mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-26 00:51:08 +02:00
* removes dist from api-client gitignore * ignores api-client/dist directory for eslint and prettier * builds api client
63 lines
2.6 KiB
JavaScript
63 lines
2.6 KiB
JavaScript
"use strict";
|
|
/* tslint:disable */
|
|
/* eslint-disable */
|
|
/**
|
|
* HashiCorp Vault API
|
|
* HTTP API that gives you full access to Vault. All API routes are prefixed with `/v1/`.
|
|
*
|
|
* The version of the OpenAPI document: 1.20.0
|
|
*
|
|
*
|
|
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
* https://openapi-generator.tech
|
|
* Do not edit the class manually.
|
|
*/
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
exports.instanceOfPkiConfigureAcmeRequest = instanceOfPkiConfigureAcmeRequest;
|
|
exports.PkiConfigureAcmeRequestFromJSON = PkiConfigureAcmeRequestFromJSON;
|
|
exports.PkiConfigureAcmeRequestFromJSONTyped = PkiConfigureAcmeRequestFromJSONTyped;
|
|
exports.PkiConfigureAcmeRequestToJSON = PkiConfigureAcmeRequestToJSON;
|
|
exports.PkiConfigureAcmeRequestToJSONTyped = PkiConfigureAcmeRequestToJSONTyped;
|
|
/**
|
|
* Check if a given object implements the PkiConfigureAcmeRequest interface.
|
|
*/
|
|
function instanceOfPkiConfigureAcmeRequest(value) {
|
|
return true;
|
|
}
|
|
function PkiConfigureAcmeRequestFromJSON(json) {
|
|
return PkiConfigureAcmeRequestFromJSONTyped(json, false);
|
|
}
|
|
function PkiConfigureAcmeRequestFromJSONTyped(json, ignoreDiscriminator) {
|
|
if (json == null) {
|
|
return json;
|
|
}
|
|
return {
|
|
allowRoleExtKeyUsage: json['allow_role_ext_key_usage'] == null ? undefined : json['allow_role_ext_key_usage'],
|
|
allowedIssuers: json['allowed_issuers'] == null ? undefined : json['allowed_issuers'],
|
|
allowedRoles: json['allowed_roles'] == null ? undefined : json['allowed_roles'],
|
|
defaultDirectoryPolicy: json['default_directory_policy'] == null ? undefined : json['default_directory_policy'],
|
|
dnsResolver: json['dns_resolver'] == null ? undefined : json['dns_resolver'],
|
|
eabPolicy: json['eab_policy'] == null ? undefined : json['eab_policy'],
|
|
enabled: json['enabled'] == null ? undefined : json['enabled'],
|
|
maxTtl: json['max_ttl'] == null ? undefined : json['max_ttl'],
|
|
};
|
|
}
|
|
function PkiConfigureAcmeRequestToJSON(json) {
|
|
return PkiConfigureAcmeRequestToJSONTyped(json, false);
|
|
}
|
|
function PkiConfigureAcmeRequestToJSONTyped(value, ignoreDiscriminator = false) {
|
|
if (value == null) {
|
|
return value;
|
|
}
|
|
return {
|
|
allow_role_ext_key_usage: value['allowRoleExtKeyUsage'],
|
|
allowed_issuers: value['allowedIssuers'],
|
|
allowed_roles: value['allowedRoles'],
|
|
default_directory_policy: value['defaultDirectoryPolicy'],
|
|
dns_resolver: value['dnsResolver'],
|
|
eab_policy: value['eabPolicy'],
|
|
enabled: value['enabled'],
|
|
max_ttl: value['maxTtl'],
|
|
};
|
|
}
|