vault/ui/api-client/dist/models/PkiConfigureAcmeRequest.js
Jordan Reimer 5905f43e1f
[UI] Check-in Built API Client (#29955)
* removes dist from api-client gitignore

* ignores api-client/dist directory for eslint and prettier

* builds api client
2025-03-19 11:50:15 -06:00

63 lines
2.6 KiB
JavaScript

"use strict";
/* tslint:disable */
/* eslint-disable */
/**
* HashiCorp Vault API
* HTTP API that gives you full access to Vault. All API routes are prefixed with `/v1/`.
*
* The version of the OpenAPI document: 1.20.0
*
*
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
* https://openapi-generator.tech
* Do not edit the class manually.
*/
Object.defineProperty(exports, "__esModule", { value: true });
exports.instanceOfPkiConfigureAcmeRequest = instanceOfPkiConfigureAcmeRequest;
exports.PkiConfigureAcmeRequestFromJSON = PkiConfigureAcmeRequestFromJSON;
exports.PkiConfigureAcmeRequestFromJSONTyped = PkiConfigureAcmeRequestFromJSONTyped;
exports.PkiConfigureAcmeRequestToJSON = PkiConfigureAcmeRequestToJSON;
exports.PkiConfigureAcmeRequestToJSONTyped = PkiConfigureAcmeRequestToJSONTyped;
/**
* Check if a given object implements the PkiConfigureAcmeRequest interface.
*/
function instanceOfPkiConfigureAcmeRequest(value) {
return true;
}
function PkiConfigureAcmeRequestFromJSON(json) {
return PkiConfigureAcmeRequestFromJSONTyped(json, false);
}
function PkiConfigureAcmeRequestFromJSONTyped(json, ignoreDiscriminator) {
if (json == null) {
return json;
}
return {
allowRoleExtKeyUsage: json['allow_role_ext_key_usage'] == null ? undefined : json['allow_role_ext_key_usage'],
allowedIssuers: json['allowed_issuers'] == null ? undefined : json['allowed_issuers'],
allowedRoles: json['allowed_roles'] == null ? undefined : json['allowed_roles'],
defaultDirectoryPolicy: json['default_directory_policy'] == null ? undefined : json['default_directory_policy'],
dnsResolver: json['dns_resolver'] == null ? undefined : json['dns_resolver'],
eabPolicy: json['eab_policy'] == null ? undefined : json['eab_policy'],
enabled: json['enabled'] == null ? undefined : json['enabled'],
maxTtl: json['max_ttl'] == null ? undefined : json['max_ttl'],
};
}
function PkiConfigureAcmeRequestToJSON(json) {
return PkiConfigureAcmeRequestToJSONTyped(json, false);
}
function PkiConfigureAcmeRequestToJSONTyped(value, ignoreDiscriminator = false) {
if (value == null) {
return value;
}
return {
allow_role_ext_key_usage: value['allowRoleExtKeyUsage'],
allowed_issuers: value['allowedIssuers'],
allowed_roles: value['allowedRoles'],
default_directory_policy: value['defaultDirectoryPolicy'],
dns_resolver: value['dnsResolver'],
eab_policy: value['eabPolicy'],
enabled: value['enabled'],
max_ttl: value['maxTtl'],
};
}