pulumi-tls 4.11.0a1678132302__tar.gz → 5.0.0a0__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (26) hide show
  1. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/PKG-INFO +3 -3
  2. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/README.md +2 -2
  3. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/cert_request.py +5 -33
  4. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/get_public_key.py +7 -7
  5. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/locally_signed_cert.py +8 -36
  6. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/private_key.py +57 -33
  7. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/self_signed_cert.py +9 -37
  8. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/PKG-INFO +3 -3
  9. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/setup.py +2 -2
  10. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/__init__.py +0 -0
  11. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/_inputs.py +0 -0
  12. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/_utilities.py +0 -0
  13. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/config/__init__.py +0 -0
  14. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/config/outputs.py +0 -0
  15. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/config/vars.py +0 -0
  16. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/get_certificate.py +0 -0
  17. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/outputs.py +0 -0
  18. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/provider.py +0 -0
  19. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/pulumi-plugin.json +0 -0
  20. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls/py.typed +0 -0
  21. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/SOURCES.txt +0 -0
  22. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/dependency_links.txt +0 -0
  23. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/not-zip-safe +0 -0
  24. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/requires.txt +0 -0
  25. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/pulumi_tls.egg-info/top_level.txt +0 -0
  26. {pulumi_tls-4.11.0a1678132302 → pulumi_tls-5.0.0a0}/setup.cfg +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_tls
3
- Version: 4.11.0a1678132302
3
+ Version: 5.0.0a0
4
4
  Summary: A Pulumi package to create TLS resources in Pulumi programs.
5
5
  Home-page: https://pulumi.io
6
6
  License: Apache-2.0
@@ -14,7 +14,7 @@ Description-Content-Type: text/markdown
14
14
  [![NPM version](https://badge.fury.io/js/%40pulumi%2Ftls.svg)](https://www.npmjs.com/package/@pulumi/tls)
15
15
  [![Python version](https://badge.fury.io/py/pulumi-tls.svg)](https://pypi.org/project/pulumi-tls)
16
16
  [![NuGet version](https://badge.fury.io/nu/pulumi.tls.svg)](https://badge.fury.io/nu/pulumi.tls)
17
- [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v4/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v4/go)
17
+ [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v5/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
18
18
  [![License](https://img.shields.io/npm/l/%40pulumi%2Fpulumi.svg)](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
19
19
 
20
20
  # TLS Resource Provider
@@ -46,7 +46,7 @@ To use from Python, install using `pip`:
46
46
 
47
47
  To use from Go, use `go get` to grab the latest version of the library
48
48
 
49
- $ go get github.com/pulumi/pulumi-tls/sdk/v4
49
+ $ go get github.com/pulumi/pulumi-tls/sdk/v5
50
50
 
51
51
  ### .NET
52
52
 
@@ -3,7 +3,7 @@
3
3
  [![NPM version](https://badge.fury.io/js/%40pulumi%2Ftls.svg)](https://www.npmjs.com/package/@pulumi/tls)
4
4
  [![Python version](https://badge.fury.io/py/pulumi-tls.svg)](https://pypi.org/project/pulumi-tls)
5
5
  [![NuGet version](https://badge.fury.io/nu/pulumi.tls.svg)](https://badge.fury.io/nu/pulumi.tls)
6
- [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v4/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v4/go)
6
+ [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v5/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
7
7
  [![License](https://img.shields.io/npm/l/%40pulumi%2Fpulumi.svg)](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
8
8
 
9
9
  # TLS Resource Provider
@@ -35,7 +35,7 @@ To use from Python, install using `pip`:
35
35
 
36
36
  To use from Go, use `go get` to grab the latest version of the library
37
37
 
38
- $ go get github.com/pulumi/pulumi-tls/sdk/v4
38
+ $ go get github.com/pulumi/pulumi-tls/sdk/v5
39
39
 
40
40
  ### .NET
41
41
 
@@ -19,7 +19,6 @@ class CertRequestArgs:
19
19
  private_key_pem: pulumi.Input[str],
20
20
  dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
21
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
- key_algorithm: Optional[pulumi.Input[str]] = None,
23
22
  subject: Optional[pulumi.Input['CertRequestSubjectArgs']] = None,
24
23
  uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
25
24
  """
@@ -29,7 +28,6 @@ class CertRequestArgs:
29
28
  interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
30
29
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
31
30
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
32
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
33
31
  :param pulumi.Input['CertRequestSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
34
32
  :param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
35
33
  """
@@ -38,11 +36,6 @@ class CertRequestArgs:
38
36
  pulumi.set(__self__, "dns_names", dns_names)
39
37
  if ip_addresses is not None:
40
38
  pulumi.set(__self__, "ip_addresses", ip_addresses)
41
- if key_algorithm is not None:
42
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
43
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
44
- if key_algorithm is not None:
45
- pulumi.set(__self__, "key_algorithm", key_algorithm)
46
39
  if subject is not None:
47
40
  pulumi.set(__self__, "subject", subject)
48
41
  if uris is not None:
@@ -86,18 +79,6 @@ class CertRequestArgs:
86
79
  def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
87
80
  pulumi.set(self, "ip_addresses", value)
88
81
 
89
- @property
90
- @pulumi.getter(name="keyAlgorithm")
91
- def key_algorithm(self) -> Optional[pulumi.Input[str]]:
92
- """
93
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
94
- """
95
- return pulumi.get(self, "key_algorithm")
96
-
97
- @key_algorithm.setter
98
- def key_algorithm(self, value: Optional[pulumi.Input[str]]):
99
- pulumi.set(self, "key_algorithm", value)
100
-
101
82
  @property
102
83
  @pulumi.getter
103
84
  def subject(self) -> Optional[pulumi.Input['CertRequestSubjectArgs']]:
@@ -142,7 +123,7 @@ class _CertRequestState:
142
123
  [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
143
124
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
144
125
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
145
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
126
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
146
127
  :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
147
128
  to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
148
129
  interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
@@ -155,9 +136,6 @@ class _CertRequestState:
155
136
  pulumi.set(__self__, "dns_names", dns_names)
156
137
  if ip_addresses is not None:
157
138
  pulumi.set(__self__, "ip_addresses", ip_addresses)
158
- if key_algorithm is not None:
159
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
160
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
161
139
  if key_algorithm is not None:
162
140
  pulumi.set(__self__, "key_algorithm", key_algorithm)
163
141
  if private_key_pem is not None:
@@ -211,7 +189,7 @@ class _CertRequestState:
211
189
  @pulumi.getter(name="keyAlgorithm")
212
190
  def key_algorithm(self) -> Optional[pulumi.Input[str]]:
213
191
  """
214
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
192
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
215
193
  """
216
194
  return pulumi.get(self, "key_algorithm")
217
195
 
@@ -265,7 +243,6 @@ class CertRequest(pulumi.CustomResource):
265
243
  opts: Optional[pulumi.ResourceOptions] = None,
266
244
  dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
267
245
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
268
- key_algorithm: Optional[pulumi.Input[str]] = None,
269
246
  private_key_pem: Optional[pulumi.Input[str]] = None,
270
247
  subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
271
248
  uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -289,7 +266,6 @@ class CertRequest(pulumi.CustomResource):
289
266
  :param pulumi.ResourceOptions opts: Options for the resource.
290
267
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
291
268
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
292
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
293
269
  :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
294
270
  to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
295
271
  interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
@@ -334,7 +310,6 @@ class CertRequest(pulumi.CustomResource):
334
310
  opts: Optional[pulumi.ResourceOptions] = None,
335
311
  dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
336
312
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
337
- key_algorithm: Optional[pulumi.Input[str]] = None,
338
313
  private_key_pem: Optional[pulumi.Input[str]] = None,
339
314
  subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
340
315
  uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -349,16 +324,13 @@ class CertRequest(pulumi.CustomResource):
349
324
 
350
325
  __props__.__dict__["dns_names"] = dns_names
351
326
  __props__.__dict__["ip_addresses"] = ip_addresses
352
- if key_algorithm is not None and not opts.urn:
353
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
354
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
355
- __props__.__dict__["key_algorithm"] = key_algorithm
356
327
  if private_key_pem is None and not opts.urn:
357
328
  raise TypeError("Missing required property 'private_key_pem'")
358
329
  __props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
359
330
  __props__.__dict__["subject"] = subject
360
331
  __props__.__dict__["uris"] = uris
361
332
  __props__.__dict__["cert_request_pem"] = None
333
+ __props__.__dict__["key_algorithm"] = None
362
334
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyPem"])
363
335
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
364
336
  super(CertRequest, __self__).__init__(
@@ -392,7 +364,7 @@ class CertRequest(pulumi.CustomResource):
392
364
  [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
393
365
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
394
366
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
395
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
367
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
396
368
  :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
397
369
  to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
398
370
  interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
@@ -444,7 +416,7 @@ class CertRequest(pulumi.CustomResource):
444
416
  @pulumi.getter(name="keyAlgorithm")
445
417
  def key_algorithm(self) -> pulumi.Output[str]:
446
418
  """
447
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
419
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
448
420
  """
449
421
  return pulumi.get(self, "key_algorithm")
450
422
 
@@ -51,7 +51,7 @@ class GetPublicKeyResult:
51
51
  @pulumi.getter
52
52
  def algorithm(self) -> str:
53
53
  """
54
- The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA` and `ED25519`.
54
+ The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA`, `ED25519`.
55
55
  """
56
56
  return pulumi.get(self, "algorithm")
57
57
 
@@ -67,7 +67,7 @@ class GetPublicKeyResult:
67
67
  @pulumi.getter(name="privateKeyOpenssh")
68
68
  def private_key_openssh(self) -> Optional[str]:
69
69
  """
70
- The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_pem`.
70
+ The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
71
71
  """
72
72
  return pulumi.get(self, "private_key_openssh")
73
73
 
@@ -75,7 +75,7 @@ class GetPublicKeyResult:
75
75
  @pulumi.getter(name="privateKeyPem")
76
76
  def private_key_pem(self) -> Optional[str]:
77
77
  """
78
- The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_openssh`.
78
+ The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
79
79
  """
80
80
  return pulumi.get(self, "private_key_pem")
81
81
 
@@ -142,8 +142,8 @@ def get_public_key(private_key_openssh: Optional[str] = None,
142
142
  ```
143
143
 
144
144
 
145
- :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_pem`.
146
- :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_openssh`.
145
+ :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
146
+ :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
147
147
  """
148
148
  __args__ = dict()
149
149
  __args__['privateKeyOpenssh'] = private_key_openssh
@@ -183,7 +183,7 @@ def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[st
183
183
  ```
184
184
 
185
185
 
186
- :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_pem`.
187
- :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_openssh`.
186
+ :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
187
+ :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
188
188
  """
189
189
  ...
@@ -19,7 +19,6 @@ class LocallySignedCertArgs:
19
19
  ca_private_key_pem: pulumi.Input[str],
20
20
  cert_request_pem: pulumi.Input[str],
21
21
  validity_period_hours: pulumi.Input[int],
22
- ca_key_algorithm: Optional[pulumi.Input[str]] = None,
23
22
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
24
23
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
25
24
  set_subject_key_id: Optional[pulumi.Input[bool]] = None):
@@ -30,7 +29,6 @@ class LocallySignedCertArgs:
30
29
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
31
30
  :param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
32
31
  :param pulumi.Input[int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
33
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
34
32
  :param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
35
33
  can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
36
34
  certificate remains valid until its true expiration time, since this resource does not (and cannot) support certificate
@@ -44,11 +42,6 @@ class LocallySignedCertArgs:
44
42
  pulumi.set(__self__, "ca_private_key_pem", ca_private_key_pem)
45
43
  pulumi.set(__self__, "cert_request_pem", cert_request_pem)
46
44
  pulumi.set(__self__, "validity_period_hours", validity_period_hours)
47
- if ca_key_algorithm is not None:
48
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
49
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
50
- if ca_key_algorithm is not None:
51
- pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
52
45
  if early_renewal_hours is not None:
53
46
  pulumi.set(__self__, "early_renewal_hours", early_renewal_hours)
54
47
  if is_ca_certificate is not None:
@@ -116,18 +109,6 @@ class LocallySignedCertArgs:
116
109
  def validity_period_hours(self, value: pulumi.Input[int]):
117
110
  pulumi.set(self, "validity_period_hours", value)
118
111
 
119
- @property
120
- @pulumi.getter(name="caKeyAlgorithm")
121
- def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
124
- """
125
- return pulumi.get(self, "ca_key_algorithm")
126
-
127
- @ca_key_algorithm.setter
128
- def ca_key_algorithm(self, value: Optional[pulumi.Input[str]]):
129
- pulumi.set(self, "ca_key_algorithm", value)
130
-
131
112
  @property
132
113
  @pulumi.getter(name="earlyRenewalHours")
133
114
  def early_renewal_hours(self) -> Optional[pulumi.Input[int]]:
@@ -189,7 +170,7 @@ class _LocallySignedCertState:
189
170
  Input properties used for looking up and filtering LocallySignedCert resources.
190
171
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
191
172
  :param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
192
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
173
+ :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
193
174
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
194
175
  :param pulumi.Input[str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the
195
176
  [underlying](https://pkg.go.dev/encoding/pem#Encode)
@@ -213,9 +194,6 @@ class _LocallySignedCertState:
213
194
  pulumi.set(__self__, "allowed_uses", allowed_uses)
214
195
  if ca_cert_pem is not None:
215
196
  pulumi.set(__self__, "ca_cert_pem", ca_cert_pem)
216
- if ca_key_algorithm is not None:
217
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
218
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
219
197
  if ca_key_algorithm is not None:
220
198
  pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
221
199
  if ca_private_key_pem is not None:
@@ -267,7 +245,7 @@ class _LocallySignedCertState:
267
245
  @pulumi.getter(name="caKeyAlgorithm")
268
246
  def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
269
247
  """
270
- Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
248
+ Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
271
249
  """
272
250
  return pulumi.get(self, "ca_key_algorithm")
273
251
 
@@ -411,7 +389,6 @@ class LocallySignedCert(pulumi.CustomResource):
411
389
  opts: Optional[pulumi.ResourceOptions] = None,
412
390
  allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
413
391
  ca_cert_pem: Optional[pulumi.Input[str]] = None,
414
- ca_key_algorithm: Optional[pulumi.Input[str]] = None,
415
392
  ca_private_key_pem: Optional[pulumi.Input[str]] = None,
416
393
  cert_request_pem: Optional[pulumi.Input[str]] = None,
417
394
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
@@ -425,7 +402,6 @@ class LocallySignedCert(pulumi.CustomResource):
425
402
  :param pulumi.ResourceOptions opts: Options for the resource.
426
403
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
427
404
  :param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
428
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
429
405
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
430
406
  :param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
431
407
  :param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
@@ -462,7 +438,6 @@ class LocallySignedCert(pulumi.CustomResource):
462
438
  opts: Optional[pulumi.ResourceOptions] = None,
463
439
  allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
464
440
  ca_cert_pem: Optional[pulumi.Input[str]] = None,
465
- ca_key_algorithm: Optional[pulumi.Input[str]] = None,
466
441
  ca_private_key_pem: Optional[pulumi.Input[str]] = None,
467
442
  cert_request_pem: Optional[pulumi.Input[str]] = None,
468
443
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
@@ -484,10 +459,6 @@ class LocallySignedCert(pulumi.CustomResource):
484
459
  if ca_cert_pem is None and not opts.urn:
485
460
  raise TypeError("Missing required property 'ca_cert_pem'")
486
461
  __props__.__dict__["ca_cert_pem"] = ca_cert_pem
487
- if ca_key_algorithm is not None and not opts.urn:
488
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
489
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
490
- __props__.__dict__["ca_key_algorithm"] = ca_key_algorithm
491
462
  if ca_private_key_pem is None and not opts.urn:
492
463
  raise TypeError("Missing required property 'ca_private_key_pem'")
493
464
  __props__.__dict__["ca_private_key_pem"] = None if ca_private_key_pem is None else pulumi.Output.secret(ca_private_key_pem)
@@ -500,6 +471,7 @@ class LocallySignedCert(pulumi.CustomResource):
500
471
  if validity_period_hours is None and not opts.urn:
501
472
  raise TypeError("Missing required property 'validity_period_hours'")
502
473
  __props__.__dict__["validity_period_hours"] = validity_period_hours
474
+ __props__.__dict__["ca_key_algorithm"] = None
503
475
  __props__.__dict__["cert_pem"] = None
504
476
  __props__.__dict__["ready_for_renewal"] = None
505
477
  __props__.__dict__["validity_end_time"] = None
@@ -538,7 +510,7 @@ class LocallySignedCert(pulumi.CustomResource):
538
510
  :param pulumi.ResourceOptions opts: Options for the resource.
539
511
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
540
512
  :param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
541
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
513
+ :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
542
514
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
543
515
  :param pulumi.Input[str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the
544
516
  [underlying](https://pkg.go.dev/encoding/pem#Encode)
@@ -597,7 +569,7 @@ class LocallySignedCert(pulumi.CustomResource):
597
569
  @pulumi.getter(name="caKeyAlgorithm")
598
570
  def ca_key_algorithm(self) -> pulumi.Output[str]:
599
571
  """
600
- Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
572
+ Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
601
573
  """
602
574
  return pulumi.get(self, "ca_key_algorithm")
603
575
 
@@ -631,7 +603,7 @@ class LocallySignedCert(pulumi.CustomResource):
631
603
 
632
604
  @property
633
605
  @pulumi.getter(name="earlyRenewalHours")
634
- def early_renewal_hours(self) -> pulumi.Output[Optional[int]]:
606
+ def early_renewal_hours(self) -> pulumi.Output[int]:
635
607
  """
636
608
  The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
637
609
  can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
@@ -643,7 +615,7 @@ class LocallySignedCert(pulumi.CustomResource):
643
615
 
644
616
  @property
645
617
  @pulumi.getter(name="isCaCertificate")
646
- def is_ca_certificate(self) -> pulumi.Output[Optional[bool]]:
618
+ def is_ca_certificate(self) -> pulumi.Output[bool]:
647
619
  """
648
620
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
649
621
  """
@@ -659,7 +631,7 @@ class LocallySignedCert(pulumi.CustomResource):
659
631
 
660
632
  @property
661
633
  @pulumi.getter(name="setSubjectKeyId")
662
- def set_subject_key_id(self) -> pulumi.Output[Optional[bool]]:
634
+ def set_subject_key_id(self) -> pulumi.Output[bool]:
663
635
  """
664
636
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
665
637
  """
@@ -19,8 +19,8 @@ class PrivateKeyArgs:
19
19
  rsa_bits: Optional[pulumi.Input[int]] = None):
20
20
  """
21
21
  The set of arguments for constructing a PrivateKey resource.
22
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
23
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
22
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
23
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
24
24
  :param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
25
25
  """
26
26
  pulumi.set(__self__, "algorithm", algorithm)
@@ -33,7 +33,7 @@ class PrivateKeyArgs:
33
33
  @pulumi.getter
34
34
  def algorithm(self) -> pulumi.Input[str]:
35
35
  """
36
- Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
36
+ Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
37
37
  """
38
38
  return pulumi.get(self, "algorithm")
39
39
 
@@ -45,7 +45,7 @@ class PrivateKeyArgs:
45
45
  @pulumi.getter(name="ecdsaCurve")
46
46
  def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
47
47
  """
48
- When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
48
+ When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
49
49
  """
50
50
  return pulumi.get(self, "ecdsa_curve")
51
51
 
@@ -73,6 +73,7 @@ class _PrivateKeyState:
73
73
  ecdsa_curve: Optional[pulumi.Input[str]] = None,
74
74
  private_key_openssh: Optional[pulumi.Input[str]] = None,
75
75
  private_key_pem: Optional[pulumi.Input[str]] = None,
76
+ private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
76
77
  public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
77
78
  public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
78
79
  public_key_openssh: Optional[pulumi.Input[str]] = None,
@@ -80,17 +81,17 @@ class _PrivateKeyState:
80
81
  rsa_bits: Optional[pulumi.Input[int]] = None):
81
82
  """
82
83
  Input properties used for looking up and filtering PrivateKey resources.
83
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
84
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
84
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
85
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
85
86
  :param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
86
87
  :param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
88
+ :param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
87
89
  :param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
88
90
  :param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
89
91
  :param pulumi.Input[str] public_key_openssh: The public key data in ["Authorized
90
- Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
91
- populated only if the configured private key is supported: this includes all `RSA` and `ED25519` keys, as well as
92
- `ECDSA` keys with curves `P256`, `P384` and `P521`. `ECDSA` with curve `P224` [is not
93
- supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
92
+ Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
93
+ populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
94
+ [underlying](https://pkg.go.dev/encoding/pem#Encode)
94
95
  [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
95
96
  the end of the PEM. In case this disrupts your use case, we recommend using
96
97
  [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
@@ -109,6 +110,8 @@ class _PrivateKeyState:
109
110
  pulumi.set(__self__, "private_key_openssh", private_key_openssh)
110
111
  if private_key_pem is not None:
111
112
  pulumi.set(__self__, "private_key_pem", private_key_pem)
113
+ if private_key_pem_pkcs8 is not None:
114
+ pulumi.set(__self__, "private_key_pem_pkcs8", private_key_pem_pkcs8)
112
115
  if public_key_fingerprint_md5 is not None:
113
116
  pulumi.set(__self__, "public_key_fingerprint_md5", public_key_fingerprint_md5)
114
117
  if public_key_fingerprint_sha256 is not None:
@@ -124,7 +127,7 @@ class _PrivateKeyState:
124
127
  @pulumi.getter
125
128
  def algorithm(self) -> Optional[pulumi.Input[str]]:
126
129
  """
127
- Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
130
+ Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
128
131
  """
129
132
  return pulumi.get(self, "algorithm")
130
133
 
@@ -136,7 +139,7 @@ class _PrivateKeyState:
136
139
  @pulumi.getter(name="ecdsaCurve")
137
140
  def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
138
141
  """
139
- When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
142
+ When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
140
143
  """
141
144
  return pulumi.get(self, "ecdsa_curve")
142
145
 
@@ -168,6 +171,18 @@ class _PrivateKeyState:
168
171
  def private_key_pem(self, value: Optional[pulumi.Input[str]]):
169
172
  pulumi.set(self, "private_key_pem", value)
170
173
 
174
+ @property
175
+ @pulumi.getter(name="privateKeyPemPkcs8")
176
+ def private_key_pem_pkcs8(self) -> Optional[pulumi.Input[str]]:
177
+ """
178
+ Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
179
+ """
180
+ return pulumi.get(self, "private_key_pem_pkcs8")
181
+
182
+ @private_key_pem_pkcs8.setter
183
+ def private_key_pem_pkcs8(self, value: Optional[pulumi.Input[str]]):
184
+ pulumi.set(self, "private_key_pem_pkcs8", value)
185
+
171
186
  @property
172
187
  @pulumi.getter(name="publicKeyFingerprintMd5")
173
188
  def public_key_fingerprint_md5(self) -> Optional[pulumi.Input[str]]:
@@ -197,10 +212,9 @@ class _PrivateKeyState:
197
212
  def public_key_openssh(self) -> Optional[pulumi.Input[str]]:
198
213
  """
199
214
  The public key data in ["Authorized
200
- Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
201
- populated only if the configured private key is supported: this includes all `RSA` and `ED25519` keys, as well as
202
- `ECDSA` keys with curves `P256`, `P384` and `P521`. `ECDSA` with curve `P224` [is not
203
- supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
215
+ Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
216
+ populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
217
+ [underlying](https://pkg.go.dev/encoding/pem#Encode)
204
218
  [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
205
219
  the end of the PEM. In case this disrupts your use case, we recommend using
206
220
  [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
@@ -253,8 +267,8 @@ class PrivateKey(pulumi.CustomResource):
253
267
  Create a PrivateKey resource with the given unique name, props, and options.
254
268
  :param str resource_name: The name of the resource.
255
269
  :param pulumi.ResourceOptions opts: Options for the resource.
256
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
257
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
270
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
271
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
258
272
  :param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
259
273
  """
260
274
  ...
@@ -299,11 +313,12 @@ class PrivateKey(pulumi.CustomResource):
299
313
  __props__.__dict__["rsa_bits"] = rsa_bits
300
314
  __props__.__dict__["private_key_openssh"] = None
301
315
  __props__.__dict__["private_key_pem"] = None
316
+ __props__.__dict__["private_key_pem_pkcs8"] = None
302
317
  __props__.__dict__["public_key_fingerprint_md5"] = None
303
318
  __props__.__dict__["public_key_fingerprint_sha256"] = None
304
319
  __props__.__dict__["public_key_openssh"] = None
305
320
  __props__.__dict__["public_key_pem"] = None
306
- secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem"])
321
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem", "privateKeyPemPkcs8"])
307
322
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
308
323
  super(PrivateKey, __self__).__init__(
309
324
  'tls:index/privateKey:PrivateKey',
@@ -319,6 +334,7 @@ class PrivateKey(pulumi.CustomResource):
319
334
  ecdsa_curve: Optional[pulumi.Input[str]] = None,
320
335
  private_key_openssh: Optional[pulumi.Input[str]] = None,
321
336
  private_key_pem: Optional[pulumi.Input[str]] = None,
337
+ private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
322
338
  public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
323
339
  public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
324
340
  public_key_openssh: Optional[pulumi.Input[str]] = None,
@@ -331,17 +347,17 @@ class PrivateKey(pulumi.CustomResource):
331
347
  :param str resource_name: The unique name of the resulting resource.
332
348
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
333
349
  :param pulumi.ResourceOptions opts: Options for the resource.
334
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
335
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
350
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
351
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
336
352
  :param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
337
353
  :param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
354
+ :param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
338
355
  :param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
339
356
  :param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
340
357
  :param pulumi.Input[str] public_key_openssh: The public key data in ["Authorized
341
- Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
342
- populated only if the configured private key is supported: this includes all `RSA` and `ED25519` keys, as well as
343
- `ECDSA` keys with curves `P256`, `P384` and `P521`. `ECDSA` with curve `P224` [is not
344
- supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
358
+ Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
359
+ populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
360
+ [underlying](https://pkg.go.dev/encoding/pem#Encode)
345
361
  [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
346
362
  the end of the PEM. In case this disrupts your use case, we recommend using
347
363
  [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
@@ -360,6 +376,7 @@ class PrivateKey(pulumi.CustomResource):
360
376
  __props__.__dict__["ecdsa_curve"] = ecdsa_curve
361
377
  __props__.__dict__["private_key_openssh"] = private_key_openssh
362
378
  __props__.__dict__["private_key_pem"] = private_key_pem
379
+ __props__.__dict__["private_key_pem_pkcs8"] = private_key_pem_pkcs8
363
380
  __props__.__dict__["public_key_fingerprint_md5"] = public_key_fingerprint_md5
364
381
  __props__.__dict__["public_key_fingerprint_sha256"] = public_key_fingerprint_sha256
365
382
  __props__.__dict__["public_key_openssh"] = public_key_openssh
@@ -371,15 +388,15 @@ class PrivateKey(pulumi.CustomResource):
371
388
  @pulumi.getter
372
389
  def algorithm(self) -> pulumi.Output[str]:
373
390
  """
374
- Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
391
+ Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
375
392
  """
376
393
  return pulumi.get(self, "algorithm")
377
394
 
378
395
  @property
379
396
  @pulumi.getter(name="ecdsaCurve")
380
- def ecdsa_curve(self) -> pulumi.Output[Optional[str]]:
397
+ def ecdsa_curve(self) -> pulumi.Output[str]:
381
398
  """
382
- When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
399
+ When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
383
400
  """
384
401
  return pulumi.get(self, "ecdsa_curve")
385
402
 
@@ -399,6 +416,14 @@ class PrivateKey(pulumi.CustomResource):
399
416
  """
400
417
  return pulumi.get(self, "private_key_pem")
401
418
 
419
+ @property
420
+ @pulumi.getter(name="privateKeyPemPkcs8")
421
+ def private_key_pem_pkcs8(self) -> pulumi.Output[str]:
422
+ """
423
+ Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
424
+ """
425
+ return pulumi.get(self, "private_key_pem_pkcs8")
426
+
402
427
  @property
403
428
  @pulumi.getter(name="publicKeyFingerprintMd5")
404
429
  def public_key_fingerprint_md5(self) -> pulumi.Output[str]:
@@ -420,10 +445,9 @@ class PrivateKey(pulumi.CustomResource):
420
445
  def public_key_openssh(self) -> pulumi.Output[str]:
421
446
  """
422
447
  The public key data in ["Authorized
423
- Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is
424
- populated only if the configured private key is supported: this includes all `RSA` and `ED25519` keys, as well as
425
- `ECDSA` keys with curves `P256`, `P384` and `P521`. `ECDSA` with curve `P224` [is not
426
- supported](../../docs#limitations). **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode)
448
+ Keys"](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not
449
+ populated for `ECDSA` with curve `P224`, as it is [not supported](../../docs#limitations). **NOTE**: the
450
+ [underlying](https://pkg.go.dev/encoding/pem#Encode)
427
451
  [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at
428
452
  the end of the PEM. In case this disrupts your use case, we recommend using
429
453
  [`trimspace()`](https://www.terraform.io/language/functions/trimspace).
@@ -444,7 +468,7 @@ class PrivateKey(pulumi.CustomResource):
444
468
 
445
469
  @property
446
470
  @pulumi.getter(name="rsaBits")
447
- def rsa_bits(self) -> pulumi.Output[Optional[int]]:
471
+ def rsa_bits(self) -> pulumi.Output[int]:
448
472
  """
449
473
  When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
450
474
  """
@@ -23,7 +23,6 @@ class SelfSignedCertArgs:
23
23
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
24
24
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
25
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
26
- key_algorithm: Optional[pulumi.Input[str]] = None,
27
26
  set_authority_key_id: Optional[pulumi.Input[bool]] = None,
28
27
  set_subject_key_id: Optional[pulumi.Input[bool]] = None,
29
28
  subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
@@ -43,7 +42,6 @@ class SelfSignedCertArgs:
43
42
  early renewal period. (default: `0`)
44
43
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
45
44
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
46
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
47
45
  :param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
48
46
  :param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
49
47
  :param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
@@ -60,11 +58,6 @@ class SelfSignedCertArgs:
60
58
  pulumi.set(__self__, "ip_addresses", ip_addresses)
61
59
  if is_ca_certificate is not None:
62
60
  pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
63
- if key_algorithm is not None:
64
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
65
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
66
- if key_algorithm is not None:
67
- pulumi.set(__self__, "key_algorithm", key_algorithm)
68
61
  if set_authority_key_id is not None:
69
62
  pulumi.set(__self__, "set_authority_key_id", set_authority_key_id)
70
63
  if set_subject_key_id is not None:
@@ -164,18 +157,6 @@ class SelfSignedCertArgs:
164
157
  def is_ca_certificate(self, value: Optional[pulumi.Input[bool]]):
165
158
  pulumi.set(self, "is_ca_certificate", value)
166
159
 
167
- @property
168
- @pulumi.getter(name="keyAlgorithm")
169
- def key_algorithm(self) -> Optional[pulumi.Input[str]]:
170
- """
171
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
172
- """
173
- return pulumi.get(self, "key_algorithm")
174
-
175
- @key_algorithm.setter
176
- def key_algorithm(self, value: Optional[pulumi.Input[str]]):
177
- pulumi.set(self, "key_algorithm", value)
178
-
179
160
  @property
180
161
  @pulumi.getter(name="setAuthorityKeyId")
181
162
  def set_authority_key_id(self) -> Optional[pulumi.Input[bool]]:
@@ -260,7 +241,7 @@ class _SelfSignedCertState:
260
241
  early renewal period. (default: `0`)
261
242
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
262
243
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
263
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
244
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
264
245
  :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
265
246
  to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
266
247
  interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
@@ -285,9 +266,6 @@ class _SelfSignedCertState:
285
266
  pulumi.set(__self__, "ip_addresses", ip_addresses)
286
267
  if is_ca_certificate is not None:
287
268
  pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
288
- if key_algorithm is not None:
289
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
290
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
291
269
  if key_algorithm is not None:
292
270
  pulumi.set(__self__, "key_algorithm", key_algorithm)
293
271
  if private_key_pem is not None:
@@ -393,7 +371,7 @@ class _SelfSignedCertState:
393
371
  @pulumi.getter(name="keyAlgorithm")
394
372
  def key_algorithm(self) -> Optional[pulumi.Input[str]]:
395
373
  """
396
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
374
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
397
375
  """
398
376
  return pulumi.get(self, "key_algorithm")
399
377
 
@@ -522,7 +500,6 @@ class SelfSignedCert(pulumi.CustomResource):
522
500
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
523
501
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
524
502
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
525
- key_algorithm: Optional[pulumi.Input[str]] = None,
526
503
  private_key_pem: Optional[pulumi.Input[str]] = None,
527
504
  set_authority_key_id: Optional[pulumi.Input[bool]] = None,
528
505
  set_subject_key_id: Optional[pulumi.Input[bool]] = None,
@@ -543,7 +520,6 @@ class SelfSignedCert(pulumi.CustomResource):
543
520
  early renewal period. (default: `0`)
544
521
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
545
522
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
546
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
547
523
  :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
548
524
  to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
549
525
  interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
@@ -581,7 +557,6 @@ class SelfSignedCert(pulumi.CustomResource):
581
557
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
582
558
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
583
559
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
584
- key_algorithm: Optional[pulumi.Input[str]] = None,
585
560
  private_key_pem: Optional[pulumi.Input[str]] = None,
586
561
  set_authority_key_id: Optional[pulumi.Input[bool]] = None,
587
562
  set_subject_key_id: Optional[pulumi.Input[bool]] = None,
@@ -604,10 +579,6 @@ class SelfSignedCert(pulumi.CustomResource):
604
579
  __props__.__dict__["early_renewal_hours"] = early_renewal_hours
605
580
  __props__.__dict__["ip_addresses"] = ip_addresses
606
581
  __props__.__dict__["is_ca_certificate"] = is_ca_certificate
607
- if key_algorithm is not None and not opts.urn:
608
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
609
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
610
- __props__.__dict__["key_algorithm"] = key_algorithm
611
582
  if private_key_pem is None and not opts.urn:
612
583
  raise TypeError("Missing required property 'private_key_pem'")
613
584
  __props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
@@ -619,6 +590,7 @@ class SelfSignedCert(pulumi.CustomResource):
619
590
  raise TypeError("Missing required property 'validity_period_hours'")
620
591
  __props__.__dict__["validity_period_hours"] = validity_period_hours
621
592
  __props__.__dict__["cert_pem"] = None
593
+ __props__.__dict__["key_algorithm"] = None
622
594
  __props__.__dict__["ready_for_renewal"] = None
623
595
  __props__.__dict__["validity_end_time"] = None
624
596
  __props__.__dict__["validity_start_time"] = None
@@ -671,7 +643,7 @@ class SelfSignedCert(pulumi.CustomResource):
671
643
  early renewal period. (default: `0`)
672
644
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
673
645
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
674
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
646
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
675
647
  :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
676
648
  to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
677
649
  interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
@@ -736,7 +708,7 @@ class SelfSignedCert(pulumi.CustomResource):
736
708
 
737
709
  @property
738
710
  @pulumi.getter(name="earlyRenewalHours")
739
- def early_renewal_hours(self) -> pulumi.Output[Optional[int]]:
711
+ def early_renewal_hours(self) -> pulumi.Output[int]:
740
712
  """
741
713
  The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
742
714
  can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
@@ -756,7 +728,7 @@ class SelfSignedCert(pulumi.CustomResource):
756
728
 
757
729
  @property
758
730
  @pulumi.getter(name="isCaCertificate")
759
- def is_ca_certificate(self) -> pulumi.Output[Optional[bool]]:
731
+ def is_ca_certificate(self) -> pulumi.Output[bool]:
760
732
  """
761
733
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
762
734
  """
@@ -766,7 +738,7 @@ class SelfSignedCert(pulumi.CustomResource):
766
738
  @pulumi.getter(name="keyAlgorithm")
767
739
  def key_algorithm(self) -> pulumi.Output[str]:
768
740
  """
769
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
741
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
770
742
  """
771
743
  return pulumi.get(self, "key_algorithm")
772
744
 
@@ -790,7 +762,7 @@ class SelfSignedCert(pulumi.CustomResource):
790
762
 
791
763
  @property
792
764
  @pulumi.getter(name="setAuthorityKeyId")
793
- def set_authority_key_id(self) -> pulumi.Output[Optional[bool]]:
765
+ def set_authority_key_id(self) -> pulumi.Output[bool]:
794
766
  """
795
767
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
796
768
  """
@@ -798,7 +770,7 @@ class SelfSignedCert(pulumi.CustomResource):
798
770
 
799
771
  @property
800
772
  @pulumi.getter(name="setSubjectKeyId")
801
- def set_subject_key_id(self) -> pulumi.Output[Optional[bool]]:
773
+ def set_subject_key_id(self) -> pulumi.Output[bool]:
802
774
  """
803
775
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
804
776
  """
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi-tls
3
- Version: 4.11.0a1678132302
3
+ Version: 5.0.0a0
4
4
  Summary: A Pulumi package to create TLS resources in Pulumi programs.
5
5
  Home-page: https://pulumi.io
6
6
  License: Apache-2.0
@@ -14,7 +14,7 @@ Description-Content-Type: text/markdown
14
14
  [![NPM version](https://badge.fury.io/js/%40pulumi%2Ftls.svg)](https://www.npmjs.com/package/@pulumi/tls)
15
15
  [![Python version](https://badge.fury.io/py/pulumi-tls.svg)](https://pypi.org/project/pulumi-tls)
16
16
  [![NuGet version](https://badge.fury.io/nu/pulumi.tls.svg)](https://badge.fury.io/nu/pulumi.tls)
17
- [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v4/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v4/go)
17
+ [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v5/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
18
18
  [![License](https://img.shields.io/npm/l/%40pulumi%2Fpulumi.svg)](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
19
19
 
20
20
  # TLS Resource Provider
@@ -46,7 +46,7 @@ To use from Python, install using `pip`:
46
46
 
47
47
  To use from Go, use `go get` to grab the latest version of the library
48
48
 
49
- $ go get github.com/pulumi/pulumi-tls/sdk/v4
49
+ $ go get github.com/pulumi/pulumi-tls/sdk/v5
50
50
 
51
51
  ### .NET
52
52
 
@@ -8,8 +8,8 @@ from setuptools.command.install import install
8
8
  from subprocess import check_call
9
9
 
10
10
 
11
- VERSION = "4.11.0a1678132302"
12
- PLUGIN_VERSION = "4.11.0-alpha.1678132302+bc36d2fb"
11
+ VERSION = "5.0.0a0"
12
+ PLUGIN_VERSION = "5.0.0-alpha.0+7c9d3d42"
13
13
 
14
14
  class InstallPluginCommand(install):
15
15
  def run(self):