All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.azurenative.azurefleet.kotlin.inputs.VaultCertificateArgs.kt Maven / Gradle / Ivy

Go to download

Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.

There is a newer version: 2.82.0.0
Show newest version
@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.azurenative.azurefleet.kotlin.inputs

import com.pulumi.azurenative.azurefleet.inputs.VaultCertificateArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName

/**
 * Describes a single certificate reference in a Key Vault, and where the
 * certificate should reside on the VM.
 * @property certificateStore For Windows VMs, specifies the certificate store on the Virtual Machine to
 * which the certificate should be added. The specified certificate store is
 * implicitly in the LocalMachine account. For Linux VMs, the certificate file is
 * placed under the /var/lib/waagent directory, with the file name
 * <UppercaseThumbprint>.crt for the X509 certificate file and
 * <UppercaseThumbprint>.prv for private key. Both of these files are .pem
 * formatted.
 * @property certificateUrl This is the URL of a certificate that has been uploaded to Key Vault as a
 * secret. For adding a secret to the Key Vault, see [Add a key or secret to the
 * key
 * vault](https://docs.microsoft.com/azure/key-vault/key-vault-get-started/#add).
 * In this case, your certificate needs to be It is the Base64 encoding of the
 * following JSON Object which is encoded in UTF-8: 

{
* "data":"",
"dataType":"pfx",
* "password":""
}
To install certificates on a virtual * machine it is recommended to use the [Azure Key Vault virtual machine extension * for * Linux](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-linux) * or the [Azure Key Vault virtual machine extension for * Windows](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-windows). */ public data class VaultCertificateArgs( public val certificateStore: Output? = null, public val certificateUrl: Output? = null, ) : ConvertibleToJava { override fun toJava(): com.pulumi.azurenative.azurefleet.inputs.VaultCertificateArgs = com.pulumi.azurenative.azurefleet.inputs.VaultCertificateArgs.builder() .certificateStore(certificateStore?.applyValue({ args0 -> args0 })) .certificateUrl(certificateUrl?.applyValue({ args0 -> args0 })).build() } /** * Builder for [VaultCertificateArgs]. */ @PulumiTagMarker public class VaultCertificateArgsBuilder internal constructor() { private var certificateStore: Output? = null private var certificateUrl: Output? = null /** * @param value For Windows VMs, specifies the certificate store on the Virtual Machine to * which the certificate should be added. The specified certificate store is * implicitly in the LocalMachine account. For Linux VMs, the certificate file is * placed under the /var/lib/waagent directory, with the file name * <UppercaseThumbprint>.crt for the X509 certificate file and * <UppercaseThumbprint>.prv for private key. Both of these files are .pem * formatted. */ @JvmName("cdbgowkfhfvmxhwb") public suspend fun certificateStore(`value`: Output) { this.certificateStore = value } /** * @param value This is the URL of a certificate that has been uploaded to Key Vault as a * secret. For adding a secret to the Key Vault, see [Add a key or secret to the * key * vault](https://docs.microsoft.com/azure/key-vault/key-vault-get-started/#add). * In this case, your certificate needs to be It is the Base64 encoding of the * following JSON Object which is encoded in UTF-8:

{
* "data":"",
"dataType":"pfx",
* "password":""
}
To install certificates on a virtual * machine it is recommended to use the [Azure Key Vault virtual machine extension * for * Linux](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-linux) * or the [Azure Key Vault virtual machine extension for * Windows](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-windows). */ @JvmName("xipeayehbkoxkfia") public suspend fun certificateUrl(`value`: Output) { this.certificateUrl = value } /** * @param value For Windows VMs, specifies the certificate store on the Virtual Machine to * which the certificate should be added. The specified certificate store is * implicitly in the LocalMachine account. For Linux VMs, the certificate file is * placed under the /var/lib/waagent directory, with the file name * <UppercaseThumbprint>.crt for the X509 certificate file and * <UppercaseThumbprint>.prv for private key. Both of these files are .pem * formatted. */ @JvmName("rgtoaiabxsiowlwg") public suspend fun certificateStore(`value`: String?) { val toBeMapped = value val mapped = toBeMapped?.let({ args0 -> of(args0) }) this.certificateStore = mapped } /** * @param value This is the URL of a certificate that has been uploaded to Key Vault as a * secret. For adding a secret to the Key Vault, see [Add a key or secret to the * key * vault](https://docs.microsoft.com/azure/key-vault/key-vault-get-started/#add). * In this case, your certificate needs to be It is the Base64 encoding of the * following JSON Object which is encoded in UTF-8:

{
* "data":"",
"dataType":"pfx",
* "password":""
}
To install certificates on a virtual * machine it is recommended to use the [Azure Key Vault virtual machine extension * for * Linux](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-linux) * or the [Azure Key Vault virtual machine extension for * Windows](https://docs.microsoft.com/azure/virtual-machines/extensions/key-vault-windows). */ @JvmName("wuvmiwacceltxtpv") public suspend fun certificateUrl(`value`: String?) { val toBeMapped = value val mapped = toBeMapped?.let({ args0 -> of(args0) }) this.certificateUrl = mapped } internal fun build(): VaultCertificateArgs = VaultCertificateArgs( certificateStore = certificateStore, certificateUrl = certificateUrl, ) }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy