Documentation ¶
Index ¶
- func NewPkiSecretBackendRolePolicyIdentifierList_Override(p PkiSecretBackendRolePolicyIdentifierList, ...)
- func NewPkiSecretBackendRolePolicyIdentifierOutputReference_Override(p PkiSecretBackendRolePolicyIdentifierOutputReference, ...)
- func NewPkiSecretBackendRole_Override(p PkiSecretBackendRole, scope constructs.Construct, id *string, ...)
- func PkiSecretBackendRole_IsConstruct(x interface{}) *bool
- func PkiSecretBackendRole_IsTerraformElement(x interface{}) *bool
- func PkiSecretBackendRole_IsTerraformResource(x interface{}) *bool
- func PkiSecretBackendRole_TfResourceType() *string
- type PkiSecretBackendRole
- type PkiSecretBackendRoleConfig
- type PkiSecretBackendRolePolicyIdentifier
- type PkiSecretBackendRolePolicyIdentifierList
- type PkiSecretBackendRolePolicyIdentifierOutputReference
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewPkiSecretBackendRolePolicyIdentifierList_Override ¶
func NewPkiSecretBackendRolePolicyIdentifierList_Override(p PkiSecretBackendRolePolicyIdentifierList, terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, wrapsSet *bool)
func NewPkiSecretBackendRolePolicyIdentifierOutputReference_Override ¶
func NewPkiSecretBackendRolePolicyIdentifierOutputReference_Override(p PkiSecretBackendRolePolicyIdentifierOutputReference, terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, complexObjectIndex *float64, complexObjectIsFromSet *bool)
func NewPkiSecretBackendRole_Override ¶
func NewPkiSecretBackendRole_Override(p PkiSecretBackendRole, scope constructs.Construct, id *string, config *PkiSecretBackendRoleConfig)
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} Resource.
func PkiSecretBackendRole_IsConstruct ¶
func PkiSecretBackendRole_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Use this method instead of `instanceof` to properly detect `Construct` instances, even when the construct library is symlinked.
Explanation: in JavaScript, multiple copies of the `constructs` library on disk are seen as independent, completely different libraries. As a consequence, the class `Construct` in each copy of the `constructs` library is seen as a different class, and an instance of one class will not test as `instanceof` the other class. `npm install` will not create installations like this, but users may manually symlink construct libraries together or use a monorepo tool: in those cases, multiple copies of the `constructs` library can be accidentally installed, and `instanceof` will behave unpredictably. It is safest to avoid using `instanceof`, and using this type-testing method instead.
Returns: true if `x` is an object created from a class which extends `Construct`.
func PkiSecretBackendRole_IsTerraformElement ¶
func PkiSecretBackendRole_IsTerraformElement(x interface{}) *bool
Experimental.
func PkiSecretBackendRole_IsTerraformResource ¶
func PkiSecretBackendRole_IsTerraformResource(x interface{}) *bool
Experimental.
func PkiSecretBackendRole_TfResourceType ¶
func PkiSecretBackendRole_TfResourceType() *string
Types ¶
type PkiSecretBackendRole ¶
type PkiSecretBackendRole interface { cdktf.TerraformResource AllowAnyName() interface{} SetAllowAnyName(val interface{}) AllowAnyNameInput() interface{} AllowBareDomains() interface{} SetAllowBareDomains(val interface{}) AllowBareDomainsInput() interface{} AllowedDomains() *[]*string SetAllowedDomains(val *[]*string) AllowedDomainsInput() *[]*string AllowedDomainsTemplate() interface{} SetAllowedDomainsTemplate(val interface{}) AllowedDomainsTemplateInput() interface{} AllowedOtherSans() *[]*string SetAllowedOtherSans(val *[]*string) AllowedOtherSansInput() *[]*string AllowedSerialNumbers() *[]*string SetAllowedSerialNumbers(val *[]*string) AllowedSerialNumbersInput() *[]*string AllowedUriSans() *[]*string SetAllowedUriSans(val *[]*string) AllowedUriSansInput() *[]*string AllowedUriSansTemplate() interface{} SetAllowedUriSansTemplate(val interface{}) AllowedUriSansTemplateInput() interface{} AllowedUserIds() *[]*string SetAllowedUserIds(val *[]*string) AllowedUserIdsInput() *[]*string AllowGlobDomains() interface{} SetAllowGlobDomains(val interface{}) AllowGlobDomainsInput() interface{} AllowIpSans() interface{} SetAllowIpSans(val interface{}) AllowIpSansInput() interface{} AllowLocalhost() interface{} SetAllowLocalhost(val interface{}) AllowLocalhostInput() interface{} AllowSubdomains() interface{} SetAllowSubdomains(val interface{}) AllowSubdomainsInput() interface{} AllowWildcardCertificates() interface{} SetAllowWildcardCertificates(val interface{}) AllowWildcardCertificatesInput() interface{} Backend() *string SetBackend(val *string) BackendInput() *string BasicConstraintsValidForNonCa() interface{} SetBasicConstraintsValidForNonCa(val interface{}) BasicConstraintsValidForNonCaInput() interface{} // Experimental. CdktfStack() cdktf.TerraformStack ClientFlag() interface{} SetClientFlag(val interface{}) ClientFlagInput() interface{} CodeSigningFlag() interface{} SetCodeSigningFlag(val interface{}) CodeSigningFlagInput() interface{} // Experimental. Connection() interface{} // Experimental. SetConnection(val interface{}) // Experimental. ConstructNodeMetadata() *map[string]interface{} // Experimental. Count() interface{} // Experimental. SetCount(val interface{}) Country() *[]*string SetCountry(val *[]*string) CountryInput() *[]*string // Experimental. DependsOn() *[]*string // Experimental. SetDependsOn(val *[]*string) EmailProtectionFlag() interface{} SetEmailProtectionFlag(val interface{}) EmailProtectionFlagInput() interface{} EnforceHostnames() interface{} SetEnforceHostnames(val interface{}) EnforceHostnamesInput() interface{} ExtKeyUsage() *[]*string SetExtKeyUsage(val *[]*string) ExtKeyUsageInput() *[]*string // Experimental. ForEach() cdktf.ITerraformIterator // Experimental. SetForEach(val cdktf.ITerraformIterator) // Experimental. Fqn() *string // Experimental. FriendlyUniqueId() *string GenerateLease() interface{} SetGenerateLease(val interface{}) GenerateLeaseInput() interface{} Id() *string SetId(val *string) IdInput() *string IssuerRef() *string SetIssuerRef(val *string) IssuerRefInput() *string KeyBits() *float64 SetKeyBits(val *float64) KeyBitsInput() *float64 KeyType() *string SetKeyType(val *string) KeyTypeInput() *string KeyUsage() *[]*string SetKeyUsage(val *[]*string) KeyUsageInput() *[]*string // Experimental. Lifecycle() *cdktf.TerraformResourceLifecycle // Experimental. SetLifecycle(val *cdktf.TerraformResourceLifecycle) Locality() *[]*string SetLocality(val *[]*string) LocalityInput() *[]*string MaxTtl() *string SetMaxTtl(val *string) MaxTtlInput() *string Name() *string SetName(val *string) NameInput() *string Namespace() *string SetNamespace(val *string) NamespaceInput() *string // The tree node. Node() constructs.Node NoStore() interface{} SetNoStore(val interface{}) NoStoreInput() interface{} NotBeforeDuration() *string SetNotBeforeDuration(val *string) NotBeforeDurationInput() *string Organization() *[]*string SetOrganization(val *[]*string) OrganizationInput() *[]*string Ou() *[]*string SetOu(val *[]*string) OuInput() *[]*string PolicyIdentifier() PkiSecretBackendRolePolicyIdentifierList PolicyIdentifierInput() interface{} PolicyIdentifiers() *[]*string SetPolicyIdentifiers(val *[]*string) PolicyIdentifiersInput() *[]*string PostalCode() *[]*string SetPostalCode(val *[]*string) PostalCodeInput() *[]*string // Experimental. Provider() cdktf.TerraformProvider // Experimental. SetProvider(val cdktf.TerraformProvider) Province() *[]*string SetProvince(val *[]*string) ProvinceInput() *[]*string // Experimental. Provisioners() *[]interface{} // Experimental. SetProvisioners(val *[]interface{}) // Experimental. RawOverrides() interface{} RequireCn() interface{} SetRequireCn(val interface{}) RequireCnInput() interface{} ServerFlag() interface{} SetServerFlag(val interface{}) ServerFlagInput() interface{} StreetAddress() *[]*string SetStreetAddress(val *[]*string) StreetAddressInput() *[]*string // Experimental. TerraformGeneratorMetadata() *cdktf.TerraformProviderGeneratorMetadata // Experimental. TerraformMetaArguments() *map[string]interface{} // Experimental. TerraformResourceType() *string Ttl() *string SetTtl(val *string) TtlInput() *string UseCsrCommonName() interface{} SetUseCsrCommonName(val interface{}) UseCsrCommonNameInput() interface{} UseCsrSans() interface{} SetUseCsrSans(val interface{}) UseCsrSansInput() interface{} // Experimental. AddOverride(path *string, value interface{}) // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. InterpolationForAttribute(terraformAttribute *string) cdktf.IResolvable // Overrides the auto-generated logical ID with a specific ID. // Experimental. OverrideLogicalId(newLogicalId *string) PutPolicyIdentifier(value interface{}) ResetAllowAnyName() ResetAllowBareDomains() ResetAllowedDomains() ResetAllowedDomainsTemplate() ResetAllowedOtherSans() ResetAllowedSerialNumbers() ResetAllowedUriSans() ResetAllowedUriSansTemplate() ResetAllowedUserIds() ResetAllowGlobDomains() ResetAllowIpSans() ResetAllowLocalhost() ResetAllowSubdomains() ResetAllowWildcardCertificates() ResetBasicConstraintsValidForNonCa() ResetClientFlag() ResetCodeSigningFlag() ResetCountry() ResetEmailProtectionFlag() ResetEnforceHostnames() ResetExtKeyUsage() ResetGenerateLease() ResetId() ResetIssuerRef() ResetKeyBits() ResetKeyType() ResetKeyUsage() ResetLocality() ResetMaxTtl() ResetNamespace() ResetNoStore() ResetNotBeforeDuration() ResetOrganization() ResetOu() // Resets a previously passed logical Id to use the auto-generated logical id again. // Experimental. ResetOverrideLogicalId() ResetPolicyIdentifier() ResetPolicyIdentifiers() ResetPostalCode() ResetProvince() ResetRequireCn() ResetServerFlag() ResetStreetAddress() ResetTtl() ResetUseCsrCommonName() ResetUseCsrSans() SynthesizeAttributes() *map[string]interface{} // Experimental. ToMetadata() interface{} // Returns a string representation of this construct. ToString() *string // Adds this resource to the terraform JSON output. // Experimental. ToTerraform() interface{} }
Represents a {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role}.
func NewPkiSecretBackendRole ¶
func NewPkiSecretBackendRole(scope constructs.Construct, id *string, config *PkiSecretBackendRoleConfig) PkiSecretBackendRole
Create a new {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role vault_pki_secret_backend_role} Resource.
type PkiSecretBackendRoleConfig ¶
type PkiSecretBackendRoleConfig struct { // Experimental. Connection interface{} `field:"optional" json:"connection" yaml:"connection"` // Experimental. Count interface{} `field:"optional" json:"count" yaml:"count"` // Experimental. DependsOn *[]cdktf.ITerraformDependable `field:"optional" json:"dependsOn" yaml:"dependsOn"` // Experimental. ForEach cdktf.ITerraformIterator `field:"optional" json:"forEach" yaml:"forEach"` // Experimental. Lifecycle *cdktf.TerraformResourceLifecycle `field:"optional" json:"lifecycle" yaml:"lifecycle"` // Experimental. Provider cdktf.TerraformProvider `field:"optional" json:"provider" yaml:"provider"` // Experimental. Provisioners *[]interface{} `field:"optional" json:"provisioners" yaml:"provisioners"` // The path of the PKI secret backend the resource belongs to. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#backend PkiSecretBackendRole#backend} Backend *string `field:"required" json:"backend" yaml:"backend"` // Unique name for the role. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#name PkiSecretBackendRole#name} Name *string `field:"required" json:"name" yaml:"name"` // Flag to allow any name. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_any_name PkiSecretBackendRole#allow_any_name} AllowAnyName interface{} `field:"optional" json:"allowAnyName" yaml:"allowAnyName"` // Flag to allow certificates matching the actual domain. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_bare_domains PkiSecretBackendRole#allow_bare_domains} AllowBareDomains interface{} `field:"optional" json:"allowBareDomains" yaml:"allowBareDomains"` // The domains of the role. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_domains PkiSecretBackendRole#allowed_domains} AllowedDomains *[]*string `field:"optional" json:"allowedDomains" yaml:"allowedDomains"` // Flag to indicate that `allowed_domains` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}}). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_domains_template PkiSecretBackendRole#allowed_domains_template} AllowedDomainsTemplate interface{} `field:"optional" json:"allowedDomainsTemplate" yaml:"allowedDomainsTemplate"` // Defines allowed custom SANs. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_other_sans PkiSecretBackendRole#allowed_other_sans} AllowedOtherSans *[]*string `field:"optional" json:"allowedOtherSans" yaml:"allowedOtherSans"` // Defines allowed Subject serial numbers. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_serial_numbers PkiSecretBackendRole#allowed_serial_numbers} AllowedSerialNumbers *[]*string `field:"optional" json:"allowedSerialNumbers" yaml:"allowedSerialNumbers"` // Defines allowed URI SANs. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_uri_sans PkiSecretBackendRole#allowed_uri_sans} AllowedUriSans *[]*string `field:"optional" json:"allowedUriSans" yaml:"allowedUriSans"` // Flag to indicate that `allowed_uri_sans` specifies a template expression (e.g. {{identity.entity.aliases.<mount accessor>.name}}). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_uri_sans_template PkiSecretBackendRole#allowed_uri_sans_template} AllowedUriSansTemplate interface{} `field:"optional" json:"allowedUriSansTemplate" yaml:"allowedUriSansTemplate"` // The allowed User ID's. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allowed_user_ids PkiSecretBackendRole#allowed_user_ids} AllowedUserIds *[]*string `field:"optional" json:"allowedUserIds" yaml:"allowedUserIds"` // Flag to allow names containing glob patterns. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_glob_domains PkiSecretBackendRole#allow_glob_domains} AllowGlobDomains interface{} `field:"optional" json:"allowGlobDomains" yaml:"allowGlobDomains"` // Flag to allow IP SANs. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_ip_sans PkiSecretBackendRole#allow_ip_sans} AllowIpSans interface{} `field:"optional" json:"allowIpSans" yaml:"allowIpSans"` // Flag to allow certificates for localhost. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_localhost PkiSecretBackendRole#allow_localhost} AllowLocalhost interface{} `field:"optional" json:"allowLocalhost" yaml:"allowLocalhost"` // Flag to allow certificates matching subdomains. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_subdomains PkiSecretBackendRole#allow_subdomains} AllowSubdomains interface{} `field:"optional" json:"allowSubdomains" yaml:"allowSubdomains"` // Flag to allow wildcard certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#allow_wildcard_certificates PkiSecretBackendRole#allow_wildcard_certificates} AllowWildcardCertificates interface{} `field:"optional" json:"allowWildcardCertificates" yaml:"allowWildcardCertificates"` // Flag to mark basic constraints valid when issuing non-CA certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#basic_constraints_valid_for_non_ca PkiSecretBackendRole#basic_constraints_valid_for_non_ca} BasicConstraintsValidForNonCa interface{} `field:"optional" json:"basicConstraintsValidForNonCa" yaml:"basicConstraintsValidForNonCa"` // Flag to specify certificates for client use. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#client_flag PkiSecretBackendRole#client_flag} ClientFlag interface{} `field:"optional" json:"clientFlag" yaml:"clientFlag"` // Flag to specify certificates for code signing use. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#code_signing_flag PkiSecretBackendRole#code_signing_flag} CodeSigningFlag interface{} `field:"optional" json:"codeSigningFlag" yaml:"codeSigningFlag"` // The country of generated certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#country PkiSecretBackendRole#country} Country *[]*string `field:"optional" json:"country" yaml:"country"` // Flag to specify certificates for email protection use. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#email_protection_flag PkiSecretBackendRole#email_protection_flag} EmailProtectionFlag interface{} `field:"optional" json:"emailProtectionFlag" yaml:"emailProtectionFlag"` // Flag to allow only valid host names. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#enforce_hostnames PkiSecretBackendRole#enforce_hostnames} EnforceHostnames interface{} `field:"optional" json:"enforceHostnames" yaml:"enforceHostnames"` // Specify the allowed extended key usage constraint on issued certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#ext_key_usage PkiSecretBackendRole#ext_key_usage} ExtKeyUsage *[]*string `field:"optional" json:"extKeyUsage" yaml:"extKeyUsage"` // Flag to generate leases with certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#generate_lease PkiSecretBackendRole#generate_lease} GenerateLease interface{} `field:"optional" json:"generateLease" yaml:"generateLease"` // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#id PkiSecretBackendRole#id}. // // Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. // If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. Id *string `field:"optional" json:"id" yaml:"id"` // Specifies the default issuer of this request. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#issuer_ref PkiSecretBackendRole#issuer_ref} IssuerRef *string `field:"optional" json:"issuerRef" yaml:"issuerRef"` // The number of bits of generated keys. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#key_bits PkiSecretBackendRole#key_bits} KeyBits *float64 `field:"optional" json:"keyBits" yaml:"keyBits"` // The generated key type. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#key_type PkiSecretBackendRole#key_type} KeyType *string `field:"optional" json:"keyType" yaml:"keyType"` // Specify the allowed key usage constraint on issued certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#key_usage PkiSecretBackendRole#key_usage} KeyUsage *[]*string `field:"optional" json:"keyUsage" yaml:"keyUsage"` // The locality of generated certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#locality PkiSecretBackendRole#locality} Locality *[]*string `field:"optional" json:"locality" yaml:"locality"` // The maximum TTL. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#max_ttl PkiSecretBackendRole#max_ttl} MaxTtl *string `field:"optional" json:"maxTtl" yaml:"maxTtl"` // Target namespace. (requires Enterprise). // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#namespace PkiSecretBackendRole#namespace} Namespace *string `field:"optional" json:"namespace" yaml:"namespace"` // Flag to not store certificates in the storage backend. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#no_store PkiSecretBackendRole#no_store} NoStore interface{} `field:"optional" json:"noStore" yaml:"noStore"` // Specifies the duration by which to backdate the NotBefore property. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#not_before_duration PkiSecretBackendRole#not_before_duration} NotBeforeDuration *string `field:"optional" json:"notBeforeDuration" yaml:"notBeforeDuration"` // The organization of generated certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#organization PkiSecretBackendRole#organization} Organization *[]*string `field:"optional" json:"organization" yaml:"organization"` // The organization unit of generated certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#ou PkiSecretBackendRole#ou} Ou *[]*string `field:"optional" json:"ou" yaml:"ou"` // policy_identifier block. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#policy_identifier PkiSecretBackendRole#policy_identifier} PolicyIdentifier interface{} `field:"optional" json:"policyIdentifier" yaml:"policyIdentifier"` // Specify the list of allowed policies OIDs. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#policy_identifiers PkiSecretBackendRole#policy_identifiers} PolicyIdentifiers *[]*string `field:"optional" json:"policyIdentifiers" yaml:"policyIdentifiers"` // The postal code of generated certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#postal_code PkiSecretBackendRole#postal_code} PostalCode *[]*string `field:"optional" json:"postalCode" yaml:"postalCode"` // The province of generated certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#province PkiSecretBackendRole#province} Province *[]*string `field:"optional" json:"province" yaml:"province"` // Flag to force CN usage. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#require_cn PkiSecretBackendRole#require_cn} RequireCn interface{} `field:"optional" json:"requireCn" yaml:"requireCn"` // Flag to specify certificates for server use. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#server_flag PkiSecretBackendRole#server_flag} ServerFlag interface{} `field:"optional" json:"serverFlag" yaml:"serverFlag"` // The street address of generated certificates. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#street_address PkiSecretBackendRole#street_address} StreetAddress *[]*string `field:"optional" json:"streetAddress" yaml:"streetAddress"` // The TTL. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#ttl PkiSecretBackendRole#ttl} Ttl *string `field:"optional" json:"ttl" yaml:"ttl"` // Flag to use the CN in the CSR. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#use_csr_common_name PkiSecretBackendRole#use_csr_common_name} UseCsrCommonName interface{} `field:"optional" json:"useCsrCommonName" yaml:"useCsrCommonName"` // Flag to use the SANs in the CSR. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#use_csr_sans PkiSecretBackendRole#use_csr_sans} UseCsrSans interface{} `field:"optional" json:"useCsrSans" yaml:"useCsrSans"` }
type PkiSecretBackendRolePolicyIdentifier ¶
type PkiSecretBackendRolePolicyIdentifier struct { // OID. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#oid PkiSecretBackendRole#oid} Oid *string `field:"required" json:"oid" yaml:"oid"` // Optional CPS URL. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#cps PkiSecretBackendRole#cps} Cps *string `field:"optional" json:"cps" yaml:"cps"` // Optional notice. // // Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/vault/3.19.0/docs/resources/pki_secret_backend_role#notice PkiSecretBackendRole#notice} Notice *string `field:"optional" json:"notice" yaml:"notice"` }
type PkiSecretBackendRolePolicyIdentifierList ¶
type PkiSecretBackendRolePolicyIdentifierList interface { cdktf.ComplexList // The creation stack of this resolvable which will be appended to errors thrown during resolution. // // If this returns an empty array the stack will not be attached. // Experimental. CreationStack() *[]*string // Experimental. Fqn() *string InternalValue() interface{} SetInternalValue(val interface{}) // The attribute on the parent resource this class is referencing. TerraformAttribute() *string SetTerraformAttribute(val *string) // The parent resource. TerraformResource() cdktf.IInterpolatingParent SetTerraformResource(val cdktf.IInterpolatingParent) // whether the list is wrapping a set (will add tolist() to be able to access an item via an index). WrapsSet() *bool SetWrapsSet(val *bool) // Experimental. ComputeFqn() *string Get(index *float64) PkiSecretBackendRolePolicyIdentifierOutputReference // Produce the Token's value at resolution time. // Experimental. Resolve(_context cdktf.IResolveContext) interface{} // Return a string representation of this resolvable object. // // Returns a reversible string representation. // Experimental. ToString() *string }
func NewPkiSecretBackendRolePolicyIdentifierList ¶
func NewPkiSecretBackendRolePolicyIdentifierList(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, wrapsSet *bool) PkiSecretBackendRolePolicyIdentifierList
type PkiSecretBackendRolePolicyIdentifierOutputReference ¶
type PkiSecretBackendRolePolicyIdentifierOutputReference interface { cdktf.ComplexObject // the index of the complex object in a list. // Experimental. ComplexObjectIndex() interface{} // Experimental. SetComplexObjectIndex(val interface{}) // set to true if this item is from inside a set and needs tolist() for accessing it set to "0" for single list items. // Experimental. ComplexObjectIsFromSet() *bool // Experimental. SetComplexObjectIsFromSet(val *bool) Cps() *string SetCps(val *string) CpsInput() *string // The creation stack of this resolvable which will be appended to errors thrown during resolution. // // If this returns an empty array the stack will not be attached. // Experimental. CreationStack() *[]*string // Experimental. Fqn() *string InternalValue() interface{} SetInternalValue(val interface{}) Notice() *string SetNotice(val *string) NoticeInput() *string Oid() *string SetOid(val *string) OidInput() *string // Experimental. TerraformAttribute() *string // Experimental. SetTerraformAttribute(val *string) // Experimental. TerraformResource() cdktf.IInterpolatingParent // Experimental. SetTerraformResource(val cdktf.IInterpolatingParent) // Experimental. ComputeFqn() *string // Experimental. GetAnyMapAttribute(terraformAttribute *string) *map[string]interface{} // Experimental. GetBooleanAttribute(terraformAttribute *string) cdktf.IResolvable // Experimental. GetBooleanMapAttribute(terraformAttribute *string) *map[string]*bool // Experimental. GetListAttribute(terraformAttribute *string) *[]*string // Experimental. GetNumberAttribute(terraformAttribute *string) *float64 // Experimental. GetNumberListAttribute(terraformAttribute *string) *[]*float64 // Experimental. GetNumberMapAttribute(terraformAttribute *string) *map[string]*float64 // Experimental. GetStringAttribute(terraformAttribute *string) *string // Experimental. GetStringMapAttribute(terraformAttribute *string) *map[string]*string // Experimental. InterpolationAsList() cdktf.IResolvable // Experimental. InterpolationForAttribute(property *string) cdktf.IResolvable ResetCps() ResetNotice() // Produce the Token's value at resolution time. // Experimental. Resolve(_context cdktf.IResolveContext) interface{} // Return a string representation of this resolvable object. // // Returns a reversible string representation. // Experimental. ToString() *string }
func NewPkiSecretBackendRolePolicyIdentifierOutputReference ¶
func NewPkiSecretBackendRolePolicyIdentifierOutputReference(terraformResource cdktf.IInterpolatingParent, terraformAttribute *string, complexObjectIndex *float64, complexObjectIsFromSet *bool) PkiSecretBackendRolePolicyIdentifierOutputReference
Source Files ¶
- PkiSecretBackendRole.go
- PkiSecretBackendRoleConfig.go
- PkiSecretBackendRolePolicyIdentifier.go
- PkiSecretBackendRolePolicyIdentifierList.go
- PkiSecretBackendRolePolicyIdentifierList__checks.go
- PkiSecretBackendRolePolicyIdentifierOutputReference.go
- PkiSecretBackendRolePolicyIdentifierOutputReference__checks.go
- PkiSecretBackendRole__checks.go
- main.go