pulumi-tls 4.12.0a1700547240__py3-none-any.whl → 5.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_tls/cert_request.py +12 -60
- pulumi_tls/get_public_key.py +7 -7
- pulumi_tls/locally_signed_cert.py +8 -42
- pulumi_tls/private_key.py +45 -17
- pulumi_tls/self_signed_cert.py +16 -64
- {pulumi_tls-4.12.0a1700547240.dist-info → pulumi_tls-5.0.0.dist-info}/METADATA +3 -3
- {pulumi_tls-4.12.0a1700547240.dist-info → pulumi_tls-5.0.0.dist-info}/RECORD +9 -9
- {pulumi_tls-4.12.0a1700547240.dist-info → pulumi_tls-5.0.0.dist-info}/WHEEL +1 -1
- {pulumi_tls-4.12.0a1700547240.dist-info → pulumi_tls-5.0.0.dist-info}/top_level.txt +0 -0
pulumi_tls/cert_request.py
CHANGED
@@ -19,17 +19,13 @@ class CertRequestArgs:
|
|
19
19
|
private_key_pem: pulumi.Input[str],
|
20
20
|
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
21
21
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
23
22
|
subject: Optional[pulumi.Input['CertRequestSubjectArgs']] = None,
|
24
23
|
uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
25
24
|
"""
|
26
25
|
The set of arguments for constructing a CertRequest resource.
|
27
|
-
:param pulumi.Input[str] private_key_pem: Private key in
|
28
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
29
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
26
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
30
27
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
31
28
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
32
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
33
29
|
:param pulumi.Input['CertRequestSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
34
30
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
35
31
|
"""
|
@@ -38,11 +34,6 @@ class CertRequestArgs:
|
|
38
34
|
pulumi.set(__self__, "dns_names", dns_names)
|
39
35
|
if ip_addresses is not None:
|
40
36
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
41
|
-
if key_algorithm is not None:
|
42
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
43
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
44
|
-
if key_algorithm is not None:
|
45
|
-
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
46
37
|
if subject is not None:
|
47
38
|
pulumi.set(__self__, "subject", subject)
|
48
39
|
if uris is not None:
|
@@ -52,9 +43,7 @@ class CertRequestArgs:
|
|
52
43
|
@pulumi.getter(name="privateKeyPem")
|
53
44
|
def private_key_pem(self) -> pulumi.Input[str]:
|
54
45
|
"""
|
55
|
-
Private key in
|
56
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
57
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
46
|
+
Private key in PEM (RFC 1421) interpolation function.
|
58
47
|
"""
|
59
48
|
return pulumi.get(self, "private_key_pem")
|
60
49
|
|
@@ -86,21 +75,6 @@ class CertRequestArgs:
|
|
86
75
|
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
87
76
|
pulumi.set(self, "ip_addresses", value)
|
88
77
|
|
89
|
-
@property
|
90
|
-
@pulumi.getter(name="keyAlgorithm")
|
91
|
-
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
92
|
-
"""
|
93
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
94
|
-
"""
|
95
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
96
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
97
|
-
|
98
|
-
return pulumi.get(self, "key_algorithm")
|
99
|
-
|
100
|
-
@key_algorithm.setter
|
101
|
-
def key_algorithm(self, value: Optional[pulumi.Input[str]]):
|
102
|
-
pulumi.set(self, "key_algorithm", value)
|
103
|
-
|
104
78
|
@property
|
105
79
|
@pulumi.getter
|
106
80
|
def subject(self) -> Optional[pulumi.Input['CertRequestSubjectArgs']]:
|
@@ -141,10 +115,8 @@ class _CertRequestState:
|
|
141
115
|
:param pulumi.Input[str] cert_request_pem: The certificate request data in PEM (RFC 1421).
|
142
116
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
143
117
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
144
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
145
|
-
:param pulumi.Input[str] private_key_pem: Private key in
|
146
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
147
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
118
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
119
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
148
120
|
:param pulumi.Input['CertRequestSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
149
121
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
150
122
|
"""
|
@@ -154,9 +126,6 @@ class _CertRequestState:
|
|
154
126
|
pulumi.set(__self__, "dns_names", dns_names)
|
155
127
|
if ip_addresses is not None:
|
156
128
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
157
|
-
if key_algorithm is not None:
|
158
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
159
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
160
129
|
if key_algorithm is not None:
|
161
130
|
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
162
131
|
if private_key_pem is not None:
|
@@ -206,11 +175,8 @@ class _CertRequestState:
|
|
206
175
|
@pulumi.getter(name="keyAlgorithm")
|
207
176
|
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
208
177
|
"""
|
209
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
178
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
210
179
|
"""
|
211
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
212
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
213
|
-
|
214
180
|
return pulumi.get(self, "key_algorithm")
|
215
181
|
|
216
182
|
@key_algorithm.setter
|
@@ -221,9 +187,7 @@ class _CertRequestState:
|
|
221
187
|
@pulumi.getter(name="privateKeyPem")
|
222
188
|
def private_key_pem(self) -> Optional[pulumi.Input[str]]:
|
223
189
|
"""
|
224
|
-
Private key in
|
225
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
226
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
190
|
+
Private key in PEM (RFC 1421) interpolation function.
|
227
191
|
"""
|
228
192
|
return pulumi.get(self, "private_key_pem")
|
229
193
|
|
@@ -263,7 +227,6 @@ class CertRequest(pulumi.CustomResource):
|
|
263
227
|
opts: Optional[pulumi.ResourceOptions] = None,
|
264
228
|
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
265
229
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
266
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
267
230
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
268
231
|
subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
|
269
232
|
uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -287,10 +250,7 @@ class CertRequest(pulumi.CustomResource):
|
|
287
250
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
288
251
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
289
252
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
290
|
-
:param pulumi.Input[str]
|
291
|
-
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
292
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
293
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
253
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
294
254
|
:param pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
295
255
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
296
256
|
"""
|
@@ -332,7 +292,6 @@ class CertRequest(pulumi.CustomResource):
|
|
332
292
|
opts: Optional[pulumi.ResourceOptions] = None,
|
333
293
|
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
334
294
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
335
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
336
295
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
337
296
|
subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
|
338
297
|
uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
@@ -347,13 +306,13 @@ class CertRequest(pulumi.CustomResource):
|
|
347
306
|
|
348
307
|
__props__.__dict__["dns_names"] = dns_names
|
349
308
|
__props__.__dict__["ip_addresses"] = ip_addresses
|
350
|
-
__props__.__dict__["key_algorithm"] = key_algorithm
|
351
309
|
if private_key_pem is None and not opts.urn:
|
352
310
|
raise TypeError("Missing required property 'private_key_pem'")
|
353
311
|
__props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
|
354
312
|
__props__.__dict__["subject"] = subject
|
355
313
|
__props__.__dict__["uris"] = uris
|
356
314
|
__props__.__dict__["cert_request_pem"] = None
|
315
|
+
__props__.__dict__["key_algorithm"] = None
|
357
316
|
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyPem"])
|
358
317
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
359
318
|
super(CertRequest, __self__).__init__(
|
@@ -383,10 +342,8 @@ class CertRequest(pulumi.CustomResource):
|
|
383
342
|
:param pulumi.Input[str] cert_request_pem: The certificate request data in PEM (RFC 1421).
|
384
343
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
385
344
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
386
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
387
|
-
:param pulumi.Input[str] private_key_pem: Private key in
|
388
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
389
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
345
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
346
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
390
347
|
:param pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
391
348
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
392
349
|
"""
|
@@ -431,20 +388,15 @@ class CertRequest(pulumi.CustomResource):
|
|
431
388
|
@pulumi.getter(name="keyAlgorithm")
|
432
389
|
def key_algorithm(self) -> pulumi.Output[str]:
|
433
390
|
"""
|
434
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
391
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
435
392
|
"""
|
436
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
437
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
438
|
-
|
439
393
|
return pulumi.get(self, "key_algorithm")
|
440
394
|
|
441
395
|
@property
|
442
396
|
@pulumi.getter(name="privateKeyPem")
|
443
397
|
def private_key_pem(self) -> pulumi.Output[str]:
|
444
398
|
"""
|
445
|
-
Private key in
|
446
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
447
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
399
|
+
Private key in PEM (RFC 1421) interpolation function.
|
448
400
|
"""
|
449
401
|
return pulumi.get(self, "private_key_pem")
|
450
402
|
|
pulumi_tls/get_public_key.py
CHANGED
@@ -51,7 +51,7 @@ class GetPublicKeyResult:
|
|
51
51
|
@pulumi.getter
|
52
52
|
def algorithm(self) -> str:
|
53
53
|
"""
|
54
|
-
The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA
|
54
|
+
The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA`, `ED25519`.
|
55
55
|
"""
|
56
56
|
return pulumi.get(self, "algorithm")
|
57
57
|
|
@@ -67,7 +67,7 @@ class GetPublicKeyResult:
|
|
67
67
|
@pulumi.getter(name="privateKeyOpenssh")
|
68
68
|
def private_key_openssh(self) -> Optional[str]:
|
69
69
|
"""
|
70
|
-
The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
70
|
+
The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
71
71
|
"""
|
72
72
|
return pulumi.get(self, "private_key_openssh")
|
73
73
|
|
@@ -75,7 +75,7 @@ class GetPublicKeyResult:
|
|
75
75
|
@pulumi.getter(name="privateKeyPem")
|
76
76
|
def private_key_pem(self) -> Optional[str]:
|
77
77
|
"""
|
78
|
-
The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
78
|
+
The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
79
79
|
"""
|
80
80
|
return pulumi.get(self, "private_key_pem")
|
81
81
|
|
@@ -148,8 +148,8 @@ def get_public_key(private_key_openssh: Optional[str] = None,
|
|
148
148
|
```
|
149
149
|
|
150
150
|
|
151
|
-
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
152
|
-
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
151
|
+
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
152
|
+
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
153
153
|
"""
|
154
154
|
__args__ = dict()
|
155
155
|
__args__['privateKeyOpenssh'] = private_key_openssh
|
@@ -189,7 +189,7 @@ def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[st
|
|
189
189
|
```
|
190
190
|
|
191
191
|
|
192
|
-
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
193
|
-
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA
|
192
|
+
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
193
|
+
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
194
194
|
"""
|
195
195
|
...
|
@@ -19,7 +19,6 @@ class LocallySignedCertArgs:
|
|
19
19
|
ca_private_key_pem: pulumi.Input[str],
|
20
20
|
cert_request_pem: pulumi.Input[str],
|
21
21
|
validity_period_hours: pulumi.Input[int],
|
22
|
-
ca_key_algorithm: Optional[pulumi.Input[str]] = None,
|
23
22
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
24
23
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
25
24
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None):
|
@@ -30,7 +29,6 @@ class LocallySignedCertArgs:
|
|
30
29
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
31
30
|
:param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
32
31
|
:param pulumi.Input[int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
33
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
34
32
|
:param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
35
33
|
can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
|
36
34
|
certificate remains valid until its true expiration time, since this resource does not (and cannot) support certificate
|
@@ -44,11 +42,6 @@ class LocallySignedCertArgs:
|
|
44
42
|
pulumi.set(__self__, "ca_private_key_pem", ca_private_key_pem)
|
45
43
|
pulumi.set(__self__, "cert_request_pem", cert_request_pem)
|
46
44
|
pulumi.set(__self__, "validity_period_hours", validity_period_hours)
|
47
|
-
if ca_key_algorithm is not None:
|
48
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
49
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
50
|
-
if ca_key_algorithm is not None:
|
51
|
-
pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
|
52
45
|
if early_renewal_hours is not None:
|
53
46
|
pulumi.set(__self__, "early_renewal_hours", early_renewal_hours)
|
54
47
|
if is_ca_certificate is not None:
|
@@ -116,21 +109,6 @@ class LocallySignedCertArgs:
|
|
116
109
|
def validity_period_hours(self, value: pulumi.Input[int]):
|
117
110
|
pulumi.set(self, "validity_period_hours", value)
|
118
111
|
|
119
|
-
@property
|
120
|
-
@pulumi.getter(name="caKeyAlgorithm")
|
121
|
-
def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
122
|
-
"""
|
123
|
-
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
124
|
-
"""
|
125
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
126
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
127
|
-
|
128
|
-
return pulumi.get(self, "ca_key_algorithm")
|
129
|
-
|
130
|
-
@ca_key_algorithm.setter
|
131
|
-
def ca_key_algorithm(self, value: Optional[pulumi.Input[str]]):
|
132
|
-
pulumi.set(self, "ca_key_algorithm", value)
|
133
|
-
|
134
112
|
@property
|
135
113
|
@pulumi.getter(name="earlyRenewalHours")
|
136
114
|
def early_renewal_hours(self) -> Optional[pulumi.Input[int]]:
|
@@ -192,7 +170,7 @@ class _LocallySignedCertState:
|
|
192
170
|
Input properties used for looking up and filtering LocallySignedCert resources.
|
193
171
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
194
172
|
:param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
195
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
173
|
+
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
196
174
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
197
175
|
:param pulumi.Input[str] cert_pem: Certificate data in PEM (RFC 1421).
|
198
176
|
:param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
@@ -212,9 +190,6 @@ class _LocallySignedCertState:
|
|
212
190
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
213
191
|
if ca_cert_pem is not None:
|
214
192
|
pulumi.set(__self__, "ca_cert_pem", ca_cert_pem)
|
215
|
-
if ca_key_algorithm is not None:
|
216
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
217
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
218
193
|
if ca_key_algorithm is not None:
|
219
194
|
pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
|
220
195
|
if ca_private_key_pem is not None:
|
@@ -266,11 +241,8 @@ class _LocallySignedCertState:
|
|
266
241
|
@pulumi.getter(name="caKeyAlgorithm")
|
267
242
|
def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
268
243
|
"""
|
269
|
-
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
244
|
+
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
270
245
|
"""
|
271
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
272
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
273
|
-
|
274
246
|
return pulumi.get(self, "ca_key_algorithm")
|
275
247
|
|
276
248
|
@ca_key_algorithm.setter
|
@@ -409,7 +381,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
409
381
|
opts: Optional[pulumi.ResourceOptions] = None,
|
410
382
|
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
411
383
|
ca_cert_pem: Optional[pulumi.Input[str]] = None,
|
412
|
-
ca_key_algorithm: Optional[pulumi.Input[str]] = None,
|
413
384
|
ca_private_key_pem: Optional[pulumi.Input[str]] = None,
|
414
385
|
cert_request_pem: Optional[pulumi.Input[str]] = None,
|
415
386
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
@@ -423,7 +394,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
423
394
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
424
395
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
425
396
|
:param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
426
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
427
397
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
428
398
|
:param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
429
399
|
:param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
@@ -460,7 +430,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
460
430
|
opts: Optional[pulumi.ResourceOptions] = None,
|
461
431
|
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
462
432
|
ca_cert_pem: Optional[pulumi.Input[str]] = None,
|
463
|
-
ca_key_algorithm: Optional[pulumi.Input[str]] = None,
|
464
433
|
ca_private_key_pem: Optional[pulumi.Input[str]] = None,
|
465
434
|
cert_request_pem: Optional[pulumi.Input[str]] = None,
|
466
435
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
@@ -482,7 +451,6 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
482
451
|
if ca_cert_pem is None and not opts.urn:
|
483
452
|
raise TypeError("Missing required property 'ca_cert_pem'")
|
484
453
|
__props__.__dict__["ca_cert_pem"] = ca_cert_pem
|
485
|
-
__props__.__dict__["ca_key_algorithm"] = ca_key_algorithm
|
486
454
|
if ca_private_key_pem is None and not opts.urn:
|
487
455
|
raise TypeError("Missing required property 'ca_private_key_pem'")
|
488
456
|
__props__.__dict__["ca_private_key_pem"] = None if ca_private_key_pem is None else pulumi.Output.secret(ca_private_key_pem)
|
@@ -495,6 +463,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
495
463
|
if validity_period_hours is None and not opts.urn:
|
496
464
|
raise TypeError("Missing required property 'validity_period_hours'")
|
497
465
|
__props__.__dict__["validity_period_hours"] = validity_period_hours
|
466
|
+
__props__.__dict__["ca_key_algorithm"] = None
|
498
467
|
__props__.__dict__["cert_pem"] = None
|
499
468
|
__props__.__dict__["ready_for_renewal"] = None
|
500
469
|
__props__.__dict__["validity_end_time"] = None
|
@@ -533,7 +502,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
533
502
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
534
503
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
535
504
|
:param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
536
|
-
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
505
|
+
:param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
537
506
|
:param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
538
507
|
:param pulumi.Input[str] cert_pem: Certificate data in PEM (RFC 1421).
|
539
508
|
:param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
@@ -588,11 +557,8 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
588
557
|
@pulumi.getter(name="caKeyAlgorithm")
|
589
558
|
def ca_key_algorithm(self) -> pulumi.Output[str]:
|
590
559
|
"""
|
591
|
-
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
560
|
+
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
592
561
|
"""
|
593
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
|
594
|
-
pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
|
595
|
-
|
596
562
|
return pulumi.get(self, "ca_key_algorithm")
|
597
563
|
|
598
564
|
@property
|
@@ -621,7 +587,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
621
587
|
|
622
588
|
@property
|
623
589
|
@pulumi.getter(name="earlyRenewalHours")
|
624
|
-
def early_renewal_hours(self) -> pulumi.Output[
|
590
|
+
def early_renewal_hours(self) -> pulumi.Output[int]:
|
625
591
|
"""
|
626
592
|
The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
627
593
|
can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
|
@@ -633,7 +599,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
633
599
|
|
634
600
|
@property
|
635
601
|
@pulumi.getter(name="isCaCertificate")
|
636
|
-
def is_ca_certificate(self) -> pulumi.Output[
|
602
|
+
def is_ca_certificate(self) -> pulumi.Output[bool]:
|
637
603
|
"""
|
638
604
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
639
605
|
"""
|
@@ -649,7 +615,7 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
649
615
|
|
650
616
|
@property
|
651
617
|
@pulumi.getter(name="setSubjectKeyId")
|
652
|
-
def set_subject_key_id(self) -> pulumi.Output[
|
618
|
+
def set_subject_key_id(self) -> pulumi.Output[bool]:
|
653
619
|
"""
|
654
620
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
655
621
|
"""
|
pulumi_tls/private_key.py
CHANGED
@@ -19,8 +19,8 @@ class PrivateKeyArgs:
|
|
19
19
|
rsa_bits: Optional[pulumi.Input[int]] = None):
|
20
20
|
"""
|
21
21
|
The set of arguments for constructing a PrivateKey resource.
|
22
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
23
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
22
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
23
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
24
24
|
:param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
|
25
25
|
"""
|
26
26
|
pulumi.set(__self__, "algorithm", algorithm)
|
@@ -33,7 +33,7 @@ class PrivateKeyArgs:
|
|
33
33
|
@pulumi.getter
|
34
34
|
def algorithm(self) -> pulumi.Input[str]:
|
35
35
|
"""
|
36
|
-
Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
36
|
+
Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
37
37
|
"""
|
38
38
|
return pulumi.get(self, "algorithm")
|
39
39
|
|
@@ -45,7 +45,7 @@ class PrivateKeyArgs:
|
|
45
45
|
@pulumi.getter(name="ecdsaCurve")
|
46
46
|
def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
|
47
47
|
"""
|
48
|
-
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
48
|
+
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
49
49
|
"""
|
50
50
|
return pulumi.get(self, "ecdsa_curve")
|
51
51
|
|
@@ -73,6 +73,7 @@ class _PrivateKeyState:
|
|
73
73
|
ecdsa_curve: Optional[pulumi.Input[str]] = None,
|
74
74
|
private_key_openssh: Optional[pulumi.Input[str]] = None,
|
75
75
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
76
|
+
private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
|
76
77
|
public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
|
77
78
|
public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
|
78
79
|
public_key_openssh: Optional[pulumi.Input[str]] = None,
|
@@ -80,10 +81,11 @@ class _PrivateKeyState:
|
|
80
81
|
rsa_bits: Optional[pulumi.Input[int]] = None):
|
81
82
|
"""
|
82
83
|
Input properties used for looking up and filtering PrivateKey resources.
|
83
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
84
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
84
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
85
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
85
86
|
:param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
|
86
87
|
:param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
88
|
+
:param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
87
89
|
:param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
88
90
|
:param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
89
91
|
:param pulumi.Input[str] public_key_openssh: The public key data in "Authorized Keys".
|
@@ -98,6 +100,8 @@ class _PrivateKeyState:
|
|
98
100
|
pulumi.set(__self__, "private_key_openssh", private_key_openssh)
|
99
101
|
if private_key_pem is not None:
|
100
102
|
pulumi.set(__self__, "private_key_pem", private_key_pem)
|
103
|
+
if private_key_pem_pkcs8 is not None:
|
104
|
+
pulumi.set(__self__, "private_key_pem_pkcs8", private_key_pem_pkcs8)
|
101
105
|
if public_key_fingerprint_md5 is not None:
|
102
106
|
pulumi.set(__self__, "public_key_fingerprint_md5", public_key_fingerprint_md5)
|
103
107
|
if public_key_fingerprint_sha256 is not None:
|
@@ -113,7 +117,7 @@ class _PrivateKeyState:
|
|
113
117
|
@pulumi.getter
|
114
118
|
def algorithm(self) -> Optional[pulumi.Input[str]]:
|
115
119
|
"""
|
116
|
-
Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
120
|
+
Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
117
121
|
"""
|
118
122
|
return pulumi.get(self, "algorithm")
|
119
123
|
|
@@ -125,7 +129,7 @@ class _PrivateKeyState:
|
|
125
129
|
@pulumi.getter(name="ecdsaCurve")
|
126
130
|
def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
|
127
131
|
"""
|
128
|
-
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
132
|
+
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
129
133
|
"""
|
130
134
|
return pulumi.get(self, "ecdsa_curve")
|
131
135
|
|
@@ -157,6 +161,18 @@ class _PrivateKeyState:
|
|
157
161
|
def private_key_pem(self, value: Optional[pulumi.Input[str]]):
|
158
162
|
pulumi.set(self, "private_key_pem", value)
|
159
163
|
|
164
|
+
@property
|
165
|
+
@pulumi.getter(name="privateKeyPemPkcs8")
|
166
|
+
def private_key_pem_pkcs8(self) -> Optional[pulumi.Input[str]]:
|
167
|
+
"""
|
168
|
+
Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
169
|
+
"""
|
170
|
+
return pulumi.get(self, "private_key_pem_pkcs8")
|
171
|
+
|
172
|
+
@private_key_pem_pkcs8.setter
|
173
|
+
def private_key_pem_pkcs8(self, value: Optional[pulumi.Input[str]]):
|
174
|
+
pulumi.set(self, "private_key_pem_pkcs8", value)
|
175
|
+
|
160
176
|
@property
|
161
177
|
@pulumi.getter(name="publicKeyFingerprintMd5")
|
162
178
|
def public_key_fingerprint_md5(self) -> Optional[pulumi.Input[str]]:
|
@@ -231,8 +247,8 @@ class PrivateKey(pulumi.CustomResource):
|
|
231
247
|
Create a PrivateKey resource with the given unique name, props, and options.
|
232
248
|
:param str resource_name: The name of the resource.
|
233
249
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
234
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
235
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
250
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
251
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
236
252
|
:param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
|
237
253
|
"""
|
238
254
|
...
|
@@ -277,11 +293,12 @@ class PrivateKey(pulumi.CustomResource):
|
|
277
293
|
__props__.__dict__["rsa_bits"] = rsa_bits
|
278
294
|
__props__.__dict__["private_key_openssh"] = None
|
279
295
|
__props__.__dict__["private_key_pem"] = None
|
296
|
+
__props__.__dict__["private_key_pem_pkcs8"] = None
|
280
297
|
__props__.__dict__["public_key_fingerprint_md5"] = None
|
281
298
|
__props__.__dict__["public_key_fingerprint_sha256"] = None
|
282
299
|
__props__.__dict__["public_key_openssh"] = None
|
283
300
|
__props__.__dict__["public_key_pem"] = None
|
284
|
-
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem"])
|
301
|
+
secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem", "privateKeyPemPkcs8"])
|
285
302
|
opts = pulumi.ResourceOptions.merge(opts, secret_opts)
|
286
303
|
super(PrivateKey, __self__).__init__(
|
287
304
|
'tls:index/privateKey:PrivateKey',
|
@@ -297,6 +314,7 @@ class PrivateKey(pulumi.CustomResource):
|
|
297
314
|
ecdsa_curve: Optional[pulumi.Input[str]] = None,
|
298
315
|
private_key_openssh: Optional[pulumi.Input[str]] = None,
|
299
316
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
317
|
+
private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
|
300
318
|
public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
|
301
319
|
public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
|
302
320
|
public_key_openssh: Optional[pulumi.Input[str]] = None,
|
@@ -309,10 +327,11 @@ class PrivateKey(pulumi.CustomResource):
|
|
309
327
|
:param str resource_name: The unique name of the resulting resource.
|
310
328
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
311
329
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
312
|
-
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
313
|
-
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
330
|
+
:param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
331
|
+
:param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
314
332
|
:param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
|
315
333
|
:param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
334
|
+
:param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
316
335
|
:param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
317
336
|
:param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
|
318
337
|
:param pulumi.Input[str] public_key_openssh: The public key data in "Authorized Keys".
|
@@ -327,6 +346,7 @@ class PrivateKey(pulumi.CustomResource):
|
|
327
346
|
__props__.__dict__["ecdsa_curve"] = ecdsa_curve
|
328
347
|
__props__.__dict__["private_key_openssh"] = private_key_openssh
|
329
348
|
__props__.__dict__["private_key_pem"] = private_key_pem
|
349
|
+
__props__.__dict__["private_key_pem_pkcs8"] = private_key_pem_pkcs8
|
330
350
|
__props__.__dict__["public_key_fingerprint_md5"] = public_key_fingerprint_md5
|
331
351
|
__props__.__dict__["public_key_fingerprint_sha256"] = public_key_fingerprint_sha256
|
332
352
|
__props__.__dict__["public_key_openssh"] = public_key_openssh
|
@@ -338,15 +358,15 @@ class PrivateKey(pulumi.CustomResource):
|
|
338
358
|
@pulumi.getter
|
339
359
|
def algorithm(self) -> pulumi.Output[str]:
|
340
360
|
"""
|
341
|
-
Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA
|
361
|
+
Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
|
342
362
|
"""
|
343
363
|
return pulumi.get(self, "algorithm")
|
344
364
|
|
345
365
|
@property
|
346
366
|
@pulumi.getter(name="ecdsaCurve")
|
347
|
-
def ecdsa_curve(self) -> pulumi.Output[
|
367
|
+
def ecdsa_curve(self) -> pulumi.Output[str]:
|
348
368
|
"""
|
349
|
-
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384
|
369
|
+
When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
|
350
370
|
"""
|
351
371
|
return pulumi.get(self, "ecdsa_curve")
|
352
372
|
|
@@ -366,6 +386,14 @@ class PrivateKey(pulumi.CustomResource):
|
|
366
386
|
"""
|
367
387
|
return pulumi.get(self, "private_key_pem")
|
368
388
|
|
389
|
+
@property
|
390
|
+
@pulumi.getter(name="privateKeyPemPkcs8")
|
391
|
+
def private_key_pem_pkcs8(self) -> pulumi.Output[str]:
|
392
|
+
"""
|
393
|
+
Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
|
394
|
+
"""
|
395
|
+
return pulumi.get(self, "private_key_pem_pkcs8")
|
396
|
+
|
369
397
|
@property
|
370
398
|
@pulumi.getter(name="publicKeyFingerprintMd5")
|
371
399
|
def public_key_fingerprint_md5(self) -> pulumi.Output[str]:
|
@@ -400,7 +428,7 @@ class PrivateKey(pulumi.CustomResource):
|
|
400
428
|
|
401
429
|
@property
|
402
430
|
@pulumi.getter(name="rsaBits")
|
403
|
-
def rsa_bits(self) -> pulumi.Output[
|
431
|
+
def rsa_bits(self) -> pulumi.Output[int]:
|
404
432
|
"""
|
405
433
|
When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
|
406
434
|
"""
|
pulumi_tls/self_signed_cert.py
CHANGED
@@ -23,7 +23,6 @@ class SelfSignedCertArgs:
|
|
23
23
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
24
24
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
25
25
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
26
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
27
26
|
set_authority_key_id: Optional[pulumi.Input[bool]] = None,
|
28
27
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None,
|
29
28
|
subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
|
@@ -31,9 +30,7 @@ class SelfSignedCertArgs:
|
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a SelfSignedCert resource.
|
33
32
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
34
|
-
:param pulumi.Input[str] private_key_pem: Private key in
|
35
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
36
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
33
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
37
34
|
:param pulumi.Input[int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
38
35
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
39
36
|
:param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
@@ -43,7 +40,6 @@ class SelfSignedCertArgs:
|
|
43
40
|
early renewal period. (default: `0`)
|
44
41
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
45
42
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
46
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
47
43
|
:param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
48
44
|
:param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
49
45
|
:param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
@@ -60,11 +56,6 @@ class SelfSignedCertArgs:
|
|
60
56
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
61
57
|
if is_ca_certificate is not None:
|
62
58
|
pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
|
63
|
-
if key_algorithm is not None:
|
64
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
65
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
66
|
-
if key_algorithm is not None:
|
67
|
-
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
68
59
|
if set_authority_key_id is not None:
|
69
60
|
pulumi.set(__self__, "set_authority_key_id", set_authority_key_id)
|
70
61
|
if set_subject_key_id is not None:
|
@@ -90,9 +81,7 @@ class SelfSignedCertArgs:
|
|
90
81
|
@pulumi.getter(name="privateKeyPem")
|
91
82
|
def private_key_pem(self) -> pulumi.Input[str]:
|
92
83
|
"""
|
93
|
-
Private key in
|
94
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
95
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
84
|
+
Private key in PEM (RFC 1421) interpolation function.
|
96
85
|
"""
|
97
86
|
return pulumi.get(self, "private_key_pem")
|
98
87
|
|
@@ -164,21 +153,6 @@ class SelfSignedCertArgs:
|
|
164
153
|
def is_ca_certificate(self, value: Optional[pulumi.Input[bool]]):
|
165
154
|
pulumi.set(self, "is_ca_certificate", value)
|
166
155
|
|
167
|
-
@property
|
168
|
-
@pulumi.getter(name="keyAlgorithm")
|
169
|
-
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
170
|
-
"""
|
171
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
|
172
|
-
"""
|
173
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
174
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
175
|
-
|
176
|
-
return pulumi.get(self, "key_algorithm")
|
177
|
-
|
178
|
-
@key_algorithm.setter
|
179
|
-
def key_algorithm(self, value: Optional[pulumi.Input[str]]):
|
180
|
-
pulumi.set(self, "key_algorithm", value)
|
181
|
-
|
182
156
|
@property
|
183
157
|
@pulumi.getter(name="setAuthorityKeyId")
|
184
158
|
def set_authority_key_id(self) -> Optional[pulumi.Input[bool]]:
|
@@ -259,10 +233,8 @@ class _SelfSignedCertState:
|
|
259
233
|
early renewal period. (default: `0`)
|
260
234
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
261
235
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
262
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
263
|
-
:param pulumi.Input[str] private_key_pem: Private key in
|
264
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
265
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
236
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
237
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
266
238
|
:param pulumi.Input[bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
267
239
|
:param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
268
240
|
:param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
@@ -284,9 +256,6 @@ class _SelfSignedCertState:
|
|
284
256
|
pulumi.set(__self__, "ip_addresses", ip_addresses)
|
285
257
|
if is_ca_certificate is not None:
|
286
258
|
pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
|
287
|
-
if key_algorithm is not None:
|
288
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
289
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
290
259
|
if key_algorithm is not None:
|
291
260
|
pulumi.set(__self__, "key_algorithm", key_algorithm)
|
292
261
|
if private_key_pem is not None:
|
@@ -388,11 +357,8 @@ class _SelfSignedCertState:
|
|
388
357
|
@pulumi.getter(name="keyAlgorithm")
|
389
358
|
def key_algorithm(self) -> Optional[pulumi.Input[str]]:
|
390
359
|
"""
|
391
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
360
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
392
361
|
"""
|
393
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
394
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
395
|
-
|
396
362
|
return pulumi.get(self, "key_algorithm")
|
397
363
|
|
398
364
|
@key_algorithm.setter
|
@@ -403,9 +369,7 @@ class _SelfSignedCertState:
|
|
403
369
|
@pulumi.getter(name="privateKeyPem")
|
404
370
|
def private_key_pem(self) -> Optional[pulumi.Input[str]]:
|
405
371
|
"""
|
406
|
-
Private key in
|
407
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
408
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
372
|
+
Private key in PEM (RFC 1421) interpolation function.
|
409
373
|
"""
|
410
374
|
return pulumi.get(self, "private_key_pem")
|
411
375
|
|
@@ -520,7 +484,6 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
520
484
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
521
485
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
522
486
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
523
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
524
487
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
525
488
|
set_authority_key_id: Optional[pulumi.Input[bool]] = None,
|
526
489
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None,
|
@@ -541,10 +504,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
541
504
|
early renewal period. (default: `0`)
|
542
505
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
543
506
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
544
|
-
:param pulumi.Input[str]
|
545
|
-
:param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
|
546
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
547
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
507
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
548
508
|
:param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
549
509
|
:param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
550
510
|
:param pulumi.Input[pulumi.InputType['SelfSignedCertSubjectArgs']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
@@ -579,7 +539,6 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
579
539
|
early_renewal_hours: Optional[pulumi.Input[int]] = None,
|
580
540
|
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
581
541
|
is_ca_certificate: Optional[pulumi.Input[bool]] = None,
|
582
|
-
key_algorithm: Optional[pulumi.Input[str]] = None,
|
583
542
|
private_key_pem: Optional[pulumi.Input[str]] = None,
|
584
543
|
set_authority_key_id: Optional[pulumi.Input[bool]] = None,
|
585
544
|
set_subject_key_id: Optional[pulumi.Input[bool]] = None,
|
@@ -602,7 +561,6 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
602
561
|
__props__.__dict__["early_renewal_hours"] = early_renewal_hours
|
603
562
|
__props__.__dict__["ip_addresses"] = ip_addresses
|
604
563
|
__props__.__dict__["is_ca_certificate"] = is_ca_certificate
|
605
|
-
__props__.__dict__["key_algorithm"] = key_algorithm
|
606
564
|
if private_key_pem is None and not opts.urn:
|
607
565
|
raise TypeError("Missing required property 'private_key_pem'")
|
608
566
|
__props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
|
@@ -614,6 +572,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
614
572
|
raise TypeError("Missing required property 'validity_period_hours'")
|
615
573
|
__props__.__dict__["validity_period_hours"] = validity_period_hours
|
616
574
|
__props__.__dict__["cert_pem"] = None
|
575
|
+
__props__.__dict__["key_algorithm"] = None
|
617
576
|
__props__.__dict__["ready_for_renewal"] = None
|
618
577
|
__props__.__dict__["validity_end_time"] = None
|
619
578
|
__props__.__dict__["validity_start_time"] = None
|
@@ -662,10 +621,8 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
662
621
|
early renewal period. (default: `0`)
|
663
622
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
664
623
|
:param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
665
|
-
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
666
|
-
:param pulumi.Input[str] private_key_pem: Private key in
|
667
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
668
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
624
|
+
:param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
625
|
+
:param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
|
669
626
|
:param pulumi.Input[bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
670
627
|
:param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
671
628
|
:param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
@@ -723,7 +680,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
723
680
|
|
724
681
|
@property
|
725
682
|
@pulumi.getter(name="earlyRenewalHours")
|
726
|
-
def early_renewal_hours(self) -> pulumi.Output[
|
683
|
+
def early_renewal_hours(self) -> pulumi.Output[int]:
|
727
684
|
"""
|
728
685
|
The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
|
729
686
|
can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
|
@@ -743,7 +700,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
743
700
|
|
744
701
|
@property
|
745
702
|
@pulumi.getter(name="isCaCertificate")
|
746
|
-
def is_ca_certificate(self) -> pulumi.Output[
|
703
|
+
def is_ca_certificate(self) -> pulumi.Output[bool]:
|
747
704
|
"""
|
748
705
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
749
706
|
"""
|
@@ -753,20 +710,15 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
753
710
|
@pulumi.getter(name="keyAlgorithm")
|
754
711
|
def key_algorithm(self) -> pulumi.Output[str]:
|
755
712
|
"""
|
756
|
-
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
713
|
+
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
757
714
|
"""
|
758
|
-
warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
|
759
|
-
pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
|
760
|
-
|
761
715
|
return pulumi.get(self, "key_algorithm")
|
762
716
|
|
763
717
|
@property
|
764
718
|
@pulumi.getter(name="privateKeyPem")
|
765
719
|
def private_key_pem(self) -> pulumi.Output[str]:
|
766
720
|
"""
|
767
|
-
Private key in
|
768
|
-
to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
|
769
|
-
interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
|
721
|
+
Private key in PEM (RFC 1421) interpolation function.
|
770
722
|
"""
|
771
723
|
return pulumi.get(self, "private_key_pem")
|
772
724
|
|
@@ -780,7 +732,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
780
732
|
|
781
733
|
@property
|
782
734
|
@pulumi.getter(name="setAuthorityKeyId")
|
783
|
-
def set_authority_key_id(self) -> pulumi.Output[
|
735
|
+
def set_authority_key_id(self) -> pulumi.Output[bool]:
|
784
736
|
"""
|
785
737
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
786
738
|
"""
|
@@ -788,7 +740,7 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
788
740
|
|
789
741
|
@property
|
790
742
|
@pulumi.getter(name="setSubjectKeyId")
|
791
|
-
def set_subject_key_id(self) -> pulumi.Output[
|
743
|
+
def set_subject_key_id(self) -> pulumi.Output[bool]:
|
792
744
|
"""
|
793
745
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
794
746
|
"""
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: pulumi-tls
|
3
|
-
Version:
|
3
|
+
Version: 5.0.0
|
4
4
|
Summary: A Pulumi package to create TLS resources in Pulumi programs.
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
@@ -17,7 +17,7 @@ Requires-Dist: semver >=2.8.1
|
|
17
17
|
[](https://www.npmjs.com/package/@pulumi/tls)
|
18
18
|
[](https://pypi.org/project/pulumi-tls)
|
19
19
|
[](https://badge.fury.io/nu/pulumi.tls)
|
20
|
-
[](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
|
21
21
|
[](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
|
22
22
|
|
23
23
|
# TLS Resource Provider
|
@@ -49,7 +49,7 @@ To use from Python, install using `pip`:
|
|
49
49
|
|
50
50
|
To use from Go, use `go get` to grab the latest version of the library
|
51
51
|
|
52
|
-
$ go get github.com/pulumi/pulumi-tls/sdk/
|
52
|
+
$ go get github.com/pulumi/pulumi-tls/sdk/v5
|
53
53
|
|
54
54
|
### .NET
|
55
55
|
|
@@ -1,21 +1,21 @@
|
|
1
1
|
pulumi_tls/__init__.py,sha256=Fk7hjyRIMx42E0iGoNp4d238SBG6PAUxDzvlIndTJck,1523
|
2
2
|
pulumi_tls/_inputs.py,sha256=JjQ3K8U2n9LfP0b1LDRcIoUVU2sjplfTdrJ09qu9v_A,13099
|
3
3
|
pulumi_tls/_utilities.py,sha256=fRvpCIKutW049SlpPUAoouFyjnSSk1J-OY0b8SDzJaE,8081
|
4
|
-
pulumi_tls/cert_request.py,sha256=
|
4
|
+
pulumi_tls/cert_request.py,sha256=36qmjbtEgZE6QAqYk0oNVtPjn8VSha50_Tzs8XNR7Mw,20391
|
5
5
|
pulumi_tls/get_certificate.py,sha256=lUy1OLl5oA8GbQnOeVy6F7Sfd8pWSgCnZ1g9gV9Jr30,5540
|
6
|
-
pulumi_tls/get_public_key.py,sha256=
|
7
|
-
pulumi_tls/locally_signed_cert.py,sha256=
|
6
|
+
pulumi_tls/get_public_key.py,sha256=1vo4D1xf6z33AwgCrh4tR6qARrp7PBwUlAEli5Y-ldE,9965
|
7
|
+
pulumi_tls/locally_signed_cert.py,sha256=4NvYD8E-YpLQ-rIncp90RC7FDtJoMSYkoOjmuXHm2zM,41155
|
8
8
|
pulumi_tls/outputs.py,sha256=3Yjo4iKbFD4gJQhCGGWwocpCAuS3V-d6nvQ9lseB3Qg,14909
|
9
|
-
pulumi_tls/private_key.py,sha256=
|
9
|
+
pulumi_tls/private_key.py,sha256=l7YLkUhXlp-lLWST8p34AoR0zMI_Dj2qRlQEf8sjMVg,22201
|
10
10
|
pulumi_tls/provider.py,sha256=GAIHbL660HmefqI6S05zA77JT1tVZVpxwSKnONjxqIM,4571
|
11
11
|
pulumi_tls/pulumi-plugin.json,sha256=2ADHqCdf08udDO1YqVdDR76NxjDeYeP-Cs1zG4KQmnk,40
|
12
12
|
pulumi_tls/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
13
|
-
pulumi_tls/self_signed_cert.py,sha256=
|
13
|
+
pulumi_tls/self_signed_cert.py,sha256=t_MyOK6xCSMMiBeCcNZEKdafd5w903BTKt5ufrfKl4M,50239
|
14
14
|
pulumi_tls/config/__init__.py,sha256=cfY0smRZD3fDVc93ZIAxEl_IM2pynmXB52n3Ahzi030,285
|
15
15
|
pulumi_tls/config/__init__.pyi,sha256=kaPJpeRs8A7zNA-3MY-QL0zyxMV0oqUrYrsLj3HpqEg,474
|
16
16
|
pulumi_tls/config/outputs.py,sha256=dA-Pt9uV2GYOUeiz1_qye69Jx-C80s3uCreEDydK-so,1457
|
17
17
|
pulumi_tls/config/vars.py,sha256=wTZ5QbW-pH76tJ5PSA2zAFV4bPdtC5pmxQsV7jRd3c8,661
|
18
|
-
pulumi_tls-
|
19
|
-
pulumi_tls-
|
20
|
-
pulumi_tls-
|
21
|
-
pulumi_tls-
|
18
|
+
pulumi_tls-5.0.0.dist-info/METADATA,sha256=5Mmzdwp3ExzS8POmFArZpqheOr6CLh8tNC8dByf-YTc,2416
|
19
|
+
pulumi_tls-5.0.0.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
|
20
|
+
pulumi_tls-5.0.0.dist-info/top_level.txt,sha256=w0yJOTuCUb1BpNsSTm0FJZPucueobFIfzPGzjYklx1U,11
|
21
|
+
pulumi_tls-5.0.0.dist-info/RECORD,,
|
File without changes
|