(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) PkiSecretBackendRolePolicyIdentifierList

type PkiSecretBackendRolePolicyIdentifierOutputReference

type PkiSecretBackendRolePolicyIdentifierOutputReference interface {
	cdktf.ComplexObject
	// the index of the complex object in a list.
	// Experimental.
	ComplexObjectIndex() interface{}
	// Experimental.
	SetComplexObjectIndex(val interface{})
	// set to true if this item is from inside a set and needs tolist() for accessing it set to "0" for single list items.
	// Experimental.
	ComplexObjectIsFromSet() *bool
	// Experimental.
	SetComplexObjectIsFromSet(val *bool)
	Cps() *string
	SetCps(val *string)
	CpsInput() *string
	// The creation stack of this resolvable which will be appended to errors thrown during resolution.
	//
	// If this returns an empty array the stack will not be attached.
	// Experimental.
	CreationStack() *[]*string
	// Experimental.
	Fqn() *string
	InternalValue() interface{}
	SetInternalValue(val interface{})
	Notice() *string
	SetNotice(val *string)
	NoticeInput() *string
	Oid() *string
	SetOid(val *string)
	OidInput() *string
	// Experimental.
	TerraformAttribute() *string
	// Experimental.
	SetTerraformAttribute(val *string)
	// Experimental.
	TerraformResource() cdktf.IInterpolatingParent
	// Experimental.
	SetTerraformResource(val cdktf.IInterpolatingParent)
	// Experimental.
	ComputeFqn() *string
	// Experimental.
	GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{}
	// Experimental.
	GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable
	// Experimental.
	GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool
	// Experimental.
	GetListAttribute(terraformAttribute *string) *[]*string
	// Experimental.
	GetNumberAttribute(terraformAttribute *string) *float64
	// Experimental.
	GetNumberListAttribute(terraformAttribute *string) *[]*float64
	// Experimental.
	GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64
	// Experimental.
	GetStringAttribute(terraformAttribute *string) *string
	// Experimental.
	GetStringMapAttribute(terraformAttribute *string) *map[string]*string
	// Experimental.
	InterpolationAsList() cdktf.IResolvable
	// Experimental.
	InterpolationForAttribute(property *string) cdktf.IResolvable
	ResetCps()
	ResetNotice()
	// Produce the Token's value at resolution time.
	// Experimental.
	Resolve(_context cdktf.IResolveContext) interface{}
	// Return a string representation of this resolvable object.
	//
	// Returns a reversible string representation.
	// Experimental.
	ToString() *string
}

func NewPkiSecretBackendRolePolicyIdentifierOutputReference

func NewPkiSecretBackendRolePolicyIdentifierOutputReference(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, complexObjectIndex *float64, complexObjectIsFromSet *bool) PkiSecretBackendRolePolicyIdentifierOutputReference

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL