@cdktn/provider-newrelic 14.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (154) hide show
  1. package/.jsii +198156 -0
  2. package/LICENSE +355 -0
  3. package/README.md +94 -0
  4. package/lib/account-management/index.d.ts +122 -0
  5. package/lib/account-management/index.js +293 -0
  6. package/lib/alert-channel/index.d.ts +351 -0
  7. package/lib/alert-channel/index.js +769 -0
  8. package/lib/alert-compound-condition/index.d.ts +233 -0
  9. package/lib/alert-compound-condition/index.js +506 -0
  10. package/lib/alert-condition/index.d.ts +271 -0
  11. package/lib/alert-condition/index.js +558 -0
  12. package/lib/alert-muting-rule/index.d.ts +309 -0
  13. package/lib/alert-muting-rule/index.js +714 -0
  14. package/lib/alert-policy/index.d.ts +91 -0
  15. package/lib/alert-policy/index.js +174 -0
  16. package/lib/alert-policy-channel/index.d.ts +114 -0
  17. package/lib/alert-policy-channel/index.js +258 -0
  18. package/lib/api-access-key/index.d.ts +102 -0
  19. package/lib/api-access-key/index.js +220 -0
  20. package/lib/application-settings/index.d.ts +414 -0
  21. package/lib/application-settings/index.js +944 -0
  22. package/lib/browser-application/index.d.ts +149 -0
  23. package/lib/browser-application/index.js +341 -0
  24. package/lib/cloud-aws-eu-sovereign-integrations/index.d.ts +199 -0
  25. package/lib/cloud-aws-eu-sovereign-integrations/index.js +481 -0
  26. package/lib/cloud-aws-eu-sovereign-link-account/index.d.ts +90 -0
  27. package/lib/cloud-aws-eu-sovereign-link-account/index.js +171 -0
  28. package/lib/cloud-aws-govcloud-integrations/index.d.ts +1523 -0
  29. package/lib/cloud-aws-govcloud-integrations/index.js +3776 -0
  30. package/lib/cloud-aws-govcloud-link-account/index.d.ts +90 -0
  31. package/lib/cloud-aws-govcloud-link-account/index.js +171 -0
  32. package/lib/cloud-aws-integrations/index.d.ts +3345 -0
  33. package/lib/cloud-aws-integrations/index.js +8599 -0
  34. package/lib/cloud-aws-link-account/index.d.ts +90 -0
  35. package/lib/cloud-aws-link-account/index.js +171 -0
  36. package/lib/cloud-azure-integrations/index.d.ts +1666 -0
  37. package/lib/cloud-azure-integrations/index.js +4361 -0
  38. package/lib/cloud-azure-link-account/index.d.ts +109 -0
  39. package/lib/cloud-azure-link-account/index.js +204 -0
  40. package/lib/cloud-gcp-integrations/index.d.ts +1049 -0
  41. package/lib/cloud-gcp-integrations/index.js +2810 -0
  42. package/lib/cloud-gcp-link-account/index.d.ts +79 -0
  43. package/lib/cloud-gcp-link-account/index.js +150 -0
  44. package/lib/cloud-oci-link-account/index.d.ts +195 -0
  45. package/lib/cloud-oci-link-account/index.js +366 -0
  46. package/lib/data-newrelic-account/index.d.ts +82 -0
  47. package/lib/data-newrelic-account/index.js +160 -0
  48. package/lib/data-newrelic-alert-channel/index.d.ts +126 -0
  49. package/lib/data-newrelic-alert-channel/index.js +298 -0
  50. package/lib/data-newrelic-alert-policy/index.d.ts +82 -0
  51. package/lib/data-newrelic-alert-policy/index.js +161 -0
  52. package/lib/data-newrelic-application/index.d.ts +60 -0
  53. package/lib/data-newrelic-application/index.js +122 -0
  54. package/lib/data-newrelic-authentication-domain/index.d.ts +47 -0
  55. package/lib/data-newrelic-authentication-domain/index.js +97 -0
  56. package/lib/data-newrelic-cloud-account/index.d.ts +79 -0
  57. package/lib/data-newrelic-cloud-account/index.js +150 -0
  58. package/lib/data-newrelic-entity/index.d.ts +189 -0
  59. package/lib/data-newrelic-entity/index.js +401 -0
  60. package/lib/data-newrelic-group/index.d.ts +58 -0
  61. package/lib/data-newrelic-group/index.js +116 -0
  62. package/lib/data-newrelic-key-transaction/index.d.ts +82 -0
  63. package/lib/data-newrelic-key-transaction/index.js +161 -0
  64. package/lib/data-newrelic-notification-destination/index.d.ts +165 -0
  65. package/lib/data-newrelic-notification-destination/index.js +372 -0
  66. package/lib/data-newrelic-obfuscation-expression/index.d.ts +69 -0
  67. package/lib/data-newrelic-obfuscation-expression/index.js +132 -0
  68. package/lib/data-newrelic-service-level-alert-helper/index.d.ts +111 -0
  69. package/lib/data-newrelic-service-level-alert-helper/index.js +244 -0
  70. package/lib/data-newrelic-synthetics-private-location/index.d.ts +80 -0
  71. package/lib/data-newrelic-synthetics-private-location/index.js +153 -0
  72. package/lib/data-newrelic-synthetics-secure-credential/index.d.ts +71 -0
  73. package/lib/data-newrelic-synthetics-secure-credential/index.js +140 -0
  74. package/lib/data-newrelic-test-grok-pattern/index.d.ts +149 -0
  75. package/lib/data-newrelic-test-grok-pattern/index.js +318 -0
  76. package/lib/data-newrelic-user/index.d.ts +69 -0
  77. package/lib/data-newrelic-user/index.js +136 -0
  78. package/lib/data-partition-rule/index.d.ts +146 -0
  79. package/lib/data-partition-rule/index.js +319 -0
  80. package/lib/entity-tags/index.d.ts +156 -0
  81. package/lib/entity-tags/index.js +368 -0
  82. package/lib/events-to-metrics-rule/index.d.ts +102 -0
  83. package/lib/events-to-metrics-rule/index.js +196 -0
  84. package/lib/group/index.d.ts +79 -0
  85. package/lib/group/index.js +150 -0
  86. package/lib/index.d.ts +74 -0
  87. package/lib/index.js +80 -0
  88. package/lib/infra-alert-condition/index.d.ts +293 -0
  89. package/lib/infra-alert-condition/index.js +665 -0
  90. package/lib/insights-event/index.d.ts +186 -0
  91. package/lib/insights-event/index.js +425 -0
  92. package/lib/key-transaction/index.d.ts +100 -0
  93. package/lib/key-transaction/index.js +191 -0
  94. package/lib/lazy-index.d.ts +4 -0
  95. package/lib/lazy-index.js +77 -0
  96. package/lib/log-parsing-rule/index.d.ts +132 -0
  97. package/lib/log-parsing-rule/index.js +250 -0
  98. package/lib/monitor-downtime/index.d.ts +259 -0
  99. package/lib/monitor-downtime/index.js +594 -0
  100. package/lib/notification-channel/index.d.ts +240 -0
  101. package/lib/notification-channel/index.js +546 -0
  102. package/lib/notification-destination/index.d.ts +406 -0
  103. package/lib/notification-destination/index.js +1030 -0
  104. package/lib/nrql-alert-condition/index.d.ts +976 -0
  105. package/lib/nrql-alert-condition/index.js +2320 -0
  106. package/lib/nrql-drop-rule/index.d.ts +127 -0
  107. package/lib/nrql-drop-rule/index.js +287 -0
  108. package/lib/obfuscation-expression/index.d.ts +90 -0
  109. package/lib/obfuscation-expression/index.js +171 -0
  110. package/lib/obfuscation-rule/index.d.ts +173 -0
  111. package/lib/obfuscation-rule/index.js +361 -0
  112. package/lib/one-dashboard/index-structs/index.d.ts +6 -0
  113. package/lib/one-dashboard/index-structs/index.js +23 -0
  114. package/lib/one-dashboard/index-structs/structs0.d.ts +7000 -0
  115. package/lib/one-dashboard/index-structs/structs0.js +17966 -0
  116. package/lib/one-dashboard/index-structs/structs400.d.ts +3703 -0
  117. package/lib/one-dashboard/index-structs/structs400.js +9484 -0
  118. package/lib/one-dashboard/index.d.ts +116 -0
  119. package/lib/one-dashboard/index.js +246 -0
  120. package/lib/one-dashboard-json/index.d.ts +116 -0
  121. package/lib/one-dashboard-json/index.js +278 -0
  122. package/lib/one-dashboard-raw/index.d.ts +278 -0
  123. package/lib/one-dashboard-raw/index.js +646 -0
  124. package/lib/pipeline-cloud-rule/index.d.ts +90 -0
  125. package/lib/pipeline-cloud-rule/index.js +171 -0
  126. package/lib/provider/index.d.ts +164 -0
  127. package/lib/provider/index.js +354 -0
  128. package/lib/service-level/index.d.ts +505 -0
  129. package/lib/service-level/index.js +1429 -0
  130. package/lib/synthetics-alert-condition/index.d.ts +101 -0
  131. package/lib/synthetics-alert-condition/index.js +193 -0
  132. package/lib/synthetics-broken-links-monitor/index.d.ts +221 -0
  133. package/lib/synthetics-broken-links-monitor/index.js +455 -0
  134. package/lib/synthetics-cert-check-monitor/index.d.ts +226 -0
  135. package/lib/synthetics-cert-check-monitor/index.js +469 -0
  136. package/lib/synthetics-monitor/index.d.ts +408 -0
  137. package/lib/synthetics-monitor/index.js +843 -0
  138. package/lib/synthetics-multilocation-alert-condition/index.d.ts +181 -0
  139. package/lib/synthetics-multilocation-alert-condition/index.js +403 -0
  140. package/lib/synthetics-private-location/index.d.ts +94 -0
  141. package/lib/synthetics-private-location/index.js +187 -0
  142. package/lib/synthetics-script-monitor/index.d.ts +352 -0
  143. package/lib/synthetics-script-monitor/index.js +736 -0
  144. package/lib/synthetics-secure-credential/index.d.ts +136 -0
  145. package/lib/synthetics-secure-credential/index.js +300 -0
  146. package/lib/synthetics-step-monitor/index.d.ts +372 -0
  147. package/lib/synthetics-step-monitor/index.js +809 -0
  148. package/lib/user/index.d.ts +89 -0
  149. package/lib/user/index.js +168 -0
  150. package/lib/workflow/index.d.ts +445 -0
  151. package/lib/workflow/index.js +1058 -0
  152. package/lib/workload/index.d.ts +518 -0
  153. package/lib/workload/index.js +1279 -0
  154. package/package.json +155 -0
@@ -0,0 +1,171 @@
1
+ "use strict";
2
+ var _a;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.ObfuscationExpression = void 0;
5
+ const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
+ const cdktn = require("cdktn");
7
+ /**
8
+ * Represents a {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression newrelic_obfuscation_expression}
9
+ */
10
+ class ObfuscationExpression extends cdktn.TerraformResource {
11
+ // ==============
12
+ // STATIC Methods
13
+ // ==============
14
+ /**
15
+ * Generates CDKTN code for importing a ObfuscationExpression resource upon running "cdktn plan <stack-name>"
16
+ * @param scope The scope in which to define this construct
17
+ * @param importToId The construct id used in the generated config for the ObfuscationExpression to import
18
+ * @param importFromId The id of the existing ObfuscationExpression that should be imported. Refer to the {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression#import import section} in the documentation of this resource for the id to use
19
+ * @param provider? Optional instance of the provider where the ObfuscationExpression to import is found
20
+ */
21
+ static generateConfigForImport(scope, importToId, importFromId, provider) {
22
+ return new cdktn.ImportableResource(scope, importToId, { terraformResourceType: "newrelic_obfuscation_expression", importId: importFromId, provider });
23
+ }
24
+ // ===========
25
+ // INITIALIZER
26
+ // ===========
27
+ /**
28
+ * Create a new {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression newrelic_obfuscation_expression} Resource
29
+ *
30
+ * @param scope The scope in which to define this construct
31
+ * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
32
+ * @param options ObfuscationExpressionConfig
33
+ */
34
+ constructor(scope, id, config) {
35
+ super(scope, id, {
36
+ terraformResourceType: 'newrelic_obfuscation_expression',
37
+ terraformGeneratorMetadata: {
38
+ providerName: 'newrelic',
39
+ providerVersion: '3.80.2',
40
+ providerVersionConstraint: '~> 3.7'
41
+ },
42
+ provider: config.provider,
43
+ dependsOn: config.dependsOn,
44
+ count: config.count,
45
+ lifecycle: config.lifecycle,
46
+ provisioners: config.provisioners,
47
+ connection: config.connection,
48
+ forEach: config.forEach
49
+ });
50
+ this._accountId = config.accountId;
51
+ this._description = config.description;
52
+ this._id = config.id;
53
+ this._name = config.name;
54
+ this._regex = config.regex;
55
+ }
56
+ get accountId() {
57
+ return this.getNumberAttribute('account_id');
58
+ }
59
+ set accountId(value) {
60
+ this._accountId = value;
61
+ }
62
+ resetAccountId() {
63
+ this._accountId = undefined;
64
+ }
65
+ // Temporarily expose input value. Use with caution.
66
+ get accountIdInput() {
67
+ return this._accountId;
68
+ }
69
+ get description() {
70
+ return this.getStringAttribute('description');
71
+ }
72
+ set description(value) {
73
+ this._description = value;
74
+ }
75
+ resetDescription() {
76
+ this._description = undefined;
77
+ }
78
+ // Temporarily expose input value. Use with caution.
79
+ get descriptionInput() {
80
+ return this._description;
81
+ }
82
+ get id() {
83
+ return this.getStringAttribute('id');
84
+ }
85
+ set id(value) {
86
+ this._id = value;
87
+ }
88
+ resetId() {
89
+ this._id = undefined;
90
+ }
91
+ // Temporarily expose input value. Use with caution.
92
+ get idInput() {
93
+ return this._id;
94
+ }
95
+ get name() {
96
+ return this.getStringAttribute('name');
97
+ }
98
+ set name(value) {
99
+ this._name = value;
100
+ }
101
+ // Temporarily expose input value. Use with caution.
102
+ get nameInput() {
103
+ return this._name;
104
+ }
105
+ get regex() {
106
+ return this.getStringAttribute('regex');
107
+ }
108
+ set regex(value) {
109
+ this._regex = value;
110
+ }
111
+ // Temporarily expose input value. Use with caution.
112
+ get regexInput() {
113
+ return this._regex;
114
+ }
115
+ // =========
116
+ // SYNTHESIS
117
+ // =========
118
+ synthesizeAttributes() {
119
+ return {
120
+ account_id: cdktn.numberToTerraform(this._accountId),
121
+ description: cdktn.stringToTerraform(this._description),
122
+ id: cdktn.stringToTerraform(this._id),
123
+ name: cdktn.stringToTerraform(this._name),
124
+ regex: cdktn.stringToTerraform(this._regex),
125
+ };
126
+ }
127
+ synthesizeHclAttributes() {
128
+ const attrs = {
129
+ account_id: {
130
+ value: cdktn.numberToHclTerraform(this._accountId),
131
+ isBlock: false,
132
+ type: "simple",
133
+ storageClassType: "number",
134
+ },
135
+ description: {
136
+ value: cdktn.stringToHclTerraform(this._description),
137
+ isBlock: false,
138
+ type: "simple",
139
+ storageClassType: "string",
140
+ },
141
+ id: {
142
+ value: cdktn.stringToHclTerraform(this._id),
143
+ isBlock: false,
144
+ type: "simple",
145
+ storageClassType: "string",
146
+ },
147
+ name: {
148
+ value: cdktn.stringToHclTerraform(this._name),
149
+ isBlock: false,
150
+ type: "simple",
151
+ storageClassType: "string",
152
+ },
153
+ regex: {
154
+ value: cdktn.stringToHclTerraform(this._regex),
155
+ isBlock: false,
156
+ type: "simple",
157
+ storageClassType: "string",
158
+ },
159
+ };
160
+ // remove undefined attributes
161
+ return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined));
162
+ }
163
+ }
164
+ exports.ObfuscationExpression = ObfuscationExpression;
165
+ _a = JSII_RTTI_SYMBOL_1;
166
+ ObfuscationExpression[_a] = { fqn: "@cdktn/provider-newrelic.obfuscationExpression.ObfuscationExpression", version: "14.0.0" };
167
+ // =================
168
+ // STATIC PROPERTIES
169
+ // =================
170
+ ObfuscationExpression.tfResourceType = "newrelic_obfuscation_expression";
171
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["../../src/obfuscation-expression/index.ts"],"names":[],"mappings":";;;;;AASA,+BAA+B;AAsC/B;;EAEE;AACF,MAAa,qBAAsB,SAAQ,KAAK,CAAC,iBAAiB;IAOhE,iBAAiB;IACjB,iBAAiB;IACjB,iBAAiB;IACjB;;;;;;MAME;IACK,MAAM,CAAC,uBAAuB,CAAC,KAAgB,EAAE,UAAkB,EAAE,YAAoB,EAAE,QAAkC;QAC9H,OAAO,IAAI,KAAK,CAAC,kBAAkB,CAAC,KAAK,EAAE,UAAU,EAAE,EAAE,qBAAqB,EAAE,iCAAiC,EAAE,QAAQ,EAAE,YAAY,EAAE,QAAQ,EAAE,CAAC,CAAC;IACzJ,CAAC;IAEL,cAAc;IACd,cAAc;IACd,cAAc;IAEd;;;;;;MAME;IACF,YAAmB,KAAgB,EAAE,EAAU,EAAE,MAAmC;QAClF,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,qBAAqB,EAAE,iCAAiC;YACxD,0BAA0B,EAAE;gBAC1B,YAAY,EAAE,UAAU;gBACxB,eAAe,EAAE,QAAQ;gBACzB,yBAAyB,EAAE,QAAQ;aACpC;YACD,QAAQ,EAAE,MAAM,CAAC,QAAQ;YACzB,SAAS,EAAE,MAAM,CAAC,SAAS;YAC3B,KAAK,EAAE,MAAM,CAAC,KAAK;YACnB,SAAS,EAAE,MAAM,CAAC,SAAS;YAC3B,YAAY,EAAE,MAAM,CAAC,YAAY;YACjC,UAAU,EAAE,MAAM,CAAC,UAAU;YAC7B,OAAO,EAAE,MAAM,CAAC,OAAO;SACxB,CAAC,CAAC;QACH,IAAI,CAAC,UAAU,GAAG,MAAM,CAAC,SAAS,CAAC;QACnC,IAAI,CAAC,YAAY,GAAG,MAAM,CAAC,WAAW,CAAC;QACvC,IAAI,CAAC,GAAG,GAAG,MAAM,CAAC,EAAE,CAAC;QACrB,IAAI,CAAC,KAAK,GAAG,MAAM,CAAC,IAAI,CAAC;QACzB,IAAI,CAAC,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC;IAC7B,CAAC;IAQD,IAAW,SAAS;QAClB,OAAO,IAAI,CAAC,kBAAkB,CAAC,YAAY,CAAC,CAAC;IAC/C,CAAC;IACD,IAAW,SAAS,CAAC,KAAa;QAChC,IAAI,CAAC,UAAU,GAAG,KAAK,CAAC;IAC1B,CAAC;IACM,cAAc;QACnB,IAAI,CAAC,UAAU,GAAG,SAAS,CAAC;IAC9B,CAAC;IACD,oDAAoD;IACpD,IAAW,cAAc;QACvB,OAAO,IAAI,CAAC,UAAU,CAAC;IACzB,CAAC;IAID,IAAW,WAAW;QACpB,OAAO,IAAI,CAAC,kBAAkB,CAAC,aAAa,CAAC,CAAC;IAChD,CAAC;IACD,IAAW,WAAW,CAAC,KAAa;QAClC,IAAI,CAAC,YAAY,GAAG,KAAK,CAAC;IAC5B,CAAC;IACM,gBAAgB;QACrB,IAAI,CAAC,YAAY,GAAG,SAAS,CAAC;IAChC,CAAC;IACD,oDAAoD;IACpD,IAAW,gBAAgB;QACzB,OAAO,IAAI,CAAC,YAAY,CAAC;IAC3B,CAAC;IAID,IAAW,EAAE;QACX,OAAO,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;IACvC,CAAC;IACD,IAAW,EAAE,CAAC,KAAa;QACzB,IAAI,CAAC,GAAG,GAAG,KAAK,CAAC;IACnB,CAAC;IACM,OAAO;QACZ,IAAI,CAAC,GAAG,GAAG,SAAS,CAAC;IACvB,CAAC;IACD,oDAAoD;IACpD,IAAW,OAAO;QAChB,OAAO,IAAI,CAAC,GAAG,CAAC;IAClB,CAAC;IAID,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,kBAAkB,CAAC,MAAM,CAAC,CAAC;IACzC,CAAC;IACD,IAAW,IAAI,CAAC,KAAa;QAC3B,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;IACrB,CAAC;IACD,oDAAoD;IACpD,IAAW,SAAS;QAClB,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAID,IAAW,KAAK;QACd,OAAO,IAAI,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;IAC1C,CAAC;IACD,IAAW,KAAK,CAAC,KAAa;QAC5B,IAAI,CAAC,MAAM,GAAG,KAAK,CAAC;IACtB,CAAC;IACD,oDAAoD;IACpD,IAAW,UAAU;QACnB,OAAO,IAAI,CAAC,MAAM,CAAC;IACrB,CAAC;IAED,YAAY;IACZ,YAAY;IACZ,YAAY;IAEF,oBAAoB;QAC5B,OAAO;YACL,UAAU,EAAE,KAAK,CAAC,iBAAiB,CAAC,IAAI,CAAC,UAAU,CAAC;YACpD,WAAW,EAAE,KAAK,CAAC,iBAAiB,CAAC,IAAI,CAAC,YAAY,CAAC;YACvD,EAAE,EAAE,KAAK,CAAC,iBAAiB,CAAC,IAAI,CAAC,GAAG,CAAC;YACrC,IAAI,EAAE,KAAK,CAAC,iBAAiB,CAAC,IAAI,CAAC,KAAK,CAAC;YACzC,KAAK,EAAE,KAAK,CAAC,iBAAiB,CAAC,IAAI,CAAC,MAAM,CAAC;SAC5C,CAAC;IACJ,CAAC;IAES,uBAAuB;QAC/B,MAAM,KAAK,GAAG;YACZ,UAAU,EAAE;gBACV,KAAK,EAAE,KAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,UAAU,CAAC;gBAClD,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,QAAQ;aAC3B;YACD,WAAW,EAAE;gBACX,KAAK,EAAE,KAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,YAAY,CAAC;gBACpD,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,QAAQ;aAC3B;YACD,EAAE,EAAE;gBACF,KAAK,EAAE,KAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,GAAG,CAAC;gBAC3C,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,QAAQ;aAC3B;YACD,IAAI,EAAE;gBACJ,KAAK,EAAE,KAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,KAAK,CAAC;gBAC7C,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,QAAQ;aAC3B;YACD,KAAK,EAAE;gBACL,KAAK,EAAE,KAAK,CAAC,oBAAoB,CAAC,IAAI,CAAC,MAAM,CAAC;gBAC9C,OAAO,EAAE,KAAK;gBACd,IAAI,EAAE,QAAQ;gBACd,gBAAgB,EAAE,QAAQ;aAC3B;SACF,CAAC;QAEF,8BAA8B;QAC9B,OAAO,MAAM,CAAC,WAAW,CAAC,MAAM,CAAC,OAAO,CAAC,KAAK,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,CAAC,EAAE,KAAK,CAAC,EAAE,EAAE,CAAC,KAAK,KAAK,SAAS,IAAI,KAAK,CAAC,KAAK,KAAK,SAAS,CAAE,CAAC,CAAA;IAC5H,CAAC;;AAvLH,sDAwLC;;;AAtLC,oBAAoB;AACpB,oBAAoB;AACpB,oBAAoB;AACG,oCAAc,GAAG,iCAAiC,CAAC","sourcesContent":["/**\n * Copyright IBM Corp. 2021, 2026\n * SPDX-License-Identifier: MPL-2.0\n */\n\n// https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression\n// generated from terraform resource schema\n\nimport { Construct } from 'constructs';\nimport * as cdktn from 'cdktn';\n\n// Configuration\n\nexport interface ObfuscationExpressionConfig extends cdktn.TerraformMetaArguments {\n  /**\n  * The account id associated with the obfuscation expression.\n  *\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression#account_id ObfuscationExpression#account_id}\n  */\n  readonly accountId?: number;\n  /**\n  * Description of expression.\n  *\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression#description ObfuscationExpression#description}\n  */\n  readonly description?: string;\n  /**\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression#id ObfuscationExpression#id}\n  *\n  * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.\n  * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.\n  */\n  readonly id?: string;\n  /**\n  * Name of expression.\n  *\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression#name ObfuscationExpression#name}\n  */\n  readonly name: string;\n  /**\n  * Regex of expression.\n  *\n  * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression#regex ObfuscationExpression#regex}\n  */\n  readonly regex: string;\n}\n\n/**\n* Represents a {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression newrelic_obfuscation_expression}\n*/\nexport class ObfuscationExpression extends cdktn.TerraformResource {\n\n  // =================\n  // STATIC PROPERTIES\n  // =================\n  public static readonly tfResourceType = \"newrelic_obfuscation_expression\";\n\n  // ==============\n  // STATIC Methods\n  // ==============\n  /**\n  * Generates CDKTN code for importing a ObfuscationExpression resource upon running \"cdktn plan <stack-name>\"\n  * @param scope The scope in which to define this construct\n  * @param importToId The construct id used in the generated config for the ObfuscationExpression to import\n  * @param importFromId The id of the existing ObfuscationExpression that should be imported. Refer to the {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression#import import section} in the documentation of this resource for the id to use\n  * @param provider? Optional instance of the provider where the ObfuscationExpression to import is found\n  */\n  public static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktn.TerraformProvider) {\n        return new cdktn.ImportableResource(scope, importToId, { terraformResourceType: \"newrelic_obfuscation_expression\", importId: importFromId, provider });\n      }\n\n  // ===========\n  // INITIALIZER\n  // ===========\n\n  /**\n  * Create a new {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_expression newrelic_obfuscation_expression} Resource\n  *\n  * @param scope The scope in which to define this construct\n  * @param id The scoped construct ID. Must be unique amongst siblings in the same scope\n  * @param options ObfuscationExpressionConfig\n  */\n  public constructor(scope: Construct, id: string, config: ObfuscationExpressionConfig) {\n    super(scope, id, {\n      terraformResourceType: 'newrelic_obfuscation_expression',\n      terraformGeneratorMetadata: {\n        providerName: 'newrelic',\n        providerVersion: '3.80.2',\n        providerVersionConstraint: '~> 3.7'\n      },\n      provider: config.provider,\n      dependsOn: config.dependsOn,\n      count: config.count,\n      lifecycle: config.lifecycle,\n      provisioners: config.provisioners,\n      connection: config.connection,\n      forEach: config.forEach\n    });\n    this._accountId = config.accountId;\n    this._description = config.description;\n    this._id = config.id;\n    this._name = config.name;\n    this._regex = config.regex;\n  }\n\n  // ==========\n  // ATTRIBUTES\n  // ==========\n\n  // account_id - computed: true, optional: true, required: false\n  private _accountId?: number; \n  public get accountId() {\n    return this.getNumberAttribute('account_id');\n  }\n  public set accountId(value: number) {\n    this._accountId = value;\n  }\n  public resetAccountId() {\n    this._accountId = undefined;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get accountIdInput() {\n    return this._accountId;\n  }\n\n  // description - computed: false, optional: true, required: false\n  private _description?: string; \n  public get description() {\n    return this.getStringAttribute('description');\n  }\n  public set description(value: string) {\n    this._description = value;\n  }\n  public resetDescription() {\n    this._description = undefined;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get descriptionInput() {\n    return this._description;\n  }\n\n  // id - computed: true, optional: true, required: false\n  private _id?: string; \n  public get id() {\n    return this.getStringAttribute('id');\n  }\n  public set id(value: string) {\n    this._id = value;\n  }\n  public resetId() {\n    this._id = undefined;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get idInput() {\n    return this._id;\n  }\n\n  // name - computed: false, optional: false, required: true\n  private _name?: string; \n  public get name() {\n    return this.getStringAttribute('name');\n  }\n  public set name(value: string) {\n    this._name = value;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get nameInput() {\n    return this._name;\n  }\n\n  // regex - computed: false, optional: false, required: true\n  private _regex?: string; \n  public get regex() {\n    return this.getStringAttribute('regex');\n  }\n  public set regex(value: string) {\n    this._regex = value;\n  }\n  // Temporarily expose input value. Use with caution.\n  public get regexInput() {\n    return this._regex;\n  }\n\n  // =========\n  // SYNTHESIS\n  // =========\n\n  protected synthesizeAttributes(): { [name: string]: any } {\n    return {\n      account_id: cdktn.numberToTerraform(this._accountId),\n      description: cdktn.stringToTerraform(this._description),\n      id: cdktn.stringToTerraform(this._id),\n      name: cdktn.stringToTerraform(this._name),\n      regex: cdktn.stringToTerraform(this._regex),\n    };\n  }\n\n  protected synthesizeHclAttributes(): { [name: string]: any } {\n    const attrs = {\n      account_id: {\n        value: cdktn.numberToHclTerraform(this._accountId),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"number\",\n      },\n      description: {\n        value: cdktn.stringToHclTerraform(this._description),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"string\",\n      },\n      id: {\n        value: cdktn.stringToHclTerraform(this._id),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"string\",\n      },\n      name: {\n        value: cdktn.stringToHclTerraform(this._name),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"string\",\n      },\n      regex: {\n        value: cdktn.stringToHclTerraform(this._regex),\n        isBlock: false,\n        type: \"simple\",\n        storageClassType: \"string\",\n      },\n    };\n\n    // remove undefined attributes\n    return Object.fromEntries(Object.entries(attrs).filter(([_, value]) => value !== undefined && value.value !== undefined ))\n  }\n}\n"]}
@@ -0,0 +1,173 @@
1
+ /**
2
+ * Copyright IBM Corp. 2021, 2026
3
+ * SPDX-License-Identifier: MPL-2.0
4
+ */
5
+ import { Construct } from 'constructs';
6
+ import * as cdktn from 'cdktn';
7
+ export interface ObfuscationRuleConfig extends cdktn.TerraformMetaArguments {
8
+ /**
9
+ * The account id associated with the obfuscation rule.
10
+ *
11
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#account_id ObfuscationRule#account_id}
12
+ */
13
+ readonly accountId?: number;
14
+ /**
15
+ * Description of rule.
16
+ *
17
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#description ObfuscationRule#description}
18
+ */
19
+ readonly description?: string;
20
+ /**
21
+ * Whether the rule should be applied or not to incoming data.
22
+ *
23
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#enabled ObfuscationRule#enabled}
24
+ */
25
+ readonly enabled: boolean | cdktn.IResolvable;
26
+ /**
27
+ * NRQL for determining whether a given log record should have obfuscation actions applied.
28
+ *
29
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#filter ObfuscationRule#filter}
30
+ */
31
+ readonly filter: string;
32
+ /**
33
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#id ObfuscationRule#id}
34
+ *
35
+ * Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
36
+ * If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
37
+ */
38
+ readonly id?: string;
39
+ /**
40
+ * Name of rule.
41
+ *
42
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#name ObfuscationRule#name}
43
+ */
44
+ readonly name: string;
45
+ /**
46
+ * action block
47
+ *
48
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#action ObfuscationRule#action}
49
+ */
50
+ readonly action: ObfuscationRuleAction[] | cdktn.IResolvable;
51
+ }
52
+ export interface ObfuscationRuleAction {
53
+ /**
54
+ * Attribute names for action. An empty list applies the action to all the attributes.
55
+ *
56
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#attribute ObfuscationRule#attribute}
57
+ */
58
+ readonly attribute: string[];
59
+ /**
60
+ * Expression Id for action.
61
+ *
62
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#expression_id ObfuscationRule#expression_id}
63
+ */
64
+ readonly expressionId: string;
65
+ /**
66
+ * Obfuscation method to use.
67
+ *
68
+ * Docs at Terraform Registry: {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#method ObfuscationRule#method}
69
+ */
70
+ readonly method: string;
71
+ }
72
+ export declare function obfuscationRuleActionToTerraform(struct?: ObfuscationRuleAction | cdktn.IResolvable): any;
73
+ export declare function obfuscationRuleActionToHclTerraform(struct?: ObfuscationRuleAction | cdktn.IResolvable): any;
74
+ export declare class ObfuscationRuleActionOutputReference extends cdktn.ComplexObject {
75
+ private isEmptyObject;
76
+ private resolvableValue?;
77
+ /**
78
+ * @param terraformResource The parent resource
79
+ * @param terraformAttribute The attribute on the parent resource this class is referencing
80
+ * @param complexObjectIndex the index of this item in the list
81
+ * @param complexObjectIsFromSet whether the list is wrapping a set (will add tolist() to be able to access an item via an index)
82
+ */
83
+ constructor(terraformResource: cdktn.IInterpolatingParent, terraformAttribute: string, complexObjectIndex: number, complexObjectIsFromSet: boolean);
84
+ get internalValue(): ObfuscationRuleAction | cdktn.IResolvable | undefined;
85
+ set internalValue(value: ObfuscationRuleAction | cdktn.IResolvable | undefined);
86
+ private _attribute?;
87
+ get attribute(): string[];
88
+ set attribute(value: string[]);
89
+ get attributeInput(): string[] | undefined;
90
+ private _expressionId?;
91
+ get expressionId(): string;
92
+ set expressionId(value: string);
93
+ get expressionIdInput(): string | undefined;
94
+ private _method?;
95
+ get method(): string;
96
+ set method(value: string);
97
+ get methodInput(): string | undefined;
98
+ }
99
+ export declare class ObfuscationRuleActionList extends cdktn.ComplexList {
100
+ protected terraformResource: cdktn.IInterpolatingParent;
101
+ protected terraformAttribute: string;
102
+ protected wrapsSet: boolean;
103
+ internalValue?: ObfuscationRuleAction[] | cdktn.IResolvable;
104
+ /**
105
+ * @param terraformResource The parent resource
106
+ * @param terraformAttribute The attribute on the parent resource this class is referencing
107
+ * @param wrapsSet whether the list is wrapping a set (will add tolist() to be able to access an item via an index)
108
+ */
109
+ constructor(terraformResource: cdktn.IInterpolatingParent, terraformAttribute: string, wrapsSet: boolean);
110
+ /**
111
+ * @param index the index of the item to return
112
+ */
113
+ get(index: number): ObfuscationRuleActionOutputReference;
114
+ }
115
+ /**
116
+ * Represents a {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule newrelic_obfuscation_rule}
117
+ */
118
+ export declare class ObfuscationRule extends cdktn.TerraformResource {
119
+ static readonly tfResourceType = "newrelic_obfuscation_rule";
120
+ /**
121
+ * Generates CDKTN code for importing a ObfuscationRule resource upon running "cdktn plan <stack-name>"
122
+ * @param scope The scope in which to define this construct
123
+ * @param importToId The construct id used in the generated config for the ObfuscationRule to import
124
+ * @param importFromId The id of the existing ObfuscationRule that should be imported. Refer to the {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule#import import section} in the documentation of this resource for the id to use
125
+ * @param provider? Optional instance of the provider where the ObfuscationRule to import is found
126
+ */
127
+ static generateConfigForImport(scope: Construct, importToId: string, importFromId: string, provider?: cdktn.TerraformProvider): cdktn.ImportableResource;
128
+ /**
129
+ * Create a new {@link https://registry.terraform.io/providers/newrelic/newrelic/3.80.2/docs/resources/obfuscation_rule newrelic_obfuscation_rule} Resource
130
+ *
131
+ * @param scope The scope in which to define this construct
132
+ * @param id The scoped construct ID. Must be unique amongst siblings in the same scope
133
+ * @param options ObfuscationRuleConfig
134
+ */
135
+ constructor(scope: Construct, id: string, config: ObfuscationRuleConfig);
136
+ private _accountId?;
137
+ get accountId(): number;
138
+ set accountId(value: number);
139
+ resetAccountId(): void;
140
+ get accountIdInput(): number | undefined;
141
+ private _description?;
142
+ get description(): string;
143
+ set description(value: string);
144
+ resetDescription(): void;
145
+ get descriptionInput(): string | undefined;
146
+ private _enabled?;
147
+ get enabled(): boolean | cdktn.IResolvable;
148
+ set enabled(value: boolean | cdktn.IResolvable);
149
+ get enabledInput(): boolean | cdktn.IResolvable | undefined;
150
+ private _filter?;
151
+ get filter(): string;
152
+ set filter(value: string);
153
+ get filterInput(): string | undefined;
154
+ private _id?;
155
+ get id(): string;
156
+ set id(value: string);
157
+ resetId(): void;
158
+ get idInput(): string | undefined;
159
+ private _name?;
160
+ get name(): string;
161
+ set name(value: string);
162
+ get nameInput(): string | undefined;
163
+ private _action;
164
+ get action(): ObfuscationRuleActionList;
165
+ putAction(value: ObfuscationRuleAction[] | cdktn.IResolvable): void;
166
+ get actionInput(): cdktn.IResolvable | ObfuscationRuleAction[] | undefined;
167
+ protected synthesizeAttributes(): {
168
+ [name: string]: any;
169
+ };
170
+ protected synthesizeHclAttributes(): {
171
+ [name: string]: any;
172
+ };
173
+ }