@cdktn/provider-docker 12.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. package/.eslintrc.json +230 -0
  2. package/.jsii +46911 -0
  3. package/LICENSE +355 -0
  4. package/README.md +94 -0
  5. package/lib/buildx-builder/index.d.ts +764 -0
  6. package/lib/buildx-builder/index.js +1791 -0
  7. package/lib/config/index.d.ts +68 -0
  8. package/lib/config/index.js +129 -0
  9. package/lib/container/index.d.ts +1845 -0
  10. package/lib/container/index.js +4085 -0
  11. package/lib/data-docker-image/index.d.ts +59 -0
  12. package/lib/data-docker-image/index.js +115 -0
  13. package/lib/data-docker-logs/index.d.ts +153 -0
  14. package/lib/data-docker-logs/index.js +325 -0
  15. package/lib/data-docker-network/index.d.ts +90 -0
  16. package/lib/data-docker-network/index.js +207 -0
  17. package/lib/data-docker-plugin/index.d.ts +66 -0
  18. package/lib/data-docker-plugin/index.js +134 -0
  19. package/lib/data-docker-registry-image/index.d.ts +70 -0
  20. package/lib/data-docker-registry-image/index.js +136 -0
  21. package/lib/data-docker-registry-image-manifests/index.d.ts +161 -0
  22. package/lib/data-docker-registry-image-manifests/index.js +366 -0
  23. package/lib/image/index.d.ts +871 -0
  24. package/lib/image/index.js +2003 -0
  25. package/lib/index.d.ts +22 -0
  26. package/lib/index.js +27 -0
  27. package/lib/lazy-index.d.ts +4 -0
  28. package/lib/lazy-index.js +25 -0
  29. package/lib/network/index.d.ts +334 -0
  30. package/lib/network/index.js +666 -0
  31. package/lib/plugin/index.d.ts +200 -0
  32. package/lib/plugin/index.js +414 -0
  33. package/lib/provider/index.d.ts +186 -0
  34. package/lib/provider/index.js +342 -0
  35. package/lib/registry-image/index.d.ts +155 -0
  36. package/lib/registry-image/index.js +320 -0
  37. package/lib/secret/index.d.ts +132 -0
  38. package/lib/secret/index.js +281 -0
  39. package/lib/service/index.d.ts +2282 -0
  40. package/lib/service/index.js +5760 -0
  41. package/lib/tag/index.d.ts +80 -0
  42. package/lib/tag/index.js +154 -0
  43. package/lib/volume/index.d.ts +154 -0
  44. package/lib/volume/index.js +312 -0
  45. package/package.json +152 -0
  46. package/tsconfig.eslint.json +34 -0
@@ -0,0 +1,136 @@
1
+ "use strict";
2
+ var _a;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.DataDockerRegistryImage = void 0;
5
+ const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
+ const cdktf = require("cdktf");
7
+ /**
8
+ * Represents a {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image docker_registry_image}
9
+ */
10
+ class DataDockerRegistryImage extends cdktf.TerraformDataSource {
11
+ // ==============
12
+ // STATIC Methods
13
+ // ==============
14
+ /**
15
+ * Generates CDKTF code for importing a DataDockerRegistryImage resource upon running "cdktf plan <stack-name>"
16
+ * @param scope The scope in which to define this construct
17
+ * @param importToId The construct id used in the generated config for the DataDockerRegistryImage to import
18
+ * @param importFromId The id of the existing DataDockerRegistryImage that should be imported. Refer to the {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image#import import section} in the documentation of this resource for the id to use
19
+ * @param provider? Optional instance of the provider where the DataDockerRegistryImage to import is found
20
+ */
21
+ static generateConfigForImport(scope, importToId, importFromId, provider) {
22
+ return new cdktf.ImportableResource(scope, importToId, { terraformResourceType: "docker_registry_image", importId: importFromId, provider });
23
+ }
24
+ // ===========
25
+ // INITIALIZER
26
+ // ===========
27
+ /**
28
+ * Create a new {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image docker_registry_image} Data Source
29
+ *
30
+ * @param scope The scope in which to define this construct
31
+ * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
32
+ * @param options DataDockerRegistryImageConfig
33
+ */
34
+ constructor(scope, id, config) {
35
+ super(scope, id, {
36
+ terraformResourceType: 'docker_registry_image',
37
+ terraformGeneratorMetadata: {
38
+ providerName: 'docker',
39
+ providerVersion: '3.6.2',
40
+ providerVersionConstraint: '~> 3.0'
41
+ },
42
+ provider: config.provider,
43
+ dependsOn: config.dependsOn,
44
+ count: config.count,
45
+ lifecycle: config.lifecycle,
46
+ provisioners: config.provisioners,
47
+ connection: config.connection,
48
+ forEach: config.forEach
49
+ });
50
+ this._id = config.id;
51
+ this._insecureSkipVerify = config.insecureSkipVerify;
52
+ this._name = config.name;
53
+ }
54
+ get id() {
55
+ return this.getStringAttribute('id');
56
+ }
57
+ set id(value) {
58
+ this._id = value;
59
+ }
60
+ resetId() {
61
+ this._id = undefined;
62
+ }
63
+ // Temporarily expose input value. Use with caution.
64
+ get idInput() {
65
+ return this._id;
66
+ }
67
+ get insecureSkipVerify() {
68
+ return this.getBooleanAttribute('insecure_skip_verify');
69
+ }
70
+ set insecureSkipVerify(value) {
71
+ this._insecureSkipVerify = value;
72
+ }
73
+ resetInsecureSkipVerify() {
74
+ this._insecureSkipVerify = undefined;
75
+ }
76
+ // Temporarily expose input value. Use with caution.
77
+ get insecureSkipVerifyInput() {
78
+ return this._insecureSkipVerify;
79
+ }
80
+ get name() {
81
+ return this.getStringAttribute('name');
82
+ }
83
+ set name(value) {
84
+ this._name = value;
85
+ }
86
+ // Temporarily expose input value. Use with caution.
87
+ get nameInput() {
88
+ return this._name;
89
+ }
90
+ // sha256_digest - computed: true, optional: false, required: false
91
+ get sha256Digest() {
92
+ return this.getStringAttribute('sha256_digest');
93
+ }
94
+ // =========
95
+ // SYNTHESIS
96
+ // =========
97
+ synthesizeAttributes() {
98
+ return {
99
+ id: cdktf.stringToTerraform(this._id),
100
+ insecure_skip_verify: cdktf.booleanToTerraform(this._insecureSkipVerify),
101
+ name: cdktf.stringToTerraform(this._name),
102
+ };
103
+ }
104
+ synthesizeHclAttributes() {
105
+ const attrs = {
106
+ id: {
107
+ value: cdktf.stringToHclTerraform(this._id),
108
+ isBlock: false,
109
+ type: "simple",
110
+ storageClassType: "string",
111
+ },
112
+ insecure_skip_verify: {
113
+ value: cdktf.booleanToHclTerraform(this._insecureSkipVerify),
114
+ isBlock: false,
115
+ type: "simple",
116
+ storageClassType: "boolean",
117
+ },
118
+ name: {
119
+ value: cdktf.stringToHclTerraform(this._name),
120
+ isBlock: false,
121
+ type: "simple",
122
+ storageClassType: "string",
123
+ },
124
+ };
125
+ // remove undefined attributes
126
+ return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined));
127
+ }
128
+ }
129
+ exports.DataDockerRegistryImage = DataDockerRegistryImage;
130
+ _a = JSII_RTTI_SYMBOL_1;
131
+ DataDockerRegistryImage[_a] = { fqn: "@cdktn/provider-docker.dataDockerRegistryImage.DataDockerRegistryImage", version: "12.1.0" };
132
+ // =================
133
+ // STATIC PROPERTIES
134
+ // =================
135
+ DataDockerRegistryImage.tfResourceType = "docker_registry_image";
136
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/data-docker-registry-image/index.ts"],"names":[],"mappings":";;;;;AASA,+BAA+B;AA0B/B;;EAEE;AACF,MAAa,uBAAwB,SAAQ,KAAK,CAAC,mBAAmB;IAOpE,iBAAiB;IACjB,iBAAiB;IACjB,iBAAiB;IACjB;;;;;;MAME;IACK,MAAM,CAAC,uBAAuB,CAAC,KAAgB,EAAE,UAAkB,EAAE,YAAoB,EAAE,QAAkC;QAC9H,OAAO,IAAI,KAAK,CAAC,kBAAkB,CAAC,KAAK,EAAE,UAAU,EAAE,EAAE,qBAAqB,EAAE,uBAAuB,EAAE,QAAQ,EAAE,YAAY,EAAE,QAAQ,EAAE,CAAC,CAAC;IAC/I,CAAC;IAEL,cAAc;IACd,cAAc;IACd,cAAc;IAEd;;;;;;MAME;IACF,YAAmB,KAAgB,EAAE,EAAU,EAAE,MAAqC;QACpF,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,qBAAqB,EAAE,uBAAuB;YAC9C,0BAA0B,EAAE;gBAC1B,YAAY,EAAE,QAAQ;gBACtB,eAAe,EAAE,OAAO;gBACxB,yBAAyB,EAAE,QAAQ;aACpC;YACD,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,SAAS,EAAE,MAAM,CAAC,SAAS;YAC3B,KAAK,EAAE,MAAM,CAAC,KAAK;YACnB,SAAS,EAAE,MAAM,CAAC,SAAS;YAC3B,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,OAAO,EAAE,MAAM,CAAC,OAAO;SACxB,CAAC,CAAC;QACH,IAAI,CAAC,GAAG,GAAG,MAAM,CAAC,EAAE,CAAC;QACrB,IAAI,CAAC,mBAAmB,GAAG,MAAM,CAAC,kBAAkB,CAAC;QACrD,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC;IAC3B,CAAC;IAQD,IAAW,EAAE;QACX,OAAO,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;IACvC,CAAC;IACD,IAAW,EAAE,CAAC,KAAa;QACzB,IAAI,CAAC,GAAG,GAAG,KAAK,CAAC;IACnB,CAAC;IACM,OAAO;QACZ,IAAI,CAAC,GAAG,GAAG,SAAS,CAAC;IACvB,CAAC;IACD,oDAAoD;IACpD,IAAW,OAAO;QAChB,OAAO,IAAI,CAAC,GAAG,CAAC;IAClB,CAAC;IAID,IAAW,kBAAkB;QAC3B,OAAO,IAAI,CAAC,mBAAmB,CAAC,sBAAsB,CAAC,CAAC;IAC1D,CAAC;IACD,IAAW,kBAAkB,CAAC,KAAkC;QAC9D,IAAI,CAAC,mBAAmB,GAAG,KAAK,CAAC;IACnC,CAAC;IACM,uBAAuB;QAC5B,IAAI,CAAC,mBAAmB,GAAG,SAAS,CAAC;IACvC,CAAC;IACD,oDAAoD;IACpD,IAAW,uBAAuB;QAChC,OAAO,IAAI,CAAC,mBAAmB,CAAC;IAClC,CAAC;IAID,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;IACzC,CAAC;IACD,IAAW,IAAI,CAAC,KAAa;QAC3B,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;IACrB,CAAC;IACD,oDAAoD;IACpD,IAAW,SAAS;QAClB,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAED,mEAAmE;IACnE,IAAW,YAAY;QACrB,OAAO,IAAI,CAAC,kBAAkB,CAAC,eAAe,CAAC,CAAC;IAClD,CAAC;IAED,YAAY;IACZ,YAAY;IACZ,YAAY;IAEF,oBAAoB;QAC5B,OAAO;YACL,EAAE,EAAE,KAAK,CAAC,iBAAiB,CAAC,IAAI,CAAC,GAAG,CAAC;YACrC,oBAAoB,EAAE,KAAK,CAAC,kBAAkB,CAAC,IAAI,CAAC,mBAAmB,CAAC;YACxE,IAAI,EAAE,KAAK,CAAC,iBAAiB,CAAC,IAAI,CAAC,KAAK,CAAC;SAC1C,CAAC;IACJ,CAAC;IAES,uBAAuB;QAC/B,MAAM,KAAK,GAAG;YACZ,EAAE,EAAE;gBACF,KAAK,EAAE,KAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,GAAG,CAAC;gBAC3C,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,QAAQ;aAC3B;YACD,oBAAoB,EAAE;gBACpB,KAAK,EAAE,KAAK,CAAC,qBAAqB,CAAC,IAAI,CAAC,mBAAmB,CAAC;gBAC5D,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,SAAS;aAC5B;YACD,IAAI,EAAE;gBACJ,KAAK,EAAE,KAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,KAAK,CAAC;gBAC7C,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,QAAQ;aAC3B;SACF,CAAC;QAEF,8BAA8B;QAC9B,OAAO,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,KAAK,KAAK,SAAS,IAAI,KAAK,CAAC,KAAK,KAAK,SAAS,CAAE,CAAC,CAAA;IAC5H,CAAC;;AA/IH,0DAgJC;;;AA9IC,oBAAoB;AACpB,oBAAoB;AACpB,oBAAoB;AACG,sCAAc,GAAG,uBAAuB,CAAC","sourcesContent":["/**\n * Copyright (c) HashiCorp, Inc.\n * SPDX-License-Identifier: MPL-2.0\n */\n\n// https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image\n// generated from terraform resource schema\n\nimport { Construct } from 'constructs';\nimport * as cdktf from 'cdktf';\n\n// Configuration\n\nexport interface DataDockerRegistryImageConfig extends cdktf.TerraformMetaArguments {\n  /**\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image#id DataDockerRegistryImage#id}\n  *\n  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.\n  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.\n  */\n  readonly id?: string;\n  /**\n  * If `true`, the verification of TLS certificates of the server/registry is disabled. Defaults to `false`\n  *\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image#insecure_skip_verify DataDockerRegistryImage#insecure_skip_verify}\n  */\n  readonly insecureSkipVerify?: boolean | cdktf.IResolvable;\n  /**\n  * The name of the Docker image, including any tags. e.g. `alpine:latest`. You can also specify a digest, e.g. `nginx:1.28.0@sha256:eaa7e36decc3421fc04478c586dfea0d931cebe47d5bc0b15d758a32ba51126f`.\n  *\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image#name DataDockerRegistryImage#name}\n  */\n  readonly name: string;\n}\n\n/**\n* Represents a {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image docker_registry_image}\n*/\nexport class DataDockerRegistryImage extends cdktf.TerraformDataSource {\n\n  // =================\n  // STATIC PROPERTIES\n  // =================\n  public static readonly tfResourceType = \"docker_registry_image\";\n\n  // ==============\n  // STATIC Methods\n  // ==============\n  /**\n  * Generates CDKTF code for importing a DataDockerRegistryImage resource upon running \"cdktf plan <stack-name>\"\n  * @param scope The scope in which to define this construct\n  * @param importToId The construct id used in the generated config for the DataDockerRegistryImage to import\n  * @param importFromId The id of the existing DataDockerRegistryImage that should be imported. Refer to the {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image#import import section} in the documentation of this resource for the id to use\n  * @param provider? Optional instance of the provider where the DataDockerRegistryImage to import is found\n  */\n  public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider) {\n        return new cdktf.ImportableResource(scope, importToId, { terraformResourceType: \"docker_registry_image\", importId: importFromId, provider });\n      }\n\n  // ===========\n  // INITIALIZER\n  // ===========\n\n  /**\n  * Create a new {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image docker_registry_image} Data Source\n  *\n  * @param scope The scope in which to define this construct\n  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope\n  * @param options DataDockerRegistryImageConfig\n  */\n  public constructor(scope: Construct, id: string, config: DataDockerRegistryImageConfig) {\n    super(scope, id, {\n      terraformResourceType: 'docker_registry_image',\n      terraformGeneratorMetadata: {\n        providerName: 'docker',\n        providerVersion: '3.6.2',\n        providerVersionConstraint: '~> 3.0'\n      },\n      provider: config.provider,\n      dependsOn: config.dependsOn,\n      count: config.count,\n      lifecycle: config.lifecycle,\n      provisioners: config.provisioners,\n      connection: config.connection,\n      forEach: config.forEach\n    });\n    this._id = config.id;\n    this._insecureSkipVerify = config.insecureSkipVerify;\n    this._name = config.name;\n  }\n\n  // ==========\n  // ATTRIBUTES\n  // ==========\n\n  // id - computed: true, optional: true, required: false\n  private _id?: string; \n  public get id() {\n    return this.getStringAttribute('id');\n  }\n  public set id(value: string) {\n    this._id = value;\n  }\n  public resetId() {\n    this._id = undefined;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get idInput() {\n    return this._id;\n  }\n\n  // insecure_skip_verify - computed: false, optional: true, required: false\n  private _insecureSkipVerify?: boolean | cdktf.IResolvable; \n  public get insecureSkipVerify() {\n    return this.getBooleanAttribute('insecure_skip_verify');\n  }\n  public set insecureSkipVerify(value: boolean | cdktf.IResolvable) {\n    this._insecureSkipVerify = value;\n  }\n  public resetInsecureSkipVerify() {\n    this._insecureSkipVerify = undefined;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get insecureSkipVerifyInput() {\n    return this._insecureSkipVerify;\n  }\n\n  // name - computed: false, optional: false, required: true\n  private _name?: string; \n  public get name() {\n    return this.getStringAttribute('name');\n  }\n  public set name(value: string) {\n    this._name = value;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get nameInput() {\n    return this._name;\n  }\n\n  // sha256_digest - computed: true, optional: false, required: false\n  public get sha256Digest() {\n    return this.getStringAttribute('sha256_digest');\n  }\n\n  // =========\n  // SYNTHESIS\n  // =========\n\n  protected synthesizeAttributes(): { [name: string]: any } {\n    return {\n      id: cdktf.stringToTerraform(this._id),\n      insecure_skip_verify: cdktf.booleanToTerraform(this._insecureSkipVerify),\n      name: cdktf.stringToTerraform(this._name),\n    };\n  }\n\n  protected synthesizeHclAttributes(): { [name: string]: any } {\n    const attrs = {\n      id: {\n        value: cdktf.stringToHclTerraform(this._id),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"string\",\n      },\n      insecure_skip_verify: {\n        value: cdktf.booleanToHclTerraform(this._insecureSkipVerify),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"boolean\",\n      },\n      name: {\n        value: cdktf.stringToHclTerraform(this._name),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"string\",\n      },\n    };\n\n    // remove undefined attributes\n    return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined ))\n  }\n}\n"]}
@@ -0,0 +1,161 @@
1
+ /**
2
+ * Copyright (c) HashiCorp, Inc.
3
+ * SPDX-License-Identifier: MPL-2.0
4
+ */
5
+ import { Construct } from 'constructs';
6
+ import * as cdktf from 'cdktf';
7
+ export interface DataDockerRegistryImageManifestsConfig extends cdktf.TerraformMetaArguments {
8
+ /**
9
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#id DataDockerRegistryImageManifests#id}
10
+ *
11
+ * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
12
+ * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
13
+ */
14
+ readonly id?: string;
15
+ /**
16
+ * If `true`, the verification of TLS certificates of the server/registry is disabled. Defaults to `false`
17
+ *
18
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#insecure_skip_verify DataDockerRegistryImageManifests#insecure_skip_verify}
19
+ */
20
+ readonly insecureSkipVerify?: boolean | cdktf.IResolvable;
21
+ /**
22
+ * The name of the Docker image, including any tags. e.g. `alpine:latest`
23
+ *
24
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#name DataDockerRegistryImageManifests#name}
25
+ */
26
+ readonly name: string;
27
+ /**
28
+ * auth_config block
29
+ *
30
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#auth_config DataDockerRegistryImageManifests#auth_config}
31
+ */
32
+ readonly authConfig?: DataDockerRegistryImageManifestsAuthConfig;
33
+ }
34
+ export interface DataDockerRegistryImageManifestsManifests {
35
+ }
36
+ export declare function dataDockerRegistryImageManifestsManifestsToTerraform(struct?: DataDockerRegistryImageManifestsManifests): any;
37
+ export declare function dataDockerRegistryImageManifestsManifestsToHclTerraform(struct?: DataDockerRegistryImageManifestsManifests): any;
38
+ export declare class DataDockerRegistryImageManifestsManifestsOutputReference extends cdktf.ComplexObject {
39
+ private isEmptyObject;
40
+ /**
41
+ * @param terraformResource The parent resource
42
+ * @param terraformAttribute The attribute on the parent resource this class is referencing
43
+ * @param complexObjectIndex the index of this item in the list
44
+ * @param complexObjectIsFromSet whether the list is wrapping a set (will add tolist() to be able to access an item via an index)
45
+ */
46
+ constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string, complexObjectIndex: number, complexObjectIsFromSet: boolean);
47
+ get internalValue(): DataDockerRegistryImageManifestsManifests | undefined;
48
+ set internalValue(value: DataDockerRegistryImageManifestsManifests | undefined);
49
+ get architecture(): string;
50
+ get mediaType(): string;
51
+ get os(): string;
52
+ get sha256Digest(): string;
53
+ }
54
+ export declare class DataDockerRegistryImageManifestsManifestsList extends cdktf.ComplexList {
55
+ protected terraformResource: cdktf.IInterpolatingParent;
56
+ protected terraformAttribute: string;
57
+ protected wrapsSet: boolean;
58
+ /**
59
+ * @param terraformResource The parent resource
60
+ * @param terraformAttribute The attribute on the parent resource this class is referencing
61
+ * @param wrapsSet whether the list is wrapping a set (will add tolist() to be able to access an item via an index)
62
+ */
63
+ constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string, wrapsSet: boolean);
64
+ /**
65
+ * @param index the index of the item to return
66
+ */
67
+ get(index: number): DataDockerRegistryImageManifestsManifestsOutputReference;
68
+ }
69
+ export interface DataDockerRegistryImageManifestsAuthConfig {
70
+ /**
71
+ * The address of the Docker registry.
72
+ *
73
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#address DataDockerRegistryImageManifests#address}
74
+ */
75
+ readonly address: string;
76
+ /**
77
+ * The password for the Docker registry.
78
+ *
79
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#password DataDockerRegistryImageManifests#password}
80
+ */
81
+ readonly password: string;
82
+ /**
83
+ * The username for the Docker registry.
84
+ *
85
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#username DataDockerRegistryImageManifests#username}
86
+ */
87
+ readonly username: string;
88
+ }
89
+ export declare function dataDockerRegistryImageManifestsAuthConfigToTerraform(struct?: DataDockerRegistryImageManifestsAuthConfigOutputReference | DataDockerRegistryImageManifestsAuthConfig): any;
90
+ export declare function dataDockerRegistryImageManifestsAuthConfigToHclTerraform(struct?: DataDockerRegistryImageManifestsAuthConfigOutputReference | DataDockerRegistryImageManifestsAuthConfig): any;
91
+ export declare class DataDockerRegistryImageManifestsAuthConfigOutputReference extends cdktf.ComplexObject {
92
+ private isEmptyObject;
93
+ /**
94
+ * @param terraformResource The parent resource
95
+ * @param terraformAttribute The attribute on the parent resource this class is referencing
96
+ */
97
+ constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string);
98
+ get internalValue(): DataDockerRegistryImageManifestsAuthConfig | undefined;
99
+ set internalValue(value: DataDockerRegistryImageManifestsAuthConfig | undefined);
100
+ private _address?;
101
+ get address(): string;
102
+ set address(value: string);
103
+ get addressInput(): string | undefined;
104
+ private _password?;
105
+ get password(): string;
106
+ set password(value: string);
107
+ get passwordInput(): string | undefined;
108
+ private _username?;
109
+ get username(): string;
110
+ set username(value: string);
111
+ get usernameInput(): string | undefined;
112
+ }
113
+ /**
114
+ * Represents a {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests docker_registry_image_manifests}
115
+ */
116
+ export declare class DataDockerRegistryImageManifests extends cdktf.TerraformDataSource {
117
+ static readonly tfResourceType = "docker_registry_image_manifests";
118
+ /**
119
+ * Generates CDKTF code for importing a DataDockerRegistryImageManifests resource upon running "cdktf plan <stack-name>"
120
+ * @param scope The scope in which to define this construct
121
+ * @param importToId The construct id used in the generated config for the DataDockerRegistryImageManifests to import
122
+ * @param importFromId The id of the existing DataDockerRegistryImageManifests that should be imported. Refer to the {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests#import import section} in the documentation of this resource for the id to use
123
+ * @param provider? Optional instance of the provider where the DataDockerRegistryImageManifests to import is found
124
+ */
125
+ static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktf.TerraformProvider): cdktf.ImportableResource;
126
+ /**
127
+ * Create a new {@link https://registry.terraform.io/providers/kreuzwerker/docker/3.6.2/docs/data-sources/registry_image_manifests docker_registry_image_manifests} Data Source
128
+ *
129
+ * @param scope The scope in which to define this construct
130
+ * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
131
+ * @param options DataDockerRegistryImageManifestsConfig
132
+ */
133
+ constructor(scope: Construct, id: string, config: DataDockerRegistryImageManifestsConfig);
134
+ private _id?;
135
+ get id(): string;
136
+ set id(value: string);
137
+ resetId(): void;
138
+ get idInput(): string | undefined;
139
+ private _insecureSkipVerify?;
140
+ get insecureSkipVerify(): boolean | cdktf.IResolvable;
141
+ set insecureSkipVerify(value: boolean | cdktf.IResolvable);
142
+ resetInsecureSkipVerify(): void;
143
+ get insecureSkipVerifyInput(): boolean | cdktf.IResolvable | undefined;
144
+ private _manifests;
145
+ get manifests(): DataDockerRegistryImageManifestsManifestsList;
146
+ private _name?;
147
+ get name(): string;
148
+ set name(value: string);
149
+ get nameInput(): string | undefined;
150
+ private _authConfig;
151
+ get authConfig(): DataDockerRegistryImageManifestsAuthConfigOutputReference;
152
+ putAuthConfig(value: DataDockerRegistryImageManifestsAuthConfig): void;
153
+ resetAuthConfig(): void;
154
+ get authConfigInput(): DataDockerRegistryImageManifestsAuthConfig | undefined;
155
+ protected synthesizeAttributes(): {
156
+ [name: string]: any;
157
+ };
158
+ protected synthesizeHclAttributes(): {
159
+ [name: string]: any;
160
+ };
161
+ }