Class ApigeeTargetServerSSlInfo.Builder

    • Constructor Detail

      • Builder

        public Builder()
    • Method Detail

      • enabled

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder enabled​(Boolean enabled)
        Parameters:
        enabled - Enables TLS. If false, neither one-way nor two-way TLS will be enabled. This parameter is required. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#enabled ApigeeTargetServer#enabled}
        Returns:
        this
      • enabled

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder enabled​(com.hashicorp.cdktf.IResolvable enabled)
        Parameters:
        enabled - Enables TLS. If false, neither one-way nor two-way TLS will be enabled. This parameter is required. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#enabled ApigeeTargetServer#enabled}
        Returns:
        this
      • ciphers

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder ciphers​(List<String> ciphers)
        Parameters:
        ciphers - The SSL/TLS cipher suites to be used. For programmable proxies, it must be one of the cipher suite names listed in: http://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html#ciphersuites. For configurable proxies, it must follow the configuration specified in: https://commondatastorage.googleapis.com/chromium-boringssl-docs/ssl.h.html#Cipher-suite-configuration. This setting has no effect for configurable proxies when negotiating TLS 1.3. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#ciphers ApigeeTargetServer#ciphers}
        Returns:
        this
      • clientAuthEnabled

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder clientAuthEnabled​(Boolean clientAuthEnabled)
        Parameters:
        clientAuthEnabled - Enables two-way TLS. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#client_auth_enabled ApigeeTargetServer#client_auth_enabled}
        Returns:
        this
      • clientAuthEnabled

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder clientAuthEnabled​(com.hashicorp.cdktf.IResolvable clientAuthEnabled)
        Parameters:
        clientAuthEnabled - Enables two-way TLS. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#client_auth_enabled ApigeeTargetServer#client_auth_enabled}
        Returns:
        this
      • ignoreValidationErrors

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder ignoreValidationErrors​(Boolean ignoreValidationErrors)
        Parameters:
        ignoreValidationErrors - If true, Edge ignores TLS certificate errors. Valid when configuring TLS for target servers and target endpoints, and when configuring virtual hosts that use 2-way TLS. When used with a target endpoint/target server, if the backend system uses SNI and returns a cert with a subject Distinguished Name (DN) that does not match the hostname, there is no way to ignore the error and the connection fails. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#ignore_validation_errors ApigeeTargetServer#ignore_validation_errors}
        Returns:
        this
      • ignoreValidationErrors

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder ignoreValidationErrors​(com.hashicorp.cdktf.IResolvable ignoreValidationErrors)
        Parameters:
        ignoreValidationErrors - If true, Edge ignores TLS certificate errors. Valid when configuring TLS for target servers and target endpoints, and when configuring virtual hosts that use 2-way TLS. When used with a target endpoint/target server, if the backend system uses SNI and returns a cert with a subject Distinguished Name (DN) that does not match the hostname, there is no way to ignore the error and the connection fails. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#ignore_validation_errors ApigeeTargetServer#ignore_validation_errors}
        Returns:
        this
      • keyAlias

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder keyAlias​(String keyAlias)
        Parameters:
        keyAlias - Required if clientAuthEnabled is true. The resource ID for the alias containing the private key and cert. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#key_alias ApigeeTargetServer#key_alias}
        Returns:
        this
      • keyStore

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder keyStore​(String keyStore)
        Parameters:
        keyStore - Required if clientAuthEnabled is true. The resource ID of the keystore. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#key_store ApigeeTargetServer#key_store}
        Returns:
        this
      • trustStore

        @Stability(Stable)
        public ApigeeTargetServerSSlInfo.Builder trustStore​(String trustStore)
        Parameters:
        trustStore - The resource ID of the truststore. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/apigee_target_server#trust_store ApigeeTargetServer#trust_store}
        Returns:
        this