@pulumi/tls 4.9.0-alpha.1676324299 → 4.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/certRequest.d.ts +2 -12
- package/certRequest.js +1 -1
- package/certRequest.js.map +1 -1
- package/getPublicKey.d.ts +7 -7
- package/locallySignedCert.d.ts +5 -15
- package/locallySignedCert.js +1 -1
- package/locallySignedCert.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/privateKey.d.ts +22 -16
- package/privateKey.js +3 -1
- package/privateKey.js.map +1 -1
- package/selfSignedCert.d.ts +6 -16
- package/selfSignedCert.js +1 -1
- package/selfSignedCert.js.map +1 -1
package/certRequest.d.ts
CHANGED
|
@@ -51,9 +51,7 @@ export declare class CertRequest extends pulumi.CustomResource {
|
|
|
51
51
|
*/
|
|
52
52
|
readonly ipAddresses: pulumi.Output<string[] | undefined>;
|
|
53
53
|
/**
|
|
54
|
-
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
55
|
-
*
|
|
56
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `private_key_pem`.
|
|
54
|
+
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
57
55
|
*/
|
|
58
56
|
readonly keyAlgorithm: pulumi.Output<string>;
|
|
59
57
|
/**
|
|
@@ -100,9 +98,7 @@ export interface CertRequestState {
|
|
|
100
98
|
*/
|
|
101
99
|
ipAddresses?: pulumi.Input<pulumi.Input<string>[]>;
|
|
102
100
|
/**
|
|
103
|
-
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
104
|
-
*
|
|
105
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `private_key_pem`.
|
|
101
|
+
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
106
102
|
*/
|
|
107
103
|
keyAlgorithm?: pulumi.Input<string>;
|
|
108
104
|
/**
|
|
@@ -132,12 +128,6 @@ export interface CertRequestArgs {
|
|
|
132
128
|
* List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
|
133
129
|
*/
|
|
134
130
|
ipAddresses?: pulumi.Input<pulumi.Input<string>[]>;
|
|
135
|
-
/**
|
|
136
|
-
* Name of the algorithm used when generating the private key provided in `privateKeyPem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
|
137
|
-
*
|
|
138
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `private_key_pem`.
|
|
139
|
-
*/
|
|
140
|
-
keyAlgorithm?: pulumi.Input<string>;
|
|
141
131
|
/**
|
|
142
132
|
* Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
|
143
133
|
* to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
package/certRequest.js
CHANGED
|
@@ -65,11 +65,11 @@ class CertRequest extends pulumi.CustomResource {
|
|
|
65
65
|
}
|
|
66
66
|
resourceInputs["dnsNames"] = args ? args.dnsNames : undefined;
|
|
67
67
|
resourceInputs["ipAddresses"] = args ? args.ipAddresses : undefined;
|
|
68
|
-
resourceInputs["keyAlgorithm"] = args ? args.keyAlgorithm : undefined;
|
|
69
68
|
resourceInputs["privateKeyPem"] = (args === null || args === void 0 ? void 0 : args.privateKeyPem) ? pulumi.secret(args.privateKeyPem) : undefined;
|
|
70
69
|
resourceInputs["subject"] = args ? args.subject : undefined;
|
|
71
70
|
resourceInputs["uris"] = args ? args.uris : undefined;
|
|
72
71
|
resourceInputs["certRequestPem"] = undefined /*out*/;
|
|
72
|
+
resourceInputs["keyAlgorithm"] = undefined /*out*/;
|
|
73
73
|
}
|
|
74
74
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
75
75
|
const secretOpts = { additionalSecretOutputs: ["privateKeyPem"] };
|
package/certRequest.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"certRequest.js","sourceRoot":"","sources":["../certRequest.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;GAgBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;
|
|
1
|
+
{"version":3,"file":"certRequest.js","sourceRoot":"","sources":["../certRequest.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;GAgBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA6CD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,aAAa,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACtG,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,eAAe,CAAC,EAAE,CAAC;QAClE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AApGL,kCAqGC;AAvFG,gBAAgB;AACO,wBAAY,GAAG,mCAAmC,CAAC"}
|
package/getPublicKey.d.ts
CHANGED
|
@@ -26,11 +26,11 @@ export declare function getPublicKey(args?: GetPublicKeyArgs, opts?: pulumi.Invo
|
|
|
26
26
|
*/
|
|
27
27
|
export interface GetPublicKeyArgs {
|
|
28
28
|
/**
|
|
29
|
-
* The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
|
29
|
+
* The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `privateKeyPem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
|
30
30
|
*/
|
|
31
31
|
privateKeyOpenssh?: string;
|
|
32
32
|
/**
|
|
33
|
-
* The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
|
33
|
+
* The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `privateKeyOpenssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
|
34
34
|
*/
|
|
35
35
|
privateKeyPem?: string;
|
|
36
36
|
}
|
|
@@ -39,7 +39,7 @@ export interface GetPublicKeyArgs {
|
|
|
39
39
|
*/
|
|
40
40
|
export interface GetPublicKeyResult {
|
|
41
41
|
/**
|
|
42
|
-
* The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA
|
|
42
|
+
* The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA`, `ED25519`.
|
|
43
43
|
*/
|
|
44
44
|
readonly algorithm: string;
|
|
45
45
|
/**
|
|
@@ -47,11 +47,11 @@ export interface GetPublicKeyResult {
|
|
|
47
47
|
*/
|
|
48
48
|
readonly id: string;
|
|
49
49
|
/**
|
|
50
|
-
* The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
|
50
|
+
* The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `privateKeyPem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
|
51
51
|
*/
|
|
52
52
|
readonly privateKeyOpenssh?: string;
|
|
53
53
|
/**
|
|
54
|
-
* The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
|
54
|
+
* The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `privateKeyOpenssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
|
55
55
|
*/
|
|
56
56
|
readonly privateKeyPem?: string;
|
|
57
57
|
/**
|
|
@@ -92,11 +92,11 @@ export declare function getPublicKeyOutput(args?: GetPublicKeyOutputArgs, opts?:
|
|
|
92
92
|
*/
|
|
93
93
|
export interface GetPublicKeyOutputArgs {
|
|
94
94
|
/**
|
|
95
|
-
* The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
|
95
|
+
* The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `privateKeyPem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
|
96
96
|
*/
|
|
97
97
|
privateKeyOpenssh?: pulumi.Input<string>;
|
|
98
98
|
/**
|
|
99
|
-
* The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
|
99
|
+
* The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `privateKeyOpenssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
|
100
100
|
*/
|
|
101
101
|
privateKeyPem?: pulumi.Input<string>;
|
|
102
102
|
}
|
package/locallySignedCert.d.ts
CHANGED
|
@@ -24,9 +24,7 @@ export declare class LocallySignedCert extends pulumi.CustomResource {
|
|
|
24
24
|
*/
|
|
25
25
|
readonly caCertPem: pulumi.Output<string>;
|
|
26
26
|
/**
|
|
27
|
-
* Name of the algorithm used when generating the private key provided in `caPrivateKeyPem`.
|
|
28
|
-
*
|
|
29
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.
|
|
27
|
+
* Name of the algorithm used when generating the private key provided in `caPrivateKeyPem`.
|
|
30
28
|
*/
|
|
31
29
|
readonly caKeyAlgorithm: pulumi.Output<string>;
|
|
32
30
|
/**
|
|
@@ -52,11 +50,11 @@ export declare class LocallySignedCert extends pulumi.CustomResource {
|
|
|
52
50
|
* revocation. Also, this advance update can only be performed should the Terraform configuration be applied during the
|
|
53
51
|
* early renewal period. (default: `0`)
|
|
54
52
|
*/
|
|
55
|
-
readonly earlyRenewalHours: pulumi.Output<number
|
|
53
|
+
readonly earlyRenewalHours: pulumi.Output<number>;
|
|
56
54
|
/**
|
|
57
55
|
* Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
|
58
56
|
*/
|
|
59
|
-
readonly isCaCertificate: pulumi.Output<boolean
|
|
57
|
+
readonly isCaCertificate: pulumi.Output<boolean>;
|
|
60
58
|
/**
|
|
61
59
|
* Is the certificate either expired (i.e. beyond the `validityPeriodHours`) or ready for an early renewal (i.e. within the `earlyRenewalHours`)?
|
|
62
60
|
*/
|
|
@@ -64,7 +62,7 @@ export declare class LocallySignedCert extends pulumi.CustomResource {
|
|
|
64
62
|
/**
|
|
65
63
|
* Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
|
66
64
|
*/
|
|
67
|
-
readonly setSubjectKeyId: pulumi.Output<boolean
|
|
65
|
+
readonly setSubjectKeyId: pulumi.Output<boolean>;
|
|
68
66
|
/**
|
|
69
67
|
* The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
|
70
68
|
*/
|
|
@@ -99,9 +97,7 @@ export interface LocallySignedCertState {
|
|
|
99
97
|
*/
|
|
100
98
|
caCertPem?: pulumi.Input<string>;
|
|
101
99
|
/**
|
|
102
|
-
* Name of the algorithm used when generating the private key provided in `caPrivateKeyPem`.
|
|
103
|
-
*
|
|
104
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.
|
|
100
|
+
* Name of the algorithm used when generating the private key provided in `caPrivateKeyPem`.
|
|
105
101
|
*/
|
|
106
102
|
caKeyAlgorithm?: pulumi.Input<string>;
|
|
107
103
|
/**
|
|
@@ -165,12 +161,6 @@ export interface LocallySignedCertArgs {
|
|
|
165
161
|
* Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
|
166
162
|
*/
|
|
167
163
|
caCertPem: pulumi.Input<string>;
|
|
168
|
-
/**
|
|
169
|
-
* Name of the algorithm used when generating the private key provided in `caPrivateKeyPem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
|
170
|
-
*
|
|
171
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.
|
|
172
|
-
*/
|
|
173
|
-
caKeyAlgorithm?: pulumi.Input<string>;
|
|
174
164
|
/**
|
|
175
165
|
* Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
|
176
166
|
*/
|
package/locallySignedCert.js
CHANGED
|
@@ -66,13 +66,13 @@ class LocallySignedCert extends pulumi.CustomResource {
|
|
|
66
66
|
}
|
|
67
67
|
resourceInputs["allowedUses"] = args ? args.allowedUses : undefined;
|
|
68
68
|
resourceInputs["caCertPem"] = args ? args.caCertPem : undefined;
|
|
69
|
-
resourceInputs["caKeyAlgorithm"] = args ? args.caKeyAlgorithm : undefined;
|
|
70
69
|
resourceInputs["caPrivateKeyPem"] = (args === null || args === void 0 ? void 0 : args.caPrivateKeyPem) ? pulumi.secret(args.caPrivateKeyPem) : undefined;
|
|
71
70
|
resourceInputs["certRequestPem"] = args ? args.certRequestPem : undefined;
|
|
72
71
|
resourceInputs["earlyRenewalHours"] = args ? args.earlyRenewalHours : undefined;
|
|
73
72
|
resourceInputs["isCaCertificate"] = args ? args.isCaCertificate : undefined;
|
|
74
73
|
resourceInputs["setSubjectKeyId"] = args ? args.setSubjectKeyId : undefined;
|
|
75
74
|
resourceInputs["validityPeriodHours"] = args ? args.validityPeriodHours : undefined;
|
|
75
|
+
resourceInputs["caKeyAlgorithm"] = undefined /*out*/;
|
|
76
76
|
resourceInputs["certPem"] = undefined /*out*/;
|
|
77
77
|
resourceInputs["readyForRenewal"] = undefined /*out*/;
|
|
78
78
|
resourceInputs["validityEndTime"] = undefined /*out*/;
|
package/locallySignedCert.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"locallySignedCert.js","sourceRoot":"","sources":["../locallySignedCert.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;
|
|
1
|
+
{"version":3,"file":"locallySignedCert.js","sourceRoot":"","sources":["../locallySignedCert.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAuED,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;SACrF;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,eAAe,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5G,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC3D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,iBAAiB,CAAC,EAAE,CAAC;QACpE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AAtJL,8CAuJC;AAzIG,gBAAgB;AACO,8BAAY,GAAG,+CAA+C,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/tls",
|
|
3
|
-
"version": "v4.9.0
|
|
3
|
+
"version": "v4.9.0",
|
|
4
4
|
"description": "A Pulumi package to create TLS resources in Pulumi programs.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource tls v4.9.0
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource tls v4.9.0"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/package.json.dev
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/tls",
|
|
3
|
-
"version": "v4.9.0
|
|
3
|
+
"version": "v4.9.0",
|
|
4
4
|
"description": "A Pulumi package to create TLS resources in Pulumi programs.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource tls v4.9.0
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource tls v4.9.0"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/privateKey.d.ts
CHANGED
|
@@ -16,13 +16,13 @@ export declare class PrivateKey extends pulumi.CustomResource {
|
|
|
16
16
|
*/
|
|
17
17
|
static isInstance(obj: any): obj is PrivateKey;
|
|
18
18
|
/**
|
|
19
|
-
* Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
|
19
|
+
* Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
|
20
20
|
*/
|
|
21
21
|
readonly algorithm: pulumi.Output<string>;
|
|
22
22
|
/**
|
|
23
|
-
* When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
|
23
|
+
* When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
|
24
24
|
*/
|
|
25
|
-
readonly ecdsaCurve: pulumi.Output<string
|
|
25
|
+
readonly ecdsaCurve: pulumi.Output<string>;
|
|
26
26
|
/**
|
|
27
27
|
* Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
|
|
28
28
|
*/
|
|
@@ -31,6 +31,10 @@ export declare class PrivateKey extends pulumi.CustomResource {
|
|
|
31
31
|
* Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
|
32
32
|
*/
|
|
33
33
|
readonly privateKeyPem: pulumi.Output<string>;
|
|
34
|
+
/**
|
|
35
|
+
* Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
|
36
|
+
*/
|
|
37
|
+
readonly privateKeyPemPkcs8: pulumi.Output<string>;
|
|
34
38
|
/**
|
|
35
39
|
* The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `publicKeyOpenssh` and the ECDSA P224 limitations.
|
|
36
40
|
*/
|
|
@@ -41,10 +45,9 @@ export declare class PrivateKey extends pulumi.CustomResource {
|
|
|
41
45
|
readonly publicKeyFingerprintSha256: pulumi.Output<string>;
|
|
42
46
|
/**
|
|
43
47
|
* The public key data in ["Authorized
|
|
44
|
-
* Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
|
|
45
|
-
* populated
|
|
46
|
-
*
|
|
47
|
-
* supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
|
48
|
+
* Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
|
|
49
|
+
* populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
|
|
50
|
+
* [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
|
48
51
|
* [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\n` at
|
|
49
52
|
* the end of the PEM. In case this disrupts your use case, we recommend using
|
|
50
53
|
* [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
|
@@ -61,7 +64,7 @@ export declare class PrivateKey extends pulumi.CustomResource {
|
|
|
61
64
|
/**
|
|
62
65
|
* When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
|
|
63
66
|
*/
|
|
64
|
-
readonly rsaBits: pulumi.Output<number
|
|
67
|
+
readonly rsaBits: pulumi.Output<number>;
|
|
65
68
|
/**
|
|
66
69
|
* Create a PrivateKey resource with the given unique name, arguments, and options.
|
|
67
70
|
*
|
|
@@ -76,11 +79,11 @@ export declare class PrivateKey extends pulumi.CustomResource {
|
|
|
76
79
|
*/
|
|
77
80
|
export interface PrivateKeyState {
|
|
78
81
|
/**
|
|
79
|
-
* Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
|
82
|
+
* Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
|
80
83
|
*/
|
|
81
84
|
algorithm?: pulumi.Input<string>;
|
|
82
85
|
/**
|
|
83
|
-
* When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
|
86
|
+
* When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
|
84
87
|
*/
|
|
85
88
|
ecdsaCurve?: pulumi.Input<string>;
|
|
86
89
|
/**
|
|
@@ -91,6 +94,10 @@ export interface PrivateKeyState {
|
|
|
91
94
|
* Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
|
92
95
|
*/
|
|
93
96
|
privateKeyPem?: pulumi.Input<string>;
|
|
97
|
+
/**
|
|
98
|
+
* Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
|
99
|
+
*/
|
|
100
|
+
privateKeyPemPkcs8?: pulumi.Input<string>;
|
|
94
101
|
/**
|
|
95
102
|
* The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `publicKeyOpenssh` and the ECDSA P224 limitations.
|
|
96
103
|
*/
|
|
@@ -101,10 +108,9 @@ export interface PrivateKeyState {
|
|
|
101
108
|
publicKeyFingerprintSha256?: pulumi.Input<string>;
|
|
102
109
|
/**
|
|
103
110
|
* The public key data in ["Authorized
|
|
104
|
-
* Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
|
|
105
|
-
* populated
|
|
106
|
-
*
|
|
107
|
-
* supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
|
111
|
+
* Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
|
|
112
|
+
* populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
|
|
113
|
+
* [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
|
108
114
|
* [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\n` at
|
|
109
115
|
* the end of the PEM. In case this disrupts your use case, we recommend using
|
|
110
116
|
* [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
|
@@ -128,11 +134,11 @@ export interface PrivateKeyState {
|
|
|
128
134
|
*/
|
|
129
135
|
export interface PrivateKeyArgs {
|
|
130
136
|
/**
|
|
131
|
-
* Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
|
137
|
+
* Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
|
132
138
|
*/
|
|
133
139
|
algorithm: pulumi.Input<string>;
|
|
134
140
|
/**
|
|
135
|
-
* When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
|
141
|
+
* When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
|
136
142
|
*/
|
|
137
143
|
ecdsaCurve?: pulumi.Input<string>;
|
|
138
144
|
/**
|
package/privateKey.js
CHANGED
|
@@ -37,6 +37,7 @@ class PrivateKey extends pulumi.CustomResource {
|
|
|
37
37
|
resourceInputs["ecdsaCurve"] = state ? state.ecdsaCurve : undefined;
|
|
38
38
|
resourceInputs["privateKeyOpenssh"] = state ? state.privateKeyOpenssh : undefined;
|
|
39
39
|
resourceInputs["privateKeyPem"] = state ? state.privateKeyPem : undefined;
|
|
40
|
+
resourceInputs["privateKeyPemPkcs8"] = state ? state.privateKeyPemPkcs8 : undefined;
|
|
40
41
|
resourceInputs["publicKeyFingerprintMd5"] = state ? state.publicKeyFingerprintMd5 : undefined;
|
|
41
42
|
resourceInputs["publicKeyFingerprintSha256"] = state ? state.publicKeyFingerprintSha256 : undefined;
|
|
42
43
|
resourceInputs["publicKeyOpenssh"] = state ? state.publicKeyOpenssh : undefined;
|
|
@@ -53,13 +54,14 @@ class PrivateKey extends pulumi.CustomResource {
|
|
|
53
54
|
resourceInputs["rsaBits"] = args ? args.rsaBits : undefined;
|
|
54
55
|
resourceInputs["privateKeyOpenssh"] = undefined /*out*/;
|
|
55
56
|
resourceInputs["privateKeyPem"] = undefined /*out*/;
|
|
57
|
+
resourceInputs["privateKeyPemPkcs8"] = undefined /*out*/;
|
|
56
58
|
resourceInputs["publicKeyFingerprintMd5"] = undefined /*out*/;
|
|
57
59
|
resourceInputs["publicKeyFingerprintSha256"] = undefined /*out*/;
|
|
58
60
|
resourceInputs["publicKeyOpenssh"] = undefined /*out*/;
|
|
59
61
|
resourceInputs["publicKeyPem"] = undefined /*out*/;
|
|
60
62
|
}
|
|
61
63
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
62
|
-
const secretOpts = { additionalSecretOutputs: ["privateKeyOpenssh", "privateKeyPem"] };
|
|
64
|
+
const secretOpts = { additionalSecretOutputs: ["privateKeyOpenssh", "privateKeyPem", "privateKeyPemPkcs8"] };
|
|
63
65
|
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
64
66
|
super(PrivateKey.__pulumiType, name, resourceInputs, opts);
|
|
65
67
|
}
|
package/privateKey.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"privateKey.js","sourceRoot":"","sources":["../privateKey.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;
|
|
1
|
+
{"version":3,"file":"privateKey.js","sourceRoot":"","sources":["../privateKey.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA6DD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC,CAAC,SAAS,CAAC;YACpG,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACpD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACzD,cAAc,CAAC,yBAAyB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9D,cAAc,CAAC,4BAA4B,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACjE,cAAc,CAAC,kBAAkB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACvD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,mBAAmB,EAAE,eAAe,EAAE,oBAAoB,CAAC,EAAE,CAAC;QAC7G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AA1HL,gCA2HC;AA7GG,gBAAgB;AACO,uBAAY,GAAG,iCAAiC,CAAC"}
|
package/selfSignedCert.d.ts
CHANGED
|
@@ -40,7 +40,7 @@ export declare class SelfSignedCert extends pulumi.CustomResource {
|
|
|
40
40
|
* revocation. Also, this advance update can only be performed should the Terraform configuration be applied during the
|
|
41
41
|
* early renewal period. (default: `0`)
|
|
42
42
|
*/
|
|
43
|
-
readonly earlyRenewalHours: pulumi.Output<number
|
|
43
|
+
readonly earlyRenewalHours: pulumi.Output<number>;
|
|
44
44
|
/**
|
|
45
45
|
* List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
|
46
46
|
*/
|
|
@@ -48,11 +48,9 @@ export declare class SelfSignedCert extends pulumi.CustomResource {
|
|
|
48
48
|
/**
|
|
49
49
|
* Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
|
50
50
|
*/
|
|
51
|
-
readonly isCaCertificate: pulumi.Output<boolean
|
|
51
|
+
readonly isCaCertificate: pulumi.Output<boolean>;
|
|
52
52
|
/**
|
|
53
|
-
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
54
|
-
*
|
|
55
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `private_key_pem`.
|
|
53
|
+
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
56
54
|
*/
|
|
57
55
|
readonly keyAlgorithm: pulumi.Output<string>;
|
|
58
56
|
/**
|
|
@@ -68,11 +66,11 @@ export declare class SelfSignedCert extends pulumi.CustomResource {
|
|
|
68
66
|
/**
|
|
69
67
|
* Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
|
70
68
|
*/
|
|
71
|
-
readonly setAuthorityKeyId: pulumi.Output<boolean
|
|
69
|
+
readonly setAuthorityKeyId: pulumi.Output<boolean>;
|
|
72
70
|
/**
|
|
73
71
|
* Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
|
74
72
|
*/
|
|
75
|
-
readonly setSubjectKeyId: pulumi.Output<boolean
|
|
73
|
+
readonly setSubjectKeyId: pulumi.Output<boolean>;
|
|
76
74
|
/**
|
|
77
75
|
* The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
|
78
76
|
*/
|
|
@@ -139,9 +137,7 @@ export interface SelfSignedCertState {
|
|
|
139
137
|
*/
|
|
140
138
|
isCaCertificate?: pulumi.Input<boolean>;
|
|
141
139
|
/**
|
|
142
|
-
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
143
|
-
*
|
|
144
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `private_key_pem`.
|
|
140
|
+
* Name of the algorithm used when generating the private key provided in `privateKeyPem`.
|
|
145
141
|
*/
|
|
146
142
|
keyAlgorithm?: pulumi.Input<string>;
|
|
147
143
|
/**
|
|
@@ -211,12 +207,6 @@ export interface SelfSignedCertArgs {
|
|
|
211
207
|
* Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
|
212
208
|
*/
|
|
213
209
|
isCaCertificate?: pulumi.Input<boolean>;
|
|
214
|
-
/**
|
|
215
|
-
* Name of the algorithm used when generating the private key provided in `privateKeyPem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
|
216
|
-
*
|
|
217
|
-
* @deprecated This is now ignored, as the key algorithm is inferred from the `private_key_pem`.
|
|
218
|
-
*/
|
|
219
|
-
keyAlgorithm?: pulumi.Input<string>;
|
|
220
210
|
/**
|
|
221
211
|
* Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
|
222
212
|
* to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
package/selfSignedCert.js
CHANGED
|
@@ -66,7 +66,6 @@ class SelfSignedCert extends pulumi.CustomResource {
|
|
|
66
66
|
resourceInputs["earlyRenewalHours"] = args ? args.earlyRenewalHours : undefined;
|
|
67
67
|
resourceInputs["ipAddresses"] = args ? args.ipAddresses : undefined;
|
|
68
68
|
resourceInputs["isCaCertificate"] = args ? args.isCaCertificate : undefined;
|
|
69
|
-
resourceInputs["keyAlgorithm"] = args ? args.keyAlgorithm : undefined;
|
|
70
69
|
resourceInputs["privateKeyPem"] = (args === null || args === void 0 ? void 0 : args.privateKeyPem) ? pulumi.secret(args.privateKeyPem) : undefined;
|
|
71
70
|
resourceInputs["setAuthorityKeyId"] = args ? args.setAuthorityKeyId : undefined;
|
|
72
71
|
resourceInputs["setSubjectKeyId"] = args ? args.setSubjectKeyId : undefined;
|
|
@@ -74,6 +73,7 @@ class SelfSignedCert extends pulumi.CustomResource {
|
|
|
74
73
|
resourceInputs["uris"] = args ? args.uris : undefined;
|
|
75
74
|
resourceInputs["validityPeriodHours"] = args ? args.validityPeriodHours : undefined;
|
|
76
75
|
resourceInputs["certPem"] = undefined /*out*/;
|
|
76
|
+
resourceInputs["keyAlgorithm"] = undefined /*out*/;
|
|
77
77
|
resourceInputs["readyForRenewal"] = undefined /*out*/;
|
|
78
78
|
resourceInputs["validityEndTime"] = undefined /*out*/;
|
|
79
79
|
resourceInputs["validityStartTime"] = undefined /*out*/;
|
package/selfSignedCert.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"selfSignedCert.js","sourceRoot":"","sources":["../selfSignedCert.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;
|
|
1
|
+
{"version":3,"file":"selfSignedCert.js","sourceRoot":"","sources":["../selfSignedCert.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IAqFD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;SACrF;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,aAAa,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACtG,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC3D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,eAAe,CAAC,EAAE,CAAC;QAClE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AApKL,wCAqKC;AAvJG,gBAAgB;AACO,2BAAY,GAAG,yCAAyC,CAAC"}
|