pulumi-gcp 7.21.0a1714543973__py3-none-any.whl → 7.21.0a1714596856__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +40 -0
- pulumi_gcp/alloydb/_inputs.py +74 -0
- pulumi_gcp/alloydb/instance.py +90 -0
- pulumi_gcp/alloydb/outputs.py +98 -0
- pulumi_gcp/apigee/environment.py +47 -0
- pulumi_gcp/applicationintegration/__init__.py +1 -0
- pulumi_gcp/applicationintegration/_inputs.py +843 -0
- pulumi_gcp/applicationintegration/auth_config.py +998 -0
- pulumi_gcp/applicationintegration/outputs.py +891 -0
- pulumi_gcp/bigquerydatapolicy/_inputs.py +21 -4
- pulumi_gcp/bigquerydatapolicy/data_policy.py +78 -0
- pulumi_gcp/bigquerydatapolicy/outputs.py +16 -3
- pulumi_gcp/certificateauthority/_inputs.py +92 -12
- pulumi_gcp/certificateauthority/authority.py +110 -0
- pulumi_gcp/certificateauthority/certificate.py +176 -0
- pulumi_gcp/certificateauthority/outputs.py +144 -12
- pulumi_gcp/composer/__init__.py +1 -0
- pulumi_gcp/composer/user_workloads_secret.py +441 -0
- pulumi_gcp/compute/__init__.py +1 -0
- pulumi_gcp/compute/_inputs.py +121 -58
- pulumi_gcp/compute/global_forwarding_rule.py +0 -282
- pulumi_gcp/compute/outputs.py +120 -57
- pulumi_gcp/compute/region_target_https_proxy.py +257 -0
- pulumi_gcp/compute/region_url_map.py +0 -470
- pulumi_gcp/compute/security_policy_rule.py +850 -0
- pulumi_gcp/dataloss/__init__.py +1 -0
- pulumi_gcp/dataloss/_inputs.py +1040 -0
- pulumi_gcp/dataloss/outputs.py +1123 -0
- pulumi_gcp/dataloss/prevention_discovery_config.py +737 -0
- pulumi_gcp/dns/_inputs.py +2 -2
- pulumi_gcp/dns/outputs.py +2 -2
- pulumi_gcp/dns/record_set.py +2 -2
- pulumi_gcp/filestore/get_instance.py +11 -1
- pulumi_gcp/filestore/instance.py +101 -0
- pulumi_gcp/firebase/_inputs.py +16 -0
- pulumi_gcp/firebase/app_check_play_integrity_config.py +20 -0
- pulumi_gcp/firebase/app_check_recaptcha_enterprise_config.py +10 -0
- pulumi_gcp/firebase/hosting_version.py +44 -0
- pulumi_gcp/firebase/outputs.py +12 -0
- pulumi_gcp/logging/folder_sink.py +54 -0
- pulumi_gcp/logging/organization_sink.py +54 -0
- pulumi_gcp/monitoring/_inputs.py +46 -2
- pulumi_gcp/monitoring/outputs.py +40 -2
- pulumi_gcp/monitoring/uptime_check_config.py +6 -0
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/internal_range.py +1024 -0
- pulumi_gcp/secretmanager/get_secret.py +13 -3
- pulumi_gcp/secretmanager/outputs.py +20 -1
- pulumi_gcp/secretmanager/secret.py +90 -3
- pulumi_gcp/storage/__init__.py +1 -0
- pulumi_gcp/storage/get_bucket_objects.py +153 -0
- pulumi_gcp/storage/outputs.py +63 -0
- {pulumi_gcp-7.21.0a1714543973.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.21.0a1714543973.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/RECORD +56 -50
- {pulumi_gcp-7.21.0a1714543973.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.21.0a1714543973.dist-info → pulumi_gcp-7.21.0a1714596856.dist-info}/top_level.txt +0 -0
@@ -968,6 +968,94 @@ class Certificate(pulumi.CustomResource):
|
|
968
968
|
),
|
969
969
|
))
|
970
970
|
```
|
971
|
+
### Privateca Certificate Custom Ski
|
972
|
+
|
973
|
+
```python
|
974
|
+
import pulumi
|
975
|
+
import pulumi_gcp as gcp
|
976
|
+
import pulumi_std as std
|
977
|
+
|
978
|
+
default = gcp.certificateauthority.CaPool("default",
|
979
|
+
location="us-central1",
|
980
|
+
name="my-pool",
|
981
|
+
tier="ENTERPRISE")
|
982
|
+
default_authority = gcp.certificateauthority.Authority("default",
|
983
|
+
location="us-central1",
|
984
|
+
pool=default.name,
|
985
|
+
certificate_authority_id="my-authority",
|
986
|
+
config=gcp.certificateauthority.AuthorityConfigArgs(
|
987
|
+
subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
|
988
|
+
subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
|
989
|
+
organization="HashiCorp",
|
990
|
+
common_name="my-certificate-authority",
|
991
|
+
),
|
992
|
+
subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
|
993
|
+
dns_names=["hashicorp.com"],
|
994
|
+
),
|
995
|
+
),
|
996
|
+
x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
|
997
|
+
ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
|
998
|
+
is_ca=True,
|
999
|
+
),
|
1000
|
+
key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
|
1001
|
+
base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1002
|
+
digital_signature=True,
|
1003
|
+
cert_sign=True,
|
1004
|
+
crl_sign=True,
|
1005
|
+
),
|
1006
|
+
extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1007
|
+
server_auth=True,
|
1008
|
+
),
|
1009
|
+
),
|
1010
|
+
),
|
1011
|
+
),
|
1012
|
+
lifetime="86400s",
|
1013
|
+
key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
|
1014
|
+
algorithm="RSA_PKCS1_4096_SHA256",
|
1015
|
+
),
|
1016
|
+
deletion_protection=False,
|
1017
|
+
skip_grace_period=True,
|
1018
|
+
ignore_active_certificates_on_deletion=True)
|
1019
|
+
default_certificate = gcp.certificateauthority.Certificate("default",
|
1020
|
+
location="us-central1",
|
1021
|
+
pool=default.name,
|
1022
|
+
name="my-certificate",
|
1023
|
+
lifetime="860s",
|
1024
|
+
config=gcp.certificateauthority.CertificateConfigArgs(
|
1025
|
+
subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
|
1026
|
+
subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
|
1027
|
+
common_name="san1.example.com",
|
1028
|
+
country_code="us",
|
1029
|
+
organization="google",
|
1030
|
+
organizational_unit="enterprise",
|
1031
|
+
locality="mountain view",
|
1032
|
+
province="california",
|
1033
|
+
street_address="1600 amphitheatre parkway",
|
1034
|
+
postal_code="94109",
|
1035
|
+
),
|
1036
|
+
),
|
1037
|
+
subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
|
1038
|
+
key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
|
1039
|
+
),
|
1040
|
+
x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
|
1041
|
+
ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
|
1042
|
+
is_ca=False,
|
1043
|
+
),
|
1044
|
+
key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
|
1045
|
+
base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1046
|
+
crl_sign=True,
|
1047
|
+
),
|
1048
|
+
extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1049
|
+
server_auth=True,
|
1050
|
+
),
|
1051
|
+
),
|
1052
|
+
),
|
1053
|
+
public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
|
1054
|
+
format="PEM",
|
1055
|
+
key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
|
1056
|
+
),
|
1057
|
+
))
|
1058
|
+
```
|
971
1059
|
|
972
1060
|
## Import
|
973
1061
|
|
@@ -1407,6 +1495,94 @@ class Certificate(pulumi.CustomResource):
|
|
1407
1495
|
),
|
1408
1496
|
))
|
1409
1497
|
```
|
1498
|
+
### Privateca Certificate Custom Ski
|
1499
|
+
|
1500
|
+
```python
|
1501
|
+
import pulumi
|
1502
|
+
import pulumi_gcp as gcp
|
1503
|
+
import pulumi_std as std
|
1504
|
+
|
1505
|
+
default = gcp.certificateauthority.CaPool("default",
|
1506
|
+
location="us-central1",
|
1507
|
+
name="my-pool",
|
1508
|
+
tier="ENTERPRISE")
|
1509
|
+
default_authority = gcp.certificateauthority.Authority("default",
|
1510
|
+
location="us-central1",
|
1511
|
+
pool=default.name,
|
1512
|
+
certificate_authority_id="my-authority",
|
1513
|
+
config=gcp.certificateauthority.AuthorityConfigArgs(
|
1514
|
+
subject_config=gcp.certificateauthority.AuthorityConfigSubjectConfigArgs(
|
1515
|
+
subject=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectArgs(
|
1516
|
+
organization="HashiCorp",
|
1517
|
+
common_name="my-certificate-authority",
|
1518
|
+
),
|
1519
|
+
subject_alt_name=gcp.certificateauthority.AuthorityConfigSubjectConfigSubjectAltNameArgs(
|
1520
|
+
dns_names=["hashicorp.com"],
|
1521
|
+
),
|
1522
|
+
),
|
1523
|
+
x509_config=gcp.certificateauthority.AuthorityConfigX509ConfigArgs(
|
1524
|
+
ca_options=gcp.certificateauthority.AuthorityConfigX509ConfigCaOptionsArgs(
|
1525
|
+
is_ca=True,
|
1526
|
+
),
|
1527
|
+
key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageArgs(
|
1528
|
+
base_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1529
|
+
digital_signature=True,
|
1530
|
+
cert_sign=True,
|
1531
|
+
crl_sign=True,
|
1532
|
+
),
|
1533
|
+
extended_key_usage=gcp.certificateauthority.AuthorityConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1534
|
+
server_auth=True,
|
1535
|
+
),
|
1536
|
+
),
|
1537
|
+
),
|
1538
|
+
),
|
1539
|
+
lifetime="86400s",
|
1540
|
+
key_spec=gcp.certificateauthority.AuthorityKeySpecArgs(
|
1541
|
+
algorithm="RSA_PKCS1_4096_SHA256",
|
1542
|
+
),
|
1543
|
+
deletion_protection=False,
|
1544
|
+
skip_grace_period=True,
|
1545
|
+
ignore_active_certificates_on_deletion=True)
|
1546
|
+
default_certificate = gcp.certificateauthority.Certificate("default",
|
1547
|
+
location="us-central1",
|
1548
|
+
pool=default.name,
|
1549
|
+
name="my-certificate",
|
1550
|
+
lifetime="860s",
|
1551
|
+
config=gcp.certificateauthority.CertificateConfigArgs(
|
1552
|
+
subject_config=gcp.certificateauthority.CertificateConfigSubjectConfigArgs(
|
1553
|
+
subject=gcp.certificateauthority.CertificateConfigSubjectConfigSubjectArgs(
|
1554
|
+
common_name="san1.example.com",
|
1555
|
+
country_code="us",
|
1556
|
+
organization="google",
|
1557
|
+
organizational_unit="enterprise",
|
1558
|
+
locality="mountain view",
|
1559
|
+
province="california",
|
1560
|
+
street_address="1600 amphitheatre parkway",
|
1561
|
+
postal_code="94109",
|
1562
|
+
),
|
1563
|
+
),
|
1564
|
+
subject_key_id=gcp.certificateauthority.CertificateConfigSubjectKeyIdArgs(
|
1565
|
+
key_id="4cf3372289b1d411b999dbb9ebcd44744b6b2fca",
|
1566
|
+
),
|
1567
|
+
x509_config=gcp.certificateauthority.CertificateConfigX509ConfigArgs(
|
1568
|
+
ca_options=gcp.certificateauthority.CertificateConfigX509ConfigCaOptionsArgs(
|
1569
|
+
is_ca=False,
|
1570
|
+
),
|
1571
|
+
key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageArgs(
|
1572
|
+
base_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageBaseKeyUsageArgs(
|
1573
|
+
crl_sign=True,
|
1574
|
+
),
|
1575
|
+
extended_key_usage=gcp.certificateauthority.CertificateConfigX509ConfigKeyUsageExtendedKeyUsageArgs(
|
1576
|
+
server_auth=True,
|
1577
|
+
),
|
1578
|
+
),
|
1579
|
+
),
|
1580
|
+
public_key=gcp.certificateauthority.CertificateConfigPublicKeyArgs(
|
1581
|
+
format="PEM",
|
1582
|
+
key=std.filebase64(input="test-fixtures/rsa_public.pem").result,
|
1583
|
+
),
|
1584
|
+
))
|
1585
|
+
```
|
1410
1586
|
|
1411
1587
|
## Import
|
1412
1588
|
|
@@ -16,6 +16,7 @@ __all__ = [
|
|
16
16
|
'AuthorityConfigSubjectConfig',
|
17
17
|
'AuthorityConfigSubjectConfigSubject',
|
18
18
|
'AuthorityConfigSubjectConfigSubjectAltName',
|
19
|
+
'AuthorityConfigSubjectKeyId',
|
19
20
|
'AuthorityConfigX509Config',
|
20
21
|
'AuthorityConfigX509ConfigAdditionalExtension',
|
21
22
|
'AuthorityConfigX509ConfigAdditionalExtensionObjectId',
|
@@ -74,6 +75,7 @@ __all__ = [
|
|
74
75
|
'CertificateConfigSubjectConfig',
|
75
76
|
'CertificateConfigSubjectConfigSubject',
|
76
77
|
'CertificateConfigSubjectConfigSubjectAltName',
|
78
|
+
'CertificateConfigSubjectKeyId',
|
77
79
|
'CertificateConfigX509Config',
|
78
80
|
'CertificateConfigX509ConfigAdditionalExtension',
|
79
81
|
'CertificateConfigX509ConfigAdditionalExtensionObjectId',
|
@@ -105,6 +107,7 @@ __all__ = [
|
|
105
107
|
'GetAuthorityConfigSubjectConfigResult',
|
106
108
|
'GetAuthorityConfigSubjectConfigSubjectResult',
|
107
109
|
'GetAuthorityConfigSubjectConfigSubjectAltNameResult',
|
110
|
+
'GetAuthorityConfigSubjectKeyIdResult',
|
108
111
|
'GetAuthorityConfigX509ConfigResult',
|
109
112
|
'GetAuthorityConfigX509ConfigAdditionalExtensionResult',
|
110
113
|
'GetAuthorityConfigX509ConfigAdditionalExtensionObjectIdResult',
|
@@ -187,6 +190,8 @@ class AuthorityConfig(dict):
|
|
187
190
|
suggest = "subject_config"
|
188
191
|
elif key == "x509Config":
|
189
192
|
suggest = "x509_config"
|
193
|
+
elif key == "subjectKeyId":
|
194
|
+
suggest = "subject_key_id"
|
190
195
|
|
191
196
|
if suggest:
|
192
197
|
pulumi.log.warn(f"Key '{key}' not found in AuthorityConfig. Access the value via the '{suggest}' property getter instead.")
|
@@ -201,18 +206,20 @@ class AuthorityConfig(dict):
|
|
201
206
|
|
202
207
|
def __init__(__self__, *,
|
203
208
|
subject_config: 'outputs.AuthorityConfigSubjectConfig',
|
204
|
-
x509_config: 'outputs.AuthorityConfigX509Config'
|
209
|
+
x509_config: 'outputs.AuthorityConfigX509Config',
|
210
|
+
subject_key_id: Optional['outputs.AuthorityConfigSubjectKeyId'] = None):
|
205
211
|
"""
|
206
212
|
:param 'AuthorityConfigSubjectConfigArgs' subject_config: Specifies some of the values in a certificate that are related to the subject.
|
207
213
|
Structure is documented below.
|
208
|
-
|
209
|
-
|
210
|
-
<a name="nested_x509_config"></a>The `x509_config` block supports:
|
211
214
|
:param 'AuthorityConfigX509ConfigArgs' x509_config: Describes how some of the technical X.509 fields in a certificate should be populated.
|
212
215
|
Structure is documented below.
|
216
|
+
:param 'AuthorityConfigSubjectKeyIdArgs' subject_key_id: When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
|
217
|
+
Structure is documented below.
|
213
218
|
"""
|
214
219
|
pulumi.set(__self__, "subject_config", subject_config)
|
215
220
|
pulumi.set(__self__, "x509_config", x509_config)
|
221
|
+
if subject_key_id is not None:
|
222
|
+
pulumi.set(__self__, "subject_key_id", subject_key_id)
|
216
223
|
|
217
224
|
@property
|
218
225
|
@pulumi.getter(name="subjectConfig")
|
@@ -220,9 +227,6 @@ class AuthorityConfig(dict):
|
|
220
227
|
"""
|
221
228
|
Specifies some of the values in a certificate that are related to the subject.
|
222
229
|
Structure is documented below.
|
223
|
-
|
224
|
-
|
225
|
-
<a name="nested_x509_config"></a>The `x509_config` block supports:
|
226
230
|
"""
|
227
231
|
return pulumi.get(self, "subject_config")
|
228
232
|
|
@@ -235,6 +239,15 @@ class AuthorityConfig(dict):
|
|
235
239
|
"""
|
236
240
|
return pulumi.get(self, "x509_config")
|
237
241
|
|
242
|
+
@property
|
243
|
+
@pulumi.getter(name="subjectKeyId")
|
244
|
+
def subject_key_id(self) -> Optional['outputs.AuthorityConfigSubjectKeyId']:
|
245
|
+
"""
|
246
|
+
When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
|
247
|
+
Structure is documented below.
|
248
|
+
"""
|
249
|
+
return pulumi.get(self, "subject_key_id")
|
250
|
+
|
238
251
|
|
239
252
|
@pulumi.output_type
|
240
253
|
class AuthorityConfigSubjectConfig(dict):
|
@@ -489,6 +502,46 @@ class AuthorityConfigSubjectConfigSubjectAltName(dict):
|
|
489
502
|
return pulumi.get(self, "uris")
|
490
503
|
|
491
504
|
|
505
|
+
@pulumi.output_type
|
506
|
+
class AuthorityConfigSubjectKeyId(dict):
|
507
|
+
@staticmethod
|
508
|
+
def __key_warning(key: str):
|
509
|
+
suggest = None
|
510
|
+
if key == "keyId":
|
511
|
+
suggest = "key_id"
|
512
|
+
|
513
|
+
if suggest:
|
514
|
+
pulumi.log.warn(f"Key '{key}' not found in AuthorityConfigSubjectKeyId. Access the value via the '{suggest}' property getter instead.")
|
515
|
+
|
516
|
+
def __getitem__(self, key: str) -> Any:
|
517
|
+
AuthorityConfigSubjectKeyId.__key_warning(key)
|
518
|
+
return super().__getitem__(key)
|
519
|
+
|
520
|
+
def get(self, key: str, default = None) -> Any:
|
521
|
+
AuthorityConfigSubjectKeyId.__key_warning(key)
|
522
|
+
return super().get(key, default)
|
523
|
+
|
524
|
+
def __init__(__self__, *,
|
525
|
+
key_id: Optional[str] = None):
|
526
|
+
"""
|
527
|
+
:param str key_id: The value of the KeyId in lowercase hexidecimal.
|
528
|
+
|
529
|
+
<a name="nested_x509_config"></a>The `x509_config` block supports:
|
530
|
+
"""
|
531
|
+
if key_id is not None:
|
532
|
+
pulumi.set(__self__, "key_id", key_id)
|
533
|
+
|
534
|
+
@property
|
535
|
+
@pulumi.getter(name="keyId")
|
536
|
+
def key_id(self) -> Optional[str]:
|
537
|
+
"""
|
538
|
+
The value of the KeyId in lowercase hexidecimal.
|
539
|
+
|
540
|
+
<a name="nested_x509_config"></a>The `x509_config` block supports:
|
541
|
+
"""
|
542
|
+
return pulumi.get(self, "key_id")
|
543
|
+
|
544
|
+
|
492
545
|
@pulumi.output_type
|
493
546
|
class AuthorityConfigX509Config(dict):
|
494
547
|
@staticmethod
|
@@ -3720,8 +3773,7 @@ class CertificateCertificateDescriptionSubjectKeyId(dict):
|
|
3720
3773
|
def __init__(__self__, *,
|
3721
3774
|
key_id: Optional[str] = None):
|
3722
3775
|
"""
|
3723
|
-
:param str key_id:
|
3724
|
-
Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
|
3776
|
+
:param str key_id: The value of the KeyId in lowercase hexidecimal.
|
3725
3777
|
"""
|
3726
3778
|
if key_id is not None:
|
3727
3779
|
pulumi.set(__self__, "key_id", key_id)
|
@@ -3730,8 +3782,7 @@ class CertificateCertificateDescriptionSubjectKeyId(dict):
|
|
3730
3782
|
@pulumi.getter(name="keyId")
|
3731
3783
|
def key_id(self) -> Optional[str]:
|
3732
3784
|
"""
|
3733
|
-
|
3734
|
-
Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
|
3785
|
+
The value of the KeyId in lowercase hexidecimal.
|
3735
3786
|
"""
|
3736
3787
|
return pulumi.get(self, "key_id")
|
3737
3788
|
|
@@ -4619,6 +4670,8 @@ class CertificateConfig(dict):
|
|
4619
4670
|
suggest = "subject_config"
|
4620
4671
|
elif key == "x509Config":
|
4621
4672
|
suggest = "x509_config"
|
4673
|
+
elif key == "subjectKeyId":
|
4674
|
+
suggest = "subject_key_id"
|
4622
4675
|
|
4623
4676
|
if suggest:
|
4624
4677
|
pulumi.log.warn(f"Key '{key}' not found in CertificateConfig. Access the value via the '{suggest}' property getter instead.")
|
@@ -4634,7 +4687,8 @@ class CertificateConfig(dict):
|
|
4634
4687
|
def __init__(__self__, *,
|
4635
4688
|
public_key: 'outputs.CertificateConfigPublicKey',
|
4636
4689
|
subject_config: 'outputs.CertificateConfigSubjectConfig',
|
4637
|
-
x509_config: 'outputs.CertificateConfigX509Config'
|
4690
|
+
x509_config: 'outputs.CertificateConfigX509Config',
|
4691
|
+
subject_key_id: Optional['outputs.CertificateConfigSubjectKeyId'] = None):
|
4638
4692
|
"""
|
4639
4693
|
:param 'CertificateConfigPublicKeyArgs' public_key: A PublicKey describes a public key.
|
4640
4694
|
Structure is documented below.
|
@@ -4645,10 +4699,14 @@ class CertificateConfig(dict):
|
|
4645
4699
|
Structure is documented below.
|
4646
4700
|
:param 'CertificateConfigX509ConfigArgs' x509_config: Describes how some of the technical X.509 fields in a certificate should be populated.
|
4647
4701
|
Structure is documented below.
|
4702
|
+
:param 'CertificateConfigSubjectKeyIdArgs' subject_key_id: When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
|
4703
|
+
Structure is documented below.
|
4648
4704
|
"""
|
4649
4705
|
pulumi.set(__self__, "public_key", public_key)
|
4650
4706
|
pulumi.set(__self__, "subject_config", subject_config)
|
4651
4707
|
pulumi.set(__self__, "x509_config", x509_config)
|
4708
|
+
if subject_key_id is not None:
|
4709
|
+
pulumi.set(__self__, "subject_key_id", subject_key_id)
|
4652
4710
|
|
4653
4711
|
@property
|
4654
4712
|
@pulumi.getter(name="publicKey")
|
@@ -4680,6 +4738,15 @@ class CertificateConfig(dict):
|
|
4680
4738
|
"""
|
4681
4739
|
return pulumi.get(self, "x509_config")
|
4682
4740
|
|
4741
|
+
@property
|
4742
|
+
@pulumi.getter(name="subjectKeyId")
|
4743
|
+
def subject_key_id(self) -> Optional['outputs.CertificateConfigSubjectKeyId']:
|
4744
|
+
"""
|
4745
|
+
When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
|
4746
|
+
Structure is documented below.
|
4747
|
+
"""
|
4748
|
+
return pulumi.get(self, "subject_key_id")
|
4749
|
+
|
4683
4750
|
|
4684
4751
|
@pulumi.output_type
|
4685
4752
|
class CertificateConfigPublicKey(dict):
|
@@ -4966,6 +5033,42 @@ class CertificateConfigSubjectConfigSubjectAltName(dict):
|
|
4966
5033
|
return pulumi.get(self, "uris")
|
4967
5034
|
|
4968
5035
|
|
5036
|
+
@pulumi.output_type
|
5037
|
+
class CertificateConfigSubjectKeyId(dict):
|
5038
|
+
@staticmethod
|
5039
|
+
def __key_warning(key: str):
|
5040
|
+
suggest = None
|
5041
|
+
if key == "keyId":
|
5042
|
+
suggest = "key_id"
|
5043
|
+
|
5044
|
+
if suggest:
|
5045
|
+
pulumi.log.warn(f"Key '{key}' not found in CertificateConfigSubjectKeyId. Access the value via the '{suggest}' property getter instead.")
|
5046
|
+
|
5047
|
+
def __getitem__(self, key: str) -> Any:
|
5048
|
+
CertificateConfigSubjectKeyId.__key_warning(key)
|
5049
|
+
return super().__getitem__(key)
|
5050
|
+
|
5051
|
+
def get(self, key: str, default = None) -> Any:
|
5052
|
+
CertificateConfigSubjectKeyId.__key_warning(key)
|
5053
|
+
return super().get(key, default)
|
5054
|
+
|
5055
|
+
def __init__(__self__, *,
|
5056
|
+
key_id: Optional[str] = None):
|
5057
|
+
"""
|
5058
|
+
:param str key_id: The value of the KeyId in lowercase hexidecimal.
|
5059
|
+
"""
|
5060
|
+
if key_id is not None:
|
5061
|
+
pulumi.set(__self__, "key_id", key_id)
|
5062
|
+
|
5063
|
+
@property
|
5064
|
+
@pulumi.getter(name="keyId")
|
5065
|
+
def key_id(self) -> Optional[str]:
|
5066
|
+
"""
|
5067
|
+
The value of the KeyId in lowercase hexidecimal.
|
5068
|
+
"""
|
5069
|
+
return pulumi.get(self, "key_id")
|
5070
|
+
|
5071
|
+
|
4969
5072
|
@pulumi.output_type
|
4970
5073
|
class CertificateConfigX509Config(dict):
|
4971
5074
|
@staticmethod
|
@@ -6856,12 +6959,15 @@ class GetAuthorityAccessUrlResult(dict):
|
|
6856
6959
|
class GetAuthorityConfigResult(dict):
|
6857
6960
|
def __init__(__self__, *,
|
6858
6961
|
subject_configs: Sequence['outputs.GetAuthorityConfigSubjectConfigResult'],
|
6962
|
+
subject_key_ids: Sequence['outputs.GetAuthorityConfigSubjectKeyIdResult'],
|
6859
6963
|
x509_configs: Sequence['outputs.GetAuthorityConfigX509ConfigResult']):
|
6860
6964
|
"""
|
6861
6965
|
:param Sequence['GetAuthorityConfigSubjectConfigArgs'] subject_configs: Specifies some of the values in a certificate that are related to the subject.
|
6966
|
+
:param Sequence['GetAuthorityConfigSubjectKeyIdArgs'] subject_key_ids: When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
|
6862
6967
|
:param Sequence['GetAuthorityConfigX509ConfigArgs'] x509_configs: Describes how some of the technical X.509 fields in a certificate should be populated.
|
6863
6968
|
"""
|
6864
6969
|
pulumi.set(__self__, "subject_configs", subject_configs)
|
6970
|
+
pulumi.set(__self__, "subject_key_ids", subject_key_ids)
|
6865
6971
|
pulumi.set(__self__, "x509_configs", x509_configs)
|
6866
6972
|
|
6867
6973
|
@property
|
@@ -6872,6 +6978,14 @@ class GetAuthorityConfigResult(dict):
|
|
6872
6978
|
"""
|
6873
6979
|
return pulumi.get(self, "subject_configs")
|
6874
6980
|
|
6981
|
+
@property
|
6982
|
+
@pulumi.getter(name="subjectKeyIds")
|
6983
|
+
def subject_key_ids(self) -> Sequence['outputs.GetAuthorityConfigSubjectKeyIdResult']:
|
6984
|
+
"""
|
6985
|
+
When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2..
|
6986
|
+
"""
|
6987
|
+
return pulumi.get(self, "subject_key_ids")
|
6988
|
+
|
6875
6989
|
@property
|
6876
6990
|
@pulumi.getter(name="x509Configs")
|
6877
6991
|
def x509_configs(self) -> Sequence['outputs.GetAuthorityConfigX509ConfigResult']:
|
@@ -7056,6 +7170,24 @@ class GetAuthorityConfigSubjectConfigSubjectAltNameResult(dict):
|
|
7056
7170
|
return pulumi.get(self, "uris")
|
7057
7171
|
|
7058
7172
|
|
7173
|
+
@pulumi.output_type
|
7174
|
+
class GetAuthorityConfigSubjectKeyIdResult(dict):
|
7175
|
+
def __init__(__self__, *,
|
7176
|
+
key_id: str):
|
7177
|
+
"""
|
7178
|
+
:param str key_id: The value of the KeyId in lowercase hexidecimal.
|
7179
|
+
"""
|
7180
|
+
pulumi.set(__self__, "key_id", key_id)
|
7181
|
+
|
7182
|
+
@property
|
7183
|
+
@pulumi.getter(name="keyId")
|
7184
|
+
def key_id(self) -> str:
|
7185
|
+
"""
|
7186
|
+
The value of the KeyId in lowercase hexidecimal.
|
7187
|
+
"""
|
7188
|
+
return pulumi.get(self, "key_id")
|
7189
|
+
|
7190
|
+
|
7059
7191
|
@pulumi.output_type
|
7060
7192
|
class GetAuthorityConfigX509ConfigResult(dict):
|
7061
7193
|
def __init__(__self__, *,
|