-
Notifications
You must be signed in to change notification settings - Fork 18
/
model_pki_root_sign_intermediate_request.go
93 lines (64 loc) · 5.92 KB
/
model_pki_root_sign_intermediate_request.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
//
// Code generated with OpenAPI Generator (https://openapi-generator.tech); DO NOT EDIT.
package schema
// PkiRootSignIntermediateRequest struct for PkiRootSignIntermediateRequest
type PkiRootSignIntermediateRequest struct {
// The requested Subject Alternative Names, if any, in a comma-delimited list. May contain both DNS names and email addresses.
AltNames string `json:"alt_names,omitempty"`
// The requested common name; if you want more than one, specify the alternative names in the alt_names map. If not specified when signing, the common name will be taken from the CSR; other names must still be specified in alt_names or ip_sans.
CommonName string `json:"common_name,omitempty"`
// If set, Country will be set to this value.
Country []string `json:"country,omitempty"`
// PEM-format CSR to be signed.
Csr string `json:"csr,omitempty"`
// If true, the Common Name will not be included in DNS or Email Subject Alternate Names. Defaults to false (CN is included).
ExcludeCnFromSans bool `json:"exclude_cn_from_sans,omitempty"`
// Format for returned data. Can be \"pem\", \"der\", or \"pem_bundle\". If \"pem_bundle\", any private key and issuing cert will be appended to the certificate pem. If \"der\", the value will be base64 encoded. Defaults to \"pem\".
Format string `json:"format,omitempty"`
// The requested IP SANs, if any, in a comma-delimited list
IpSans []string `json:"ip_sans,omitempty"`
// Provide a name to the generated or existing issuer, the name must be unique across all issuers and not be the reserved value 'default'
IssuerName string `json:"issuer_name,omitempty"`
// Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer.
IssuerRef string `json:"issuer_ref,omitempty"`
// If set, Locality will be set to this value.
Locality []string `json:"locality,omitempty"`
// The maximum allowable path length
MaxPathLength int32 `json:"max_path_length,omitempty"`
// Set the not after field of the certificate with specified date value. The value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ
NotAfter string `json:"not_after,omitempty"`
// The duration before now which the certificate needs to be backdated by.
NotBeforeDuration string `json:"not_before_duration,omitempty"`
// If set, O (Organization) will be set to this value.
Organization []string `json:"organization,omitempty"`
// Requested other SANs, in an array with the format <oid>;UTF8:<utf8 string value> for each entry.
OtherSans []string `json:"other_sans,omitempty"`
// If set, OU (OrganizationalUnit) will be set to this value.
Ou []string `json:"ou,omitempty"`
// Domains for which this certificate is allowed to sign or issue child certificates. If set, all DNS names (subject and alt) on child certs must be exact matches or subsets of the given domains (see https://tools.ietf.org/html/rfc5280#section-4.2.1.10).
PermittedDnsDomains []string `json:"permitted_dns_domains,omitempty"`
// If set, Postal Code will be set to this value.
PostalCode []string `json:"postal_code,omitempty"`
// Format for the returned private key. Generally the default will be controlled by the \"format\" parameter as either base64-encoded DER or PEM-encoded DER. However, this can be set to \"pkcs8\" to have the returned private key contain base64-encoded pkcs8 or PEM-encoded pkcs8 instead. Defaults to \"der\".
PrivateKeyFormat string `json:"private_key_format,omitempty"`
// If set, Province will be set to this value.
Province []string `json:"province,omitempty"`
// The Subject's requested serial number, if any. See RFC 4519 Section 2.31 'serialNumber' for a description of this field. If you want more than one, specify alternative names in the alt_names map using OID 2.5.4.5. This has no impact on the final certificate's Serial Number field.
SerialNumber string `json:"serial_number,omitempty"`
// The number of bits to use in the signature algorithm; accepts 256 for SHA-2-256, 384 for SHA-2-384, and 512 for SHA-2-512. Defaults to 0 to automatically detect based on key length (SHA-2-256 for RSA keys, and matching the curve size for NIST P-Curves).
SignatureBits int32 `json:"signature_bits,omitempty"`
// Value for the Subject Key Identifier field (RFC 5280 Section 4.2.1.2). This value should ONLY be used when cross-signing to mimic the existing certificate's SKID value; this is necessary to allow certain TLS implementations (such as OpenSSL) which use SKID/AKID matches in chain building to restrict possible valid chains. Specified as a string in hex format. Default is empty, allowing Vault to automatically calculate the SKID according to method one in the above RFC section.
Skid string `json:"skid,omitempty"`
// If set, Street Address will be set to this value.
StreetAddress []string `json:"street_address,omitempty"`
// The requested Time To Live for the certificate; sets the expiration date. If not specified the role default, backend default, or system default TTL is used, in that order. Cannot be larger than the mount max TTL. Note: this only has an effect when generating a CA cert or signing a CA cert, not when generating a CSR for an intermediate CA.
Ttl string `json:"ttl,omitempty"`
// The requested URI SANs, if any, in a comma-delimited list.
UriSans []string `json:"uri_sans,omitempty"`
// If true, then: 1) Subject information, including names and alternate names, will be preserved from the CSR rather than using values provided in the other parameters to this path; 2) Any key usages requested in the CSR will be added to the basic set of key usages used for CA certs signed by this path; for instance, the non-repudiation flag; 3) Extensions requested in the CSR will be copied into the issued certificate.
UseCsrValues bool `json:"use_csr_values,omitempty"`
// Whether or not to use PSS signatures when using a RSA key-type issuer. Defaults to false.
UsePss bool `json:"use_pss,omitempty"`
}