@cdktf/provider-acme 0.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.gitattributes +23 -0
- package/.jsii +2899 -0
- package/API.md +2204 -0
- package/LICENSE +353 -0
- package/README.md +77 -0
- package/lib/acme-provider.d.ts +76 -0
- package/lib/acme-provider.js +102 -0
- package/lib/certificate.d.ts +715 -0
- package/lib/certificate.js +947 -0
- package/lib/index.d.ts +3 -0
- package/lib/index.js +17 -0
- package/lib/registration.d.ts +168 -0
- package/lib/registration.js +241 -0
- package/package.json +101 -0
@@ -0,0 +1,715 @@
|
|
1
|
+
import { Construct } from 'constructs';
|
2
|
+
import * as cdktf from 'cdktf';
|
3
|
+
/**
|
4
|
+
* @stability stable
|
5
|
+
*/
|
6
|
+
export interface CertificateConfig extends cdktf.TerraformMetaArguments {
|
7
|
+
/**
|
8
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#account_key_pem Certificate#account_key_pem}.
|
9
|
+
*
|
10
|
+
* @stability stable
|
11
|
+
*/
|
12
|
+
readonly accountKeyPem: string;
|
13
|
+
/**
|
14
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#certificate_p12_password Certificate#certificate_p12_password}.
|
15
|
+
*
|
16
|
+
* @stability stable
|
17
|
+
*/
|
18
|
+
readonly certificateP12Password?: string;
|
19
|
+
/**
|
20
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#certificate_request_pem Certificate#certificate_request_pem}.
|
21
|
+
*
|
22
|
+
* @stability stable
|
23
|
+
*/
|
24
|
+
readonly certificateRequestPem?: string;
|
25
|
+
/**
|
26
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#common_name Certificate#common_name}.
|
27
|
+
*
|
28
|
+
* @stability stable
|
29
|
+
*/
|
30
|
+
readonly commonName?: string;
|
31
|
+
/**
|
32
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#disable_complete_propagation Certificate#disable_complete_propagation}.
|
33
|
+
*
|
34
|
+
* @stability stable
|
35
|
+
*/
|
36
|
+
readonly disableCompletePropagation?: boolean | cdktf.IResolvable;
|
37
|
+
/**
|
38
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#key_type Certificate#key_type}.
|
39
|
+
*
|
40
|
+
* @stability stable
|
41
|
+
*/
|
42
|
+
readonly keyType?: string;
|
43
|
+
/**
|
44
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#min_days_remaining Certificate#min_days_remaining}.
|
45
|
+
*
|
46
|
+
* @stability stable
|
47
|
+
*/
|
48
|
+
readonly minDaysRemaining?: number;
|
49
|
+
/**
|
50
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#must_staple Certificate#must_staple}.
|
51
|
+
*
|
52
|
+
* @stability stable
|
53
|
+
*/
|
54
|
+
readonly mustStaple?: boolean | cdktf.IResolvable;
|
55
|
+
/**
|
56
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#pre_check_delay Certificate#pre_check_delay}.
|
57
|
+
*
|
58
|
+
* @stability stable
|
59
|
+
*/
|
60
|
+
readonly preCheckDelay?: number;
|
61
|
+
/**
|
62
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#preferred_chain Certificate#preferred_chain}.
|
63
|
+
*
|
64
|
+
* @stability stable
|
65
|
+
*/
|
66
|
+
readonly preferredChain?: string;
|
67
|
+
/**
|
68
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#recursive_nameservers Certificate#recursive_nameservers}.
|
69
|
+
*
|
70
|
+
* @stability stable
|
71
|
+
*/
|
72
|
+
readonly recursiveNameservers?: string[];
|
73
|
+
/**
|
74
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#revoke_certificate_on_destroy Certificate#revoke_certificate_on_destroy}.
|
75
|
+
*
|
76
|
+
* @stability stable
|
77
|
+
*/
|
78
|
+
readonly revokeCertificateOnDestroy?: boolean | cdktf.IResolvable;
|
79
|
+
/**
|
80
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#subject_alternative_names Certificate#subject_alternative_names}.
|
81
|
+
*
|
82
|
+
* @stability stable
|
83
|
+
*/
|
84
|
+
readonly subjectAlternativeNames?: string[];
|
85
|
+
/**
|
86
|
+
* dns_challenge block.
|
87
|
+
*
|
88
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#dns_challenge Certificate#dns_challenge}
|
89
|
+
*
|
90
|
+
* @stability stable
|
91
|
+
*/
|
92
|
+
readonly dnsChallenge?: CertificateDnsChallenge[];
|
93
|
+
/**
|
94
|
+
* http_challenge block.
|
95
|
+
*
|
96
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#http_challenge Certificate#http_challenge}
|
97
|
+
*
|
98
|
+
* @stability stable
|
99
|
+
*/
|
100
|
+
readonly httpChallenge?: CertificateHttpChallenge;
|
101
|
+
/**
|
102
|
+
* http_memcached_challenge block.
|
103
|
+
*
|
104
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#http_memcached_challenge Certificate#http_memcached_challenge}
|
105
|
+
*
|
106
|
+
* @stability stable
|
107
|
+
*/
|
108
|
+
readonly httpMemcachedChallenge?: CertificateHttpMemcachedChallenge;
|
109
|
+
/**
|
110
|
+
* http_webroot_challenge block.
|
111
|
+
*
|
112
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#http_webroot_challenge Certificate#http_webroot_challenge}
|
113
|
+
*
|
114
|
+
* @stability stable
|
115
|
+
*/
|
116
|
+
readonly httpWebrootChallenge?: CertificateHttpWebrootChallenge;
|
117
|
+
/**
|
118
|
+
* tls_challenge block.
|
119
|
+
*
|
120
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#tls_challenge Certificate#tls_challenge}
|
121
|
+
*
|
122
|
+
* @stability stable
|
123
|
+
*/
|
124
|
+
readonly tlsChallenge?: CertificateTlsChallenge;
|
125
|
+
}
|
126
|
+
/**
|
127
|
+
* @stability stable
|
128
|
+
*/
|
129
|
+
export interface CertificateDnsChallenge {
|
130
|
+
/**
|
131
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#config Certificate#config}.
|
132
|
+
*
|
133
|
+
* @stability stable
|
134
|
+
*/
|
135
|
+
readonly config?: {
|
136
|
+
[key: string]: string;
|
137
|
+
} | cdktf.IResolvable;
|
138
|
+
/**
|
139
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#provider Certificate#provider}.
|
140
|
+
*
|
141
|
+
* @stability stable
|
142
|
+
*/
|
143
|
+
readonly provider: string;
|
144
|
+
}
|
145
|
+
export declare function certificateDnsChallengeToTerraform(struct?: CertificateDnsChallenge): any;
|
146
|
+
/**
|
147
|
+
* @stability stable
|
148
|
+
*/
|
149
|
+
export interface CertificateHttpChallenge {
|
150
|
+
/**
|
151
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#port Certificate#port}.
|
152
|
+
*
|
153
|
+
* @stability stable
|
154
|
+
*/
|
155
|
+
readonly port?: number;
|
156
|
+
/**
|
157
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#proxy_header Certificate#proxy_header}.
|
158
|
+
*
|
159
|
+
* @stability stable
|
160
|
+
*/
|
161
|
+
readonly proxyHeader?: string;
|
162
|
+
}
|
163
|
+
export declare function certificateHttpChallengeToTerraform(struct?: CertificateHttpChallengeOutputReference | CertificateHttpChallenge): any;
|
164
|
+
/**
|
165
|
+
* @stability stable
|
166
|
+
*/
|
167
|
+
export declare class CertificateHttpChallengeOutputReference extends cdktf.ComplexObject {
|
168
|
+
private isEmptyObject;
|
169
|
+
/**
|
170
|
+
* @param terraformResource The parent resource.
|
171
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing.
|
172
|
+
* @param isSingleItem True if this is a block, false if it's a list.
|
173
|
+
* @stability stable
|
174
|
+
*/
|
175
|
+
constructor(terraformResource: cdktf.ITerraformResource, terraformAttribute: string, isSingleItem: boolean);
|
176
|
+
/**
|
177
|
+
* @stability stable
|
178
|
+
*/
|
179
|
+
get internalValue(): CertificateHttpChallenge | undefined;
|
180
|
+
/**
|
181
|
+
* @stability stable
|
182
|
+
*/
|
183
|
+
set internalValue(value: CertificateHttpChallenge | undefined);
|
184
|
+
private _port?;
|
185
|
+
/**
|
186
|
+
* @stability stable
|
187
|
+
*/
|
188
|
+
get port(): number;
|
189
|
+
/**
|
190
|
+
* @stability stable
|
191
|
+
*/
|
192
|
+
set port(value: number);
|
193
|
+
/**
|
194
|
+
* @stability stable
|
195
|
+
*/
|
196
|
+
resetPort(): void;
|
197
|
+
/**
|
198
|
+
* @stability stable
|
199
|
+
*/
|
200
|
+
get portInput(): number | undefined;
|
201
|
+
private _proxyHeader?;
|
202
|
+
/**
|
203
|
+
* @stability stable
|
204
|
+
*/
|
205
|
+
get proxyHeader(): string;
|
206
|
+
/**
|
207
|
+
* @stability stable
|
208
|
+
*/
|
209
|
+
set proxyHeader(value: string);
|
210
|
+
/**
|
211
|
+
* @stability stable
|
212
|
+
*/
|
213
|
+
resetProxyHeader(): void;
|
214
|
+
/**
|
215
|
+
* @stability stable
|
216
|
+
*/
|
217
|
+
get proxyHeaderInput(): string | undefined;
|
218
|
+
}
|
219
|
+
/**
|
220
|
+
* @stability stable
|
221
|
+
*/
|
222
|
+
export interface CertificateHttpMemcachedChallenge {
|
223
|
+
/**
|
224
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#hosts Certificate#hosts}.
|
225
|
+
*
|
226
|
+
* @stability stable
|
227
|
+
*/
|
228
|
+
readonly hosts: string[];
|
229
|
+
}
|
230
|
+
export declare function certificateHttpMemcachedChallengeToTerraform(struct?: CertificateHttpMemcachedChallengeOutputReference | CertificateHttpMemcachedChallenge): any;
|
231
|
+
/**
|
232
|
+
* @stability stable
|
233
|
+
*/
|
234
|
+
export declare class CertificateHttpMemcachedChallengeOutputReference extends cdktf.ComplexObject {
|
235
|
+
private isEmptyObject;
|
236
|
+
/**
|
237
|
+
* @param terraformResource The parent resource.
|
238
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing.
|
239
|
+
* @param isSingleItem True if this is a block, false if it's a list.
|
240
|
+
* @stability stable
|
241
|
+
*/
|
242
|
+
constructor(terraformResource: cdktf.ITerraformResource, terraformAttribute: string, isSingleItem: boolean);
|
243
|
+
/**
|
244
|
+
* @stability stable
|
245
|
+
*/
|
246
|
+
get internalValue(): CertificateHttpMemcachedChallenge | undefined;
|
247
|
+
/**
|
248
|
+
* @stability stable
|
249
|
+
*/
|
250
|
+
set internalValue(value: CertificateHttpMemcachedChallenge | undefined);
|
251
|
+
private _hosts?;
|
252
|
+
/**
|
253
|
+
* @stability stable
|
254
|
+
*/
|
255
|
+
get hosts(): string[];
|
256
|
+
/**
|
257
|
+
* @stability stable
|
258
|
+
*/
|
259
|
+
set hosts(value: string[]);
|
260
|
+
/**
|
261
|
+
* @stability stable
|
262
|
+
*/
|
263
|
+
get hostsInput(): string[] | undefined;
|
264
|
+
}
|
265
|
+
/**
|
266
|
+
* @stability stable
|
267
|
+
*/
|
268
|
+
export interface CertificateHttpWebrootChallenge {
|
269
|
+
/**
|
270
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#directory Certificate#directory}.
|
271
|
+
*
|
272
|
+
* @stability stable
|
273
|
+
*/
|
274
|
+
readonly directory: string;
|
275
|
+
}
|
276
|
+
export declare function certificateHttpWebrootChallengeToTerraform(struct?: CertificateHttpWebrootChallengeOutputReference | CertificateHttpWebrootChallenge): any;
|
277
|
+
/**
|
278
|
+
* @stability stable
|
279
|
+
*/
|
280
|
+
export declare class CertificateHttpWebrootChallengeOutputReference extends cdktf.ComplexObject {
|
281
|
+
private isEmptyObject;
|
282
|
+
/**
|
283
|
+
* @param terraformResource The parent resource.
|
284
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing.
|
285
|
+
* @param isSingleItem True if this is a block, false if it's a list.
|
286
|
+
* @stability stable
|
287
|
+
*/
|
288
|
+
constructor(terraformResource: cdktf.ITerraformResource, terraformAttribute: string, isSingleItem: boolean);
|
289
|
+
/**
|
290
|
+
* @stability stable
|
291
|
+
*/
|
292
|
+
get internalValue(): CertificateHttpWebrootChallenge | undefined;
|
293
|
+
/**
|
294
|
+
* @stability stable
|
295
|
+
*/
|
296
|
+
set internalValue(value: CertificateHttpWebrootChallenge | undefined);
|
297
|
+
private _directory?;
|
298
|
+
/**
|
299
|
+
* @stability stable
|
300
|
+
*/
|
301
|
+
get directory(): string;
|
302
|
+
/**
|
303
|
+
* @stability stable
|
304
|
+
*/
|
305
|
+
set directory(value: string);
|
306
|
+
/**
|
307
|
+
* @stability stable
|
308
|
+
*/
|
309
|
+
get directoryInput(): string | undefined;
|
310
|
+
}
|
311
|
+
/**
|
312
|
+
* @stability stable
|
313
|
+
*/
|
314
|
+
export interface CertificateTlsChallenge {
|
315
|
+
/**
|
316
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate.html#port Certificate#port}.
|
317
|
+
*
|
318
|
+
* @stability stable
|
319
|
+
*/
|
320
|
+
readonly port?: number;
|
321
|
+
}
|
322
|
+
export declare function certificateTlsChallengeToTerraform(struct?: CertificateTlsChallengeOutputReference | CertificateTlsChallenge): any;
|
323
|
+
/**
|
324
|
+
* @stability stable
|
325
|
+
*/
|
326
|
+
export declare class CertificateTlsChallengeOutputReference extends cdktf.ComplexObject {
|
327
|
+
private isEmptyObject;
|
328
|
+
/**
|
329
|
+
* @param terraformResource The parent resource.
|
330
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing.
|
331
|
+
* @param isSingleItem True if this is a block, false if it's a list.
|
332
|
+
* @stability stable
|
333
|
+
*/
|
334
|
+
constructor(terraformResource: cdktf.ITerraformResource, terraformAttribute: string, isSingleItem: boolean);
|
335
|
+
/**
|
336
|
+
* @stability stable
|
337
|
+
*/
|
338
|
+
get internalValue(): CertificateTlsChallenge | undefined;
|
339
|
+
/**
|
340
|
+
* @stability stable
|
341
|
+
*/
|
342
|
+
set internalValue(value: CertificateTlsChallenge | undefined);
|
343
|
+
private _port?;
|
344
|
+
/**
|
345
|
+
* @stability stable
|
346
|
+
*/
|
347
|
+
get port(): number;
|
348
|
+
/**
|
349
|
+
* @stability stable
|
350
|
+
*/
|
351
|
+
set port(value: number);
|
352
|
+
/**
|
353
|
+
* @stability stable
|
354
|
+
*/
|
355
|
+
resetPort(): void;
|
356
|
+
/**
|
357
|
+
* @stability stable
|
358
|
+
*/
|
359
|
+
get portInput(): number | undefined;
|
360
|
+
}
|
361
|
+
/**
|
362
|
+
* Represents a {@link https://www.terraform.io/docs/providers/acme/r/certificate.html acme_certificate}.
|
363
|
+
*
|
364
|
+
* @stability stable
|
365
|
+
*/
|
366
|
+
export declare class Certificate extends cdktf.TerraformResource {
|
367
|
+
/**
|
368
|
+
* @stability stable
|
369
|
+
*/
|
370
|
+
static readonly tfResourceType: string;
|
371
|
+
/**
|
372
|
+
* Create a new {@link https://www.terraform.io/docs/providers/acme/r/certificate.html acme_certificate} Resource.
|
373
|
+
*
|
374
|
+
* @param scope The scope in which to define this construct.
|
375
|
+
* @param id The scoped construct ID.
|
376
|
+
* @stability stable
|
377
|
+
*/
|
378
|
+
constructor(scope: Construct, id: string, config: CertificateConfig);
|
379
|
+
private _accountKeyPem?;
|
380
|
+
/**
|
381
|
+
* @stability stable
|
382
|
+
*/
|
383
|
+
get accountKeyPem(): string;
|
384
|
+
/**
|
385
|
+
* @stability stable
|
386
|
+
*/
|
387
|
+
set accountKeyPem(value: string);
|
388
|
+
/**
|
389
|
+
* @stability stable
|
390
|
+
*/
|
391
|
+
get accountKeyPemInput(): string | undefined;
|
392
|
+
/**
|
393
|
+
* @stability stable
|
394
|
+
*/
|
395
|
+
get certificateDomain(): string;
|
396
|
+
/**
|
397
|
+
* @stability stable
|
398
|
+
*/
|
399
|
+
get certificateP12(): string;
|
400
|
+
private _certificateP12Password?;
|
401
|
+
/**
|
402
|
+
* @stability stable
|
403
|
+
*/
|
404
|
+
get certificateP12Password(): string;
|
405
|
+
/**
|
406
|
+
* @stability stable
|
407
|
+
*/
|
408
|
+
set certificateP12Password(value: string);
|
409
|
+
/**
|
410
|
+
* @stability stable
|
411
|
+
*/
|
412
|
+
resetCertificateP12Password(): void;
|
413
|
+
/**
|
414
|
+
* @stability stable
|
415
|
+
*/
|
416
|
+
get certificateP12PasswordInput(): string | undefined;
|
417
|
+
/**
|
418
|
+
* @stability stable
|
419
|
+
*/
|
420
|
+
get certificatePem(): string;
|
421
|
+
private _certificateRequestPem?;
|
422
|
+
/**
|
423
|
+
* @stability stable
|
424
|
+
*/
|
425
|
+
get certificateRequestPem(): string;
|
426
|
+
/**
|
427
|
+
* @stability stable
|
428
|
+
*/
|
429
|
+
set certificateRequestPem(value: string);
|
430
|
+
/**
|
431
|
+
* @stability stable
|
432
|
+
*/
|
433
|
+
resetCertificateRequestPem(): void;
|
434
|
+
/**
|
435
|
+
* @stability stable
|
436
|
+
*/
|
437
|
+
get certificateRequestPemInput(): string | undefined;
|
438
|
+
/**
|
439
|
+
* @stability stable
|
440
|
+
*/
|
441
|
+
get certificateUrl(): string;
|
442
|
+
private _commonName?;
|
443
|
+
/**
|
444
|
+
* @stability stable
|
445
|
+
*/
|
446
|
+
get commonName(): string;
|
447
|
+
/**
|
448
|
+
* @stability stable
|
449
|
+
*/
|
450
|
+
set commonName(value: string);
|
451
|
+
/**
|
452
|
+
* @stability stable
|
453
|
+
*/
|
454
|
+
resetCommonName(): void;
|
455
|
+
/**
|
456
|
+
* @stability stable
|
457
|
+
*/
|
458
|
+
get commonNameInput(): string | undefined;
|
459
|
+
private _disableCompletePropagation?;
|
460
|
+
/**
|
461
|
+
* @stability stable
|
462
|
+
*/
|
463
|
+
get disableCompletePropagation(): boolean | cdktf.IResolvable;
|
464
|
+
/**
|
465
|
+
* @stability stable
|
466
|
+
*/
|
467
|
+
set disableCompletePropagation(value: boolean | cdktf.IResolvable);
|
468
|
+
/**
|
469
|
+
* @stability stable
|
470
|
+
*/
|
471
|
+
resetDisableCompletePropagation(): void;
|
472
|
+
/**
|
473
|
+
* @stability stable
|
474
|
+
*/
|
475
|
+
get disableCompletePropagationInput(): boolean | cdktf.IResolvable | undefined;
|
476
|
+
/**
|
477
|
+
* @stability stable
|
478
|
+
*/
|
479
|
+
get id(): string;
|
480
|
+
/**
|
481
|
+
* @stability stable
|
482
|
+
*/
|
483
|
+
get issuerPem(): string;
|
484
|
+
private _keyType?;
|
485
|
+
/**
|
486
|
+
* @stability stable
|
487
|
+
*/
|
488
|
+
get keyType(): string;
|
489
|
+
/**
|
490
|
+
* @stability stable
|
491
|
+
*/
|
492
|
+
set keyType(value: string);
|
493
|
+
/**
|
494
|
+
* @stability stable
|
495
|
+
*/
|
496
|
+
resetKeyType(): void;
|
497
|
+
/**
|
498
|
+
* @stability stable
|
499
|
+
*/
|
500
|
+
get keyTypeInput(): string | undefined;
|
501
|
+
private _minDaysRemaining?;
|
502
|
+
/**
|
503
|
+
* @stability stable
|
504
|
+
*/
|
505
|
+
get minDaysRemaining(): number;
|
506
|
+
/**
|
507
|
+
* @stability stable
|
508
|
+
*/
|
509
|
+
set minDaysRemaining(value: number);
|
510
|
+
/**
|
511
|
+
* @stability stable
|
512
|
+
*/
|
513
|
+
resetMinDaysRemaining(): void;
|
514
|
+
/**
|
515
|
+
* @stability stable
|
516
|
+
*/
|
517
|
+
get minDaysRemainingInput(): number | undefined;
|
518
|
+
private _mustStaple?;
|
519
|
+
/**
|
520
|
+
* @stability stable
|
521
|
+
*/
|
522
|
+
get mustStaple(): boolean | cdktf.IResolvable;
|
523
|
+
/**
|
524
|
+
* @stability stable
|
525
|
+
*/
|
526
|
+
set mustStaple(value: boolean | cdktf.IResolvable);
|
527
|
+
/**
|
528
|
+
* @stability stable
|
529
|
+
*/
|
530
|
+
resetMustStaple(): void;
|
531
|
+
/**
|
532
|
+
* @stability stable
|
533
|
+
*/
|
534
|
+
get mustStapleInput(): boolean | cdktf.IResolvable | undefined;
|
535
|
+
private _preCheckDelay?;
|
536
|
+
/**
|
537
|
+
* @stability stable
|
538
|
+
*/
|
539
|
+
get preCheckDelay(): number;
|
540
|
+
/**
|
541
|
+
* @stability stable
|
542
|
+
*/
|
543
|
+
set preCheckDelay(value: number);
|
544
|
+
/**
|
545
|
+
* @stability stable
|
546
|
+
*/
|
547
|
+
resetPreCheckDelay(): void;
|
548
|
+
/**
|
549
|
+
* @stability stable
|
550
|
+
*/
|
551
|
+
get preCheckDelayInput(): number | undefined;
|
552
|
+
private _preferredChain?;
|
553
|
+
/**
|
554
|
+
* @stability stable
|
555
|
+
*/
|
556
|
+
get preferredChain(): string;
|
557
|
+
/**
|
558
|
+
* @stability stable
|
559
|
+
*/
|
560
|
+
set preferredChain(value: string);
|
561
|
+
/**
|
562
|
+
* @stability stable
|
563
|
+
*/
|
564
|
+
resetPreferredChain(): void;
|
565
|
+
/**
|
566
|
+
* @stability stable
|
567
|
+
*/
|
568
|
+
get preferredChainInput(): string | undefined;
|
569
|
+
/**
|
570
|
+
* @stability stable
|
571
|
+
*/
|
572
|
+
get privateKeyPem(): string;
|
573
|
+
private _recursiveNameservers?;
|
574
|
+
/**
|
575
|
+
* @stability stable
|
576
|
+
*/
|
577
|
+
get recursiveNameservers(): string[];
|
578
|
+
/**
|
579
|
+
* @stability stable
|
580
|
+
*/
|
581
|
+
set recursiveNameservers(value: string[]);
|
582
|
+
/**
|
583
|
+
* @stability stable
|
584
|
+
*/
|
585
|
+
resetRecursiveNameservers(): void;
|
586
|
+
/**
|
587
|
+
* @stability stable
|
588
|
+
*/
|
589
|
+
get recursiveNameserversInput(): string[] | undefined;
|
590
|
+
private _revokeCertificateOnDestroy?;
|
591
|
+
/**
|
592
|
+
* @stability stable
|
593
|
+
*/
|
594
|
+
get revokeCertificateOnDestroy(): boolean | cdktf.IResolvable;
|
595
|
+
/**
|
596
|
+
* @stability stable
|
597
|
+
*/
|
598
|
+
set revokeCertificateOnDestroy(value: boolean | cdktf.IResolvable);
|
599
|
+
/**
|
600
|
+
* @stability stable
|
601
|
+
*/
|
602
|
+
resetRevokeCertificateOnDestroy(): void;
|
603
|
+
/**
|
604
|
+
* @stability stable
|
605
|
+
*/
|
606
|
+
get revokeCertificateOnDestroyInput(): boolean | cdktf.IResolvable | undefined;
|
607
|
+
private _subjectAlternativeNames?;
|
608
|
+
/**
|
609
|
+
* @stability stable
|
610
|
+
*/
|
611
|
+
get subjectAlternativeNames(): string[];
|
612
|
+
/**
|
613
|
+
* @stability stable
|
614
|
+
*/
|
615
|
+
set subjectAlternativeNames(value: string[]);
|
616
|
+
/**
|
617
|
+
* @stability stable
|
618
|
+
*/
|
619
|
+
resetSubjectAlternativeNames(): void;
|
620
|
+
/**
|
621
|
+
* @stability stable
|
622
|
+
*/
|
623
|
+
get subjectAlternativeNamesInput(): string[] | undefined;
|
624
|
+
private _dnsChallenge?;
|
625
|
+
/**
|
626
|
+
* @stability stable
|
627
|
+
*/
|
628
|
+
get dnsChallenge(): CertificateDnsChallenge[];
|
629
|
+
/**
|
630
|
+
* @stability stable
|
631
|
+
*/
|
632
|
+
set dnsChallenge(value: CertificateDnsChallenge[]);
|
633
|
+
/**
|
634
|
+
* @stability stable
|
635
|
+
*/
|
636
|
+
resetDnsChallenge(): void;
|
637
|
+
/**
|
638
|
+
* @stability stable
|
639
|
+
*/
|
640
|
+
get dnsChallengeInput(): CertificateDnsChallenge[] | undefined;
|
641
|
+
private _httpChallenge;
|
642
|
+
/**
|
643
|
+
* @stability stable
|
644
|
+
*/
|
645
|
+
get httpChallenge(): CertificateHttpChallengeOutputReference;
|
646
|
+
/**
|
647
|
+
* @stability stable
|
648
|
+
*/
|
649
|
+
putHttpChallenge(value: CertificateHttpChallenge): void;
|
650
|
+
/**
|
651
|
+
* @stability stable
|
652
|
+
*/
|
653
|
+
resetHttpChallenge(): void;
|
654
|
+
/**
|
655
|
+
* @stability stable
|
656
|
+
*/
|
657
|
+
get httpChallengeInput(): CertificateHttpChallenge | undefined;
|
658
|
+
private _httpMemcachedChallenge;
|
659
|
+
/**
|
660
|
+
* @stability stable
|
661
|
+
*/
|
662
|
+
get httpMemcachedChallenge(): CertificateHttpMemcachedChallengeOutputReference;
|
663
|
+
/**
|
664
|
+
* @stability stable
|
665
|
+
*/
|
666
|
+
putHttpMemcachedChallenge(value: CertificateHttpMemcachedChallenge): void;
|
667
|
+
/**
|
668
|
+
* @stability stable
|
669
|
+
*/
|
670
|
+
resetHttpMemcachedChallenge(): void;
|
671
|
+
/**
|
672
|
+
* @stability stable
|
673
|
+
*/
|
674
|
+
get httpMemcachedChallengeInput(): CertificateHttpMemcachedChallenge | undefined;
|
675
|
+
private _httpWebrootChallenge;
|
676
|
+
/**
|
677
|
+
* @stability stable
|
678
|
+
*/
|
679
|
+
get httpWebrootChallenge(): CertificateHttpWebrootChallengeOutputReference;
|
680
|
+
/**
|
681
|
+
* @stability stable
|
682
|
+
*/
|
683
|
+
putHttpWebrootChallenge(value: CertificateHttpWebrootChallenge): void;
|
684
|
+
/**
|
685
|
+
* @stability stable
|
686
|
+
*/
|
687
|
+
resetHttpWebrootChallenge(): void;
|
688
|
+
/**
|
689
|
+
* @stability stable
|
690
|
+
*/
|
691
|
+
get httpWebrootChallengeInput(): CertificateHttpWebrootChallenge | undefined;
|
692
|
+
private _tlsChallenge;
|
693
|
+
/**
|
694
|
+
* @stability stable
|
695
|
+
*/
|
696
|
+
get tlsChallenge(): CertificateTlsChallengeOutputReference;
|
697
|
+
/**
|
698
|
+
* @stability stable
|
699
|
+
*/
|
700
|
+
putTlsChallenge(value: CertificateTlsChallenge): void;
|
701
|
+
/**
|
702
|
+
* @stability stable
|
703
|
+
*/
|
704
|
+
resetTlsChallenge(): void;
|
705
|
+
/**
|
706
|
+
* @stability stable
|
707
|
+
*/
|
708
|
+
get tlsChallengeInput(): CertificateTlsChallenge | undefined;
|
709
|
+
/**
|
710
|
+
* @stability stable
|
711
|
+
*/
|
712
|
+
protected synthesizeAttributes(): {
|
713
|
+
[name: string]: any;
|
714
|
+
};
|
715
|
+
}
|