Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
com.pulumi.vault.kotlin.CertAuthBackendRoleArgs.kt Maven / Gradle / Ivy
Go to download
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.vault.kotlin
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.vault.CertAuthBackendRoleArgs.builder
import kotlin.Boolean
import kotlin.Int
import kotlin.String
import kotlin.Suppress
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
* Provides a resource to create a role in an [Cert auth backend within Vault](https://www.vaultproject.io/docs/auth/cert.html).
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as std from "@pulumi/std";
* import * as vault from "@pulumi/vault";
* const cert = new vault.AuthBackend("cert", {
* path: "cert",
* type: "cert",
* });
* const certCertAuthBackendRole = new vault.CertAuthBackendRole("cert", {
* name: "foo",
* certificate: std.file({
* input: "/path/to/certs/ca-cert.pem",
* }).then(invoke => invoke.result),
* backend: cert.path,
* allowedNames: [
* "foo.example.org",
* "baz.example.org",
* ],
* tokenTtl: 300,
* tokenMaxTtl: 600,
* tokenPolicies: ["foo"],
* });
* ```
* ```python
* import pulumi
* import pulumi_std as std
* import pulumi_vault as vault
* cert = vault.AuthBackend("cert",
* path="cert",
* type="cert")
* cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
* name="foo",
* certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
* backend=cert.path,
* allowed_names=[
* "foo.example.org",
* "baz.example.org",
* ],
* token_ttl=300,
* token_max_ttl=600,
* token_policies=["foo"])
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Std = Pulumi.Std;
* using Vault = Pulumi.Vault;
* return await Deployment.RunAsync(() =>
* {
* var cert = new Vault.AuthBackend("cert", new()
* {
* Path = "cert",
* Type = "cert",
* });
* var certCertAuthBackendRole = new Vault.CertAuthBackendRole("cert", new()
* {
* Name = "foo",
* Certificate = Std.File.Invoke(new()
* {
* Input = "/path/to/certs/ca-cert.pem",
* }).Apply(invoke => invoke.Result),
* Backend = cert.Path,
* AllowedNames = new[]
* {
* "foo.example.org",
* "baz.example.org",
* },
* TokenTtl = 300,
* TokenMaxTtl = 600,
* TokenPolicies = new[]
* {
* "foo",
* },
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-std/sdk/go/std"
* "github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* cert, err := vault.NewAuthBackend(ctx, "cert", &vault.AuthBackendArgs{
* Path: pulumi.String("cert"),
* Type: pulumi.String("cert"),
* })
* if err != nil {
* return err
* }
* invokeFile, err := std.File(ctx, &std.FileArgs{
* Input: "/path/to/certs/ca-cert.pem",
* }, nil)
* if err != nil {
* return err
* }
* _, err = vault.NewCertAuthBackendRole(ctx, "cert", &vault.CertAuthBackendRoleArgs{
* Name: pulumi.String("foo"),
* Certificate: pulumi.String(invokeFile.Result),
* Backend: cert.Path,
* AllowedNames: pulumi.StringArray{
* pulumi.String("foo.example.org"),
* pulumi.String("baz.example.org"),
* },
* TokenTtl: pulumi.Int(300),
* TokenMaxTtl: pulumi.Int(600),
* TokenPolicies: pulumi.StringArray{
* pulumi.String("foo"),
* },
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.vault.AuthBackend;
* import com.pulumi.vault.AuthBackendArgs;
* import com.pulumi.vault.CertAuthBackendRole;
* import com.pulumi.vault.CertAuthBackendRoleArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* var cert = new AuthBackend("cert", AuthBackendArgs.builder()
* .path("cert")
* .type("cert")
* .build());
* var certCertAuthBackendRole = new CertAuthBackendRole("certCertAuthBackendRole", CertAuthBackendRoleArgs.builder()
* .name("foo")
* .certificate(StdFunctions.file(FileArgs.builder()
* .input("/path/to/certs/ca-cert.pem")
* .build()).result())
* .backend(cert.path())
* .allowedNames(
* "foo.example.org",
* "baz.example.org")
* .tokenTtl(300)
* .tokenMaxTtl(600)
* .tokenPolicies("foo")
* .build());
* }
* }
* ```
* ```yaml
* resources:
* cert:
* type: vault:AuthBackend
* properties:
* path: cert
* type: cert
* certCertAuthBackendRole:
* type: vault:CertAuthBackendRole
* name: cert
* properties:
* name: foo
* certificate:
* fn::invoke:
* Function: std:file
* Arguments:
* input: /path/to/certs/ca-cert.pem
* Return: result
* backend: ${cert.path}
* allowedNames:
* - foo.example.org
* - baz.example.org
* tokenTtl: 300
* tokenMaxTtl: 600
* tokenPolicies:
* - foo
* ```
*
* @property allowedCommonNames Allowed the common names for authenticated client certificates
* @property allowedDnsSans Allowed alternative dns names for authenticated client certificates
* @property allowedEmailSans Allowed emails for authenticated client certificates
* @property allowedNames DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
* @property allowedOrganizationalUnits Allowed organization units for authenticated client certificates.
* @property allowedUriSans Allowed URIs for authenticated client certificates
* @property backend Path to the mounted Cert auth backend
* @property certificate CA certificate used to validate client certificates
* @property displayName The name to display on tokens issued under this role.
* @property name Name of the role
* @property namespace The namespace to provision the resource in.
* The value should not contain leading or trailing forward slashes.
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
* *Available only for Vault Enterprise*.
* @property ocspCaCertificates Any additional CA certificates
* needed to verify OCSP responses. Provided as base64 encoded PEM data.
* Requires Vault version 1.13+.
* @property ocspEnabled If enabled, validate certificates'
* revocation status using OCSP. Requires Vault version 1.13+.
* @property ocspFailOpen If true and an OCSP response cannot
* be fetched or is of an unknown status, the login will proceed as if the
* certificate has not been revoked.
* Requires Vault version 1.13+.
* @property ocspQueryAllServers If set to true, rather than
* accepting the first successful OCSP response, query all servers and consider
* the certificate valid only if all servers agree.
* Requires Vault version 1.13+.
* @property ocspServersOverrides : A comma-separated list of OCSP
* server addresses. If unset, the OCSP server is determined from the
* AuthorityInformationAccess extension on the certificate being inspected.
* Requires Vault version 1.13+.
* @property requiredExtensions TLS extensions required on
* client certificates
* @property tokenBoundCidrs Specifies the blocks of IP addresses which are allowed to use the generated token
* @property tokenExplicitMaxTtl Generated Token's Explicit Maximum TTL in seconds
* @property tokenMaxTtl The maximum lifetime of the generated token
* @property tokenNoDefaultPolicy If true, the 'default' policy will not automatically be added to generated tokens
* @property tokenNumUses The maximum number of times a token may be used, a value of zero means unlimited
* @property tokenPeriod Generated Token's Period
* @property tokenPolicies Generated Token's Policies
* @property tokenTtl The initial ttl of the token to generate in seconds
* @property tokenType The type of token to generate, service or batch
*/
public data class CertAuthBackendRoleArgs(
public val allowedCommonNames: Output>? = null,
public val allowedDnsSans: Output>? = null,
public val allowedEmailSans: Output>? = null,
public val allowedNames: Output>? = null,
public val allowedOrganizationalUnits: Output>? = null,
public val allowedUriSans: Output>? = null,
public val backend: Output? = null,
public val certificate: Output? = null,
public val displayName: Output? = null,
public val name: Output? = null,
public val namespace: Output? = null,
public val ocspCaCertificates: Output? = null,
public val ocspEnabled: Output? = null,
public val ocspFailOpen: Output? = null,
public val ocspQueryAllServers: Output? = null,
public val ocspServersOverrides: Output>? = null,
public val requiredExtensions: Output>? = null,
public val tokenBoundCidrs: Output>? = null,
public val tokenExplicitMaxTtl: Output? = null,
public val tokenMaxTtl: Output? = null,
public val tokenNoDefaultPolicy: Output? = null,
public val tokenNumUses: Output? = null,
public val tokenPeriod: Output? = null,
public val tokenPolicies: Output>? = null,
public val tokenTtl: Output? = null,
public val tokenType: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.vault.CertAuthBackendRoleArgs =
com.pulumi.vault.CertAuthBackendRoleArgs.builder()
.allowedCommonNames(allowedCommonNames?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.allowedDnsSans(allowedDnsSans?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.allowedEmailSans(allowedEmailSans?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.allowedNames(allowedNames?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.allowedOrganizationalUnits(
allowedOrganizationalUnits?.applyValue({ args0 ->
args0.map({ args0 ->
args0
})
}),
)
.allowedUriSans(allowedUriSans?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.backend(backend?.applyValue({ args0 -> args0 }))
.certificate(certificate?.applyValue({ args0 -> args0 }))
.displayName(displayName?.applyValue({ args0 -> args0 }))
.name(name?.applyValue({ args0 -> args0 }))
.namespace(namespace?.applyValue({ args0 -> args0 }))
.ocspCaCertificates(ocspCaCertificates?.applyValue({ args0 -> args0 }))
.ocspEnabled(ocspEnabled?.applyValue({ args0 -> args0 }))
.ocspFailOpen(ocspFailOpen?.applyValue({ args0 -> args0 }))
.ocspQueryAllServers(ocspQueryAllServers?.applyValue({ args0 -> args0 }))
.ocspServersOverrides(ocspServersOverrides?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.requiredExtensions(requiredExtensions?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.tokenBoundCidrs(tokenBoundCidrs?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.tokenExplicitMaxTtl(tokenExplicitMaxTtl?.applyValue({ args0 -> args0 }))
.tokenMaxTtl(tokenMaxTtl?.applyValue({ args0 -> args0 }))
.tokenNoDefaultPolicy(tokenNoDefaultPolicy?.applyValue({ args0 -> args0 }))
.tokenNumUses(tokenNumUses?.applyValue({ args0 -> args0 }))
.tokenPeriod(tokenPeriod?.applyValue({ args0 -> args0 }))
.tokenPolicies(tokenPolicies?.applyValue({ args0 -> args0.map({ args0 -> args0 }) }))
.tokenTtl(tokenTtl?.applyValue({ args0 -> args0 }))
.tokenType(tokenType?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [CertAuthBackendRoleArgs].
*/
@PulumiTagMarker
public class CertAuthBackendRoleArgsBuilder internal constructor() {
private var allowedCommonNames: Output>? = null
private var allowedDnsSans: Output>? = null
private var allowedEmailSans: Output>? = null
private var allowedNames: Output>? = null
private var allowedOrganizationalUnits: Output>? = null
private var allowedUriSans: Output>? = null
private var backend: Output? = null
private var certificate: Output? = null
private var displayName: Output? = null
private var name: Output? = null
private var namespace: Output? = null
private var ocspCaCertificates: Output? = null
private var ocspEnabled: Output? = null
private var ocspFailOpen: Output? = null
private var ocspQueryAllServers: Output? = null
private var ocspServersOverrides: Output>? = null
private var requiredExtensions: Output>? = null
private var tokenBoundCidrs: Output>? = null
private var tokenExplicitMaxTtl: Output? = null
private var tokenMaxTtl: Output? = null
private var tokenNoDefaultPolicy: Output? = null
private var tokenNumUses: Output? = null
private var tokenPeriod: Output? = null
private var tokenPolicies: Output>? = null
private var tokenTtl: Output? = null
private var tokenType: Output? = null
/**
* @param value Allowed the common names for authenticated client certificates
*/
@JvmName("kyhhaylwnektjmna")
public suspend fun allowedCommonNames(`value`: Output>) {
this.allowedCommonNames = value
}
@JvmName("grsgstnkemqpqrog")
public suspend fun allowedCommonNames(vararg values: Output) {
this.allowedCommonNames = Output.all(values.asList())
}
/**
* @param values Allowed the common names for authenticated client certificates
*/
@JvmName("oebwmtgyjhwgrqjv")
public suspend fun allowedCommonNames(values: List>) {
this.allowedCommonNames = Output.all(values)
}
/**
* @param value Allowed alternative dns names for authenticated client certificates
*/
@JvmName("rwjcvcvhaujtudpv")
public suspend fun allowedDnsSans(`value`: Output>) {
this.allowedDnsSans = value
}
@JvmName("tommbofxnefxfhqj")
public suspend fun allowedDnsSans(vararg values: Output) {
this.allowedDnsSans = Output.all(values.asList())
}
/**
* @param values Allowed alternative dns names for authenticated client certificates
*/
@JvmName("bhnbobtvyhnjqvfv")
public suspend fun allowedDnsSans(values: List>) {
this.allowedDnsSans = Output.all(values)
}
/**
* @param value Allowed emails for authenticated client certificates
*/
@JvmName("cbfocbogelxoaxyh")
public suspend fun allowedEmailSans(`value`: Output>) {
this.allowedEmailSans = value
}
@JvmName("xpyjxpjpqmlueivr")
public suspend fun allowedEmailSans(vararg values: Output) {
this.allowedEmailSans = Output.all(values.asList())
}
/**
* @param values Allowed emails for authenticated client certificates
*/
@JvmName("giqevlwxavuaaihy")
public suspend fun allowedEmailSans(values: List>) {
this.allowedEmailSans = Output.all(values)
}
/**
* @param value DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
*/
@JvmName("qgxtlnvqyosxnarp")
public suspend fun allowedNames(`value`: Output>) {
this.allowedNames = value
}
@JvmName("vsyocfqcotqaxbma")
public suspend fun allowedNames(vararg values: Output) {
this.allowedNames = Output.all(values.asList())
}
/**
* @param values DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
*/
@JvmName("goocoeqfwtohkknc")
public suspend fun allowedNames(values: List>) {
this.allowedNames = Output.all(values)
}
/**
* @param value Allowed organization units for authenticated client certificates.
*/
@JvmName("wvpylbaarnqdhspk")
public suspend fun allowedOrganizationalUnits(`value`: Output>) {
this.allowedOrganizationalUnits = value
}
@JvmName("agewfdymwfgfrell")
public suspend fun allowedOrganizationalUnits(vararg values: Output) {
this.allowedOrganizationalUnits = Output.all(values.asList())
}
/**
* @param values Allowed organization units for authenticated client certificates.
*/
@JvmName("wwsyjyjxlvclpyaa")
public suspend fun allowedOrganizationalUnits(values: List>) {
this.allowedOrganizationalUnits = Output.all(values)
}
/**
* @param value Allowed URIs for authenticated client certificates
*/
@JvmName("glivhaisetgkgauq")
public suspend fun allowedUriSans(`value`: Output>) {
this.allowedUriSans = value
}
@JvmName("ivclcahlgkybuudk")
public suspend fun allowedUriSans(vararg values: Output) {
this.allowedUriSans = Output.all(values.asList())
}
/**
* @param values Allowed URIs for authenticated client certificates
*/
@JvmName("gbcgaqbedcwudyfo")
public suspend fun allowedUriSans(values: List>) {
this.allowedUriSans = Output.all(values)
}
/**
* @param value Path to the mounted Cert auth backend
*/
@JvmName("mqywkhkffssorykx")
public suspend fun backend(`value`: Output) {
this.backend = value
}
/**
* @param value CA certificate used to validate client certificates
*/
@JvmName("rtrnwoubelraampr")
public suspend fun certificate(`value`: Output) {
this.certificate = value
}
/**
* @param value The name to display on tokens issued under this role.
*/
@JvmName("owwqnxhobdxwwein")
public suspend fun displayName(`value`: Output) {
this.displayName = value
}
/**
* @param value Name of the role
*/
@JvmName("opdpgybsdtxkghig")
public suspend fun name(`value`: Output) {
this.name = value
}
/**
* @param value The namespace to provision the resource in.
* The value should not contain leading or trailing forward slashes.
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
* *Available only for Vault Enterprise*.
*/
@JvmName("dvulgfdpdljpofab")
public suspend fun namespace(`value`: Output) {
this.namespace = value
}
/**
* @param value Any additional CA certificates
* needed to verify OCSP responses. Provided as base64 encoded PEM data.
* Requires Vault version 1.13+.
*/
@JvmName("mxwkvrywpewkvdar")
public suspend fun ocspCaCertificates(`value`: Output) {
this.ocspCaCertificates = value
}
/**
* @param value If enabled, validate certificates'
* revocation status using OCSP. Requires Vault version 1.13+.
*/
@JvmName("dckhymbrycstnptt")
public suspend fun ocspEnabled(`value`: Output) {
this.ocspEnabled = value
}
/**
* @param value If true and an OCSP response cannot
* be fetched or is of an unknown status, the login will proceed as if the
* certificate has not been revoked.
* Requires Vault version 1.13+.
*/
@JvmName("jhtgoevncwxislmx")
public suspend fun ocspFailOpen(`value`: Output) {
this.ocspFailOpen = value
}
/**
* @param value If set to true, rather than
* accepting the first successful OCSP response, query all servers and consider
* the certificate valid only if all servers agree.
* Requires Vault version 1.13+.
*/
@JvmName("bhabcdgdvayxwxla")
public suspend fun ocspQueryAllServers(`value`: Output) {
this.ocspQueryAllServers = value
}
/**
* @param value : A comma-separated list of OCSP
* server addresses. If unset, the OCSP server is determined from the
* AuthorityInformationAccess extension on the certificate being inspected.
* Requires Vault version 1.13+.
*/
@JvmName("mjdtgpjdgmjemksm")
public suspend fun ocspServersOverrides(`value`: Output>) {
this.ocspServersOverrides = value
}
@JvmName("cuwsddlqxeslonwr")
public suspend fun ocspServersOverrides(vararg values: Output) {
this.ocspServersOverrides = Output.all(values.asList())
}
/**
* @param values : A comma-separated list of OCSP
* server addresses. If unset, the OCSP server is determined from the
* AuthorityInformationAccess extension on the certificate being inspected.
* Requires Vault version 1.13+.
*/
@JvmName("qfeinhknifvaltrw")
public suspend fun ocspServersOverrides(values: List>) {
this.ocspServersOverrides = Output.all(values)
}
/**
* @param value TLS extensions required on
* client certificates
*/
@JvmName("dnkwixqoaxblirok")
public suspend fun requiredExtensions(`value`: Output>) {
this.requiredExtensions = value
}
@JvmName("cvvahoqxfypungyo")
public suspend fun requiredExtensions(vararg values: Output) {
this.requiredExtensions = Output.all(values.asList())
}
/**
* @param values TLS extensions required on
* client certificates
*/
@JvmName("krxrxwepvahymisd")
public suspend fun requiredExtensions(values: List>) {
this.requiredExtensions = Output.all(values)
}
/**
* @param value Specifies the blocks of IP addresses which are allowed to use the generated token
*/
@JvmName("jdepuwnppcjtmytd")
public suspend fun tokenBoundCidrs(`value`: Output>) {
this.tokenBoundCidrs = value
}
@JvmName("scxwdbffomwhaggn")
public suspend fun tokenBoundCidrs(vararg values: Output) {
this.tokenBoundCidrs = Output.all(values.asList())
}
/**
* @param values Specifies the blocks of IP addresses which are allowed to use the generated token
*/
@JvmName("nykywhujhgeldndq")
public suspend fun tokenBoundCidrs(values: List>) {
this.tokenBoundCidrs = Output.all(values)
}
/**
* @param value Generated Token's Explicit Maximum TTL in seconds
*/
@JvmName("jisjcxapvsgiejdg")
public suspend fun tokenExplicitMaxTtl(`value`: Output) {
this.tokenExplicitMaxTtl = value
}
/**
* @param value The maximum lifetime of the generated token
*/
@JvmName("pnhxcyijfcrsyxqk")
public suspend fun tokenMaxTtl(`value`: Output) {
this.tokenMaxTtl = value
}
/**
* @param value If true, the 'default' policy will not automatically be added to generated tokens
*/
@JvmName("aohjcnhhmqiettyd")
public suspend fun tokenNoDefaultPolicy(`value`: Output) {
this.tokenNoDefaultPolicy = value
}
/**
* @param value The maximum number of times a token may be used, a value of zero means unlimited
*/
@JvmName("cnwnlcftkbtmdjtv")
public suspend fun tokenNumUses(`value`: Output) {
this.tokenNumUses = value
}
/**
* @param value Generated Token's Period
*/
@JvmName("rrvymaegbapplyab")
public suspend fun tokenPeriod(`value`: Output) {
this.tokenPeriod = value
}
/**
* @param value Generated Token's Policies
*/
@JvmName("ffvskthpgrftnwxj")
public suspend fun tokenPolicies(`value`: Output>) {
this.tokenPolicies = value
}
@JvmName("yqrpupawfwsuslmr")
public suspend fun tokenPolicies(vararg values: Output) {
this.tokenPolicies = Output.all(values.asList())
}
/**
* @param values Generated Token's Policies
*/
@JvmName("scdsrlmhhtmpteuv")
public suspend fun tokenPolicies(values: List>) {
this.tokenPolicies = Output.all(values)
}
/**
* @param value The initial ttl of the token to generate in seconds
*/
@JvmName("xpquchpmfhwddlyp")
public suspend fun tokenTtl(`value`: Output) {
this.tokenTtl = value
}
/**
* @param value The type of token to generate, service or batch
*/
@JvmName("vphkwvcwnjcfswex")
public suspend fun tokenType(`value`: Output) {
this.tokenType = value
}
/**
* @param value Allowed the common names for authenticated client certificates
*/
@JvmName("xhkopdqjffqadhlc")
public suspend fun allowedCommonNames(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.allowedCommonNames = mapped
}
/**
* @param values Allowed the common names for authenticated client certificates
*/
@JvmName("angpdrcxhlxdkgul")
public suspend fun allowedCommonNames(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.allowedCommonNames = mapped
}
/**
* @param value Allowed alternative dns names for authenticated client certificates
*/
@JvmName("onfgrienymihhdun")
public suspend fun allowedDnsSans(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.allowedDnsSans = mapped
}
/**
* @param values Allowed alternative dns names for authenticated client certificates
*/
@JvmName("hmbmqpacnmskabte")
public suspend fun allowedDnsSans(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.allowedDnsSans = mapped
}
/**
* @param value Allowed emails for authenticated client certificates
*/
@JvmName("vduleqckrsaicdqs")
public suspend fun allowedEmailSans(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.allowedEmailSans = mapped
}
/**
* @param values Allowed emails for authenticated client certificates
*/
@JvmName("ojdevhaeuokgijjl")
public suspend fun allowedEmailSans(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.allowedEmailSans = mapped
}
/**
* @param value DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
*/
@JvmName("vddwsajflddgykcb")
public suspend fun allowedNames(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.allowedNames = mapped
}
/**
* @param values DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
*/
@JvmName("dovyurabpsemjloh")
public suspend fun allowedNames(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.allowedNames = mapped
}
/**
* @param value Allowed organization units for authenticated client certificates.
*/
@JvmName("uytomjkvywhlhjva")
public suspend fun allowedOrganizationalUnits(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.allowedOrganizationalUnits = mapped
}
/**
* @param values Allowed organization units for authenticated client certificates.
*/
@JvmName("ndnqpwjcqxlxkcka")
public suspend fun allowedOrganizationalUnits(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.allowedOrganizationalUnits = mapped
}
/**
* @param value Allowed URIs for authenticated client certificates
*/
@JvmName("vjprdiswxsxanwdu")
public suspend fun allowedUriSans(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.allowedUriSans = mapped
}
/**
* @param values Allowed URIs for authenticated client certificates
*/
@JvmName("ssmupynuimfvmgcu")
public suspend fun allowedUriSans(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.allowedUriSans = mapped
}
/**
* @param value Path to the mounted Cert auth backend
*/
@JvmName("dfckryotxdoswsev")
public suspend fun backend(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.backend = mapped
}
/**
* @param value CA certificate used to validate client certificates
*/
@JvmName("wwtrulnoxpsjmdiv")
public suspend fun certificate(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.certificate = mapped
}
/**
* @param value The name to display on tokens issued under this role.
*/
@JvmName("vtfjncxymhnuxjyr")
public suspend fun displayName(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.displayName = mapped
}
/**
* @param value Name of the role
*/
@JvmName("jqtvxtoxtymlcaci")
public suspend fun name(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.name = mapped
}
/**
* @param value The namespace to provision the resource in.
* The value should not contain leading or trailing forward slashes.
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
* *Available only for Vault Enterprise*.
*/
@JvmName("uxojixniwkxnerea")
public suspend fun namespace(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.namespace = mapped
}
/**
* @param value Any additional CA certificates
* needed to verify OCSP responses. Provided as base64 encoded PEM data.
* Requires Vault version 1.13+.
*/
@JvmName("neflfghhjcknmqec")
public suspend fun ocspCaCertificates(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.ocspCaCertificates = mapped
}
/**
* @param value If enabled, validate certificates'
* revocation status using OCSP. Requires Vault version 1.13+.
*/
@JvmName("qcuhakvwnmbcqkxk")
public suspend fun ocspEnabled(`value`: Boolean?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.ocspEnabled = mapped
}
/**
* @param value If true and an OCSP response cannot
* be fetched or is of an unknown status, the login will proceed as if the
* certificate has not been revoked.
* Requires Vault version 1.13+.
*/
@JvmName("wnfsobxekhstsfdh")
public suspend fun ocspFailOpen(`value`: Boolean?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.ocspFailOpen = mapped
}
/**
* @param value If set to true, rather than
* accepting the first successful OCSP response, query all servers and consider
* the certificate valid only if all servers agree.
* Requires Vault version 1.13+.
*/
@JvmName("gvglxvulijgnucsk")
public suspend fun ocspQueryAllServers(`value`: Boolean?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.ocspQueryAllServers = mapped
}
/**
* @param value : A comma-separated list of OCSP
* server addresses. If unset, the OCSP server is determined from the
* AuthorityInformationAccess extension on the certificate being inspected.
* Requires Vault version 1.13+.
*/
@JvmName("amvbapoqhiaydtbj")
public suspend fun ocspServersOverrides(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.ocspServersOverrides = mapped
}
/**
* @param values : A comma-separated list of OCSP
* server addresses. If unset, the OCSP server is determined from the
* AuthorityInformationAccess extension on the certificate being inspected.
* Requires Vault version 1.13+.
*/
@JvmName("uxbuahbkmibbbfnw")
public suspend fun ocspServersOverrides(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.ocspServersOverrides = mapped
}
/**
* @param value TLS extensions required on
* client certificates
*/
@JvmName("svvrryrtgcscauok")
public suspend fun requiredExtensions(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.requiredExtensions = mapped
}
/**
* @param values TLS extensions required on
* client certificates
*/
@JvmName("eukisacyycyemomn")
public suspend fun requiredExtensions(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.requiredExtensions = mapped
}
/**
* @param value Specifies the blocks of IP addresses which are allowed to use the generated token
*/
@JvmName("oiskgfbsvkfkwpjx")
public suspend fun tokenBoundCidrs(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenBoundCidrs = mapped
}
/**
* @param values Specifies the blocks of IP addresses which are allowed to use the generated token
*/
@JvmName("qkfmxrfrdjfrgero")
public suspend fun tokenBoundCidrs(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.tokenBoundCidrs = mapped
}
/**
* @param value Generated Token's Explicit Maximum TTL in seconds
*/
@JvmName("rsiigcgahbhdcqbg")
public suspend fun tokenExplicitMaxTtl(`value`: Int?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenExplicitMaxTtl = mapped
}
/**
* @param value The maximum lifetime of the generated token
*/
@JvmName("xypskfinkjmqpsxh")
public suspend fun tokenMaxTtl(`value`: Int?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenMaxTtl = mapped
}
/**
* @param value If true, the 'default' policy will not automatically be added to generated tokens
*/
@JvmName("wcoouvquqknauork")
public suspend fun tokenNoDefaultPolicy(`value`: Boolean?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenNoDefaultPolicy = mapped
}
/**
* @param value The maximum number of times a token may be used, a value of zero means unlimited
*/
@JvmName("ncpoxxejmyyxdruw")
public suspend fun tokenNumUses(`value`: Int?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenNumUses = mapped
}
/**
* @param value Generated Token's Period
*/
@JvmName("hgjjpsncgoxyfyqr")
public suspend fun tokenPeriod(`value`: Int?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenPeriod = mapped
}
/**
* @param value Generated Token's Policies
*/
@JvmName("vglhnttekvajouuk")
public suspend fun tokenPolicies(`value`: List?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenPolicies = mapped
}
/**
* @param values Generated Token's Policies
*/
@JvmName("ooxcymcshfvncfxw")
public suspend fun tokenPolicies(vararg values: String) {
val toBeMapped = values.toList()
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.tokenPolicies = mapped
}
/**
* @param value The initial ttl of the token to generate in seconds
*/
@JvmName("pjiopvftrenokoym")
public suspend fun tokenTtl(`value`: Int?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenTtl = mapped
}
/**
* @param value The type of token to generate, service or batch
*/
@JvmName("dojctyrjrtilklgn")
public suspend fun tokenType(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.tokenType = mapped
}
internal fun build(): CertAuthBackendRoleArgs = CertAuthBackendRoleArgs(
allowedCommonNames = allowedCommonNames,
allowedDnsSans = allowedDnsSans,
allowedEmailSans = allowedEmailSans,
allowedNames = allowedNames,
allowedOrganizationalUnits = allowedOrganizationalUnits,
allowedUriSans = allowedUriSans,
backend = backend,
certificate = certificate,
displayName = displayName,
name = name,
namespace = namespace,
ocspCaCertificates = ocspCaCertificates,
ocspEnabled = ocspEnabled,
ocspFailOpen = ocspFailOpen,
ocspQueryAllServers = ocspQueryAllServers,
ocspServersOverrides = ocspServersOverrides,
requiredExtensions = requiredExtensions,
tokenBoundCidrs = tokenBoundCidrs,
tokenExplicitMaxTtl = tokenExplicitMaxTtl,
tokenMaxTtl = tokenMaxTtl,
tokenNoDefaultPolicy = tokenNoDefaultPolicy,
tokenNumUses = tokenNumUses,
tokenPeriod = tokenPeriod,
tokenPolicies = tokenPolicies,
tokenTtl = tokenTtl,
tokenType = tokenType,
)
}