/** * HashiCorp Vault API * HTTP API that gives you full access to Vault. All API routes are prefixed with `/v1/`. * * The version of the OpenAPI document: 1.20.0 * * * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). * https://openapi-generator.tech * Do not edit the class manually. */ /** * * @export * @interface PkiIssuerSignVerbatimWithRoleRequest */ export interface PkiIssuerSignVerbatimWithRoleRequest { /** * The requested Subject Alternative Names, if any, in a comma-delimited list. If email protection is enabled for the role, this may contain email addresses. * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ altNames?: string; /** * User supplied metadata to store associated with this certificate's serial number, base64 encoded * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ certMetadata?: string; /** * The requested common name; if you want more than one, specify the alternative names in the alt_names map. If email protection is enabled in the role, this may be an email address. * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ commonName?: string; /** * PEM-format CSR to be signed. Values will be taken verbatim from the CSR, except for basic constraints. * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ csr?: string; /** * If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included). * @type {boolean} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ excludeCnFromSans?: boolean; /** * A comma-separated string or list of extended key usages. Valid values can be found at https://golang.org/pkg/crypto/x509/#ExtKeyUsage -- simply drop the "ExtKeyUsage" part of the name. To remove all key usages from being set, set this value to an empty list. * @type {Array} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ extKeyUsage?: Array; /** * A comma-separated string or list of extended key usage oids. * @type {Array} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ extKeyUsageOids?: Array; /** * Format for returned data. Can be "pem", "der", or "pem_bundle". If "pem_bundle", any private key and issuing cert will be appended to the certificate pem. If "der", the value will be base64 encoded. Defaults to "pem". * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ format?: PkiIssuerSignVerbatimWithRoleRequestFormatEnum; /** * The requested IP SANs, if any, in a comma-delimited list * @type {Array} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ ipSans?: Array; /** * A comma-separated string or list of key usages (not extended key usages). Valid values can be found at https://golang.org/pkg/crypto/x509/#KeyUsage -- simply drop the "KeyUsage" part of the name. To remove all key usages from being set, set this value to an empty list. * @type {Array} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ keyUsage?: Array; /** * Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ notAfter?: string; /** * Requested other SANs, in an array with the format ;UTF8: for each entry. * @type {Array} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ otherSans?: Array; /** * Format for the returned private key. Generally the default will be controlled by the "format" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to "pkcs8" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to "der". * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ privateKeyFormat?: PkiIssuerSignVerbatimWithRoleRequestPrivateKeyFormatEnum; /** * Whether or not to remove self-signed CA certificates in the output of the ca_chain field. * @type {boolean} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ removeRootsFromChain?: boolean; /** * The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field. * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ serialNumber?: string; /** * The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves). * @type {number} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ signatureBits?: number; /** * The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the role max TTL. * @type {string} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ ttl?: string; /** * The requested URI SANs, if any, in a comma-delimited list. * @type {Array} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ uriSans?: Array; /** * Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false. * @type {boolean} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ usePss?: boolean; /** * The requested user_ids value to place in the subject, if any, in a comma-delimited list. Restricted by allowed_user_ids. Any values are added with OID 0.9.2342.19200300.100.1.1. * @type {Array} * @memberof PkiIssuerSignVerbatimWithRoleRequest */ userIds?: Array; } /** * @export * @enum {string} */ export declare enum PkiIssuerSignVerbatimWithRoleRequestFormatEnum { PEM = "pem", DER = "der", PEM_BUNDLE = "pem_bundle" } /** * @export * @enum {string} */ export declare enum PkiIssuerSignVerbatimWithRoleRequestPrivateKeyFormatEnum { EMPTY = "", DER = "der", PEM = "pem", PKCS8 = "pkcs8" } /** * Check if a given object implements the PkiIssuerSignVerbatimWithRoleRequest interface. */ export declare function instanceOfPkiIssuerSignVerbatimWithRoleRequest(value: object): value is PkiIssuerSignVerbatimWithRoleRequest; export declare function PkiIssuerSignVerbatimWithRoleRequestFromJSON(json: any): PkiIssuerSignVerbatimWithRoleRequest; export declare function PkiIssuerSignVerbatimWithRoleRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): PkiIssuerSignVerbatimWithRoleRequest; export declare function PkiIssuerSignVerbatimWithRoleRequestToJSON(json: any): PkiIssuerSignVerbatimWithRoleRequest; export declare function PkiIssuerSignVerbatimWithRoleRequestToJSONTyped(value?: PkiIssuerSignVerbatimWithRoleRequest | null, ignoreDiscriminator?: boolean): any;