TrustConfigArgs

data class TrustConfigArgs(val description: Output<String>? = null, val etag: Output<String>? = null, val labels: Output<Map<String, String>>? = null, val location: Output<String>? = null, val name: Output<String>? = null, val project: Output<String>? = null, val trustConfigId: Output<String>? = null, val trustStores: Output<List<TrustStoreArgs>>? = null) : ConvertibleToJava<TrustConfigArgs>

Creates a new TrustConfig in a given project and location.

Constructors

Link copied to clipboard
fun TrustConfigArgs(description: Output<String>? = null, etag: Output<String>? = null, labels: Output<Map<String, String>>? = null, location: Output<String>? = null, name: Output<String>? = null, project: Output<String>? = null, trustConfigId: Output<String>? = null, trustStores: Output<List<TrustStoreArgs>>? = null)

Functions

Link copied to clipboard
open override fun toJava(): TrustConfigArgs

Properties

Link copied to clipboard
val description: Output<String>? = null

One or more paragraphs of text description of a TrustConfig.

Link copied to clipboard
val etag: Output<String>? = null

This checksum is computed by the server based on the value of other fields, and may be sent on update and delete requests to ensure the client has an up-to-date value before proceeding.

Link copied to clipboard
val labels: Output<Map<String, String>>? = null

Set of labels associated with a TrustConfig.

Link copied to clipboard
val location: Output<String>? = null
Link copied to clipboard
val name: Output<String>? = null

A user-defined name of the trust config. TrustConfig names must be unique globally and match pattern projects/*/locations/*/trustConfigs/*.

Link copied to clipboard
val project: Output<String>? = null
Link copied to clipboard
val trustConfigId: Output<String>? = null

Required. A user-provided name of the TrustConfig.

Link copied to clipboard
val trustStores: Output<List<TrustStoreArgs>>? = null

Set of trust stores to perform validation against. This field is supported when TrustConfig is configured with Load Balancers, currently not supported for SPIFFE certificate validation. Only one TrustStore specified is currently allowed. //*/