Skip to content

Commit

Permalink
Generate libsonnet source from libgenerator PR tf-libsonnet/libgenera…
Browse files Browse the repository at this point in the history
…tor#175

Signed-off-by: tflibsonnet-ci <[email protected]>
  • Loading branch information
renovate[bot] authored and tflibsonnet-ci committed Jun 7, 2023
1 parent 7102793 commit a761929
Show file tree
Hide file tree
Showing 22 changed files with 2,640 additions and 6 deletions.
45 changes: 45 additions & 0 deletions 3.x/_gen/data/auth_backends.libsonnet
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
local tf = (import 'github.com/tf-libsonnet/core/main.libsonnet');
local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet');
{
'#':: d.pkg(name='auth_backends', url='', help='`auth_backends` represents the `vault_auth_backends` Terraform data source.\n\n\n\nThis package contains functions and utilities for setting up the data source using Jsonnet code.\n'),
'#new':: d.fn(help="\n`vault.data.auth_backends.new` injects a new `data_vault_auth_backends` Terraform `data source`\nblock into the root module document.\n\nAdditionally, this inserts a private function into the `_ref` attribute that generates references to attributes of the\nresource. For example, if you added a new instance to the root using:\n\n # arguments omitted for brevity\n vault.data.auth_backends.new('some_id')\n\nYou can get the reference to the `id` field of the created `vault.data.auth_backends` using the reference:\n\n $._ref.data_vault_auth_backends.some_id.get('id')\n\nThis is the same as directly entering `\"${ data_vault_auth_backends.some_id.id }\"` as the value.\n\nNOTE: if you are chaining multiple resources together in a merge operation, you may not be able to use `super`, `self`,\nor `$` to refer to the root object. Instead, make an explicit outer object using `local`.\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block.\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n - `type` (`string`): The type of the auth backend. When `null`, the `type` field will be omitted from the resulting object.\n\n**Returns**:\n- A mixin object that injects the new data source into the root Terraform configuration.\n", args=[]),
new(
dataSrcLabel,
namespace=null,
type=null,
_meta={}
):: tf.withData(
type='vault_auth_backends',
label=dataSrcLabel,
attrs=self.newAttrs(namespace=namespace, type=type),
_meta=_meta
),
'#newAttrs':: d.fn(help='\n`vault.data.auth_backends.newAttrs` constructs a new object with attributes and blocks configured for the `auth_backends`\nTerraform data source.\n\nUnlike [vault.data.auth_backends.new](#fn-new), this function will not inject the `data source`\nblock into the root Terraform document. Instead, this must be passed in as the `attrs` argument for the\n[tf.withData](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withdata) function to build a complete block.\n\nThis is most useful when you need to preprocess the attributes with functions, conditional, or looping logic prior to\ninjecting into a complete block.\n\n**Args**:\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n - `type` (`string`): The type of the auth backend. When `null`, the `type` field will be omitted from the resulting object.\n\n**Returns**:\n - An attribute object that can be used with [tf.withData](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withdata) to construct a new `auth_backends` data source into the root Terraform configuration.\n', args=[]),
newAttrs(
namespace=null,
type=null
):: std.prune(a={
namespace: namespace,
type: type,
}),
'#withNamespace':: d.fn(help='`vault.string.withNamespace` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the namespace field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `namespace` field.\n', args=[]),
withNamespace(dataSrcLabel, value): {
data+: {
vault_auth_backends+: {
[dataSrcLabel]+: {
namespace: value,
},
},
},
},
'#withType':: d.fn(help='`vault.string.withType` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the type field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `type` field.\n', args=[]),
withType(dataSrcLabel, value): {
data+: {
vault_auth_backends+: {
[dataSrcLabel]+: {
type: value,
},
},
},
},
}
58 changes: 58 additions & 0 deletions 3.x/_gen/data/ldap_dynamic_credentials.libsonnet
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
local tf = (import 'github.com/tf-libsonnet/core/main.libsonnet');
local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet');
{
'#':: d.pkg(name='ldap_dynamic_credentials', url='', help='`ldap_dynamic_credentials` represents the `vault_ldap_dynamic_credentials` Terraform data source.\n\n\n\nThis package contains functions and utilities for setting up the data source using Jsonnet code.\n'),
'#new':: d.fn(help="\n`vault.data.ldap_dynamic_credentials.new` injects a new `data_vault_ldap_dynamic_credentials` Terraform `data source`\nblock into the root module document.\n\nAdditionally, this inserts a private function into the `_ref` attribute that generates references to attributes of the\nresource. For example, if you added a new instance to the root using:\n\n # arguments omitted for brevity\n vault.data.ldap_dynamic_credentials.new('some_id')\n\nYou can get the reference to the `id` field of the created `vault.data.ldap_dynamic_credentials` using the reference:\n\n $._ref.data_vault_ldap_dynamic_credentials.some_id.get('id')\n\nThis is the same as directly entering `\"${ data_vault_ldap_dynamic_credentials.some_id.id }\"` as the value.\n\nNOTE: if you are chaining multiple resources together in a merge operation, you may not be able to use `super`, `self`,\nor `$` to refer to the root object. Instead, make an explicit outer object using `local`.\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block.\n - `mount` (`string`): LDAP Secret Backend to read credentials from.\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n - `role_name` (`string`): Name of the role.\n\n**Returns**:\n- A mixin object that injects the new data source into the root Terraform configuration.\n", args=[]),
new(
dataSrcLabel,
mount,
role_name,
namespace=null,
_meta={}
):: tf.withData(
type='vault_ldap_dynamic_credentials',
label=dataSrcLabel,
attrs=self.newAttrs(mount=mount, namespace=namespace, role_name=role_name),
_meta=_meta
),
'#newAttrs':: d.fn(help='\n`vault.data.ldap_dynamic_credentials.newAttrs` constructs a new object with attributes and blocks configured for the `ldap_dynamic_credentials`\nTerraform data source.\n\nUnlike [vault.data.ldap_dynamic_credentials.new](#fn-new), this function will not inject the `data source`\nblock into the root Terraform document. Instead, this must be passed in as the `attrs` argument for the\n[tf.withData](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withdata) function to build a complete block.\n\nThis is most useful when you need to preprocess the attributes with functions, conditional, or looping logic prior to\ninjecting into a complete block.\n\n**Args**:\n - `mount` (`string`): LDAP Secret Backend to read credentials from.\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n - `role_name` (`string`): Name of the role.\n\n**Returns**:\n - An attribute object that can be used with [tf.withData](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withdata) to construct a new `ldap_dynamic_credentials` data source into the root Terraform configuration.\n', args=[]),
newAttrs(
mount,
role_name,
namespace=null
):: std.prune(a={
mount: mount,
namespace: namespace,
role_name: role_name,
}),
'#withMount':: d.fn(help='`vault.string.withMount` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the mount field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `mount` field.\n', args=[]),
withMount(dataSrcLabel, value): {
data+: {
vault_ldap_dynamic_credentials+: {
[dataSrcLabel]+: {
mount: value,
},
},
},
},
'#withNamespace':: d.fn(help='`vault.string.withNamespace` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the namespace field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `namespace` field.\n', args=[]),
withNamespace(dataSrcLabel, value): {
data+: {
vault_ldap_dynamic_credentials+: {
[dataSrcLabel]+: {
namespace: value,
},
},
},
},
'#withRoleName':: d.fn(help='`vault.string.withRoleName` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the role_name field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `role_name` field.\n', args=[]),
withRoleName(dataSrcLabel, value): {
data+: {
vault_ldap_dynamic_credentials+: {
[dataSrcLabel]+: {
role_name: value,
},
},
},
},
}
58 changes: 58 additions & 0 deletions 3.x/_gen/data/ldap_static_credentials.libsonnet
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
local tf = (import 'github.com/tf-libsonnet/core/main.libsonnet');
local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet');
{
'#':: d.pkg(name='ldap_static_credentials', url='', help='`ldap_static_credentials` represents the `vault_ldap_static_credentials` Terraform data source.\n\n\n\nThis package contains functions and utilities for setting up the data source using Jsonnet code.\n'),
'#new':: d.fn(help="\n`vault.data.ldap_static_credentials.new` injects a new `data_vault_ldap_static_credentials` Terraform `data source`\nblock into the root module document.\n\nAdditionally, this inserts a private function into the `_ref` attribute that generates references to attributes of the\nresource. For example, if you added a new instance to the root using:\n\n # arguments omitted for brevity\n vault.data.ldap_static_credentials.new('some_id')\n\nYou can get the reference to the `id` field of the created `vault.data.ldap_static_credentials` using the reference:\n\n $._ref.data_vault_ldap_static_credentials.some_id.get('id')\n\nThis is the same as directly entering `\"${ data_vault_ldap_static_credentials.some_id.id }\"` as the value.\n\nNOTE: if you are chaining multiple resources together in a merge operation, you may not be able to use `super`, `self`,\nor `$` to refer to the root object. Instead, make an explicit outer object using `local`.\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block.\n - `mount` (`string`): LDAP Secret Backend to read credentials from.\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n - `role_name` (`string`): Name of the role.\n\n**Returns**:\n- A mixin object that injects the new data source into the root Terraform configuration.\n", args=[]),
new(
dataSrcLabel,
mount,
role_name,
namespace=null,
_meta={}
):: tf.withData(
type='vault_ldap_static_credentials',
label=dataSrcLabel,
attrs=self.newAttrs(mount=mount, namespace=namespace, role_name=role_name),
_meta=_meta
),
'#newAttrs':: d.fn(help='\n`vault.data.ldap_static_credentials.newAttrs` constructs a new object with attributes and blocks configured for the `ldap_static_credentials`\nTerraform data source.\n\nUnlike [vault.data.ldap_static_credentials.new](#fn-new), this function will not inject the `data source`\nblock into the root Terraform document. Instead, this must be passed in as the `attrs` argument for the\n[tf.withData](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withdata) function to build a complete block.\n\nThis is most useful when you need to preprocess the attributes with functions, conditional, or looping logic prior to\ninjecting into a complete block.\n\n**Args**:\n - `mount` (`string`): LDAP Secret Backend to read credentials from.\n - `namespace` (`string`): Target namespace. (requires Enterprise) When `null`, the `namespace` field will be omitted from the resulting object.\n - `role_name` (`string`): Name of the role.\n\n**Returns**:\n - An attribute object that can be used with [tf.withData](https://github.com/tf-libsonnet/core/tree/main/docs#fn-withdata) to construct a new `ldap_static_credentials` data source into the root Terraform configuration.\n', args=[]),
newAttrs(
mount,
role_name,
namespace=null
):: std.prune(a={
mount: mount,
namespace: namespace,
role_name: role_name,
}),
'#withMount':: d.fn(help='`vault.string.withMount` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the mount field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `mount` field.\n', args=[]),
withMount(dataSrcLabel, value): {
data+: {
vault_ldap_static_credentials+: {
[dataSrcLabel]+: {
mount: value,
},
},
},
},
'#withNamespace':: d.fn(help='`vault.string.withNamespace` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the namespace field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `namespace` field.\n', args=[]),
withNamespace(dataSrcLabel, value): {
data+: {
vault_ldap_static_credentials+: {
[dataSrcLabel]+: {
namespace: value,
},
},
},
},
'#withRoleName':: d.fn(help='`vault.string.withRoleName` constructs a mixin object that can be merged into the `string`\nTerraform data source block to set or update the role_name field.\n\n\n\n**Args**:\n - `dataSrcLabel` (`string`): The name label of the block to update.\n - `value` (`string`): The value to set for the `role_name` field.\n', args=[]),
withRoleName(dataSrcLabel, value): {
data+: {
vault_ldap_static_credentials+: {
[dataSrcLabel]+: {
role_name: value,
},
},
},
},
}
3 changes: 3 additions & 0 deletions 3.x/_gen/data/main.libsonnet
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet');
ad_access_credentials: (import 'ad_access_credentials.libsonnet'),
approle_auth_backend_role_id: (import 'approle_auth_backend_role_id.libsonnet'),
auth_backend: (import 'auth_backend.libsonnet'),
auth_backends: (import 'auth_backends.libsonnet'),
aws_access_credentials: (import 'aws_access_credentials.libsonnet'),
azure_access_credentials: (import 'azure_access_credentials.libsonnet'),
gcp_auth_backend_role: (import 'gcp_auth_backend_role.libsonnet'),
Expand All @@ -21,6 +22,8 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet');
kv_secret_v2: (import 'kv_secret_v2.libsonnet'),
kv_secrets_list: (import 'kv_secrets_list.libsonnet'),
kv_secrets_list_v2: (import 'kv_secrets_list_v2.libsonnet'),
ldap_dynamic_credentials: (import 'ldap_dynamic_credentials.libsonnet'),
ldap_static_credentials: (import 'ldap_static_credentials.libsonnet'),
nomad_access_token: (import 'nomad_access_token.libsonnet'),
policy_document: (import 'policy_document.libsonnet'),
raft_autopilot_state: (import 'raft_autopilot_state.libsonnet'),
Expand Down
4 changes: 4 additions & 0 deletions 3.x/_gen/main.libsonnet
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,10 @@ local d = (import 'github.com/jsonnet-libs/docsonnet/doc-util/main.libsonnet');
ldap_auth_backend: (import 'resources/ldap_auth_backend.libsonnet'),
ldap_auth_backend_group: (import 'resources/ldap_auth_backend_group.libsonnet'),
ldap_auth_backend_user: (import 'resources/ldap_auth_backend_user.libsonnet'),
ldap_secret_backend: (import 'resources/ldap_secret_backend.libsonnet'),
ldap_secret_backend_dynamic_role: (import 'resources/ldap_secret_backend_dynamic_role.libsonnet'),
ldap_secret_backend_library_set: (import 'resources/ldap_secret_backend_library_set.libsonnet'),
ldap_secret_backend_static_role: (import 'resources/ldap_secret_backend_static_role.libsonnet'),
managed_keys: (import 'resources/managed_keys.libsonnet'),
mfa_duo: (import 'resources/mfa_duo.libsonnet'),
mfa_okta: (import 'resources/mfa_okta.libsonnet'),
Expand Down
Loading

0 comments on commit a761929

Please sign in to comment.