vault/ui/api-client/dist/models/TokenWriteRoleRequest.js
Jordan Reimer 5905f43e1f
[UI] Check-in Built API Client (#29955)
* removes dist from api-client gitignore

* ignores api-client/dist directory for eslint and prettier

* builds api client
2025-03-19 11:50:15 -06:00

81 lines
3.9 KiB
JavaScript

"use strict";
/* tslint:disable */
/* eslint-disable */
/**
* HashiCorp Vault API
* HTTP API that gives you full access to Vault. All API routes are prefixed with `/v1/`.
*
* The version of the OpenAPI document: 1.20.0
*
*
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
* https://openapi-generator.tech
* Do not edit the class manually.
*/
Object.defineProperty(exports, "__esModule", { value: true });
exports.instanceOfTokenWriteRoleRequest = instanceOfTokenWriteRoleRequest;
exports.TokenWriteRoleRequestFromJSON = TokenWriteRoleRequestFromJSON;
exports.TokenWriteRoleRequestFromJSONTyped = TokenWriteRoleRequestFromJSONTyped;
exports.TokenWriteRoleRequestToJSON = TokenWriteRoleRequestToJSON;
exports.TokenWriteRoleRequestToJSONTyped = TokenWriteRoleRequestToJSONTyped;
/**
* Check if a given object implements the TokenWriteRoleRequest interface.
*/
function instanceOfTokenWriteRoleRequest(value) {
return true;
}
function TokenWriteRoleRequestFromJSON(json) {
return TokenWriteRoleRequestFromJSONTyped(json, false);
}
function TokenWriteRoleRequestFromJSONTyped(json, ignoreDiscriminator) {
if (json == null) {
return json;
}
return {
allowedEntityAliases: json['allowed_entity_aliases'] == null ? undefined : json['allowed_entity_aliases'],
allowedPolicies: json['allowed_policies'] == null ? undefined : json['allowed_policies'],
allowedPoliciesGlob: json['allowed_policies_glob'] == null ? undefined : json['allowed_policies_glob'],
boundCidrs: json['bound_cidrs'] == null ? undefined : json['bound_cidrs'],
disallowedPolicies: json['disallowed_policies'] == null ? undefined : json['disallowed_policies'],
disallowedPoliciesGlob: json['disallowed_policies_glob'] == null ? undefined : json['disallowed_policies_glob'],
explicitMaxTtl: json['explicit_max_ttl'] == null ? undefined : json['explicit_max_ttl'],
orphan: json['orphan'] == null ? undefined : json['orphan'],
pathSuffix: json['path_suffix'] == null ? undefined : json['path_suffix'],
period: json['period'] == null ? undefined : json['period'],
renewable: json['renewable'] == null ? undefined : json['renewable'],
tokenBoundCidrs: json['token_bound_cidrs'] == null ? undefined : json['token_bound_cidrs'],
tokenExplicitMaxTtl: json['token_explicit_max_ttl'] == null ? undefined : json['token_explicit_max_ttl'],
tokenNoDefaultPolicy: json['token_no_default_policy'] == null ? undefined : json['token_no_default_policy'],
tokenNumUses: json['token_num_uses'] == null ? undefined : json['token_num_uses'],
tokenPeriod: json['token_period'] == null ? undefined : json['token_period'],
tokenType: json['token_type'] == null ? undefined : json['token_type'],
};
}
function TokenWriteRoleRequestToJSON(json) {
return TokenWriteRoleRequestToJSONTyped(json, false);
}
function TokenWriteRoleRequestToJSONTyped(value, ignoreDiscriminator = false) {
if (value == null) {
return value;
}
return {
allowed_entity_aliases: value['allowedEntityAliases'],
allowed_policies: value['allowedPolicies'],
allowed_policies_glob: value['allowedPoliciesGlob'],
bound_cidrs: value['boundCidrs'],
disallowed_policies: value['disallowedPolicies'],
disallowed_policies_glob: value['disallowedPoliciesGlob'],
explicit_max_ttl: value['explicitMaxTtl'],
orphan: value['orphan'],
path_suffix: value['pathSuffix'],
period: value['period'],
renewable: value['renewable'],
token_bound_cidrs: value['tokenBoundCidrs'],
token_explicit_max_ttl: value['tokenExplicitMaxTtl'],
token_no_default_policy: value['tokenNoDefaultPolicy'],
token_num_uses: value['tokenNumUses'],
token_period: value['tokenPeriod'],
token_type: value['tokenType'],
};
}