@highstate/cert-manager 0.6.2 → 0.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,9 +1,8 @@
1
- # v0.4.5 (Wed Mar 12 2025)
1
+ # v0.7.0 (Sat Mar 15 2025)
2
2
 
3
- #### ⚠️ Pushed to `main`
3
+ #### 🚀 Enhancement
4
4
 
5
- - fix crd build ([@Exeteres](https://github.com/Exeteres))
6
- - fix ([@Exeteres](https://github.com/Exeteres))
5
+ - feat: update app distribution mechanism ([@Exeteres](https://github.com/Exeteres))
7
6
 
8
7
  #### Authors: 1
9
8
 
package/bin/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@highstate/cert-manager",
3
- "version": "0.6.1",
3
+ "version": "0.7.0",
4
4
  "keywords": [
5
5
  "pulumi",
6
6
  "kubernetes",
@@ -37,6 +37,6 @@
37
37
  "pulumi": {
38
38
  "resource": true,
39
39
  "name": "@highstate/cert-manager",
40
- "version": "0.4.4"
40
+ "version": "0.6.1"
41
41
  }
42
42
  }
@@ -439,6 +439,10 @@ export declare namespace acme {
439
439
  * Cannot be used for Azure Managed Service Identity
440
440
  */
441
441
  resourceID?: pulumi.Input<string>;
442
+ /**
443
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
444
+ */
445
+ tenantID?: pulumi.Input<string>;
442
446
  }
443
447
  /**
444
448
  * Auth: Azure Workload Identity or Azure Managed Service Identity:
@@ -455,6 +459,10 @@ export declare namespace acme {
455
459
  * Cannot be used for Azure Managed Service Identity
456
460
  */
457
461
  resourceID?: pulumi.Input<string>;
462
+ /**
463
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
464
+ */
465
+ tenantID?: pulumi.Input<string>;
458
466
  }
459
467
  /**
460
468
  * Use the Microsoft Azure DNS API to manage DNS01 challenge records.
@@ -6513,7 +6521,7 @@ export declare namespace cert_manager {
6513
6521
  * Create enables JKS keystore creation for the Certificate.
6514
6522
  * If true, a file named `keystore.jks` will be created in the target
6515
6523
  * Secret resource, encrypted using the password stored in
6516
- * `passwordSecretRef`.
6524
+ * `passwordSecretRef` or `password`.
6517
6525
  * The keystore file will be updated immediately.
6518
6526
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6519
6527
  * will also be created in the target Secret resource, encrypted using the
@@ -6521,11 +6529,19 @@ export declare namespace cert_manager {
6521
6529
  * containing the issuing Certificate Authority
6522
6530
  */
6523
6531
  create?: pulumi.Input<boolean>;
6532
+ /**
6533
+ * Password provides a literal password used to encrypt the JKS keystore.
6534
+ * Mutually exclusive with passwordSecretRef.
6535
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6536
+ */
6537
+ password?: pulumi.Input<string>;
6524
6538
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRef>;
6525
6539
  }
6526
6540
  /**
6527
- * PasswordSecretRef is a reference to a key in a Secret resource
6541
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6528
6542
  * containing the password used to encrypt the JKS keystore.
6543
+ * Mutually exclusive with password.
6544
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6529
6545
  */
6530
6546
  interface CertificateSpecKeystoresJksPasswordSecretRef {
6531
6547
  /**
@@ -6541,8 +6557,10 @@ export declare namespace cert_manager {
6541
6557
  name?: pulumi.Input<string>;
6542
6558
  }
6543
6559
  /**
6544
- * PasswordSecretRef is a reference to a key in a Secret resource
6560
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6545
6561
  * containing the password used to encrypt the JKS keystore.
6562
+ * Mutually exclusive with password.
6563
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6546
6564
  */
6547
6565
  interface CertificateSpecKeystoresJksPasswordSecretRefPatch {
6548
6566
  /**
@@ -6571,7 +6589,7 @@ export declare namespace cert_manager {
6571
6589
  * Create enables JKS keystore creation for the Certificate.
6572
6590
  * If true, a file named `keystore.jks` will be created in the target
6573
6591
  * Secret resource, encrypted using the password stored in
6574
- * `passwordSecretRef`.
6592
+ * `passwordSecretRef` or `password`.
6575
6593
  * The keystore file will be updated immediately.
6576
6594
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6577
6595
  * will also be created in the target Secret resource, encrypted using the
@@ -6579,6 +6597,12 @@ export declare namespace cert_manager {
6579
6597
  * containing the issuing Certificate Authority
6580
6598
  */
6581
6599
  create?: pulumi.Input<boolean>;
6600
+ /**
6601
+ * Password provides a literal password used to encrypt the JKS keystore.
6602
+ * Mutually exclusive with passwordSecretRef.
6603
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6604
+ */
6605
+ password?: pulumi.Input<string>;
6582
6606
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRefPatch>;
6583
6607
  }
6584
6608
  /**
@@ -6597,7 +6621,7 @@ export declare namespace cert_manager {
6597
6621
  * Create enables PKCS12 keystore creation for the Certificate.
6598
6622
  * If true, a file named `keystore.p12` will be created in the target
6599
6623
  * Secret resource, encrypted using the password stored in
6600
- * `passwordSecretRef`.
6624
+ * `passwordSecretRef` or in `password`.
6601
6625
  * The keystore file will be updated immediately.
6602
6626
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
6603
6627
  * also be created in the target Secret resource, encrypted using the
@@ -6605,6 +6629,12 @@ export declare namespace cert_manager {
6605
6629
  * Authority
6606
6630
  */
6607
6631
  create?: pulumi.Input<boolean>;
6632
+ /**
6633
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
6634
+ * Mutually exclusive with passwordSecretRef.
6635
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6636
+ */
6637
+ password?: pulumi.Input<string>;
6608
6638
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRef>;
6609
6639
  /**
6610
6640
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -6620,8 +6650,10 @@ export declare namespace cert_manager {
6620
6650
  profile?: pulumi.Input<string>;
6621
6651
  }
6622
6652
  /**
6623
- * PasswordSecretRef is a reference to a key in a Secret resource
6624
- * containing the password used to encrypt the PKCS12 keystore.
6653
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6654
+ * containing the password used to encrypt the PKCS#12 keystore.
6655
+ * Mutually exclusive with password.
6656
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6625
6657
  */
6626
6658
  interface CertificateSpecKeystoresPkcs12PasswordSecretRef {
6627
6659
  /**
@@ -6637,8 +6669,10 @@ export declare namespace cert_manager {
6637
6669
  name?: pulumi.Input<string>;
6638
6670
  }
6639
6671
  /**
6640
- * PasswordSecretRef is a reference to a key in a Secret resource
6641
- * containing the password used to encrypt the PKCS12 keystore.
6672
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6673
+ * containing the password used to encrypt the PKCS#12 keystore.
6674
+ * Mutually exclusive with password.
6675
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6642
6676
  */
6643
6677
  interface CertificateSpecKeystoresPkcs12PasswordSecretRefPatch {
6644
6678
  /**
@@ -6662,7 +6696,7 @@ export declare namespace cert_manager {
6662
6696
  * Create enables PKCS12 keystore creation for the Certificate.
6663
6697
  * If true, a file named `keystore.p12` will be created in the target
6664
6698
  * Secret resource, encrypted using the password stored in
6665
- * `passwordSecretRef`.
6699
+ * `passwordSecretRef` or in `password`.
6666
6700
  * The keystore file will be updated immediately.
6667
6701
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
6668
6702
  * also be created in the target Secret resource, encrypted using the
@@ -6670,6 +6704,12 @@ export declare namespace cert_manager {
6670
6704
  * Authority
6671
6705
  */
6672
6706
  create?: pulumi.Input<boolean>;
6707
+ /**
6708
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
6709
+ * Mutually exclusive with passwordSecretRef.
6710
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6711
+ */
6712
+ password?: pulumi.Input<string>;
6673
6713
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRefPatch>;
6674
6714
  /**
6675
6715
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -7922,6 +7962,10 @@ export declare namespace cert_manager {
7922
7962
  * Cannot be used for Azure Managed Service Identity
7923
7963
  */
7924
7964
  resourceID?: pulumi.Input<string>;
7965
+ /**
7966
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
7967
+ */
7968
+ tenantID?: pulumi.Input<string>;
7925
7969
  }
7926
7970
  /**
7927
7971
  * Auth: Azure Workload Identity or Azure Managed Service Identity:
@@ -7938,6 +7982,10 @@ export declare namespace cert_manager {
7938
7982
  * Cannot be used for Azure Managed Service Identity
7939
7983
  */
7940
7984
  resourceID?: pulumi.Input<string>;
7985
+ /**
7986
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
7987
+ */
7988
+ tenantID?: pulumi.Input<string>;
7941
7989
  }
7942
7990
  /**
7943
7991
  * Use the Microsoft Azure DNS API to manage DNS01 challenge records.
@@ -14611,6 +14659,10 @@ export declare namespace cert_manager {
14611
14659
  * Cannot be used for Azure Managed Service Identity
14612
14660
  */
14613
14661
  resourceID?: pulumi.Input<string>;
14662
+ /**
14663
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
14664
+ */
14665
+ tenantID?: pulumi.Input<string>;
14614
14666
  }
14615
14667
  /**
14616
14668
  * Auth: Azure Workload Identity or Azure Managed Service Identity:
@@ -14627,6 +14679,10 @@ export declare namespace cert_manager {
14627
14679
  * Cannot be used for Azure Managed Service Identity
14628
14680
  */
14629
14681
  resourceID?: pulumi.Input<string>;
14682
+ /**
14683
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
14684
+ */
14685
+ tenantID?: pulumi.Input<string>;
14630
14686
  }
14631
14687
  /**
14632
14688
  * Use the Microsoft Azure DNS API to manage DNS01 challenge records.
@@ -438,6 +438,10 @@ export declare namespace acme {
438
438
  * Cannot be used for Azure Managed Service Identity
439
439
  */
440
440
  resourceID: string;
441
+ /**
442
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
443
+ */
444
+ tenantID: string;
441
445
  }
442
446
  /**
443
447
  * Auth: Azure Workload Identity or Azure Managed Service Identity:
@@ -454,6 +458,10 @@ export declare namespace acme {
454
458
  * Cannot be used for Azure Managed Service Identity
455
459
  */
456
460
  resourceID: string;
461
+ /**
462
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
463
+ */
464
+ tenantID: string;
457
465
  }
458
466
  /**
459
467
  * Use the Microsoft Azure DNS API to manage DNS01 challenge records.
@@ -6712,7 +6720,7 @@ export declare namespace cert_manager {
6712
6720
  * Create enables JKS keystore creation for the Certificate.
6713
6721
  * If true, a file named `keystore.jks` will be created in the target
6714
6722
  * Secret resource, encrypted using the password stored in
6715
- * `passwordSecretRef`.
6723
+ * `passwordSecretRef` or `password`.
6716
6724
  * The keystore file will be updated immediately.
6717
6725
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6718
6726
  * will also be created in the target Secret resource, encrypted using the
@@ -6720,11 +6728,19 @@ export declare namespace cert_manager {
6720
6728
  * containing the issuing Certificate Authority
6721
6729
  */
6722
6730
  create: boolean;
6731
+ /**
6732
+ * Password provides a literal password used to encrypt the JKS keystore.
6733
+ * Mutually exclusive with passwordSecretRef.
6734
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6735
+ */
6736
+ password: string;
6723
6737
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRef;
6724
6738
  }
6725
6739
  /**
6726
- * PasswordSecretRef is a reference to a key in a Secret resource
6740
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6727
6741
  * containing the password used to encrypt the JKS keystore.
6742
+ * Mutually exclusive with password.
6743
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6728
6744
  */
6729
6745
  interface CertificateSpecKeystoresJksPasswordSecretRef {
6730
6746
  /**
@@ -6740,8 +6756,10 @@ export declare namespace cert_manager {
6740
6756
  name: string;
6741
6757
  }
6742
6758
  /**
6743
- * PasswordSecretRef is a reference to a key in a Secret resource
6759
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6744
6760
  * containing the password used to encrypt the JKS keystore.
6761
+ * Mutually exclusive with password.
6762
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6745
6763
  */
6746
6764
  interface CertificateSpecKeystoresJksPasswordSecretRefPatch {
6747
6765
  /**
@@ -6770,7 +6788,7 @@ export declare namespace cert_manager {
6770
6788
  * Create enables JKS keystore creation for the Certificate.
6771
6789
  * If true, a file named `keystore.jks` will be created in the target
6772
6790
  * Secret resource, encrypted using the password stored in
6773
- * `passwordSecretRef`.
6791
+ * `passwordSecretRef` or `password`.
6774
6792
  * The keystore file will be updated immediately.
6775
6793
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6776
6794
  * will also be created in the target Secret resource, encrypted using the
@@ -6778,6 +6796,12 @@ export declare namespace cert_manager {
6778
6796
  * containing the issuing Certificate Authority
6779
6797
  */
6780
6798
  create: boolean;
6799
+ /**
6800
+ * Password provides a literal password used to encrypt the JKS keystore.
6801
+ * Mutually exclusive with passwordSecretRef.
6802
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6803
+ */
6804
+ password: string;
6781
6805
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRefPatch;
6782
6806
  }
6783
6807
  /**
@@ -6796,7 +6820,7 @@ export declare namespace cert_manager {
6796
6820
  * Create enables PKCS12 keystore creation for the Certificate.
6797
6821
  * If true, a file named `keystore.p12` will be created in the target
6798
6822
  * Secret resource, encrypted using the password stored in
6799
- * `passwordSecretRef`.
6823
+ * `passwordSecretRef` or in `password`.
6800
6824
  * The keystore file will be updated immediately.
6801
6825
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
6802
6826
  * also be created in the target Secret resource, encrypted using the
@@ -6804,6 +6828,12 @@ export declare namespace cert_manager {
6804
6828
  * Authority
6805
6829
  */
6806
6830
  create: boolean;
6831
+ /**
6832
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
6833
+ * Mutually exclusive with passwordSecretRef.
6834
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6835
+ */
6836
+ password: string;
6807
6837
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRef;
6808
6838
  /**
6809
6839
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -6819,8 +6849,10 @@ export declare namespace cert_manager {
6819
6849
  profile: string;
6820
6850
  }
6821
6851
  /**
6822
- * PasswordSecretRef is a reference to a key in a Secret resource
6823
- * containing the password used to encrypt the PKCS12 keystore.
6852
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6853
+ * containing the password used to encrypt the PKCS#12 keystore.
6854
+ * Mutually exclusive with password.
6855
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6824
6856
  */
6825
6857
  interface CertificateSpecKeystoresPkcs12PasswordSecretRef {
6826
6858
  /**
@@ -6836,8 +6868,10 @@ export declare namespace cert_manager {
6836
6868
  name: string;
6837
6869
  }
6838
6870
  /**
6839
- * PasswordSecretRef is a reference to a key in a Secret resource
6840
- * containing the password used to encrypt the PKCS12 keystore.
6871
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6872
+ * containing the password used to encrypt the PKCS#12 keystore.
6873
+ * Mutually exclusive with password.
6874
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6841
6875
  */
6842
6876
  interface CertificateSpecKeystoresPkcs12PasswordSecretRefPatch {
6843
6877
  /**
@@ -6861,7 +6895,7 @@ export declare namespace cert_manager {
6861
6895
  * Create enables PKCS12 keystore creation for the Certificate.
6862
6896
  * If true, a file named `keystore.p12` will be created in the target
6863
6897
  * Secret resource, encrypted using the password stored in
6864
- * `passwordSecretRef`.
6898
+ * `passwordSecretRef` or in `password`.
6865
6899
  * The keystore file will be updated immediately.
6866
6900
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
6867
6901
  * also be created in the target Secret resource, encrypted using the
@@ -6869,6 +6903,12 @@ export declare namespace cert_manager {
6869
6903
  * Authority
6870
6904
  */
6871
6905
  create: boolean;
6906
+ /**
6907
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
6908
+ * Mutually exclusive with passwordSecretRef.
6909
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6910
+ */
6911
+ password: string;
6872
6912
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRefPatch;
6873
6913
  /**
6874
6914
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -8228,6 +8268,10 @@ export declare namespace cert_manager {
8228
8268
  * Cannot be used for Azure Managed Service Identity
8229
8269
  */
8230
8270
  resourceID: string;
8271
+ /**
8272
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
8273
+ */
8274
+ tenantID: string;
8231
8275
  }
8232
8276
  /**
8233
8277
  * Auth: Azure Workload Identity or Azure Managed Service Identity:
@@ -8244,6 +8288,10 @@ export declare namespace cert_manager {
8244
8288
  * Cannot be used for Azure Managed Service Identity
8245
8289
  */
8246
8290
  resourceID: string;
8291
+ /**
8292
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
8293
+ */
8294
+ tenantID: string;
8247
8295
  }
8248
8296
  /**
8249
8297
  * Use the Microsoft Azure DNS API to manage DNS01 challenge records.
@@ -14988,6 +15036,10 @@ export declare namespace cert_manager {
14988
15036
  * Cannot be used for Azure Managed Service Identity
14989
15037
  */
14990
15038
  resourceID: string;
15039
+ /**
15040
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
15041
+ */
15042
+ tenantID: string;
14991
15043
  }
14992
15044
  /**
14993
15045
  * Auth: Azure Workload Identity or Azure Managed Service Identity:
@@ -15004,6 +15056,10 @@ export declare namespace cert_manager {
15004
15056
  * Cannot be used for Azure Managed Service Identity
15005
15057
  */
15006
15058
  resourceID: string;
15059
+ /**
15060
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
15061
+ */
15062
+ tenantID: string;
15007
15063
  }
15008
15064
  /**
15009
15065
  * Use the Microsoft Azure DNS API to manage DNS01 challenge records.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@highstate/cert-manager",
3
- "version": "0.6.2",
3
+ "version": "0.7.1",
4
4
  "keywords": [
5
5
  "pulumi",
6
6
  "kubernetes",
@@ -37,7 +37,7 @@
37
37
  "pulumi": {
38
38
  "resource": true,
39
39
  "name": "@highstate/cert-manager",
40
- "version": "0.4.4"
40
+ "version": "0.6.1"
41
41
  },
42
- "gitHead": "dfd1d6878fc7d12954b6591d5ee1783d3c501eca"
42
+ "gitHead": "76c38ce5dbf7a710cf0e6339f52e86358537a99a"
43
43
  }
package/types/input.ts CHANGED
@@ -467,6 +467,10 @@ export namespace acme {
467
467
  * Cannot be used for Azure Managed Service Identity
468
468
  */
469
469
  resourceID?: pulumi.Input<string>;
470
+ /**
471
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
472
+ */
473
+ tenantID?: pulumi.Input<string>;
470
474
  }
471
475
 
472
476
  /**
@@ -484,6 +488,10 @@ export namespace acme {
484
488
  * Cannot be used for Azure Managed Service Identity
485
489
  */
486
490
  resourceID?: pulumi.Input<string>;
491
+ /**
492
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
493
+ */
494
+ tenantID?: pulumi.Input<string>;
487
495
  }
488
496
 
489
497
  /**
@@ -6676,7 +6684,7 @@ export namespace cert_manager {
6676
6684
  * Create enables JKS keystore creation for the Certificate.
6677
6685
  * If true, a file named `keystore.jks` will be created in the target
6678
6686
  * Secret resource, encrypted using the password stored in
6679
- * `passwordSecretRef`.
6687
+ * `passwordSecretRef` or `password`.
6680
6688
  * The keystore file will be updated immediately.
6681
6689
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6682
6690
  * will also be created in the target Secret resource, encrypted using the
@@ -6684,12 +6692,20 @@ export namespace cert_manager {
6684
6692
  * containing the issuing Certificate Authority
6685
6693
  */
6686
6694
  create?: pulumi.Input<boolean>;
6695
+ /**
6696
+ * Password provides a literal password used to encrypt the JKS keystore.
6697
+ * Mutually exclusive with passwordSecretRef.
6698
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6699
+ */
6700
+ password?: pulumi.Input<string>;
6687
6701
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRef>;
6688
6702
  }
6689
6703
 
6690
6704
  /**
6691
- * PasswordSecretRef is a reference to a key in a Secret resource
6705
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6692
6706
  * containing the password used to encrypt the JKS keystore.
6707
+ * Mutually exclusive with password.
6708
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6693
6709
  */
6694
6710
  export interface CertificateSpecKeystoresJksPasswordSecretRef {
6695
6711
  /**
@@ -6706,8 +6722,10 @@ export namespace cert_manager {
6706
6722
  }
6707
6723
 
6708
6724
  /**
6709
- * PasswordSecretRef is a reference to a key in a Secret resource
6725
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6710
6726
  * containing the password used to encrypt the JKS keystore.
6727
+ * Mutually exclusive with password.
6728
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6711
6729
  */
6712
6730
  export interface CertificateSpecKeystoresJksPasswordSecretRefPatch {
6713
6731
  /**
@@ -6737,7 +6755,7 @@ export namespace cert_manager {
6737
6755
  * Create enables JKS keystore creation for the Certificate.
6738
6756
  * If true, a file named `keystore.jks` will be created in the target
6739
6757
  * Secret resource, encrypted using the password stored in
6740
- * `passwordSecretRef`.
6758
+ * `passwordSecretRef` or `password`.
6741
6759
  * The keystore file will be updated immediately.
6742
6760
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6743
6761
  * will also be created in the target Secret resource, encrypted using the
@@ -6745,6 +6763,12 @@ export namespace cert_manager {
6745
6763
  * containing the issuing Certificate Authority
6746
6764
  */
6747
6765
  create?: pulumi.Input<boolean>;
6766
+ /**
6767
+ * Password provides a literal password used to encrypt the JKS keystore.
6768
+ * Mutually exclusive with passwordSecretRef.
6769
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6770
+ */
6771
+ password?: pulumi.Input<string>;
6748
6772
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRefPatch>;
6749
6773
  }
6750
6774
 
@@ -6765,7 +6789,7 @@ export namespace cert_manager {
6765
6789
  * Create enables PKCS12 keystore creation for the Certificate.
6766
6790
  * If true, a file named `keystore.p12` will be created in the target
6767
6791
  * Secret resource, encrypted using the password stored in
6768
- * `passwordSecretRef`.
6792
+ * `passwordSecretRef` or in `password`.
6769
6793
  * The keystore file will be updated immediately.
6770
6794
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
6771
6795
  * also be created in the target Secret resource, encrypted using the
@@ -6773,6 +6797,12 @@ export namespace cert_manager {
6773
6797
  * Authority
6774
6798
  */
6775
6799
  create?: pulumi.Input<boolean>;
6800
+ /**
6801
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
6802
+ * Mutually exclusive with passwordSecretRef.
6803
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6804
+ */
6805
+ password?: pulumi.Input<string>;
6776
6806
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRef>;
6777
6807
  /**
6778
6808
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -6789,8 +6819,10 @@ export namespace cert_manager {
6789
6819
  }
6790
6820
 
6791
6821
  /**
6792
- * PasswordSecretRef is a reference to a key in a Secret resource
6793
- * containing the password used to encrypt the PKCS12 keystore.
6822
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6823
+ * containing the password used to encrypt the PKCS#12 keystore.
6824
+ * Mutually exclusive with password.
6825
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6794
6826
  */
6795
6827
  export interface CertificateSpecKeystoresPkcs12PasswordSecretRef {
6796
6828
  /**
@@ -6807,8 +6839,10 @@ export namespace cert_manager {
6807
6839
  }
6808
6840
 
6809
6841
  /**
6810
- * PasswordSecretRef is a reference to a key in a Secret resource
6811
- * containing the password used to encrypt the PKCS12 keystore.
6842
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6843
+ * containing the password used to encrypt the PKCS#12 keystore.
6844
+ * Mutually exclusive with password.
6845
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6812
6846
  */
6813
6847
  export interface CertificateSpecKeystoresPkcs12PasswordSecretRefPatch {
6814
6848
  /**
@@ -6833,7 +6867,7 @@ export namespace cert_manager {
6833
6867
  * Create enables PKCS12 keystore creation for the Certificate.
6834
6868
  * If true, a file named `keystore.p12` will be created in the target
6835
6869
  * Secret resource, encrypted using the password stored in
6836
- * `passwordSecretRef`.
6870
+ * `passwordSecretRef` or in `password`.
6837
6871
  * The keystore file will be updated immediately.
6838
6872
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
6839
6873
  * also be created in the target Secret resource, encrypted using the
@@ -6841,6 +6875,12 @@ export namespace cert_manager {
6841
6875
  * Authority
6842
6876
  */
6843
6877
  create?: pulumi.Input<boolean>;
6878
+ /**
6879
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
6880
+ * Mutually exclusive with passwordSecretRef.
6881
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6882
+ */
6883
+ password?: pulumi.Input<string>;
6844
6884
  passwordSecretRef?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRefPatch>;
6845
6885
  /**
6846
6886
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -8130,6 +8170,10 @@ export namespace cert_manager {
8130
8170
  * Cannot be used for Azure Managed Service Identity
8131
8171
  */
8132
8172
  resourceID?: pulumi.Input<string>;
8173
+ /**
8174
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
8175
+ */
8176
+ tenantID?: pulumi.Input<string>;
8133
8177
  }
8134
8178
 
8135
8179
  /**
@@ -8147,6 +8191,10 @@ export namespace cert_manager {
8147
8191
  * Cannot be used for Azure Managed Service Identity
8148
8192
  */
8149
8193
  resourceID?: pulumi.Input<string>;
8194
+ /**
8195
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
8196
+ */
8197
+ tenantID?: pulumi.Input<string>;
8150
8198
  }
8151
8199
 
8152
8200
  /**
@@ -15005,6 +15053,10 @@ export namespace cert_manager {
15005
15053
  * Cannot be used for Azure Managed Service Identity
15006
15054
  */
15007
15055
  resourceID?: pulumi.Input<string>;
15056
+ /**
15057
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
15058
+ */
15059
+ tenantID?: pulumi.Input<string>;
15008
15060
  }
15009
15061
 
15010
15062
  /**
@@ -15022,6 +15074,10 @@ export namespace cert_manager {
15022
15074
  * Cannot be used for Azure Managed Service Identity
15023
15075
  */
15024
15076
  resourceID?: pulumi.Input<string>;
15077
+ /**
15078
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
15079
+ */
15080
+ tenantID?: pulumi.Input<string>;
15025
15081
  }
15026
15082
 
15027
15083
  /**
package/types/output.ts CHANGED
@@ -467,6 +467,10 @@ export namespace acme {
467
467
  * Cannot be used for Azure Managed Service Identity
468
468
  */
469
469
  resourceID: string;
470
+ /**
471
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
472
+ */
473
+ tenantID: string;
470
474
  }
471
475
 
472
476
  /**
@@ -484,6 +488,10 @@ export namespace acme {
484
488
  * Cannot be used for Azure Managed Service Identity
485
489
  */
486
490
  resourceID: string;
491
+ /**
492
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
493
+ */
494
+ tenantID: string;
487
495
  }
488
496
 
489
497
  /**
@@ -6882,7 +6890,7 @@ export namespace cert_manager {
6882
6890
  * Create enables JKS keystore creation for the Certificate.
6883
6891
  * If true, a file named `keystore.jks` will be created in the target
6884
6892
  * Secret resource, encrypted using the password stored in
6885
- * `passwordSecretRef`.
6893
+ * `passwordSecretRef` or `password`.
6886
6894
  * The keystore file will be updated immediately.
6887
6895
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6888
6896
  * will also be created in the target Secret resource, encrypted using the
@@ -6890,12 +6898,20 @@ export namespace cert_manager {
6890
6898
  * containing the issuing Certificate Authority
6891
6899
  */
6892
6900
  create: boolean;
6901
+ /**
6902
+ * Password provides a literal password used to encrypt the JKS keystore.
6903
+ * Mutually exclusive with passwordSecretRef.
6904
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6905
+ */
6906
+ password: string;
6893
6907
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRef;
6894
6908
  }
6895
6909
 
6896
6910
  /**
6897
- * PasswordSecretRef is a reference to a key in a Secret resource
6911
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6898
6912
  * containing the password used to encrypt the JKS keystore.
6913
+ * Mutually exclusive with password.
6914
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6899
6915
  */
6900
6916
  export interface CertificateSpecKeystoresJksPasswordSecretRef {
6901
6917
  /**
@@ -6912,8 +6928,10 @@ export namespace cert_manager {
6912
6928
  }
6913
6929
 
6914
6930
  /**
6915
- * PasswordSecretRef is a reference to a key in a Secret resource
6931
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
6916
6932
  * containing the password used to encrypt the JKS keystore.
6933
+ * Mutually exclusive with password.
6934
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6917
6935
  */
6918
6936
  export interface CertificateSpecKeystoresJksPasswordSecretRefPatch {
6919
6937
  /**
@@ -6943,7 +6961,7 @@ export namespace cert_manager {
6943
6961
  * Create enables JKS keystore creation for the Certificate.
6944
6962
  * If true, a file named `keystore.jks` will be created in the target
6945
6963
  * Secret resource, encrypted using the password stored in
6946
- * `passwordSecretRef`.
6964
+ * `passwordSecretRef` or `password`.
6947
6965
  * The keystore file will be updated immediately.
6948
6966
  * If the issuer provided a CA certificate, a file named `truststore.jks`
6949
6967
  * will also be created in the target Secret resource, encrypted using the
@@ -6951,6 +6969,12 @@ export namespace cert_manager {
6951
6969
  * containing the issuing Certificate Authority
6952
6970
  */
6953
6971
  create: boolean;
6972
+ /**
6973
+ * Password provides a literal password used to encrypt the JKS keystore.
6974
+ * Mutually exclusive with passwordSecretRef.
6975
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
6976
+ */
6977
+ password: string;
6954
6978
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresJksPasswordSecretRefPatch;
6955
6979
  }
6956
6980
 
@@ -6971,7 +6995,7 @@ export namespace cert_manager {
6971
6995
  * Create enables PKCS12 keystore creation for the Certificate.
6972
6996
  * If true, a file named `keystore.p12` will be created in the target
6973
6997
  * Secret resource, encrypted using the password stored in
6974
- * `passwordSecretRef`.
6998
+ * `passwordSecretRef` or in `password`.
6975
6999
  * The keystore file will be updated immediately.
6976
7000
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
6977
7001
  * also be created in the target Secret resource, encrypted using the
@@ -6979,6 +7003,12 @@ export namespace cert_manager {
6979
7003
  * Authority
6980
7004
  */
6981
7005
  create: boolean;
7006
+ /**
7007
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
7008
+ * Mutually exclusive with passwordSecretRef.
7009
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
7010
+ */
7011
+ password: string;
6982
7012
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRef;
6983
7013
  /**
6984
7014
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -6995,8 +7025,10 @@ export namespace cert_manager {
6995
7025
  }
6996
7026
 
6997
7027
  /**
6998
- * PasswordSecretRef is a reference to a key in a Secret resource
6999
- * containing the password used to encrypt the PKCS12 keystore.
7028
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
7029
+ * containing the password used to encrypt the PKCS#12 keystore.
7030
+ * Mutually exclusive with password.
7031
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
7000
7032
  */
7001
7033
  export interface CertificateSpecKeystoresPkcs12PasswordSecretRef {
7002
7034
  /**
@@ -7013,8 +7045,10 @@ export namespace cert_manager {
7013
7045
  }
7014
7046
 
7015
7047
  /**
7016
- * PasswordSecretRef is a reference to a key in a Secret resource
7017
- * containing the password used to encrypt the PKCS12 keystore.
7048
+ * PasswordSecretRef is a reference to a non-empty key in a Secret resource
7049
+ * containing the password used to encrypt the PKCS#12 keystore.
7050
+ * Mutually exclusive with password.
7051
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
7018
7052
  */
7019
7053
  export interface CertificateSpecKeystoresPkcs12PasswordSecretRefPatch {
7020
7054
  /**
@@ -7039,7 +7073,7 @@ export namespace cert_manager {
7039
7073
  * Create enables PKCS12 keystore creation for the Certificate.
7040
7074
  * If true, a file named `keystore.p12` will be created in the target
7041
7075
  * Secret resource, encrypted using the password stored in
7042
- * `passwordSecretRef`.
7076
+ * `passwordSecretRef` or in `password`.
7043
7077
  * The keystore file will be updated immediately.
7044
7078
  * If the issuer provided a CA certificate, a file named `truststore.p12` will
7045
7079
  * also be created in the target Secret resource, encrypted using the
@@ -7047,6 +7081,12 @@ export namespace cert_manager {
7047
7081
  * Authority
7048
7082
  */
7049
7083
  create: boolean;
7084
+ /**
7085
+ * Password provides a literal password used to encrypt the PKCS#12 keystore.
7086
+ * Mutually exclusive with passwordSecretRef.
7087
+ * One of password or passwordSecretRef must provide a password with a non-zero length.
7088
+ */
7089
+ password: string;
7050
7090
  passwordSecretRef: outputs.cert_manager.v1.CertificateSpecKeystoresPkcs12PasswordSecretRefPatch;
7051
7091
  /**
7052
7092
  * Profile specifies the key and certificate encryption algorithms and the HMAC algorithm
@@ -8445,6 +8485,10 @@ export namespace cert_manager {
8445
8485
  * Cannot be used for Azure Managed Service Identity
8446
8486
  */
8447
8487
  resourceID: string;
8488
+ /**
8489
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
8490
+ */
8491
+ tenantID: string;
8448
8492
  }
8449
8493
 
8450
8494
  /**
@@ -8462,6 +8506,10 @@ export namespace cert_manager {
8462
8506
  * Cannot be used for Azure Managed Service Identity
8463
8507
  */
8464
8508
  resourceID: string;
8509
+ /**
8510
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
8511
+ */
8512
+ tenantID: string;
8465
8513
  }
8466
8514
 
8467
8515
  /**
@@ -15394,6 +15442,10 @@ export namespace cert_manager {
15394
15442
  * Cannot be used for Azure Managed Service Identity
15395
15443
  */
15396
15444
  resourceID: string;
15445
+ /**
15446
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
15447
+ */
15448
+ tenantID: string;
15397
15449
  }
15398
15450
 
15399
15451
  /**
@@ -15411,6 +15463,10 @@ export namespace cert_manager {
15411
15463
  * Cannot be used for Azure Managed Service Identity
15412
15464
  */
15413
15465
  resourceID: string;
15466
+ /**
15467
+ * tenant ID of the managed identity, can not be used at the same time as resourceID
15468
+ */
15469
+ tenantID: string;
15414
15470
  }
15415
15471
 
15416
15472
  /**