pulumi-tls 4.11.0a1678132302__tar.gz → 5.0.0a0__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/PKG-INFO +3 -3
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/README.md +2 -2
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/cert_request.py +5 -33
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/get_public_key.py +7 -7
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/locally_signed_cert.py +8 -36
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/private_key.py +57 -33
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/self_signed_cert.py +9 -37
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/PKG-INFO +3 -3
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/setup.py +2 -2
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/__init__.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/_inputs.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/_utilities.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/config/__init__.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/config/outputs.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/config/vars.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/get_certificate.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/outputs.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/provider.py +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/pulumi-plugin.json +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/py.typed +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/SOURCES.txt +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/dependency_links.txt +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/not-zip-safe +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/requires.txt +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/top_level.txt +0 -0
- {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: pulumi_tls
|
3
|
-
Version:
|
3
|
+
Version: 5.0.0a0
|
4
4
|
Summary: A Pulumi package to create TLS resources in Pulumi programs.
|
5
5
|
Home-page: https://pulumi.io
|
6
6
|
License: Apache-2.0
|
@@ -14,7 +14,7 @@ Description-Content-Type: text/markdown
|
|
14
14
|
[](https://www.npmjs.com/package/@pulumi/tls)
|
15
15
|
[](https://pypi.org/project/pulumi-tls)
|
16
16
|
[](https://badge.fury.io/nu/pulumi.tls)
|
17
|
-
[](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
|
18
18
|
[](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
|
19
19
|
|
20
20
|
# TLS Resource Provider
|
@@ -46,7 +46,7 @@ To use from Python, install using `pip`:
|
|
46
46
|
|
47
47
|
To use from Go, use `go get` to grab the latest version of the library
|
48
48
|
|
49
|
-
$ go get github.com/pulumi/pulumi-tls/sdk/
|
49
|
+
$ go get github.com/pulumi/pulumi-tls/sdk/v5
|
50
50
|
|
51
51
|
### .NET
|
52
52
|
|
@@ -3,7 +3,7 @@
|
|
3
3
|
[](https://www.npmjs.com/package/@pulumi/tls)
|
4
4
|
[](https://pypi.org/project/pulumi-tls)
|
5
5
|
[](https://badge.fury.io/nu/pulumi.tls)
|
6
|
-
[](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
|
7
7
|
[](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
|
8
8
|
|
9
9
|
# TLS Resource Provider
|
@@ -35,7 +35,7 @@ To use from Python, install using `pip`:
|
|
35
35
|
|
36
36
|
To use from Go, use `go get` to grab the latest version of the library
|
37
37
|
|
38
|
-
$ go get github.com/pulumi/pulumi-tls/sdk/
|
38
|
+
$ go get github.com/pulumi/pulumi-tls/sdk/v5
|
39
39
|
|
40
40
|
### .NET
|
41
41
|
|
@@ -19,7 +19,6 @@ class CertRequestArgs:
|
|
19
19
|
private_key_pem: pulumi.Input[str],
|
20
20
|
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
21
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
23
22
|
subject: Optional[pulumi.Input['CertRequestSubjectArgs']] = None,
|
24
23
|
uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
25
24
|
"""
|
@@ -29,7 +28,6 @@ class CertRequestArgs:
|
|
29
28
|
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
30
29
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
31
30
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
32
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
33
31
|
:param pulumi.Input['CertRequestSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
34
32
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
35
33
|
"""
|
@@ -38,11 +36,6 @@ class CertRequestArgs:
|
|
38
36
|
pulumi.set(__self__, "dns_names", dns_names)
|
39
37
|
if ip_addresses is not None:
|
40
38
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
41
|
-
if key_algorithm is not None:
|
42
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
43
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
44
|
-
if key_algorithm is not None:
|
45
|
-
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
46
39
|
if subject is not None:
|
47
40
|
pulumi.set(__self__, "subject", subject)
|
48
41
|
if uris is not None:
|
@@ -86,18 +79,6 @@ class CertRequestArgs:
|
|
86
79
|
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
87
80
|
pulumi.set(self, "ip_addresses", value)
|
88
81
|
|
89
|
-
@property
|
90
|
-
@pulumi.getter(name="keyAlgorithm")
|
91
|
-
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
92
|
-
"""
|
93
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
94
|
-
"""
|
95
|
-
return pulumi.get(self, "key_algorithm")
|
96
|
-
|
97
|
-
@key_algorithm.setter
|
98
|
-
def key_algorithm(self, value: Optional[pulumi.Input[str]]):
|
99
|
-
pulumi.set(self, "key_algorithm", value)
|
100
|
-
|
101
82
|
@property
|
102
83
|
@pulumi.getter
|
103
84
|
def subject(self) -> Optional[pulumi.Input['CertRequestSubjectArgs']]:
|
@@ -142,7 +123,7 @@ class _CertRequestState:
|
|
142
123
|
[`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
143
124
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
144
125
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
145
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
126
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
146
127
|
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
147
128
|
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
148
129
|
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
@@ -155,9 +136,6 @@ class _CertRequestState:
|
|
155
136
|
pulumi.set(__self__, "dns_names", dns_names)
|
156
137
|
if ip_addresses is not None:
|
157
138
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
158
|
-
if key_algorithm is not None:
|
159
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
160
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
161
139
|
if key_algorithm is not None:
|
162
140
|
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
163
141
|
if private_key_pem is not None:
|
@@ -211,7 +189,7 @@ class _CertRequestState:
|
|
211
189
|
@pulumi.getter(name="keyAlgorithm")
|
212
190
|
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
213
191
|
"""
|
214
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
192
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
215
193
|
"""
|
216
194
|
return pulumi.get(self, "key_algorithm")
|
217
195
|
|
@@ -265,7 +243,6 @@ class CertRequest(pulumi.CustomResource):
|
|
265
243
|
opts: Optional[pulumi.ResourceOptions] = None,
|
266
244
|
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
267
245
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
268
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
269
246
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
270
247
|
subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
|
271
248
|
uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -289,7 +266,6 @@ class CertRequest(pulumi.CustomResource):
|
|
289
266
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
290
267
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
291
268
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
292
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
293
269
|
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
294
270
|
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
295
271
|
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
@@ -334,7 +310,6 @@ class CertRequest(pulumi.CustomResource):
|
|
334
310
|
opts: Optional[pulumi.ResourceOptions] = None,
|
335
311
|
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
336
312
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
337
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
338
313
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
339
314
|
subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
|
340
315
|
uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -349,16 +324,13 @@ class CertRequest(pulumi.CustomResource):
|
|
349
324
|
|
350
325
|
__props__.__dict__["dns_names"] = dns_names
|
351
326
|
__props__.__dict__["ip_addresses"] = ip_addresses
|
352
|
-
if key_algorithm is not None and not opts.urn:
|
353
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
354
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
355
|
-
__props__.__dict__["key_algorithm"] = key_algorithm
|
356
327
|
if private_key_pem is None and not opts.urn:
|
357
328
|
raise TypeError("Missing required property 'private_key_pem'")
|
358
329
|
__props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
|
359
330
|
__props__.__dict__["subject"] = subject
|
360
331
|
__props__.__dict__["uris"] = uris
|
361
332
|
__props__.__dict__["cert_request_pem"] = None
|
333
|
+
__props__.__dict__["key_algorithm"] = None
|
362
334
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyPem"])
|
363
335
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
364
336
|
super(CertRequest, __self__).__init__(
|
@@ -392,7 +364,7 @@ class CertRequest(pulumi.CustomResource):
|
|
392
364
|
[`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
393
365
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
394
366
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
395
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
367
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
396
368
|
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
397
369
|
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
398
370
|
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
@@ -444,7 +416,7 @@ class CertRequest(pulumi.CustomResource):
|
|
444
416
|
@pulumi.getter(name="keyAlgorithm")
|
445
417
|
def key_algorithm(self) -> pulumi.Output[str]:
|
446
418
|
"""
|
447
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
419
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
448
420
|
"""
|
449
421
|
return pulumi.get(self, "key_algorithm")
|
450
422
|
|
@@ -51,7 +51,7 @@ class GetPublicKeyResult:
|
|
51
51
|
@pulumi.getter
|
52
52
|
def algorithm(self) -> str:
|
53
53
|
"""
|
54
|
-
The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA
|
54
|
+
The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA`, `ED25519`.
|
55
55
|
"""
|
56
56
|
return pulumi.get(self, "algorithm")
|
57
57
|
|
@@ -67,7 +67,7 @@ class GetPublicKeyResult:
|
|
67
67
|
@pulumi.getter(name="privateKeyOpenssh")
|
68
68
|
def private_key_openssh(self) -> Optional[str]:
|
69
69
|
"""
|
70
|
-
The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
70
|
+
The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
71
71
|
"""
|
72
72
|
return pulumi.get(self, "private_key_openssh")
|
73
73
|
|
@@ -75,7 +75,7 @@ class GetPublicKeyResult:
|
|
75
75
|
@pulumi.getter(name="privateKeyPem")
|
76
76
|
def private_key_pem(self) -> Optional[str]:
|
77
77
|
"""
|
78
|
-
The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
78
|
+
The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
79
79
|
"""
|
80
80
|
return pulumi.get(self, "private_key_pem")
|
81
81
|
|
@@ -142,8 +142,8 @@ def get_public_key(private_key_openssh: Optional[str] = None,
|
|
142
142
|
```
|
143
143
|
|
144
144
|
|
145
|
-
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
146
|
-
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
145
|
+
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
146
|
+
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
147
147
|
"""
|
148
148
|
__args__ = dict()
|
149
149
|
__args__['privateKeyOpenssh'] = private_key_openssh
|
@@ -183,7 +183,7 @@ def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[st
|
|
183
183
|
```
|
184
184
|
|
185
185
|
|
186
|
-
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
187
|
-
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
186
|
+
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
187
|
+
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
188
188
|
"""
|
189
189
|
...
|
@@ -19,7 +19,6 @@ class LocallySignedCertArgs:
|
|
19
19
|
ca_private_key_pem: pulumi.Input[str],
|
20
20
|
cert_request_pem: pulumi.Input[str],
|
21
21
|
validity_period_hours: pulumi.Input[int],
|
22
|
-
ca_key_algorithm: Optional[pulumi.Input[str]] = None,
|
23
22
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
24
23
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
25
24
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None):
|
@@ -30,7 +29,6 @@ class LocallySignedCertArgs:
|
|
30
29
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
31
30
|
:param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
32
31
|
:param pulumi.Input[int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
33
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
34
32
|
:param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
35
33
|
can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
|
36
34
|
certificate remains valid until its true expiration time, since this resource does not (and cannot) support certificate
|
@@ -44,11 +42,6 @@ class LocallySignedCertArgs:
|
|
44
42
|
pulumi.set(__self__, "ca_private_key_pem", ca_private_key_pem)
|
45
43
|
pulumi.set(__self__, "cert_request_pem", cert_request_pem)
|
46
44
|
pulumi.set(__self__, "validity_period_hours", validity_period_hours)
|
47
|
-
if ca_key_algorithm is not None:
|
48
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
49
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
50
|
-
if ca_key_algorithm is not None:
|
51
|
-
pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
|
52
45
|
if early_renewal_hours is not None:
|
53
46
|
pulumi.set(__self__, "early_renewal_hours", early_renewal_hours)
|
54
47
|
if is_ca_certificate is not None:
|
@@ -116,18 +109,6 @@ class LocallySignedCertArgs:
|
|
116
109
|
def validity_period_hours(self, value: pulumi.Input[int]):
|
117
110
|
pulumi.set(self, "validity_period_hours", value)
|
118
111
|
|
119
|
-
@property
|
120
|
-
@pulumi.getter(name="caKeyAlgorithm")
|
121
|
-
def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
122
|
-
"""
|
123
|
-
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
124
|
-
"""
|
125
|
-
return pulumi.get(self, "ca_key_algorithm")
|
126
|
-
|
127
|
-
@ca_key_algorithm.setter
|
128
|
-
def ca_key_algorithm(self, value: Optional[pulumi.Input[str]]):
|
129
|
-
pulumi.set(self, "ca_key_algorithm", value)
|
130
|
-
|
131
112
|
@property
|
132
113
|
@pulumi.getter(name="earlyRenewalHours")
|
133
114
|
def early_renewal_hours(self) -> Optional[pulumi.Input[int]]:
|
@@ -189,7 +170,7 @@ class _LocallySignedCertState:
|
|
189
170
|
Input properties used for looking up and filtering LocallySignedCert resources.
|
190
171
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
191
172
|
:param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
192
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
173
|
+
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
193
174
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
194
175
|
:param pulumi.Input[str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the
|
195
176
|
[underlying](https://pkg.go.dev/encoding/pem#Encode)
|
@@ -213,9 +194,6 @@ class _LocallySignedCertState:
|
|
213
194
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
214
195
|
if ca_cert_pem is not None:
|
215
196
|
pulumi.set(__self__, "ca_cert_pem", ca_cert_pem)
|
216
|
-
if ca_key_algorithm is not None:
|
217
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
218
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
219
197
|
if ca_key_algorithm is not None:
|
220
198
|
pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
|
221
199
|
if ca_private_key_pem is not None:
|
@@ -267,7 +245,7 @@ class _LocallySignedCertState:
|
|
267
245
|
@pulumi.getter(name="caKeyAlgorithm")
|
268
246
|
def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
269
247
|
"""
|
270
|
-
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
248
|
+
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
271
249
|
"""
|
272
250
|
return pulumi.get(self, "ca_key_algorithm")
|
273
251
|
|
@@ -411,7 +389,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
411
389
|
opts: Optional[pulumi.ResourceOptions] = None,
|
412
390
|
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
413
391
|
ca_cert_pem: Optional[pulumi.Input[str]] = None,
|
414
|
-
ca_key_algorithm: Optional[pulumi.Input[str]] = None,
|
415
392
|
ca_private_key_pem: Optional[pulumi.Input[str]] = None,
|
416
393
|
cert_request_pem: Optional[pulumi.Input[str]] = None,
|
417
394
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
@@ -425,7 +402,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
425
402
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
426
403
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
427
404
|
:param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
428
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
429
405
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
430
406
|
:param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
431
407
|
:param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
@@ -462,7 +438,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
462
438
|
opts: Optional[pulumi.ResourceOptions] = None,
|
463
439
|
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
464
440
|
ca_cert_pem: Optional[pulumi.Input[str]] = None,
|
465
|
-
ca_key_algorithm: Optional[pulumi.Input[str]] = None,
|
466
441
|
ca_private_key_pem: Optional[pulumi.Input[str]] = None,
|
467
442
|
cert_request_pem: Optional[pulumi.Input[str]] = None,
|
468
443
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
@@ -484,10 +459,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
484
459
|
if ca_cert_pem is None and not opts.urn:
|
485
460
|
raise TypeError("Missing required property 'ca_cert_pem'")
|
486
461
|
__props__.__dict__["ca_cert_pem"] = ca_cert_pem
|
487
|
-
if ca_key_algorithm is not None and not opts.urn:
|
488
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
489
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
490
|
-
__props__.__dict__["ca_key_algorithm"] = ca_key_algorithm
|
491
462
|
if ca_private_key_pem is None and not opts.urn:
|
492
463
|
raise TypeError("Missing required property 'ca_private_key_pem'")
|
493
464
|
__props__.__dict__["ca_private_key_pem"] = None if ca_private_key_pem is None else pulumi.Output.secret(ca_private_key_pem)
|
@@ -500,6 +471,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
500
471
|
if validity_period_hours is None and not opts.urn:
|
501
472
|
raise TypeError("Missing required property 'validity_period_hours'")
|
502
473
|
__props__.__dict__["validity_period_hours"] = validity_period_hours
|
474
|
+
__props__.__dict__["ca_key_algorithm"] = None
|
503
475
|
__props__.__dict__["cert_pem"] = None
|
504
476
|
__props__.__dict__["ready_for_renewal"] = None
|
505
477
|
__props__.__dict__["validity_end_time"] = None
|
@@ -538,7 +510,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
538
510
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
539
511
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
540
512
|
:param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
541
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
513
|
+
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
542
514
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
543
515
|
:param pulumi.Input[str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the
|
544
516
|
[underlying](https://pkg.go.dev/encoding/pem#Encode)
|
@@ -597,7 +569,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
597
569
|
@pulumi.getter(name="caKeyAlgorithm")
|
598
570
|
def ca_key_algorithm(self) -> pulumi.Output[str]:
|
599
571
|
"""
|
600
|
-
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
572
|
+
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
601
573
|
"""
|
602
574
|
return pulumi.get(self, "ca_key_algorithm")
|
603
575
|
|
@@ -631,7 +603,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
631
603
|
|
632
604
|
@property
|
633
605
|
@pulumi.getter(name="earlyRenewalHours")
|
634
|
-
def early_renewal_hours(self) -> pulumi.Output[
|
606
|
+
def early_renewal_hours(self) -> pulumi.Output[int]:
|
635
607
|
"""
|
636
608
|
The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
637
609
|
can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
|
@@ -643,7 +615,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
643
615
|
|
644
616
|
@property
|
645
617
|
@pulumi.getter(name="isCaCertificate")
|
646
|
-
def is_ca_certificate(self) -> pulumi.Output[
|
618
|
+
def is_ca_certificate(self) -> pulumi.Output[bool]:
|
647
619
|
"""
|
648
620
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
649
621
|
"""
|
@@ -659,7 +631,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
659
631
|
|
660
632
|
@property
|
661
633
|
@pulumi.getter(name="setSubjectKeyId")
|
662
|
-
def set_subject_key_id(self) -> pulumi.Output[
|
634
|
+
def set_subject_key_id(self) -> pulumi.Output[bool]:
|
663
635
|
"""
|
664
636
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
665
637
|
"""
|
@@ -19,8 +19,8 @@ class PrivateKeyArgs:
|
|
19
19
|
rsa_bits: Optional[pulumi.Input[int]] = None):
|
20
20
|
"""
|
21
21
|
The set of arguments for constructing a PrivateKey resource.
|
22
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
23
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
22
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
23
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
24
24
|
:param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
|
25
25
|
"""
|
26
26
|
pulumi.set(__self__, "algorithm", algorithm)
|
@@ -33,7 +33,7 @@ class PrivateKeyArgs:
|
|
33
33
|
@pulumi.getter
|
34
34
|
def algorithm(self) -> pulumi.Input[str]:
|
35
35
|
"""
|
36
|
-
Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
36
|
+
Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
37
37
|
"""
|
38
38
|
return pulumi.get(self, "algorithm")
|
39
39
|
|
@@ -45,7 +45,7 @@ class PrivateKeyArgs:
|
|
45
45
|
@pulumi.getter(name="ecdsaCurve")
|
46
46
|
def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
|
47
47
|
"""
|
48
|
-
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
48
|
+
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
49
49
|
"""
|
50
50
|
return pulumi.get(self, "ecdsa_curve")
|
51
51
|
|
@@ -73,6 +73,7 @@ class _PrivateKeyState:
|
|
73
73
|
ecdsa_curve: Optional[pulumi.Input[str]] = None,
|
74
74
|
private_key_openssh: Optional[pulumi.Input[str]] = None,
|
75
75
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
76
|
+
private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
|
76
77
|
public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
|
77
78
|
public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
|
78
79
|
public_key_openssh: Optional[pulumi.Input[str]] = None,
|
@@ -80,17 +81,17 @@ class _PrivateKeyState:
|
|
80
81
|
rsa_bits: Optional[pulumi.Input[int]] = None):
|
81
82
|
"""
|
82
83
|
Input properties used for looking up and filtering PrivateKey resources.
|
83
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
84
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
84
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
85
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
85
86
|
:param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
|
86
87
|
:param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
88
|
+
:param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
87
89
|
:param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
88
90
|
:param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
89
91
|
:param pulumi.Input[str] public_key_openssh: The public key data in ["Authorized
|
90
|
-
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
|
91
|
-
populated
|
92
|
-
|
93
|
-
supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
92
|
+
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
|
93
|
+
populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
|
94
|
+
[underlying](https://pkg.go.dev/encoding/pem#Encode)
|
94
95
|
[libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
|
95
96
|
the end of the PEM. In case this disrupts your use case, we recommend using
|
96
97
|
[`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
@@ -109,6 +110,8 @@ class _PrivateKeyState:
|
|
109
110
|
pulumi.set(__self__, "private_key_openssh", private_key_openssh)
|
110
111
|
if private_key_pem is not None:
|
111
112
|
pulumi.set(__self__, "private_key_pem", private_key_pem)
|
113
|
+
if private_key_pem_pkcs8 is not None:
|
114
|
+
pulumi.set(__self__, "private_key_pem_pkcs8", private_key_pem_pkcs8)
|
112
115
|
if public_key_fingerprint_md5 is not None:
|
113
116
|
pulumi.set(__self__, "public_key_fingerprint_md5", public_key_fingerprint_md5)
|
114
117
|
if public_key_fingerprint_sha256 is not None:
|
@@ -124,7 +127,7 @@ class _PrivateKeyState:
|
|
124
127
|
@pulumi.getter
|
125
128
|
def algorithm(self) -> Optional[pulumi.Input[str]]:
|
126
129
|
"""
|
127
|
-
Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
130
|
+
Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
128
131
|
"""
|
129
132
|
return pulumi.get(self, "algorithm")
|
130
133
|
|
@@ -136,7 +139,7 @@ class _PrivateKeyState:
|
|
136
139
|
@pulumi.getter(name="ecdsaCurve")
|
137
140
|
def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
|
138
141
|
"""
|
139
|
-
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
142
|
+
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
140
143
|
"""
|
141
144
|
return pulumi.get(self, "ecdsa_curve")
|
142
145
|
|
@@ -168,6 +171,18 @@ class _PrivateKeyState:
|
|
168
171
|
def private_key_pem(self, value: Optional[pulumi.Input[str]]):
|
169
172
|
pulumi.set(self, "private_key_pem", value)
|
170
173
|
|
174
|
+
@property
|
175
|
+
@pulumi.getter(name="privateKeyPemPkcs8")
|
176
|
+
def private_key_pem_pkcs8(self) -> Optional[pulumi.Input[str]]:
|
177
|
+
"""
|
178
|
+
Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
179
|
+
"""
|
180
|
+
return pulumi.get(self, "private_key_pem_pkcs8")
|
181
|
+
|
182
|
+
@private_key_pem_pkcs8.setter
|
183
|
+
def private_key_pem_pkcs8(self, value: Optional[pulumi.Input[str]]):
|
184
|
+
pulumi.set(self, "private_key_pem_pkcs8", value)
|
185
|
+
|
171
186
|
@property
|
172
187
|
@pulumi.getter(name="publicKeyFingerprintMd5")
|
173
188
|
def public_key_fingerprint_md5(self) -> Optional[pulumi.Input[str]]:
|
@@ -197,10 +212,9 @@ class _PrivateKeyState:
|
|
197
212
|
def public_key_openssh(self) -> Optional[pulumi.Input[str]]:
|
198
213
|
"""
|
199
214
|
The public key data in ["Authorized
|
200
|
-
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
|
201
|
-
populated
|
202
|
-
|
203
|
-
supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
215
|
+
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
|
216
|
+
populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
|
217
|
+
[underlying](https://pkg.go.dev/encoding/pem#Encode)
|
204
218
|
[libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
|
205
219
|
the end of the PEM. In case this disrupts your use case, we recommend using
|
206
220
|
[`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
@@ -253,8 +267,8 @@ class PrivateKey(pulumi.CustomResource):
|
|
253
267
|
Create a PrivateKey resource with the given unique name, props, and options.
|
254
268
|
:param str resource_name: The name of the resource.
|
255
269
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
256
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
257
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
270
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
271
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
258
272
|
:param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
|
259
273
|
"""
|
260
274
|
...
|
@@ -299,11 +313,12 @@ class PrivateKey(pulumi.CustomResource):
|
|
299
313
|
__props__.__dict__["rsa_bits"] = rsa_bits
|
300
314
|
__props__.__dict__["private_key_openssh"] = None
|
301
315
|
__props__.__dict__["private_key_pem"] = None
|
316
|
+
__props__.__dict__["private_key_pem_pkcs8"] = None
|
302
317
|
__props__.__dict__["public_key_fingerprint_md5"] = None
|
303
318
|
__props__.__dict__["public_key_fingerprint_sha256"] = None
|
304
319
|
__props__.__dict__["public_key_openssh"] = None
|
305
320
|
__props__.__dict__["public_key_pem"] = None
|
306
|
-
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem"])
|
321
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem", "privateKeyPemPkcs8"])
|
307
322
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
308
323
|
super(PrivateKey, __self__).__init__(
|
309
324
|
'tls:index/privateKey:PrivateKey',
|
@@ -319,6 +334,7 @@ class PrivateKey(pulumi.CustomResource):
|
|
319
334
|
ecdsa_curve: Optional[pulumi.Input[str]] = None,
|
320
335
|
private_key_openssh: Optional[pulumi.Input[str]] = None,
|
321
336
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
337
|
+
private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
|
322
338
|
public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
|
323
339
|
public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
|
324
340
|
public_key_openssh: Optional[pulumi.Input[str]] = None,
|
@@ -331,17 +347,17 @@ class PrivateKey(pulumi.CustomResource):
|
|
331
347
|
:param str resource_name: The unique name of the resulting resource.
|
332
348
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
333
349
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
334
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
335
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
350
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
351
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
336
352
|
:param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
|
337
353
|
:param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
354
|
+
:param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
338
355
|
:param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
339
356
|
:param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
340
357
|
:param pulumi.Input[str] public_key_openssh: The public key data in ["Authorized
|
341
|
-
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
|
342
|
-
populated
|
343
|
-
|
344
|
-
supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
358
|
+
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
|
359
|
+
populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
|
360
|
+
[underlying](https://pkg.go.dev/encoding/pem#Encode)
|
345
361
|
[libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
|
346
362
|
the end of the PEM. In case this disrupts your use case, we recommend using
|
347
363
|
[`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
@@ -360,6 +376,7 @@ class PrivateKey(pulumi.CustomResource):
|
|
360
376
|
__props__.__dict__["ecdsa_curve"] = ecdsa_curve
|
361
377
|
__props__.__dict__["private_key_openssh"] = private_key_openssh
|
362
378
|
__props__.__dict__["private_key_pem"] = private_key_pem
|
379
|
+
__props__.__dict__["private_key_pem_pkcs8"] = private_key_pem_pkcs8
|
363
380
|
__props__.__dict__["public_key_fingerprint_md5"] = public_key_fingerprint_md5
|
364
381
|
__props__.__dict__["public_key_fingerprint_sha256"] = public_key_fingerprint_sha256
|
365
382
|
__props__.__dict__["public_key_openssh"] = public_key_openssh
|
@@ -371,15 +388,15 @@ class PrivateKey(pulumi.CustomResource):
|
|
371
388
|
@pulumi.getter
|
372
389
|
def algorithm(self) -> pulumi.Output[str]:
|
373
390
|
"""
|
374
|
-
Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
391
|
+
Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
375
392
|
"""
|
376
393
|
return pulumi.get(self, "algorithm")
|
377
394
|
|
378
395
|
@property
|
379
396
|
@pulumi.getter(name="ecdsaCurve")
|
380
|
-
def ecdsa_curve(self) -> pulumi.Output[
|
397
|
+
def ecdsa_curve(self) -> pulumi.Output[str]:
|
381
398
|
"""
|
382
|
-
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
399
|
+
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
383
400
|
"""
|
384
401
|
return pulumi.get(self, "ecdsa_curve")
|
385
402
|
|
@@ -399,6 +416,14 @@ class PrivateKey(pulumi.CustomResource):
|
|
399
416
|
"""
|
400
417
|
return pulumi.get(self, "private_key_pem")
|
401
418
|
|
419
|
+
@property
|
420
|
+
@pulumi.getter(name="privateKeyPemPkcs8")
|
421
|
+
def private_key_pem_pkcs8(self) -> pulumi.Output[str]:
|
422
|
+
"""
|
423
|
+
Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
424
|
+
"""
|
425
|
+
return pulumi.get(self, "private_key_pem_pkcs8")
|
426
|
+
|
402
427
|
@property
|
403
428
|
@pulumi.getter(name="publicKeyFingerprintMd5")
|
404
429
|
def public_key_fingerprint_md5(self) -> pulumi.Output[str]:
|
@@ -420,10 +445,9 @@ class PrivateKey(pulumi.CustomResource):
|
|
420
445
|
def public_key_openssh(self) -> pulumi.Output[str]:
|
421
446
|
"""
|
422
447
|
The public key data in ["Authorized
|
423
|
-
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
|
424
|
-
populated
|
425
|
-
|
426
|
-
supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
|
448
|
+
Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
|
449
|
+
populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
|
450
|
+
[underlying](https://pkg.go.dev/encoding/pem#Encode)
|
427
451
|
[libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
|
428
452
|
the end of the PEM. In case this disrupts your use case, we recommend using
|
429
453
|
[`trimspace()`](https://www.terraform.io/language/functions/trimspace).
|
@@ -444,7 +468,7 @@ class PrivateKey(pulumi.CustomResource):
|
|
444
468
|
|
445
469
|
@property
|
446
470
|
@pulumi.getter(name="rsaBits")
|
447
|
-
def rsa_bits(self) -> pulumi.Output[
|
471
|
+
def rsa_bits(self) -> pulumi.Output[int]:
|
448
472
|
"""
|
449
473
|
When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
|
450
474
|
"""
|
@@ -23,7 +23,6 @@ class SelfSignedCertArgs:
|
|
23
23
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
24
24
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
25
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
26
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
27
26
|
set_authority_key_id: Optional[pulumi.Input[bool]] = None,
|
28
27
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None,
|
29
28
|
subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
|
@@ -43,7 +42,6 @@ class SelfSignedCertArgs:
|
|
43
42
|
early renewal period. (default: `0`)
|
44
43
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
45
44
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
46
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
47
45
|
:param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
48
46
|
:param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
49
47
|
:param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
@@ -60,11 +58,6 @@ class SelfSignedCertArgs:
|
|
60
58
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
61
59
|
if is_ca_certificate is not None:
|
62
60
|
pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
|
63
|
-
if key_algorithm is not None:
|
64
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
65
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
66
|
-
if key_algorithm is not None:
|
67
|
-
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
68
61
|
if set_authority_key_id is not None:
|
69
62
|
pulumi.set(__self__, "set_authority_key_id", set_authority_key_id)
|
70
63
|
if set_subject_key_id is not None:
|
@@ -164,18 +157,6 @@ class SelfSignedCertArgs:
|
|
164
157
|
def is_ca_certificate(self, value: Optional[pulumi.Input[bool]]):
|
165
158
|
pulumi.set(self, "is_ca_certificate", value)
|
166
159
|
|
167
|
-
@property
|
168
|
-
@pulumi.getter(name="keyAlgorithm")
|
169
|
-
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
170
|
-
"""
|
171
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
172
|
-
"""
|
173
|
-
return pulumi.get(self, "key_algorithm")
|
174
|
-
|
175
|
-
@key_algorithm.setter
|
176
|
-
def key_algorithm(self, value: Optional[pulumi.Input[str]]):
|
177
|
-
pulumi.set(self, "key_algorithm", value)
|
178
|
-
|
179
160
|
@property
|
180
161
|
@pulumi.getter(name="setAuthorityKeyId")
|
181
162
|
def set_authority_key_id(self) -> Optional[pulumi.Input[bool]]:
|
@@ -260,7 +241,7 @@ class _SelfSignedCertState:
|
|
260
241
|
early renewal period. (default: `0`)
|
261
242
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
262
243
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
263
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
244
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
264
245
|
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
265
246
|
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
266
247
|
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
@@ -285,9 +266,6 @@ class _SelfSignedCertState:
|
|
285
266
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
286
267
|
if is_ca_certificate is not None:
|
287
268
|
pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
|
288
|
-
if key_algorithm is not None:
|
289
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
290
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
291
269
|
if key_algorithm is not None:
|
292
270
|
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
293
271
|
if private_key_pem is not None:
|
@@ -393,7 +371,7 @@ class _SelfSignedCertState:
|
|
393
371
|
@pulumi.getter(name="keyAlgorithm")
|
394
372
|
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
395
373
|
"""
|
396
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
374
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
397
375
|
"""
|
398
376
|
return pulumi.get(self, "key_algorithm")
|
399
377
|
|
@@ -522,7 +500,6 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
522
500
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
523
501
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
524
502
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
525
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
526
503
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
527
504
|
set_authority_key_id: Optional[pulumi.Input[bool]] = None,
|
528
505
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None,
|
@@ -543,7 +520,6 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
543
520
|
early renewal period. (default: `0`)
|
544
521
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
545
522
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
546
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
547
523
|
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
548
524
|
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
549
525
|
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
@@ -581,7 +557,6 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
581
557
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
582
558
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
583
559
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
584
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
585
560
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
586
561
|
set_authority_key_id: Optional[pulumi.Input[bool]] = None,
|
587
562
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None,
|
@@ -604,10 +579,6 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
604
579
|
__props__.__dict__["early_renewal_hours"] = early_renewal_hours
|
605
580
|
__props__.__dict__["ip_addresses"] = ip_addresses
|
606
581
|
__props__.__dict__["is_ca_certificate"] = is_ca_certificate
|
607
|
-
if key_algorithm is not None and not opts.urn:
|
608
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
609
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
610
|
-
__props__.__dict__["key_algorithm"] = key_algorithm
|
611
582
|
if private_key_pem is None and not opts.urn:
|
612
583
|
raise TypeError("Missing required property 'private_key_pem'")
|
613
584
|
__props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
|
@@ -619,6 +590,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
619
590
|
raise TypeError("Missing required property 'validity_period_hours'")
|
620
591
|
__props__.__dict__["validity_period_hours"] = validity_period_hours
|
621
592
|
__props__.__dict__["cert_pem"] = None
|
593
|
+
__props__.__dict__["key_algorithm"] = None
|
622
594
|
__props__.__dict__["ready_for_renewal"] = None
|
623
595
|
__props__.__dict__["validity_end_time"] = None
|
624
596
|
__props__.__dict__["validity_start_time"] = None
|
@@ -671,7 +643,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
671
643
|
early renewal period. (default: `0`)
|
672
644
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
673
645
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
674
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
646
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
675
647
|
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
676
648
|
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
677
649
|
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
@@ -736,7 +708,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
736
708
|
|
737
709
|
@property
|
738
710
|
@pulumi.getter(name="earlyRenewalHours")
|
739
|
-
def early_renewal_hours(self) -> pulumi.Output[
|
711
|
+
def early_renewal_hours(self) -> pulumi.Output[int]:
|
740
712
|
"""
|
741
713
|
The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
742
714
|
can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
|
@@ -756,7 +728,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
756
728
|
|
757
729
|
@property
|
758
730
|
@pulumi.getter(name="isCaCertificate")
|
759
|
-
def is_ca_certificate(self) -> pulumi.Output[
|
731
|
+
def is_ca_certificate(self) -> pulumi.Output[bool]:
|
760
732
|
"""
|
761
733
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
762
734
|
"""
|
@@ -766,7 +738,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
766
738
|
@pulumi.getter(name="keyAlgorithm")
|
767
739
|
def key_algorithm(self) -> pulumi.Output[str]:
|
768
740
|
"""
|
769
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
741
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
770
742
|
"""
|
771
743
|
return pulumi.get(self, "key_algorithm")
|
772
744
|
|
@@ -790,7 +762,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
790
762
|
|
791
763
|
@property
|
792
764
|
@pulumi.getter(name="setAuthorityKeyId")
|
793
|
-
def set_authority_key_id(self) -> pulumi.Output[
|
765
|
+
def set_authority_key_id(self) -> pulumi.Output[bool]:
|
794
766
|
"""
|
795
767
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
796
768
|
"""
|
@@ -798,7 +770,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
798
770
|
|
799
771
|
@property
|
800
772
|
@pulumi.getter(name="setSubjectKeyId")
|
801
|
-
def set_subject_key_id(self) -> pulumi.Output[
|
773
|
+
def set_subject_key_id(self) -> pulumi.Output[bool]:
|
802
774
|
"""
|
803
775
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
804
776
|
"""
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: pulumi-tls
|
3
|
-
Version:
|
3
|
+
Version: 5.0.0a0
|
4
4
|
Summary: A Pulumi package to create TLS resources in Pulumi programs.
|
5
5
|
Home-page: https://pulumi.io
|
6
6
|
License: Apache-2.0
|
@@ -14,7 +14,7 @@ Description-Content-Type: text/markdown
|
|
14
14
|
[](https://www.npmjs.com/package/@pulumi/tls)
|
15
15
|
[](https://pypi.org/project/pulumi-tls)
|
16
16
|
[](https://badge.fury.io/nu/pulumi.tls)
|
17
|
-
[](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
|
18
18
|
[](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
|
19
19
|
|
20
20
|
# TLS Resource Provider
|
@@ -46,7 +46,7 @@ To use from Python, install using `pip`:
|
|
46
46
|
|
47
47
|
To use from Go, use `go get` to grab the latest version of the library
|
48
48
|
|
49
|
-
$ go get github.com/pulumi/pulumi-tls/sdk/
|
49
|
+
$ go get github.com/pulumi/pulumi-tls/sdk/v5
|
50
50
|
|
51
51
|
### .NET
|
52
52
|
|
@@ -8,8 +8,8 @@ from setuptools.command.install import install
|
|
8
8
|
from subprocess import check_call
|
9
9
|
|
10
10
|
|
11
|
-
VERSION = "
|
12
|
-
PLUGIN_VERSION = "
|
11
|
+
VERSION = "5.0.0a0"
|
12
|
+
PLUGIN_VERSION = "5.0.0-alpha.0+7c9d3d42"
|
13
13
|
|
14
14
|
class InstallPluginCommand(install):
|
15
15
|
def run(self):
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/dependency_links.txt
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|