UNPKG

@cdktf/provider-google

Version:

Prebuilt google Provider for Terraform CDK (cdktf)

348 lines (347 loc) 17.5 kB
/** * Copyright (c) HashiCorp, Inc. * SPDX-License-Identifier: MPL-2.0 */ import { Construct } from 'constructs'; import * as cdktf from 'cdktf'; export interface NetappActiveDirectoryConfig extends cdktf.TerraformMetaArguments { /** * Domain user accounts to be added to the local Administrators group of the SMB service. Comma-separated list of domain users or groups. The Domain Admin group is automatically added when the service joins your domain as a hidden group. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#administrators NetappActiveDirectory#administrators} */ readonly administrators?: string[]; /** * Enables AES-128 and AES-256 encryption for Kerberos-based communication with Active Directory. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#aes_encryption NetappActiveDirectory#aes_encryption} */ readonly aesEncryption?: boolean | cdktf.IResolvable; /** * Domain user/group accounts to be added to the Backup Operators group of the SMB service. The Backup Operators group allows members to backup and restore files regardless of whether they have read or write access to the files. Comma-separated list. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#backup_operators NetappActiveDirectory#backup_operators} */ readonly backupOperators?: string[]; /** * An optional description of this resource. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#description NetappActiveDirectory#description} */ readonly description?: string; /** * Comma separated list of DNS server IP addresses for the Active Directory domain. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#dns NetappActiveDirectory#dns} */ readonly dns: string; /** * Fully qualified domain name for the Active Directory domain. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#domain NetappActiveDirectory#domain} */ readonly domain: string; /** * If enabled, traffic between the SMB server to Domain Controller (DC) will be encrypted. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#encrypt_dc_connections NetappActiveDirectory#encrypt_dc_connections} */ readonly encryptDcConnections?: boolean | cdktf.IResolvable; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#id NetappActiveDirectory#id} * * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable. */ readonly id?: string; /** * Hostname of the Active Directory server used as Kerberos Key Distribution Center. Only required for volumes using kerberized NFSv4.1 * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#kdc_hostname NetappActiveDirectory#kdc_hostname} */ readonly kdcHostname?: string; /** * IP address of the Active Directory server used as Kerberos Key Distribution Center. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#kdc_ip NetappActiveDirectory#kdc_ip} */ readonly kdcIp?: string; /** * Labels as key value pairs. Example: '{ "owner": "Bob", "department": "finance", "purpose": "testing" }'. * * * **Note**: This field is non-authoritative, and will only manage the labels present in your configuration. * Please refer to the field 'effective_labels' for all of the labels present on the resource. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#labels NetappActiveDirectory#labels} */ readonly labels?: { [key: string]: string; }; /** * Specifies whether or not the LDAP traffic needs to be signed. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#ldap_signing NetappActiveDirectory#ldap_signing} */ readonly ldapSigning?: boolean | cdktf.IResolvable; /** * Name of the region for the policy to apply to. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#location NetappActiveDirectory#location} */ readonly location: string; /** * The resource name of the Active Directory pool. Needs to be unique per location. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#name NetappActiveDirectory#name} */ readonly name: string; /** * NetBIOS name prefix of the server to be created. * A five-character random ID is generated automatically, for example, -6f9a, and appended to the prefix. The full UNC share path will have the following format: * '\\NetBIOS_PREFIX-ABCD.DOMAIN_NAME\SHARE_NAME' * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#net_bios_prefix NetappActiveDirectory#net_bios_prefix} */ readonly netBiosPrefix: string; /** * Local UNIX users on clients without valid user information in Active Directory are blocked from access to LDAP enabled volumes. * This option can be used to temporarily switch such volumes to AUTH_SYS authentication (user ID + 1-16 groups). * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#nfs_users_with_ldap NetappActiveDirectory#nfs_users_with_ldap} */ readonly nfsUsersWithLdap?: boolean | cdktf.IResolvable; /** * Name of the Organizational Unit where you intend to create the computer account for NetApp Volumes. * Defaults to 'CN=Computers' if left empty. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#organizational_unit NetappActiveDirectory#organizational_unit} */ readonly organizationalUnit?: string; /** * Password for specified username. Note - Manual changes done to the password will not be detected. Terraform will not re-apply the password, unless you use a new password in Terraform. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#password NetappActiveDirectory#password} */ readonly password: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#project NetappActiveDirectory#project} */ readonly project?: string; /** * Domain accounts that require elevated privileges such as 'SeSecurityPrivilege' to manage security logs. Comma-separated list. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#security_operators NetappActiveDirectory#security_operators} */ readonly securityOperators?: string[]; /** * Specifies an Active Directory site to manage domain controller selection. * Use when Active Directory domain controllers in multiple regions are configured. Defaults to 'Default-First-Site-Name' if left empty. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#site NetappActiveDirectory#site} */ readonly site?: string; /** * Username for the Active Directory account with permissions to create the compute account within the specified organizational unit. * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#username NetappActiveDirectory#username} */ readonly username: string; /** * timeouts block * * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#timeouts NetappActiveDirectory#timeouts} */ readonly timeouts?: NetappActiveDirectoryTimeouts; } export interface NetappActiveDirectoryTimeouts { /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#create NetappActiveDirectory#create} */ readonly create?: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#delete NetappActiveDirectory#delete} */ readonly delete?: string; /** * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#update NetappActiveDirectory#update} */ readonly update?: string; } export declare function netappActiveDirectoryTimeoutsToTerraform(struct?: NetappActiveDirectoryTimeouts | cdktf.IResolvable): any; export declare function netappActiveDirectoryTimeoutsToHclTerraform(struct?: NetappActiveDirectoryTimeouts | cdktf.IResolvable): any; export declare class NetappActiveDirectoryTimeoutsOutputReference extends cdktf.ComplexObject { private isEmptyObject; private resolvableValue?; /** * @param terraformResource The parent resource * @param terraformAttribute The attribute on the parent resource this class is referencing */ constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string); get internalValue(): NetappActiveDirectoryTimeouts | cdktf.IResolvable | undefined; set internalValue(value: NetappActiveDirectoryTimeouts | cdktf.IResolvable | undefined); private _create?; get create(): string; set create(value: string); resetCreate(): void; get createInput(): string | undefined; private _delete?; get delete(): string; set delete(value: string); resetDelete(): void; get deleteInput(): string | undefined; private _update?; get update(): string; set update(value: string); resetUpdate(): void; get updateInput(): string | undefined; } /** * Represents a {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory google_netapp_active_directory} */ export declare class NetappActiveDirectory extends cdktf.TerraformResource { static readonly tfResourceType = "google_netapp_active_directory"; /** * Generates CDKTF code for importing a NetappActiveDirectory resource upon running "cdktf plan <stack-name>" * @param scope The scope in which to define this construct * @param importToId The construct id used in the generated config for the NetappActiveDirectory to import * @param importFromId The id of the existing NetappActiveDirectory that should be imported. Refer to the {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory#import import section} in the documentation of this resource for the id to use * @param provider? Optional instance of the provider where the NetappActiveDirectory to import is found */ static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): cdktf.ImportableResource; /** * Create a new {@link https://registry.terraform.io/providers/hashicorp/google/6.13.0/docs/resources/netapp_active_directory google_netapp_active_directory} Resource * * @param scope The scope in which to define this construct * @param id The scoped construct ID. Must be unique amongst siblings in the same scope * @param options NetappActiveDirectoryConfig */ constructor(scope: Construct, id: string, config: NetappActiveDirectoryConfig); private _administrators?; get administrators(): string[]; set administrators(value: string[]); resetAdministrators(): void; get administratorsInput(): string[] | undefined; private _aesEncryption?; get aesEncryption(): boolean | cdktf.IResolvable; set aesEncryption(value: boolean | cdktf.IResolvable); resetAesEncryption(): void; get aesEncryptionInput(): boolean | cdktf.IResolvable | undefined; private _backupOperators?; get backupOperators(): string[]; set backupOperators(value: string[]); resetBackupOperators(): void; get backupOperatorsInput(): string[] | undefined; get createTime(): string; private _description?; get description(): string; set description(value: string); resetDescription(): void; get descriptionInput(): string | undefined; private _dns?; get dns(): string; set dns(value: string); get dnsInput(): string | undefined; private _domain?; get domain(): string; set domain(value: string); get domainInput(): string | undefined; private _effectiveLabels; get effectiveLabels(): cdktf.StringMap; private _encryptDcConnections?; get encryptDcConnections(): boolean | cdktf.IResolvable; set encryptDcConnections(value: boolean | cdktf.IResolvable); resetEncryptDcConnections(): void; get encryptDcConnectionsInput(): boolean | cdktf.IResolvable | undefined; private _id?; get id(): string; set id(value: string); resetId(): void; get idInput(): string | undefined; private _kdcHostname?; get kdcHostname(): string; set kdcHostname(value: string); resetKdcHostname(): void; get kdcHostnameInput(): string | undefined; private _kdcIp?; get kdcIp(): string; set kdcIp(value: string); resetKdcIp(): void; get kdcIpInput(): string | undefined; private _labels?; get labels(): { [key: string]: string; }; set labels(value: { [key: string]: string; }); resetLabels(): void; get labelsInput(): { [key: string]: string; } | undefined; private _ldapSigning?; get ldapSigning(): boolean | cdktf.IResolvable; set ldapSigning(value: boolean | cdktf.IResolvable); resetLdapSigning(): void; get ldapSigningInput(): boolean | cdktf.IResolvable | undefined; private _location?; get location(): string; set location(value: string); get locationInput(): string | undefined; private _name?; get name(): string; set name(value: string); get nameInput(): string | undefined; private _netBiosPrefix?; get netBiosPrefix(): string; set netBiosPrefix(value: string); get netBiosPrefixInput(): string | undefined; private _nfsUsersWithLdap?; get nfsUsersWithLdap(): boolean | cdktf.IResolvable; set nfsUsersWithLdap(value: boolean | cdktf.IResolvable); resetNfsUsersWithLdap(): void; get nfsUsersWithLdapInput(): boolean | cdktf.IResolvable | undefined; private _organizationalUnit?; get organizationalUnit(): string; set organizationalUnit(value: string); resetOrganizationalUnit(): void; get organizationalUnitInput(): string | undefined; private _password?; get password(): string; set password(value: string); get passwordInput(): string | undefined; private _project?; get project(): string; set project(value: string); resetProject(): void; get projectInput(): string | undefined; private _securityOperators?; get securityOperators(): string[]; set securityOperators(value: string[]); resetSecurityOperators(): void; get securityOperatorsInput(): string[] | undefined; private _site?; get site(): string; set site(value: string); resetSite(): void; get siteInput(): string | undefined; get state(): string; get stateDetails(): string; private _terraformLabels; get terraformLabels(): cdktf.StringMap; private _username?; get username(): string; set username(value: string); get usernameInput(): string | undefined; private _timeouts; get timeouts(): NetappActiveDirectoryTimeoutsOutputReference; putTimeouts(value: NetappActiveDirectoryTimeouts): void; resetTimeouts(): void; get timeoutsInput(): cdktf.IResolvable | NetappActiveDirectoryTimeouts | undefined; protected synthesizeAttributes(): { [name: string]: any; }; protected synthesizeHclAttributes(): { [name: string]: any; }; }