
com.pulumi.azure.network.kotlin.inputs.ApplicationGatewayTrustedRootCertificateArgs.kt Maven / Gradle / Ivy
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.azure.network.kotlin.inputs
import com.pulumi.azure.network.inputs.ApplicationGatewayTrustedRootCertificateArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName
/**
*
* @property data The contents of the Trusted Root Certificate which should be used. Required if `key_vault_secret_id` is not set.
* @property id The ID of the Rewrite Rule Set
* @property keyVaultSecretId The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
* > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
* > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
* @property name The Name of the Trusted Root Certificate to use.
*/
public data class ApplicationGatewayTrustedRootCertificateArgs(
public val `data`: Output? = null,
public val id: Output? = null,
public val keyVaultSecretId: Output? = null,
public val name: Output,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.azure.network.inputs.ApplicationGatewayTrustedRootCertificateArgs =
com.pulumi.azure.network.inputs.ApplicationGatewayTrustedRootCertificateArgs.builder()
.`data`(`data`?.applyValue({ args0 -> args0 }))
.id(id?.applyValue({ args0 -> args0 }))
.keyVaultSecretId(keyVaultSecretId?.applyValue({ args0 -> args0 }))
.name(name.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [ApplicationGatewayTrustedRootCertificateArgs].
*/
@PulumiTagMarker
public class ApplicationGatewayTrustedRootCertificateArgsBuilder internal constructor() {
private var `data`: Output? = null
private var id: Output? = null
private var keyVaultSecretId: Output? = null
private var name: Output? = null
/**
* @param value The contents of the Trusted Root Certificate which should be used. Required if `key_vault_secret_id` is not set.
*/
@JvmName("pwwhudlpmlrsjtsk")
public suspend fun `data`(`value`: Output) {
this.`data` = value
}
/**
* @param value The ID of the Rewrite Rule Set
*/
@JvmName("gxgekcrfeecgbdup")
public suspend fun id(`value`: Output) {
this.id = value
}
/**
* @param value The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
* > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
* > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
*/
@JvmName("ybboffuiwijdwdfj")
public suspend fun keyVaultSecretId(`value`: Output) {
this.keyVaultSecretId = value
}
/**
* @param value The Name of the Trusted Root Certificate to use.
*/
@JvmName("cuajwxpbtkvmplal")
public suspend fun name(`value`: Output) {
this.name = value
}
/**
* @param value The contents of the Trusted Root Certificate which should be used. Required if `key_vault_secret_id` is not set.
*/
@JvmName("mgxaingwexaxdtlg")
public suspend fun `data`(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.`data` = mapped
}
/**
* @param value The ID of the Rewrite Rule Set
*/
@JvmName("hdnqhilnnxaydcor")
public suspend fun id(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.id = mapped
}
/**
* @param value The Secret ID of (base-64 encoded unencrypted pfx) `Secret` or `Certificate` object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if `data` is not set.
* > **NOTE:** TLS termination with Key Vault certificates is limited to the [v2 SKUs](https://docs.microsoft.com/azure/application-gateway/key-vault-certs).
* > **NOTE:** For TLS termination with Key Vault certificates to work properly existing user-assigned managed identity, which Application Gateway uses to retrieve certificates from Key Vault, should be defined via `identity` block. Additionally, access policies in the Key Vault to allow the identity to be granted *get* access to the secret should be defined.
*/
@JvmName("vittuefqqnwsewoa")
public suspend fun keyVaultSecretId(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.keyVaultSecretId = mapped
}
/**
* @param value The Name of the Trusted Root Certificate to use.
*/
@JvmName("qoiebaxkoqpidbjh")
public suspend fun name(`value`: String) {
val toBeMapped = value
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.name = mapped
}
internal fun build(): ApplicationGatewayTrustedRootCertificateArgs =
ApplicationGatewayTrustedRootCertificateArgs(
`data` = `data`,
id = id,
keyVaultSecretId = keyVaultSecretId,
name = name ?: throw PulumiNullFieldException("name"),
)
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy