All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azure.network.kotlin.inputs.ApplicationGatewayTrustedRootCertificateArgs.kt Maven / Gradle / Ivy

@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.azure.network.kotlin.inputs

import com.pulumi.azure.network.inputs.ApplicationGatewayTrustedRootCertificateArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName

/**
 *
 * @property data The contents of the Trusted Root Certificate which should be used. Required if `key_vault_secret_id` is not set.
 * @property id The ID of the Rewrite Rule Set
 * @property keyVaultSecretId The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
 * > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
 * > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
 * @property name The Name of the Trusted Root Certificate to use.
 */
public data class ApplicationGatewayTrustedRootCertificateArgs(
    public val `data`: Output? = null,
    public val id: Output? = null,
    public val keyVaultSecretId: Output? = null,
    public val name: Output,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.azure.network.inputs.ApplicationGatewayTrustedRootCertificateArgs =
        com.pulumi.azure.network.inputs.ApplicationGatewayTrustedRootCertificateArgs.builder()
            .`data`(`data`?.applyValue({ args0 -> args0 }))
            .id(id?.applyValue({ args0 -> args0 }))
            .keyVaultSecretId(keyVaultSecretId?.applyValue({ args0 -> args0 }))
            .name(name.applyValue({ args0 -> args0 })).build()
}

/**
 * Builder for [ApplicationGatewayTrustedRootCertificateArgs].
 */
@PulumiTagMarker
public class ApplicationGatewayTrustedRootCertificateArgsBuilder internal constructor() {
    private var `data`: Output? = null

    private var id: Output? = null

    private var keyVaultSecretId: Output? = null

    private var name: Output? = null

    /**
     * @param value The contents of the Trusted Root Certificate which should be used. Required if `key_vault_secret_id` is not set.
     */
    @JvmName("pwwhudlpmlrsjtsk")
    public suspend fun `data`(`value`: Output) {
        this.`data` = value
    }

    /**
     * @param value The ID of the Rewrite Rule Set
     */
    @JvmName("gxgekcrfeecgbdup")
    public suspend fun id(`value`: Output) {
        this.id = value
    }

    /**
     * @param value The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
     * > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
     * > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
     */
    @JvmName("ybboffuiwijdwdfj")
    public suspend fun keyVaultSecretId(`value`: Output) {
        this.keyVaultSecretId = value
    }

    /**
     * @param value The Name of the Trusted Root Certificate to use.
     */
    @JvmName("cuajwxpbtkvmplal")
    public suspend fun name(`value`: Output) {
        this.name = value
    }

    /**
     * @param value The contents of the Trusted Root Certificate which should be used. Required if `key_vault_secret_id` is not set.
     */
    @JvmName("mgxaingwexaxdtlg")
    public suspend fun `data`(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.`data` = mapped
    }

    /**
     * @param value The ID of the Rewrite Rule Set
     */
    @JvmName("hdnqhilnnxaydcor")
    public suspend fun id(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.id = mapped
    }

    /**
     * @param value The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
     * > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
     * > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
     */
    @JvmName("vittuefqqnwsewoa")
    public suspend fun keyVaultSecretId(`value`: String?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.keyVaultSecretId = mapped
    }

    /**
     * @param value The Name of the Trusted Root Certificate to use.
     */
    @JvmName("qoiebaxkoqpidbjh")
    public suspend fun name(`value`: String) {
        val toBeMapped = value
        val mapped = toBeMapped.let({ args0 -> of(args0) })
        this.name = mapped
    }

    internal fun build(): ApplicationGatewayTrustedRootCertificateArgs =
        ApplicationGatewayTrustedRootCertificateArgs(
            `data` = `data`,
            id = id,
            keyVaultSecretId = keyVaultSecretId,
            name = name ?: throw PulumiNullFieldException("name"),
        )
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy