Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance. Project price only 1 $
You can buy this project and download/modify it how often you want.
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.gcp.apigee.kotlin.inputs
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.gcp.apigee.inputs.TargetServerSSlInfoArgs.builder
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.Boolean
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
*
* @property ciphers The SSL/TLS cipher suites to be used. For programmable proxies, it must be one of the cipher suite names listed in: http://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html#ciphersuites. For configurable proxies, it must follow the configuration specified in: https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration. This setting has no effect for configurable proxies when negotiating TLS 1.3.
* @property clientAuthEnabled Enables two-way TLS.
* @property commonName The TLS Common Name of the certificate.
* Structure is documented below.
* @property enabled Enables TLS. If false, neither one-way nor two-way TLS will be enabled.
* @property ignoreValidationErrors If true, Edge ignores TLS certificate errors. Valid when configuring TLS for target servers and target endpoints, and when configuring virtual hosts that use 2-way TLS. When used with a target endpoint/target server, if the backend system uses SNI and returns a cert with a subject Distinguished Name (DN) that does not match the hostname, there is no way to ignore the error and the connection fails.
* @property keyAlias Required if clientAuthEnabled is true. The resource ID for the alias containing the private key and cert.
* @property keyStore Required if clientAuthEnabled is true. The resource ID of the keystore.
* @property protocols The TLS versioins to be used.
* @property trustStore The resource ID of the truststore.
*/
public data class TargetServerSSlInfoArgs(
public val ciphers: Output>? = null,
public val clientAuthEnabled: Output? = null,
public val commonName: Output? = null,
public val enabled: Output,
public val ignoreValidationErrors: Output? = null,
public val keyAlias: Output? = null,
public val keyStore: Output? = null,
public val protocols: Output>? = null,
public val trustStore: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.gcp.apigee.inputs.TargetServerSSlInfoArgs =
com.pulumi.gcp.apigee.inputs.TargetServerSSlInfoArgs.builder()
.ciphers(ciphers?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.clientAuthEnabled(clientAuthEnabled?.applyValue({ args0 -> args0 }))
.commonName(commonName?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.enabled(enabled.applyValue({ args0 -> args0 }))
.ignoreValidationErrors(ignoreValidationErrors?.applyValue({ args0 -> args0 }))
.keyAlias(keyAlias?.applyValue({ args0 -> args0 }))
.keyStore(keyStore?.applyValue({ args0 -> args0 }))
.protocols(protocols?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.trustStore(trustStore?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [TargetServerSSlInfoArgs].
*/
@PulumiTagMarker
public class TargetServerSSlInfoArgsBuilder internal constructor() {
private var ciphers: Output>? = null
private var clientAuthEnabled: Output? = null
private var commonName: Output? = null
private var enabled: Output? = null
private var ignoreValidationErrors: Output? = null
private var keyAlias: Output? = null
private var keyStore: Output? = null
private var protocols: Output>? = null
private var trustStore: Output? = null
/**
* @param value The SSL/TLS cipher suites to be used. For programmable proxies, it must be one of the cipher suite names listed in: http://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html#ciphersuites. For configurable proxies, it must follow the configuration specified in: https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration. This setting has no effect for configurable proxies when negotiating TLS 1.3.
*/
@JvmName("etdgokohjsrxktfo")
public suspend fun ciphers(`value`: Output>) {
this.ciphers = value
}
@JvmName("gsnngrbifgirwcby")
public suspend fun ciphers(vararg values: Output) {
this.ciphers = Output.all(values.asList())
}
/**
* @param values The SSL/TLS cipher suites to be used. For programmable proxies, it must be one of the cipher suite names listed in: http://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html#ciphersuites. For configurable proxies, it must follow the configuration specified in: https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration. This setting has no effect for configurable proxies when negotiating TLS 1.3.
*/
@JvmName("ixncqyvokkfcbcsr")
public suspend fun ciphers(values: List