@cdktf/provider-acme 0.1.13 → 0.1.17
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/changelog.md +1 -1
- package/lib/acme-provider.d.ts +14 -50
- package/lib/acme-provider.js +10 -39
- package/lib/certificate.d.ts +84 -488
- package/lib/certificate.js +30 -366
- package/lib/registration.d.ts +24 -112
- package/lib/registration.js +15 -87
- package/package.json +4 -4
- package/releasetag.txt +1 -1
- package/version.txt +1 -1
package/lib/certificate.d.ts
CHANGED
@@ -1,714 +1,310 @@
|
|
1
1
|
import { Construct } from 'constructs';
|
2
2
|
import * as cdktf from 'cdktf';
|
3
|
-
/**
|
4
|
-
* @stability stable
|
5
|
-
*/
|
6
3
|
export interface CertificateConfig extends cdktf.TerraformMetaArguments {
|
7
4
|
/**
|
8
|
-
|
9
|
-
|
10
|
-
* @stability stable
|
11
|
-
*/
|
5
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#account_key_pem Certificate#account_key_pem}
|
6
|
+
*/
|
12
7
|
readonly accountKeyPem: string;
|
13
8
|
/**
|
14
|
-
|
15
|
-
|
16
|
-
* @stability stable
|
17
|
-
*/
|
9
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#certificate_p12_password Certificate#certificate_p12_password}
|
10
|
+
*/
|
18
11
|
readonly certificateP12Password?: string;
|
19
12
|
/**
|
20
|
-
|
21
|
-
|
22
|
-
* @stability stable
|
23
|
-
*/
|
13
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#certificate_request_pem Certificate#certificate_request_pem}
|
14
|
+
*/
|
24
15
|
readonly certificateRequestPem?: string;
|
25
16
|
/**
|
26
|
-
|
27
|
-
|
28
|
-
* @stability stable
|
29
|
-
*/
|
17
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#common_name Certificate#common_name}
|
18
|
+
*/
|
30
19
|
readonly commonName?: string;
|
31
20
|
/**
|
32
|
-
|
33
|
-
|
34
|
-
* @stability stable
|
35
|
-
*/
|
21
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#disable_complete_propagation Certificate#disable_complete_propagation}
|
22
|
+
*/
|
36
23
|
readonly disableCompletePropagation?: boolean | cdktf.IResolvable;
|
37
24
|
/**
|
38
|
-
|
39
|
-
|
40
|
-
* @stability stable
|
41
|
-
*/
|
25
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#key_type Certificate#key_type}
|
26
|
+
*/
|
42
27
|
readonly keyType?: string;
|
43
28
|
/**
|
44
|
-
|
45
|
-
|
46
|
-
* @stability stable
|
47
|
-
*/
|
29
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#min_days_remaining Certificate#min_days_remaining}
|
30
|
+
*/
|
48
31
|
readonly minDaysRemaining?: number;
|
49
32
|
/**
|
50
|
-
|
51
|
-
|
52
|
-
* @stability stable
|
53
|
-
*/
|
33
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#must_staple Certificate#must_staple}
|
34
|
+
*/
|
54
35
|
readonly mustStaple?: boolean | cdktf.IResolvable;
|
55
36
|
/**
|
56
|
-
|
57
|
-
|
58
|
-
* @stability stable
|
59
|
-
*/
|
37
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#pre_check_delay Certificate#pre_check_delay}
|
38
|
+
*/
|
60
39
|
readonly preCheckDelay?: number;
|
61
40
|
/**
|
62
|
-
|
63
|
-
|
64
|
-
* @stability stable
|
65
|
-
*/
|
41
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#preferred_chain Certificate#preferred_chain}
|
42
|
+
*/
|
66
43
|
readonly preferredChain?: string;
|
67
44
|
/**
|
68
|
-
|
69
|
-
|
70
|
-
* @stability stable
|
71
|
-
*/
|
45
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#recursive_nameservers Certificate#recursive_nameservers}
|
46
|
+
*/
|
72
47
|
readonly recursiveNameservers?: string[];
|
73
48
|
/**
|
74
|
-
|
75
|
-
|
76
|
-
* @stability stable
|
77
|
-
*/
|
49
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#revoke_certificate_on_destroy Certificate#revoke_certificate_on_destroy}
|
50
|
+
*/
|
78
51
|
readonly revokeCertificateOnDestroy?: boolean | cdktf.IResolvable;
|
79
52
|
/**
|
80
|
-
|
81
|
-
|
82
|
-
* @stability stable
|
83
|
-
*/
|
53
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#subject_alternative_names Certificate#subject_alternative_names}
|
54
|
+
*/
|
84
55
|
readonly subjectAlternativeNames?: string[];
|
85
56
|
/**
|
86
|
-
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
* @stability stable
|
91
|
-
*/
|
57
|
+
* dns_challenge block
|
58
|
+
*
|
59
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#dns_challenge Certificate#dns_challenge}
|
60
|
+
*/
|
92
61
|
readonly dnsChallenge?: CertificateDnsChallenge[] | cdktf.IResolvable;
|
93
62
|
/**
|
94
|
-
|
95
|
-
|
96
|
-
|
97
|
-
|
98
|
-
* @stability stable
|
99
|
-
*/
|
63
|
+
* http_challenge block
|
64
|
+
*
|
65
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#http_challenge Certificate#http_challenge}
|
66
|
+
*/
|
100
67
|
readonly httpChallenge?: CertificateHttpChallenge;
|
101
68
|
/**
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
* @stability stable
|
107
|
-
*/
|
69
|
+
* http_memcached_challenge block
|
70
|
+
*
|
71
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#http_memcached_challenge Certificate#http_memcached_challenge}
|
72
|
+
*/
|
108
73
|
readonly httpMemcachedChallenge?: CertificateHttpMemcachedChallenge;
|
109
74
|
/**
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
* @stability stable
|
115
|
-
*/
|
75
|
+
* http_webroot_challenge block
|
76
|
+
*
|
77
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#http_webroot_challenge Certificate#http_webroot_challenge}
|
78
|
+
*/
|
116
79
|
readonly httpWebrootChallenge?: CertificateHttpWebrootChallenge;
|
117
80
|
/**
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
* @stability stable
|
123
|
-
*/
|
81
|
+
* tls_challenge block
|
82
|
+
*
|
83
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#tls_challenge Certificate#tls_challenge}
|
84
|
+
*/
|
124
85
|
readonly tlsChallenge?: CertificateTlsChallenge;
|
125
86
|
}
|
126
|
-
/**
|
127
|
-
* @stability stable
|
128
|
-
*/
|
129
87
|
export interface CertificateDnsChallenge {
|
130
88
|
/**
|
131
|
-
|
132
|
-
|
133
|
-
* @stability stable
|
134
|
-
*/
|
89
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#config Certificate#config}
|
90
|
+
*/
|
135
91
|
readonly config?: {
|
136
92
|
[key: string]: string;
|
137
93
|
};
|
138
94
|
/**
|
139
|
-
|
140
|
-
|
141
|
-
* @stability stable
|
142
|
-
*/
|
95
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#provider Certificate#provider}
|
96
|
+
*/
|
143
97
|
readonly provider: string;
|
144
98
|
}
|
145
99
|
export declare function certificateDnsChallengeToTerraform(struct?: CertificateDnsChallenge | cdktf.IResolvable): any;
|
146
|
-
/**
|
147
|
-
* @stability stable
|
148
|
-
*/
|
149
100
|
export interface CertificateHttpChallenge {
|
150
101
|
/**
|
151
|
-
|
152
|
-
|
153
|
-
* @stability stable
|
154
|
-
*/
|
102
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#port Certificate#port}
|
103
|
+
*/
|
155
104
|
readonly port?: number;
|
156
105
|
/**
|
157
|
-
|
158
|
-
|
159
|
-
* @stability stable
|
160
|
-
*/
|
106
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#proxy_header Certificate#proxy_header}
|
107
|
+
*/
|
161
108
|
readonly proxyHeader?: string;
|
162
109
|
}
|
163
110
|
export declare function certificateHttpChallengeToTerraform(struct?: CertificateHttpChallengeOutputReference | CertificateHttpChallenge): any;
|
164
|
-
/**
|
165
|
-
* @stability stable
|
166
|
-
*/
|
167
111
|
export declare class CertificateHttpChallengeOutputReference extends cdktf.ComplexObject {
|
168
112
|
private isEmptyObject;
|
169
113
|
/**
|
170
|
-
|
171
|
-
|
172
|
-
|
173
|
-
|
174
|
-
*/
|
114
|
+
* @param terraformResource The parent resource
|
115
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing
|
116
|
+
* @param isSingleItem True if this is a block, false if it's a list
|
117
|
+
*/
|
175
118
|
constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string, isSingleItem: boolean);
|
176
|
-
/**
|
177
|
-
* @stability stable
|
178
|
-
*/
|
179
119
|
get internalValue(): CertificateHttpChallenge | undefined;
|
180
|
-
/**
|
181
|
-
* @stability stable
|
182
|
-
*/
|
183
120
|
set internalValue(value: CertificateHttpChallenge | undefined);
|
184
121
|
private _port?;
|
185
|
-
/**
|
186
|
-
* @stability stable
|
187
|
-
*/
|
188
122
|
get port(): number;
|
189
|
-
/**
|
190
|
-
* @stability stable
|
191
|
-
*/
|
192
123
|
set port(value: number);
|
193
|
-
/**
|
194
|
-
* @stability stable
|
195
|
-
*/
|
196
124
|
resetPort(): void;
|
197
|
-
/**
|
198
|
-
* @stability stable
|
199
|
-
*/
|
200
125
|
get portInput(): number | undefined;
|
201
126
|
private _proxyHeader?;
|
202
|
-
/**
|
203
|
-
* @stability stable
|
204
|
-
*/
|
205
127
|
get proxyHeader(): string;
|
206
|
-
/**
|
207
|
-
* @stability stable
|
208
|
-
*/
|
209
128
|
set proxyHeader(value: string);
|
210
|
-
/**
|
211
|
-
* @stability stable
|
212
|
-
*/
|
213
129
|
resetProxyHeader(): void;
|
214
|
-
/**
|
215
|
-
* @stability stable
|
216
|
-
*/
|
217
130
|
get proxyHeaderInput(): string | undefined;
|
218
131
|
}
|
219
|
-
/**
|
220
|
-
* @stability stable
|
221
|
-
*/
|
222
132
|
export interface CertificateHttpMemcachedChallenge {
|
223
133
|
/**
|
224
|
-
|
225
|
-
|
226
|
-
* @stability stable
|
227
|
-
*/
|
134
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#hosts Certificate#hosts}
|
135
|
+
*/
|
228
136
|
readonly hosts: string[];
|
229
137
|
}
|
230
138
|
export declare function certificateHttpMemcachedChallengeToTerraform(struct?: CertificateHttpMemcachedChallengeOutputReference | CertificateHttpMemcachedChallenge): any;
|
231
|
-
/**
|
232
|
-
* @stability stable
|
233
|
-
*/
|
234
139
|
export declare class CertificateHttpMemcachedChallengeOutputReference extends cdktf.ComplexObject {
|
235
140
|
private isEmptyObject;
|
236
141
|
/**
|
237
|
-
|
238
|
-
|
239
|
-
|
240
|
-
|
241
|
-
*/
|
142
|
+
* @param terraformResource The parent resource
|
143
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing
|
144
|
+
* @param isSingleItem True if this is a block, false if it's a list
|
145
|
+
*/
|
242
146
|
constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string, isSingleItem: boolean);
|
243
|
-
/**
|
244
|
-
* @stability stable
|
245
|
-
*/
|
246
147
|
get internalValue(): CertificateHttpMemcachedChallenge | undefined;
|
247
|
-
/**
|
248
|
-
* @stability stable
|
249
|
-
*/
|
250
148
|
set internalValue(value: CertificateHttpMemcachedChallenge | undefined);
|
251
149
|
private _hosts?;
|
252
|
-
/**
|
253
|
-
* @stability stable
|
254
|
-
*/
|
255
150
|
get hosts(): string[];
|
256
|
-
/**
|
257
|
-
* @stability stable
|
258
|
-
*/
|
259
151
|
set hosts(value: string[]);
|
260
|
-
/**
|
261
|
-
* @stability stable
|
262
|
-
*/
|
263
152
|
get hostsInput(): string[] | undefined;
|
264
153
|
}
|
265
|
-
/**
|
266
|
-
* @stability stable
|
267
|
-
*/
|
268
154
|
export interface CertificateHttpWebrootChallenge {
|
269
155
|
/**
|
270
|
-
|
271
|
-
|
272
|
-
* @stability stable
|
273
|
-
*/
|
156
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#directory Certificate#directory}
|
157
|
+
*/
|
274
158
|
readonly directory: string;
|
275
159
|
}
|
276
160
|
export declare function certificateHttpWebrootChallengeToTerraform(struct?: CertificateHttpWebrootChallengeOutputReference | CertificateHttpWebrootChallenge): any;
|
277
|
-
/**
|
278
|
-
* @stability stable
|
279
|
-
*/
|
280
161
|
export declare class CertificateHttpWebrootChallengeOutputReference extends cdktf.ComplexObject {
|
281
162
|
private isEmptyObject;
|
282
163
|
/**
|
283
|
-
|
284
|
-
|
285
|
-
|
286
|
-
|
287
|
-
*/
|
164
|
+
* @param terraformResource The parent resource
|
165
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing
|
166
|
+
* @param isSingleItem True if this is a block, false if it's a list
|
167
|
+
*/
|
288
168
|
constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string, isSingleItem: boolean);
|
289
|
-
/**
|
290
|
-
* @stability stable
|
291
|
-
*/
|
292
169
|
get internalValue(): CertificateHttpWebrootChallenge | undefined;
|
293
|
-
/**
|
294
|
-
* @stability stable
|
295
|
-
*/
|
296
170
|
set internalValue(value: CertificateHttpWebrootChallenge | undefined);
|
297
171
|
private _directory?;
|
298
|
-
/**
|
299
|
-
* @stability stable
|
300
|
-
*/
|
301
172
|
get directory(): string;
|
302
|
-
/**
|
303
|
-
* @stability stable
|
304
|
-
*/
|
305
173
|
set directory(value: string);
|
306
|
-
/**
|
307
|
-
* @stability stable
|
308
|
-
*/
|
309
174
|
get directoryInput(): string | undefined;
|
310
175
|
}
|
311
|
-
/**
|
312
|
-
* @stability stable
|
313
|
-
*/
|
314
176
|
export interface CertificateTlsChallenge {
|
315
177
|
/**
|
316
|
-
|
317
|
-
|
318
|
-
* @stability stable
|
319
|
-
*/
|
178
|
+
* Docs at Terraform Registry: {@link https://www.terraform.io/docs/providers/acme/r/certificate#port Certificate#port}
|
179
|
+
*/
|
320
180
|
readonly port?: number;
|
321
181
|
}
|
322
182
|
export declare function certificateTlsChallengeToTerraform(struct?: CertificateTlsChallengeOutputReference | CertificateTlsChallenge): any;
|
323
|
-
/**
|
324
|
-
* @stability stable
|
325
|
-
*/
|
326
183
|
export declare class CertificateTlsChallengeOutputReference extends cdktf.ComplexObject {
|
327
184
|
private isEmptyObject;
|
328
185
|
/**
|
329
|
-
|
330
|
-
|
331
|
-
|
332
|
-
|
333
|
-
*/
|
186
|
+
* @param terraformResource The parent resource
|
187
|
+
* @param terraformAttribute The attribute on the parent resource this class is referencing
|
188
|
+
* @param isSingleItem True if this is a block, false if it's a list
|
189
|
+
*/
|
334
190
|
constructor(terraformResource: cdktf.IInterpolatingParent, terraformAttribute: string, isSingleItem: boolean);
|
335
|
-
/**
|
336
|
-
* @stability stable
|
337
|
-
*/
|
338
191
|
get internalValue(): CertificateTlsChallenge | undefined;
|
339
|
-
/**
|
340
|
-
* @stability stable
|
341
|
-
*/
|
342
192
|
set internalValue(value: CertificateTlsChallenge | undefined);
|
343
193
|
private _port?;
|
344
|
-
/**
|
345
|
-
* @stability stable
|
346
|
-
*/
|
347
194
|
get port(): number;
|
348
|
-
/**
|
349
|
-
* @stability stable
|
350
|
-
*/
|
351
195
|
set port(value: number);
|
352
|
-
/**
|
353
|
-
* @stability stable
|
354
|
-
*/
|
355
196
|
resetPort(): void;
|
356
|
-
/**
|
357
|
-
* @stability stable
|
358
|
-
*/
|
359
197
|
get portInput(): number | undefined;
|
360
198
|
}
|
361
199
|
/**
|
362
|
-
|
363
|
-
|
364
|
-
* @stability stable
|
365
|
-
*/
|
200
|
+
* Represents a {@link https://www.terraform.io/docs/providers/acme/r/certificate acme_certificate}
|
201
|
+
*/
|
366
202
|
export declare class Certificate extends cdktf.TerraformResource {
|
367
|
-
/**
|
368
|
-
* @stability stable
|
369
|
-
*/
|
370
203
|
static readonly tfResourceType: string;
|
371
204
|
/**
|
372
|
-
|
373
|
-
|
374
|
-
|
375
|
-
|
376
|
-
|
377
|
-
|
205
|
+
* Create a new {@link https://www.terraform.io/docs/providers/acme/r/certificate acme_certificate} Resource
|
206
|
+
*
|
207
|
+
* @param scope The scope in which to define this construct
|
208
|
+
* @param id The scoped construct ID. Must be unique amongst siblings in the same scope
|
209
|
+
* @param options CertificateConfig
|
210
|
+
*/
|
378
211
|
constructor(scope: Construct, id: string, config: CertificateConfig);
|
379
212
|
private _accountKeyPem?;
|
380
|
-
/**
|
381
|
-
* @stability stable
|
382
|
-
*/
|
383
213
|
get accountKeyPem(): string;
|
384
|
-
/**
|
385
|
-
* @stability stable
|
386
|
-
*/
|
387
214
|
set accountKeyPem(value: string);
|
388
|
-
/**
|
389
|
-
* @stability stable
|
390
|
-
*/
|
391
215
|
get accountKeyPemInput(): string | undefined;
|
392
|
-
/**
|
393
|
-
* @stability stable
|
394
|
-
*/
|
395
216
|
get certificateDomain(): string;
|
396
|
-
/**
|
397
|
-
* @stability stable
|
398
|
-
*/
|
399
217
|
get certificateP12(): string;
|
400
218
|
private _certificateP12Password?;
|
401
|
-
/**
|
402
|
-
* @stability stable
|
403
|
-
*/
|
404
219
|
get certificateP12Password(): string;
|
405
|
-
/**
|
406
|
-
* @stability stable
|
407
|
-
*/
|
408
220
|
set certificateP12Password(value: string);
|
409
|
-
/**
|
410
|
-
* @stability stable
|
411
|
-
*/
|
412
221
|
resetCertificateP12Password(): void;
|
413
|
-
/**
|
414
|
-
* @stability stable
|
415
|
-
*/
|
416
222
|
get certificateP12PasswordInput(): string | undefined;
|
417
|
-
/**
|
418
|
-
* @stability stable
|
419
|
-
*/
|
420
223
|
get certificatePem(): string;
|
421
224
|
private _certificateRequestPem?;
|
422
|
-
/**
|
423
|
-
* @stability stable
|
424
|
-
*/
|
425
225
|
get certificateRequestPem(): string;
|
426
|
-
/**
|
427
|
-
* @stability stable
|
428
|
-
*/
|
429
226
|
set certificateRequestPem(value: string);
|
430
|
-
/**
|
431
|
-
* @stability stable
|
432
|
-
*/
|
433
227
|
resetCertificateRequestPem(): void;
|
434
|
-
/**
|
435
|
-
* @stability stable
|
436
|
-
*/
|
437
228
|
get certificateRequestPemInput(): string | undefined;
|
438
|
-
/**
|
439
|
-
* @stability stable
|
440
|
-
*/
|
441
229
|
get certificateUrl(): string;
|
442
230
|
private _commonName?;
|
443
|
-
/**
|
444
|
-
* @stability stable
|
445
|
-
*/
|
446
231
|
get commonName(): string;
|
447
|
-
/**
|
448
|
-
* @stability stable
|
449
|
-
*/
|
450
232
|
set commonName(value: string);
|
451
|
-
/**
|
452
|
-
* @stability stable
|
453
|
-
*/
|
454
233
|
resetCommonName(): void;
|
455
|
-
/**
|
456
|
-
* @stability stable
|
457
|
-
*/
|
458
234
|
get commonNameInput(): string | undefined;
|
459
235
|
private _disableCompletePropagation?;
|
460
|
-
/**
|
461
|
-
* @stability stable
|
462
|
-
*/
|
463
236
|
get disableCompletePropagation(): boolean | cdktf.IResolvable;
|
464
|
-
/**
|
465
|
-
* @stability stable
|
466
|
-
*/
|
467
237
|
set disableCompletePropagation(value: boolean | cdktf.IResolvable);
|
468
|
-
/**
|
469
|
-
* @stability stable
|
470
|
-
*/
|
471
238
|
resetDisableCompletePropagation(): void;
|
472
|
-
/**
|
473
|
-
* @stability stable
|
474
|
-
*/
|
475
239
|
get disableCompletePropagationInput(): boolean | cdktf.IResolvable | undefined;
|
476
|
-
/**
|
477
|
-
* @stability stable
|
478
|
-
*/
|
479
240
|
get id(): string;
|
480
|
-
/**
|
481
|
-
* @stability stable
|
482
|
-
*/
|
483
241
|
get issuerPem(): string;
|
484
242
|
private _keyType?;
|
485
|
-
/**
|
486
|
-
* @stability stable
|
487
|
-
*/
|
488
243
|
get keyType(): string;
|
489
|
-
/**
|
490
|
-
* @stability stable
|
491
|
-
*/
|
492
244
|
set keyType(value: string);
|
493
|
-
/**
|
494
|
-
* @stability stable
|
495
|
-
*/
|
496
245
|
resetKeyType(): void;
|
497
|
-
/**
|
498
|
-
* @stability stable
|
499
|
-
*/
|
500
246
|
get keyTypeInput(): string | undefined;
|
501
247
|
private _minDaysRemaining?;
|
502
|
-
/**
|
503
|
-
* @stability stable
|
504
|
-
*/
|
505
248
|
get minDaysRemaining(): number;
|
506
|
-
/**
|
507
|
-
* @stability stable
|
508
|
-
*/
|
509
249
|
set minDaysRemaining(value: number);
|
510
|
-
/**
|
511
|
-
* @stability stable
|
512
|
-
*/
|
513
250
|
resetMinDaysRemaining(): void;
|
514
|
-
/**
|
515
|
-
* @stability stable
|
516
|
-
*/
|
517
251
|
get minDaysRemainingInput(): number | undefined;
|
518
252
|
private _mustStaple?;
|
519
|
-
/**
|
520
|
-
* @stability stable
|
521
|
-
*/
|
522
253
|
get mustStaple(): boolean | cdktf.IResolvable;
|
523
|
-
/**
|
524
|
-
* @stability stable
|
525
|
-
*/
|
526
254
|
set mustStaple(value: boolean | cdktf.IResolvable);
|
527
|
-
/**
|
528
|
-
* @stability stable
|
529
|
-
*/
|
530
255
|
resetMustStaple(): void;
|
531
|
-
/**
|
532
|
-
* @stability stable
|
533
|
-
*/
|
534
256
|
get mustStapleInput(): boolean | cdktf.IResolvable | undefined;
|
535
257
|
private _preCheckDelay?;
|
536
|
-
/**
|
537
|
-
* @stability stable
|
538
|
-
*/
|
539
258
|
get preCheckDelay(): number;
|
540
|
-
/**
|
541
|
-
* @stability stable
|
542
|
-
*/
|
543
259
|
set preCheckDelay(value: number);
|
544
|
-
/**
|
545
|
-
* @stability stable
|
546
|
-
*/
|
547
260
|
resetPreCheckDelay(): void;
|
548
|
-
/**
|
549
|
-
* @stability stable
|
550
|
-
*/
|
551
261
|
get preCheckDelayInput(): number | undefined;
|
552
262
|
private _preferredChain?;
|
553
|
-
/**
|
554
|
-
* @stability stable
|
555
|
-
*/
|
556
263
|
get preferredChain(): string;
|
557
|
-
/**
|
558
|
-
* @stability stable
|
559
|
-
*/
|
560
264
|
set preferredChain(value: string);
|
561
|
-
/**
|
562
|
-
* @stability stable
|
563
|
-
*/
|
564
265
|
resetPreferredChain(): void;
|
565
|
-
/**
|
566
|
-
* @stability stable
|
567
|
-
*/
|
568
266
|
get preferredChainInput(): string | undefined;
|
569
|
-
/**
|
570
|
-
* @stability stable
|
571
|
-
*/
|
572
267
|
get privateKeyPem(): string;
|
573
268
|
private _recursiveNameservers?;
|
574
|
-
/**
|
575
|
-
* @stability stable
|
576
|
-
*/
|
577
269
|
get recursiveNameservers(): string[];
|
578
|
-
/**
|
579
|
-
* @stability stable
|
580
|
-
*/
|
581
270
|
set recursiveNameservers(value: string[]);
|
582
|
-
/**
|
583
|
-
* @stability stable
|
584
|
-
*/
|
585
271
|
resetRecursiveNameservers(): void;
|
586
|
-
/**
|
587
|
-
* @stability stable
|
588
|
-
*/
|
589
272
|
get recursiveNameserversInput(): string[] | undefined;
|
590
273
|
private _revokeCertificateOnDestroy?;
|
591
|
-
/**
|
592
|
-
* @stability stable
|
593
|
-
*/
|
594
274
|
get revokeCertificateOnDestroy(): boolean | cdktf.IResolvable;
|
595
|
-
/**
|
596
|
-
* @stability stable
|
597
|
-
*/
|
598
275
|
set revokeCertificateOnDestroy(value: boolean | cdktf.IResolvable);
|
599
|
-
/**
|
600
|
-
* @stability stable
|
601
|
-
*/
|
602
276
|
resetRevokeCertificateOnDestroy(): void;
|
603
|
-
/**
|
604
|
-
* @stability stable
|
605
|
-
*/
|
606
277
|
get revokeCertificateOnDestroyInput(): boolean | cdktf.IResolvable | undefined;
|
607
278
|
private _subjectAlternativeNames?;
|
608
|
-
/**
|
609
|
-
* @stability stable
|
610
|
-
*/
|
611
279
|
get subjectAlternativeNames(): string[];
|
612
|
-
/**
|
613
|
-
* @stability stable
|
614
|
-
*/
|
615
280
|
set subjectAlternativeNames(value: string[]);
|
616
|
-
/**
|
617
|
-
* @stability stable
|
618
|
-
*/
|
619
281
|
resetSubjectAlternativeNames(): void;
|
620
|
-
/**
|
621
|
-
* @stability stable
|
622
|
-
*/
|
623
282
|
get subjectAlternativeNamesInput(): string[] | undefined;
|
624
283
|
private _dnsChallenge?;
|
625
|
-
/**
|
626
|
-
* @stability stable
|
627
|
-
*/
|
628
284
|
get dnsChallenge(): CertificateDnsChallenge[] | cdktf.IResolvable;
|
629
|
-
/**
|
630
|
-
* @stability stable
|
631
|
-
*/
|
632
285
|
set dnsChallenge(value: CertificateDnsChallenge[] | cdktf.IResolvable);
|
633
|
-
/**
|
634
|
-
* @stability stable
|
635
|
-
*/
|
636
286
|
resetDnsChallenge(): void;
|
637
|
-
/**
|
638
|
-
* @stability stable
|
639
|
-
*/
|
640
287
|
get dnsChallengeInput(): cdktf.IResolvable | CertificateDnsChallenge[] | undefined;
|
641
288
|
private _httpChallenge;
|
642
|
-
/**
|
643
|
-
* @stability stable
|
644
|
-
*/
|
645
289
|
get httpChallenge(): CertificateHttpChallengeOutputReference;
|
646
|
-
/**
|
647
|
-
* @stability stable
|
648
|
-
*/
|
649
290
|
putHttpChallenge(value: CertificateHttpChallenge): void;
|
650
|
-
/**
|
651
|
-
* @stability stable
|
652
|
-
*/
|
653
291
|
resetHttpChallenge(): void;
|
654
|
-
/**
|
655
|
-
* @stability stable
|
656
|
-
*/
|
657
292
|
get httpChallengeInput(): CertificateHttpChallenge | undefined;
|
658
293
|
private _httpMemcachedChallenge;
|
659
|
-
/**
|
660
|
-
* @stability stable
|
661
|
-
*/
|
662
294
|
get httpMemcachedChallenge(): CertificateHttpMemcachedChallengeOutputReference;
|
663
|
-
/**
|
664
|
-
* @stability stable
|
665
|
-
*/
|
666
295
|
putHttpMemcachedChallenge(value: CertificateHttpMemcachedChallenge): void;
|
667
|
-
/**
|
668
|
-
* @stability stable
|
669
|
-
*/
|
670
296
|
resetHttpMemcachedChallenge(): void;
|
671
|
-
/**
|
672
|
-
* @stability stable
|
673
|
-
*/
|
674
297
|
get httpMemcachedChallengeInput(): CertificateHttpMemcachedChallenge | undefined;
|
675
298
|
private _httpWebrootChallenge;
|
676
|
-
/**
|
677
|
-
* @stability stable
|
678
|
-
*/
|
679
299
|
get httpWebrootChallenge(): CertificateHttpWebrootChallengeOutputReference;
|
680
|
-
/**
|
681
|
-
* @stability stable
|
682
|
-
*/
|
683
300
|
putHttpWebrootChallenge(value: CertificateHttpWebrootChallenge): void;
|
684
|
-
/**
|
685
|
-
* @stability stable
|
686
|
-
*/
|
687
301
|
resetHttpWebrootChallenge(): void;
|
688
|
-
/**
|
689
|
-
* @stability stable
|
690
|
-
*/
|
691
302
|
get httpWebrootChallengeInput(): CertificateHttpWebrootChallenge | undefined;
|
692
303
|
private _tlsChallenge;
|
693
|
-
/**
|
694
|
-
* @stability stable
|
695
|
-
*/
|
696
304
|
get tlsChallenge(): CertificateTlsChallengeOutputReference;
|
697
|
-
/**
|
698
|
-
* @stability stable
|
699
|
-
*/
|
700
305
|
putTlsChallenge(value: CertificateTlsChallenge): void;
|
701
|
-
/**
|
702
|
-
* @stability stable
|
703
|
-
*/
|
704
306
|
resetTlsChallenge(): void;
|
705
|
-
/**
|
706
|
-
* @stability stable
|
707
|
-
*/
|
708
307
|
get tlsChallengeInput(): CertificateTlsChallenge | undefined;
|
709
|
-
/**
|
710
|
-
* @stability stable
|
711
|
-
*/
|
712
308
|
protected synthesizeAttributes(): {
|
713
309
|
[name: string]: any;
|
714
310
|
};
|