Client Tls Policy Args
data class ClientTlsPolicyArgs(val clientCertificate: Output<ClientTlsPolicyClientCertificateArgs>? = null, val description: Output<String>? = null, val labels: Output<Map<String, String>>? = null, val location: Output<String>? = null, val name: Output<String>? = null, val project: Output<String>? = null, val serverValidationCas: Output<List<ClientTlsPolicyServerValidationCaArgs>>? = null, val sni: Output<String>? = null) : ConvertibleToJava<ClientTlsPolicyArgs>
Example Usage
Network Security Client Tls Policy Basic
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.networksecurity.ClientTlsPolicy;
import com.pulumi.gcp.networksecurity.ClientTlsPolicyArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var default_ = new ClientTlsPolicy("default", ClientTlsPolicyArgs.builder()
.labels(Map.of("foo", "bar"))
.description("my description")
.sni("secure.example.com")
.build(), CustomResourceOptions.builder()
.provider(google_beta)
.build());
}
}
Content copied to clipboard
Network Security Client Tls Policy Advanced
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.networksecurity.ClientTlsPolicy;
import com.pulumi.gcp.networksecurity.ClientTlsPolicyArgs;
import com.pulumi.gcp.networksecurity.inputs.ClientTlsPolicyClientCertificateArgs;
import com.pulumi.gcp.networksecurity.inputs.ClientTlsPolicyClientCertificateCertificateProviderInstanceArgs;
import com.pulumi.gcp.networksecurity.inputs.ClientTlsPolicyServerValidationCaArgs;
import com.pulumi.gcp.networksecurity.inputs.ClientTlsPolicyServerValidationCaGrpcEndpointArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var default_ = new ClientTlsPolicy("default", ClientTlsPolicyArgs.builder()
.labels(Map.of("foo", "bar"))
.description("my description")
.clientCertificate(ClientTlsPolicyClientCertificateArgs.builder()
.certificateProviderInstance(ClientTlsPolicyClientCertificateCertificateProviderInstanceArgs.builder()
.pluginInstance("google_cloud_private_spiffe")
.build())
.build())
.serverValidationCas(
ClientTlsPolicyServerValidationCaArgs.builder()
.grpcEndpoint(ClientTlsPolicyServerValidationCaGrpcEndpointArgs.builder()
.targetUri("unix:mypath")
.build())
.build(),
ClientTlsPolicyServerValidationCaArgs.builder()
.grpcEndpoint(ClientTlsPolicyServerValidationCaGrpcEndpointArgs.builder()
.targetUri("unix:mypath1")
.build())
.build())
.build(), CustomResourceOptions.builder()
.provider(google_beta)
.build());
}
}
Content copied to clipboard
Import
ClientTlsPolicy can be imported using any of these accepted formats
$ pulumi import gcp:networksecurity/clientTlsPolicy:ClientTlsPolicy default projects/{{project}}/locations/{{location}}/clientTlsPolicies/{{name}}
Content copied to clipboard
$ pulumi import gcp:networksecurity/clientTlsPolicy:ClientTlsPolicy default {{project}}/{{location}}/{{name}}
Content copied to clipboard
$ pulumi import gcp:networksecurity/clientTlsPolicy:ClientTlsPolicy default {{location}}/{{name}}
Content copied to clipboard
Constructors
Link copied to clipboard
constructor(clientCertificate: Output<ClientTlsPolicyClientCertificateArgs>? = null, description: Output<String>? = null, labels: Output<Map<String, String>>? = null, location: Output<String>? = null, name: Output<String>? = null, project: Output<String>? = null, serverValidationCas: Output<List<ClientTlsPolicyServerValidationCaArgs>>? = null, sni: Output<String>? = null)
Properties
Link copied to clipboard
Defines a mechanism to provision client identity (public and private keys) for peer to peer authentication. The presence of this dictates mTLS. Structure is documented below.
Link copied to clipboard
A free-text description of the resource. Max length 1024 characters.
Link copied to clipboard
Defines the mechanism to obtain the Certificate Authority certificate to validate the server certificate. If empty, client does not validate the server certificate. Structure is documented below.