UNPKG

@cdktf/provider-azurerm

Version:

Prebuilt azurerm Provider for Terraform CDK (cdktf)

153 lines (152 loc) 9.17 kB
/** * Copyright (c) HashiCorp, Inc. * SPDX-License-Identifier: MPL-2.0 */ import { Construct } from 'constructs'; import * as cdktf from 'cdktf'; export interface KeyVaultManagedHardwareSecurityModuleRoleAssignmentConfig extends cdktf.TerraformMetaArguments { /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#id KeyVaultManagedHardwareSecurityModuleRoleAssignment#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. */ readonly id?: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#managed_hsm_id KeyVaultManagedHardwareSecurityModuleRoleAssignment#managed_hsm_id} */ readonly managedHsmId?: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#name KeyVaultManagedHardwareSecurityModuleRoleAssignment#name} */ readonly name: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#principal_id KeyVaultManagedHardwareSecurityModuleRoleAssignment#principal_id} */ readonly principalId: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#role_definition_id KeyVaultManagedHardwareSecurityModuleRoleAssignment#role_definition_id} */ readonly roleDefinitionId: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#scope KeyVaultManagedHardwareSecurityModuleRoleAssignment#scope} */ readonly scope: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#vault_base_url KeyVaultManagedHardwareSecurityModuleRoleAssignment#vault_base_url} */ readonly vaultBaseUrl?: string; /** * timeouts block * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#timeouts KeyVaultManagedHardwareSecurityModuleRoleAssignment#timeouts} */ readonly timeouts?: KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts; } export interface KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts { /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#create KeyVaultManagedHardwareSecurityModuleRoleAssignment#create} */ readonly create?: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#delete KeyVaultManagedHardwareSecurityModuleRoleAssignment#delete} */ readonly delete?: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#read KeyVaultManagedHardwareSecurityModuleRoleAssignment#read} */ readonly read?: string; } export declare function keyVaultManagedHardwareSecurityModuleRoleAssignmentTimeoutsToTerraform(struct?: KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts | cdktf.IResolvable): any; export declare function keyVaultManagedHardwareSecurityModuleRoleAssignmentTimeoutsToHclTerraform(struct?: KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts | cdktf.IResolvable): any; export declare class KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeoutsOutputReference extends cdktf.ComplexObject { private isEmptyObject; private resolvableValue?; /** * @param terraformResource The parent resource * @param terraformAttribute The attribute on the parent resource this class is referencing */ constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string); get internalValue(): KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts | cdktf.IResolvable | undefined; set internalValue(value: KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts | cdktf.IResolvable | undefined); private _create?; get create(): string; set create(value: string); resetCreate(): void; get createInput(): string | undefined; private _delete?; get delete(): string; set delete(value: string); resetDelete(): void; get deleteInput(): string | undefined; private _read?; get read(): string; set read(value: string); resetRead(): void; get readInput(): string | undefined; } /** * Represents a {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment azurerm_key_vault_managed_hardware_security_module_role_assignment} */ export declare class KeyVaultManagedHardwareSecurityModuleRoleAssignment extends cdktf.TerraformResource { static readonly tfResourceType = "azurerm_key_vault_managed_hardware_security_module_role_assignment"; /** * Generates CDKTF code for importing a KeyVaultManagedHardwareSecurityModuleRoleAssignment resource upon running "cdktf plan <stack-name>" * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the KeyVaultManagedHardwareSecurityModuleRoleAssignment to import * @param importFromId The id of the existing KeyVaultManagedHardwareSecurityModuleRoleAssignment that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the KeyVaultManagedHardwareSecurityModuleRoleAssignment to import is found */ static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): cdktf.ImportableResource; /** * Create a new {@link https://registry.terraform.io/providers/hashicorp/azurerm/3.116.0/docs/resources/key_vault_managed_hardware_security_module_role_assignment azurerm_key_vault_managed_hardware_security_module_role_assignment} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope * @param options KeyVaultManagedHardwareSecurityModuleRoleAssignmentConfig */ constructor(scope: Construct, id: string, config: KeyVaultManagedHardwareSecurityModuleRoleAssignmentConfig); private _id?; get id(): string; set id(value: string); resetId(): void; get idInput(): string | undefined; private _managedHsmId?; get managedHsmId(): string; set managedHsmId(value: string); resetManagedHsmId(): void; get managedHsmIdInput(): string | undefined; private _name?; get name(): string; set name(value: string); get nameInput(): string | undefined; private _principalId?; get principalId(): string; set principalId(value: string); get principalIdInput(): string | undefined; get resourceId(): string; private _roleDefinitionId?; get roleDefinitionId(): string; set roleDefinitionId(value: string); get roleDefinitionIdInput(): string | undefined; private _scope?; get scope(): string; set scope(value: string); get scopeInput(): string | undefined; private _vaultBaseUrl?; get vaultBaseUrl(): string; set vaultBaseUrl(value: string); resetVaultBaseUrl(): void; get vaultBaseUrlInput(): string | undefined; private _timeouts; get timeouts(): KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeoutsOutputReference; putTimeouts(value: KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts): void; resetTimeouts(): void; get timeoutsInput(): cdktf.IResolvable | KeyVaultManagedHardwareSecurityModuleRoleAssignmentTimeouts | undefined; protected synthesizeAttributes(): { [name: string]: any; }; protected synthesizeHclAttributes(): { [name: string]: any; }; }