pulumi-tls 4.12.0a1700547240__py3-none-any.whl → 5.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -19,17 +19,13 @@ class CertRequestArgs:
19
19
  private_key_pem: pulumi.Input[str],
20
20
  dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
21
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
- key_algorithm: Optional[pulumi.Input[str]] = None,
23
22
  subject: Optional[pulumi.Input['CertRequestSubjectArgs']] = None,
24
23
  uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
25
24
  """
26
25
  The set of arguments for constructing a CertRequest resource.
27
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
28
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
29
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
26
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
30
27
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
31
28
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
32
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
33
29
  :param pulumi.Input['CertRequestSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
34
30
  :param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
35
31
  """
@@ -38,11 +34,6 @@ class CertRequestArgs:
38
34
  pulumi.set(__self__, "dns_names", dns_names)
39
35
  if ip_addresses is not None:
40
36
  pulumi.set(__self__, "ip_addresses", ip_addresses)
41
- if key_algorithm is not None:
42
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
43
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
44
- if key_algorithm is not None:
45
- pulumi.set(__self__, "key_algorithm", key_algorithm)
46
37
  if subject is not None:
47
38
  pulumi.set(__self__, "subject", subject)
48
39
  if uris is not None:
@@ -52,9 +43,7 @@ class CertRequestArgs:
52
43
  @pulumi.getter(name="privateKeyPem")
53
44
  def private_key_pem(self) -> pulumi.Input[str]:
54
45
  """
55
- Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
56
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
57
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
46
+ Private key in PEM (RFC 1421) interpolation function.
58
47
  """
59
48
  return pulumi.get(self, "private_key_pem")
60
49
 
@@ -86,21 +75,6 @@ class CertRequestArgs:
86
75
  def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
87
76
  pulumi.set(self, "ip_addresses", value)
88
77
 
89
- @property
90
- @pulumi.getter(name="keyAlgorithm")
91
- def key_algorithm(self) -> Optional[pulumi.Input[str]]:
92
- """
93
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
94
- """
95
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
96
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
97
-
98
- return pulumi.get(self, "key_algorithm")
99
-
100
- @key_algorithm.setter
101
- def key_algorithm(self, value: Optional[pulumi.Input[str]]):
102
- pulumi.set(self, "key_algorithm", value)
103
-
104
78
  @property
105
79
  @pulumi.getter
106
80
  def subject(self) -> Optional[pulumi.Input['CertRequestSubjectArgs']]:
@@ -141,10 +115,8 @@ class _CertRequestState:
141
115
  :param pulumi.Input[str] cert_request_pem: The certificate request data in PEM (RFC 1421).
142
116
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
143
117
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
144
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
145
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
146
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
147
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
118
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
119
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
148
120
  :param pulumi.Input['CertRequestSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
149
121
  :param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
150
122
  """
@@ -154,9 +126,6 @@ class _CertRequestState:
154
126
  pulumi.set(__self__, "dns_names", dns_names)
155
127
  if ip_addresses is not None:
156
128
  pulumi.set(__self__, "ip_addresses", ip_addresses)
157
- if key_algorithm is not None:
158
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
159
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
160
129
  if key_algorithm is not None:
161
130
  pulumi.set(__self__, "key_algorithm", key_algorithm)
162
131
  if private_key_pem is not None:
@@ -206,11 +175,8 @@ class _CertRequestState:
206
175
  @pulumi.getter(name="keyAlgorithm")
207
176
  def key_algorithm(self) -> Optional[pulumi.Input[str]]:
208
177
  """
209
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
178
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
210
179
  """
211
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
212
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
213
-
214
180
  return pulumi.get(self, "key_algorithm")
215
181
 
216
182
  @key_algorithm.setter
@@ -221,9 +187,7 @@ class _CertRequestState:
221
187
  @pulumi.getter(name="privateKeyPem")
222
188
  def private_key_pem(self) -> Optional[pulumi.Input[str]]:
223
189
  """
224
- Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
225
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
226
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
190
+ Private key in PEM (RFC 1421) interpolation function.
227
191
  """
228
192
  return pulumi.get(self, "private_key_pem")
229
193
 
@@ -263,7 +227,6 @@ class CertRequest(pulumi.CustomResource):
263
227
  opts: Optional[pulumi.ResourceOptions] = None,
264
228
  dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
265
229
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
266
- key_algorithm: Optional[pulumi.Input[str]] = None,
267
230
  private_key_pem: Optional[pulumi.Input[str]] = None,
268
231
  subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
269
232
  uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -287,10 +250,7 @@ class CertRequest(pulumi.CustomResource):
287
250
  :param pulumi.ResourceOptions opts: Options for the resource.
288
251
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
289
252
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
290
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
291
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
292
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
293
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
253
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
294
254
  :param pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
295
255
  :param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
296
256
  """
@@ -332,7 +292,6 @@ class CertRequest(pulumi.CustomResource):
332
292
  opts: Optional[pulumi.ResourceOptions] = None,
333
293
  dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
334
294
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
335
- key_algorithm: Optional[pulumi.Input[str]] = None,
336
295
  private_key_pem: Optional[pulumi.Input[str]] = None,
337
296
  subject: Optional[pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']]] = None,
338
297
  uris: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -347,13 +306,13 @@ class CertRequest(pulumi.CustomResource):
347
306
 
348
307
  __props__.__dict__["dns_names"] = dns_names
349
308
  __props__.__dict__["ip_addresses"] = ip_addresses
350
- __props__.__dict__["key_algorithm"] = key_algorithm
351
309
  if private_key_pem is None and not opts.urn:
352
310
  raise TypeError("Missing required property 'private_key_pem'")
353
311
  __props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
354
312
  __props__.__dict__["subject"] = subject
355
313
  __props__.__dict__["uris"] = uris
356
314
  __props__.__dict__["cert_request_pem"] = None
315
+ __props__.__dict__["key_algorithm"] = None
357
316
  secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyPem"])
358
317
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
359
318
  super(CertRequest, __self__).__init__(
@@ -383,10 +342,8 @@ class CertRequest(pulumi.CustomResource):
383
342
  :param pulumi.Input[str] cert_request_pem: The certificate request data in PEM (RFC 1421).
384
343
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
385
344
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
386
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
387
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
388
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
389
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
345
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
346
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
390
347
  :param pulumi.Input[pulumi.InputType['CertRequestSubjectArgs']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
391
348
  :param pulumi.Input[Sequence[pulumi.Input[str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
392
349
  """
@@ -431,20 +388,15 @@ class CertRequest(pulumi.CustomResource):
431
388
  @pulumi.getter(name="keyAlgorithm")
432
389
  def key_algorithm(self) -> pulumi.Output[str]:
433
390
  """
434
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
391
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
435
392
  """
436
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
437
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
438
-
439
393
  return pulumi.get(self, "key_algorithm")
440
394
 
441
395
  @property
442
396
  @pulumi.getter(name="privateKeyPem")
443
397
  def private_key_pem(self) -> pulumi.Output[str]:
444
398
  """
445
- Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
446
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
447
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
399
+ Private key in PEM (RFC 1421) interpolation function.
448
400
  """
449
401
  return pulumi.get(self, "private_key_pem")
450
402
 
@@ -51,7 +51,7 @@ class GetPublicKeyResult:
51
51
  @pulumi.getter
52
52
  def algorithm(self) -> str:
53
53
  """
54
- The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA` and `ED25519`.
54
+ The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA`, `ED25519`.
55
55
  """
56
56
  return pulumi.get(self, "algorithm")
57
57
 
@@ -67,7 +67,7 @@ class GetPublicKeyResult:
67
67
  @pulumi.getter(name="privateKeyOpenssh")
68
68
  def private_key_openssh(self) -> Optional[str]:
69
69
  """
70
- The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_pem`.
70
+ The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
71
71
  """
72
72
  return pulumi.get(self, "private_key_openssh")
73
73
 
@@ -75,7 +75,7 @@ class GetPublicKeyResult:
75
75
  @pulumi.getter(name="privateKeyPem")
76
76
  def private_key_pem(self) -> Optional[str]:
77
77
  """
78
- The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_openssh`.
78
+ The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
79
79
  """
80
80
  return pulumi.get(self, "private_key_pem")
81
81
 
@@ -148,8 +148,8 @@ def get_public_key(private_key_openssh: Optional[str] = None,
148
148
  ```
149
149
 
150
150
 
151
- :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_pem`.
152
- :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_openssh`.
151
+ :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
152
+ :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
153
153
  """
154
154
  __args__ = dict()
155
155
  __args__['privateKeyOpenssh'] = private_key_openssh
@@ -189,7 +189,7 @@ def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[st
189
189
  ```
190
190
 
191
191
 
192
- :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_pem`.
193
- :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. Currently-supported algorithms for keys are `RSA`, `ECDSA` and `ED25519`. This is *mutually exclusive* with `private_key_openssh`.
192
+ :param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
193
+ :param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
194
194
  """
195
195
  ...
@@ -19,7 +19,6 @@ class LocallySignedCertArgs:
19
19
  ca_private_key_pem: pulumi.Input[str],
20
20
  cert_request_pem: pulumi.Input[str],
21
21
  validity_period_hours: pulumi.Input[int],
22
- ca_key_algorithm: Optional[pulumi.Input[str]] = None,
23
22
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
24
23
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
25
24
  set_subject_key_id: Optional[pulumi.Input[bool]] = None):
@@ -30,7 +29,6 @@ class LocallySignedCertArgs:
30
29
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
31
30
  :param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
32
31
  :param pulumi.Input[int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
33
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
34
32
  :param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
35
33
  can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
36
34
  certificate remains valid until its true expiration time, since this resource does not (and cannot) support certificate
@@ -44,11 +42,6 @@ class LocallySignedCertArgs:
44
42
  pulumi.set(__self__, "ca_private_key_pem", ca_private_key_pem)
45
43
  pulumi.set(__self__, "cert_request_pem", cert_request_pem)
46
44
  pulumi.set(__self__, "validity_period_hours", validity_period_hours)
47
- if ca_key_algorithm is not None:
48
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
49
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
50
- if ca_key_algorithm is not None:
51
- pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
52
45
  if early_renewal_hours is not None:
53
46
  pulumi.set(__self__, "early_renewal_hours", early_renewal_hours)
54
47
  if is_ca_certificate is not None:
@@ -116,21 +109,6 @@ class LocallySignedCertArgs:
116
109
  def validity_period_hours(self, value: pulumi.Input[int]):
117
110
  pulumi.set(self, "validity_period_hours", value)
118
111
 
119
- @property
120
- @pulumi.getter(name="caKeyAlgorithm")
121
- def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
122
- """
123
- Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
124
- """
125
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
126
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
127
-
128
- return pulumi.get(self, "ca_key_algorithm")
129
-
130
- @ca_key_algorithm.setter
131
- def ca_key_algorithm(self, value: Optional[pulumi.Input[str]]):
132
- pulumi.set(self, "ca_key_algorithm", value)
133
-
134
112
  @property
135
113
  @pulumi.getter(name="earlyRenewalHours")
136
114
  def early_renewal_hours(self) -> Optional[pulumi.Input[int]]:
@@ -192,7 +170,7 @@ class _LocallySignedCertState:
192
170
  Input properties used for looking up and filtering LocallySignedCert resources.
193
171
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
194
172
  :param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
195
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
173
+ :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
196
174
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
197
175
  :param pulumi.Input[str] cert_pem: Certificate data in PEM (RFC 1421).
198
176
  :param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
@@ -212,9 +190,6 @@ class _LocallySignedCertState:
212
190
  pulumi.set(__self__, "allowed_uses", allowed_uses)
213
191
  if ca_cert_pem is not None:
214
192
  pulumi.set(__self__, "ca_cert_pem", ca_cert_pem)
215
- if ca_key_algorithm is not None:
216
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
217
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
218
193
  if ca_key_algorithm is not None:
219
194
  pulumi.set(__self__, "ca_key_algorithm", ca_key_algorithm)
220
195
  if ca_private_key_pem is not None:
@@ -266,11 +241,8 @@ class _LocallySignedCertState:
266
241
  @pulumi.getter(name="caKeyAlgorithm")
267
242
  def ca_key_algorithm(self) -> Optional[pulumi.Input[str]]:
268
243
  """
269
- Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
244
+ Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
270
245
  """
271
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
272
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
273
-
274
246
  return pulumi.get(self, "ca_key_algorithm")
275
247
 
276
248
  @ca_key_algorithm.setter
@@ -409,7 +381,6 @@ class LocallySignedCert(pulumi.CustomResource):
409
381
  opts: Optional[pulumi.ResourceOptions] = None,
410
382
  allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
411
383
  ca_cert_pem: Optional[pulumi.Input[str]] = None,
412
- ca_key_algorithm: Optional[pulumi.Input[str]] = None,
413
384
  ca_private_key_pem: Optional[pulumi.Input[str]] = None,
414
385
  cert_request_pem: Optional[pulumi.Input[str]] = None,
415
386
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
@@ -423,7 +394,6 @@ class LocallySignedCert(pulumi.CustomResource):
423
394
  :param pulumi.ResourceOptions opts: Options for the resource.
424
395
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
425
396
  :param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
426
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
427
397
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
428
398
  :param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
429
399
  :param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
@@ -460,7 +430,6 @@ class LocallySignedCert(pulumi.CustomResource):
460
430
  opts: Optional[pulumi.ResourceOptions] = None,
461
431
  allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
462
432
  ca_cert_pem: Optional[pulumi.Input[str]] = None,
463
- ca_key_algorithm: Optional[pulumi.Input[str]] = None,
464
433
  ca_private_key_pem: Optional[pulumi.Input[str]] = None,
465
434
  cert_request_pem: Optional[pulumi.Input[str]] = None,
466
435
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
@@ -482,7 +451,6 @@ class LocallySignedCert(pulumi.CustomResource):
482
451
  if ca_cert_pem is None and not opts.urn:
483
452
  raise TypeError("Missing required property 'ca_cert_pem'")
484
453
  __props__.__dict__["ca_cert_pem"] = ca_cert_pem
485
- __props__.__dict__["ca_key_algorithm"] = ca_key_algorithm
486
454
  if ca_private_key_pem is None and not opts.urn:
487
455
  raise TypeError("Missing required property 'ca_private_key_pem'")
488
456
  __props__.__dict__["ca_private_key_pem"] = None if ca_private_key_pem is None else pulumi.Output.secret(ca_private_key_pem)
@@ -495,6 +463,7 @@ class LocallySignedCert(pulumi.CustomResource):
495
463
  if validity_period_hours is None and not opts.urn:
496
464
  raise TypeError("Missing required property 'validity_period_hours'")
497
465
  __props__.__dict__["validity_period_hours"] = validity_period_hours
466
+ __props__.__dict__["ca_key_algorithm"] = None
498
467
  __props__.__dict__["cert_pem"] = None
499
468
  __props__.__dict__["ready_for_renewal"] = None
500
469
  __props__.__dict__["validity_end_time"] = None
@@ -533,7 +502,7 @@ class LocallySignedCert(pulumi.CustomResource):
533
502
  :param pulumi.ResourceOptions opts: Options for the resource.
534
503
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
535
504
  :param pulumi.Input[str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
536
- :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
505
+ :param pulumi.Input[str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
537
506
  :param pulumi.Input[str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
538
507
  :param pulumi.Input[str] cert_pem: Certificate data in PEM (RFC 1421).
539
508
  :param pulumi.Input[str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
@@ -588,11 +557,8 @@ class LocallySignedCert(pulumi.CustomResource):
588
557
  @pulumi.getter(name="caKeyAlgorithm")
589
558
  def ca_key_algorithm(self) -> pulumi.Output[str]:
590
559
  """
591
- Name of the algorithm used when generating the private key provided in `ca_private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
560
+ Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
592
561
  """
593
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""", DeprecationWarning)
594
- pulumi.log.warn("""ca_key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `ca_private_key_pem`.""")
595
-
596
562
  return pulumi.get(self, "ca_key_algorithm")
597
563
 
598
564
  @property
@@ -621,7 +587,7 @@ class LocallySignedCert(pulumi.CustomResource):
621
587
 
622
588
  @property
623
589
  @pulumi.getter(name="earlyRenewalHours")
624
- def early_renewal_hours(self) -> pulumi.Output[Optional[int]]:
590
+ def early_renewal_hours(self) -> pulumi.Output[int]:
625
591
  """
626
592
  The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
627
593
  can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
@@ -633,7 +599,7 @@ class LocallySignedCert(pulumi.CustomResource):
633
599
 
634
600
  @property
635
601
  @pulumi.getter(name="isCaCertificate")
636
- def is_ca_certificate(self) -> pulumi.Output[Optional[bool]]:
602
+ def is_ca_certificate(self) -> pulumi.Output[bool]:
637
603
  """
638
604
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
639
605
  """
@@ -649,7 +615,7 @@ class LocallySignedCert(pulumi.CustomResource):
649
615
 
650
616
  @property
651
617
  @pulumi.getter(name="setSubjectKeyId")
652
- def set_subject_key_id(self) -> pulumi.Output[Optional[bool]]:
618
+ def set_subject_key_id(self) -> pulumi.Output[bool]:
653
619
  """
654
620
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
655
621
  """
pulumi_tls/private_key.py CHANGED
@@ -19,8 +19,8 @@ class PrivateKeyArgs:
19
19
  rsa_bits: Optional[pulumi.Input[int]] = None):
20
20
  """
21
21
  The set of arguments for constructing a PrivateKey resource.
22
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
23
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
22
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
23
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
24
24
  :param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
25
25
  """
26
26
  pulumi.set(__self__, "algorithm", algorithm)
@@ -33,7 +33,7 @@ class PrivateKeyArgs:
33
33
  @pulumi.getter
34
34
  def algorithm(self) -> pulumi.Input[str]:
35
35
  """
36
- Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
36
+ Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
37
37
  """
38
38
  return pulumi.get(self, "algorithm")
39
39
 
@@ -45,7 +45,7 @@ class PrivateKeyArgs:
45
45
  @pulumi.getter(name="ecdsaCurve")
46
46
  def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
47
47
  """
48
- When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
48
+ When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
49
49
  """
50
50
  return pulumi.get(self, "ecdsa_curve")
51
51
 
@@ -73,6 +73,7 @@ class _PrivateKeyState:
73
73
  ecdsa_curve: Optional[pulumi.Input[str]] = None,
74
74
  private_key_openssh: Optional[pulumi.Input[str]] = None,
75
75
  private_key_pem: Optional[pulumi.Input[str]] = None,
76
+ private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
76
77
  public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
77
78
  public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
78
79
  public_key_openssh: Optional[pulumi.Input[str]] = None,
@@ -80,10 +81,11 @@ class _PrivateKeyState:
80
81
  rsa_bits: Optional[pulumi.Input[int]] = None):
81
82
  """
82
83
  Input properties used for looking up and filtering PrivateKey resources.
83
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
84
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
84
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
85
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
85
86
  :param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
86
87
  :param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
88
+ :param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
87
89
  :param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
88
90
  :param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
89
91
  :param pulumi.Input[str] public_key_openssh: The public key data in "Authorized Keys".
@@ -98,6 +100,8 @@ class _PrivateKeyState:
98
100
  pulumi.set(__self__, "private_key_openssh", private_key_openssh)
99
101
  if private_key_pem is not None:
100
102
  pulumi.set(__self__, "private_key_pem", private_key_pem)
103
+ if private_key_pem_pkcs8 is not None:
104
+ pulumi.set(__self__, "private_key_pem_pkcs8", private_key_pem_pkcs8)
101
105
  if public_key_fingerprint_md5 is not None:
102
106
  pulumi.set(__self__, "public_key_fingerprint_md5", public_key_fingerprint_md5)
103
107
  if public_key_fingerprint_sha256 is not None:
@@ -113,7 +117,7 @@ class _PrivateKeyState:
113
117
  @pulumi.getter
114
118
  def algorithm(self) -> Optional[pulumi.Input[str]]:
115
119
  """
116
- Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
120
+ Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
117
121
  """
118
122
  return pulumi.get(self, "algorithm")
119
123
 
@@ -125,7 +129,7 @@ class _PrivateKeyState:
125
129
  @pulumi.getter(name="ecdsaCurve")
126
130
  def ecdsa_curve(self) -> Optional[pulumi.Input[str]]:
127
131
  """
128
- When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
132
+ When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
129
133
  """
130
134
  return pulumi.get(self, "ecdsa_curve")
131
135
 
@@ -157,6 +161,18 @@ class _PrivateKeyState:
157
161
  def private_key_pem(self, value: Optional[pulumi.Input[str]]):
158
162
  pulumi.set(self, "private_key_pem", value)
159
163
 
164
+ @property
165
+ @pulumi.getter(name="privateKeyPemPkcs8")
166
+ def private_key_pem_pkcs8(self) -> Optional[pulumi.Input[str]]:
167
+ """
168
+ Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
169
+ """
170
+ return pulumi.get(self, "private_key_pem_pkcs8")
171
+
172
+ @private_key_pem_pkcs8.setter
173
+ def private_key_pem_pkcs8(self, value: Optional[pulumi.Input[str]]):
174
+ pulumi.set(self, "private_key_pem_pkcs8", value)
175
+
160
176
  @property
161
177
  @pulumi.getter(name="publicKeyFingerprintMd5")
162
178
  def public_key_fingerprint_md5(self) -> Optional[pulumi.Input[str]]:
@@ -231,8 +247,8 @@ class PrivateKey(pulumi.CustomResource):
231
247
  Create a PrivateKey resource with the given unique name, props, and options.
232
248
  :param str resource_name: The name of the resource.
233
249
  :param pulumi.ResourceOptions opts: Options for the resource.
234
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
235
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
250
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
251
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
236
252
  :param pulumi.Input[int] rsa_bits: When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
237
253
  """
238
254
  ...
@@ -277,11 +293,12 @@ class PrivateKey(pulumi.CustomResource):
277
293
  __props__.__dict__["rsa_bits"] = rsa_bits
278
294
  __props__.__dict__["private_key_openssh"] = None
279
295
  __props__.__dict__["private_key_pem"] = None
296
+ __props__.__dict__["private_key_pem_pkcs8"] = None
280
297
  __props__.__dict__["public_key_fingerprint_md5"] = None
281
298
  __props__.__dict__["public_key_fingerprint_sha256"] = None
282
299
  __props__.__dict__["public_key_openssh"] = None
283
300
  __props__.__dict__["public_key_pem"] = None
284
- secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem"])
301
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["privateKeyOpenssh", "privateKeyPem", "privateKeyPemPkcs8"])
285
302
  opts = pulumi.ResourceOptions.merge(opts, secret_opts)
286
303
  super(PrivateKey, __self__).__init__(
287
304
  'tls:index/privateKey:PrivateKey',
@@ -297,6 +314,7 @@ class PrivateKey(pulumi.CustomResource):
297
314
  ecdsa_curve: Optional[pulumi.Input[str]] = None,
298
315
  private_key_openssh: Optional[pulumi.Input[str]] = None,
299
316
  private_key_pem: Optional[pulumi.Input[str]] = None,
317
+ private_key_pem_pkcs8: Optional[pulumi.Input[str]] = None,
300
318
  public_key_fingerprint_md5: Optional[pulumi.Input[str]] = None,
301
319
  public_key_fingerprint_sha256: Optional[pulumi.Input[str]] = None,
302
320
  public_key_openssh: Optional[pulumi.Input[str]] = None,
@@ -309,10 +327,11 @@ class PrivateKey(pulumi.CustomResource):
309
327
  :param str resource_name: The unique name of the resulting resource.
310
328
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
311
329
  :param pulumi.ResourceOptions opts: Options for the resource.
312
- :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
313
- :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
330
+ :param pulumi.Input[str] algorithm: Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
331
+ :param pulumi.Input[str] ecdsa_curve: When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
314
332
  :param pulumi.Input[str] private_key_openssh: Private key data in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format.
315
333
  :param pulumi.Input[str] private_key_pem: Private key data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
334
+ :param pulumi.Input[str] private_key_pem_pkcs8: Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
316
335
  :param pulumi.Input[str] public_key_fingerprint_md5: The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
317
336
  :param pulumi.Input[str] public_key_fingerprint_sha256: The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, similarly to `public_key_openssh` and the ECDSA P224 limitations.
318
337
  :param pulumi.Input[str] public_key_openssh: The public key data in "Authorized Keys".
@@ -327,6 +346,7 @@ class PrivateKey(pulumi.CustomResource):
327
346
  __props__.__dict__["ecdsa_curve"] = ecdsa_curve
328
347
  __props__.__dict__["private_key_openssh"] = private_key_openssh
329
348
  __props__.__dict__["private_key_pem"] = private_key_pem
349
+ __props__.__dict__["private_key_pem_pkcs8"] = private_key_pem_pkcs8
330
350
  __props__.__dict__["public_key_fingerprint_md5"] = public_key_fingerprint_md5
331
351
  __props__.__dict__["public_key_fingerprint_sha256"] = public_key_fingerprint_sha256
332
352
  __props__.__dict__["public_key_openssh"] = public_key_openssh
@@ -338,15 +358,15 @@ class PrivateKey(pulumi.CustomResource):
338
358
  @pulumi.getter
339
359
  def algorithm(self) -> pulumi.Output[str]:
340
360
  """
341
- Name of the algorithm to use when generating the private key. Currently-supported values are `RSA`, `ECDSA` and `ED25519`.
361
+ Name of the algorithm to use when generating the private key. Currently-supported values are: `RSA`, `ECDSA`, `ED25519`.
342
362
  """
343
363
  return pulumi.get(self, "algorithm")
344
364
 
345
365
  @property
346
366
  @pulumi.getter(name="ecdsaCurve")
347
- def ecdsa_curve(self) -> pulumi.Output[Optional[str]]:
367
+ def ecdsa_curve(self) -> pulumi.Output[str]:
348
368
  """
349
- When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are `P224`, `P256`, `P384` or `P521` (default: `P224`).
369
+ When `algorithm` is `ECDSA`, the name of the elliptic curve to use. Currently-supported values are: `P224`, `P256`, `P384`, `P521`. (default: `P224`).
350
370
  """
351
371
  return pulumi.get(self, "ecdsa_curve")
352
372
 
@@ -366,6 +386,14 @@ class PrivateKey(pulumi.CustomResource):
366
386
  """
367
387
  return pulumi.get(self, "private_key_pem")
368
388
 
389
+ @property
390
+ @pulumi.getter(name="privateKeyPemPkcs8")
391
+ def private_key_pem_pkcs8(self) -> pulumi.Output[str]:
392
+ """
393
+ Private key data in [PKCS#8 PEM (RFC 5208)](https://datatracker.ietf.org/doc/html/rfc5208) format.
394
+ """
395
+ return pulumi.get(self, "private_key_pem_pkcs8")
396
+
369
397
  @property
370
398
  @pulumi.getter(name="publicKeyFingerprintMd5")
371
399
  def public_key_fingerprint_md5(self) -> pulumi.Output[str]:
@@ -400,7 +428,7 @@ class PrivateKey(pulumi.CustomResource):
400
428
 
401
429
  @property
402
430
  @pulumi.getter(name="rsaBits")
403
- def rsa_bits(self) -> pulumi.Output[Optional[int]]:
431
+ def rsa_bits(self) -> pulumi.Output[int]:
404
432
  """
405
433
  When `algorithm` is `RSA`, the size of the generated RSA key, in bits (default: `2048`).
406
434
  """
@@ -23,7 +23,6 @@ class SelfSignedCertArgs:
23
23
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
24
24
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
25
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
26
- key_algorithm: Optional[pulumi.Input[str]] = None,
27
26
  set_authority_key_id: Optional[pulumi.Input[bool]] = None,
28
27
  set_subject_key_id: Optional[pulumi.Input[bool]] = None,
29
28
  subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
@@ -31,9 +30,7 @@ class SelfSignedCertArgs:
31
30
  """
32
31
  The set of arguments for constructing a SelfSignedCert resource.
33
32
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
34
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
35
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
36
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
33
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
37
34
  :param pulumi.Input[int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
38
35
  :param pulumi.Input[Sequence[pulumi.Input[str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
39
36
  :param pulumi.Input[int] early_renewal_hours: The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
@@ -43,7 +40,6 @@ class SelfSignedCertArgs:
43
40
  early renewal period. (default: `0`)
44
41
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
45
42
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
46
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
47
43
  :param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
48
44
  :param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
49
45
  :param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
@@ -60,11 +56,6 @@ class SelfSignedCertArgs:
60
56
  pulumi.set(__self__, "ip_addresses", ip_addresses)
61
57
  if is_ca_certificate is not None:
62
58
  pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
63
- if key_algorithm is not None:
64
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
65
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
66
- if key_algorithm is not None:
67
- pulumi.set(__self__, "key_algorithm", key_algorithm)
68
59
  if set_authority_key_id is not None:
69
60
  pulumi.set(__self__, "set_authority_key_id", set_authority_key_id)
70
61
  if set_subject_key_id is not None:
@@ -90,9 +81,7 @@ class SelfSignedCertArgs:
90
81
  @pulumi.getter(name="privateKeyPem")
91
82
  def private_key_pem(self) -> pulumi.Input[str]:
92
83
  """
93
- Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
94
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
95
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
84
+ Private key in PEM (RFC 1421) interpolation function.
96
85
  """
97
86
  return pulumi.get(self, "private_key_pem")
98
87
 
@@ -164,21 +153,6 @@ class SelfSignedCertArgs:
164
153
  def is_ca_certificate(self, value: Optional[pulumi.Input[bool]]):
165
154
  pulumi.set(self, "is_ca_certificate", value)
166
155
 
167
- @property
168
- @pulumi.getter(name="keyAlgorithm")
169
- def key_algorithm(self) -> Optional[pulumi.Input[str]]:
170
- """
171
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
172
- """
173
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
174
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
175
-
176
- return pulumi.get(self, "key_algorithm")
177
-
178
- @key_algorithm.setter
179
- def key_algorithm(self, value: Optional[pulumi.Input[str]]):
180
- pulumi.set(self, "key_algorithm", value)
181
-
182
156
  @property
183
157
  @pulumi.getter(name="setAuthorityKeyId")
184
158
  def set_authority_key_id(self) -> Optional[pulumi.Input[bool]]:
@@ -259,10 +233,8 @@ class _SelfSignedCertState:
259
233
  early renewal period. (default: `0`)
260
234
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
261
235
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
262
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
263
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
264
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
265
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
236
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
237
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
266
238
  :param pulumi.Input[bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
267
239
  :param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
268
240
  :param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
@@ -284,9 +256,6 @@ class _SelfSignedCertState:
284
256
  pulumi.set(__self__, "ip_addresses", ip_addresses)
285
257
  if is_ca_certificate is not None:
286
258
  pulumi.set(__self__, "is_ca_certificate", is_ca_certificate)
287
- if key_algorithm is not None:
288
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
289
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
290
259
  if key_algorithm is not None:
291
260
  pulumi.set(__self__, "key_algorithm", key_algorithm)
292
261
  if private_key_pem is not None:
@@ -388,11 +357,8 @@ class _SelfSignedCertState:
388
357
  @pulumi.getter(name="keyAlgorithm")
389
358
  def key_algorithm(self) -> Optional[pulumi.Input[str]]:
390
359
  """
391
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
360
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
392
361
  """
393
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
394
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
395
-
396
362
  return pulumi.get(self, "key_algorithm")
397
363
 
398
364
  @key_algorithm.setter
@@ -403,9 +369,7 @@ class _SelfSignedCertState:
403
369
  @pulumi.getter(name="privateKeyPem")
404
370
  def private_key_pem(self) -> Optional[pulumi.Input[str]]:
405
371
  """
406
- Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
407
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
408
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
372
+ Private key in PEM (RFC 1421) interpolation function.
409
373
  """
410
374
  return pulumi.get(self, "private_key_pem")
411
375
 
@@ -520,7 +484,6 @@ class SelfSignedCert(pulumi.CustomResource):
520
484
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
521
485
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
522
486
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
523
- key_algorithm: Optional[pulumi.Input[str]] = None,
524
487
  private_key_pem: Optional[pulumi.Input[str]] = None,
525
488
  set_authority_key_id: Optional[pulumi.Input[bool]] = None,
526
489
  set_subject_key_id: Optional[pulumi.Input[bool]] = None,
@@ -541,10 +504,7 @@ class SelfSignedCert(pulumi.CustomResource):
541
504
  early renewal period. (default: `0`)
542
505
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
543
506
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
544
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
545
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
546
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
547
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
507
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
548
508
  :param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
549
509
  :param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
550
510
  :param pulumi.Input[pulumi.InputType['SelfSignedCertSubjectArgs']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
@@ -579,7 +539,6 @@ class SelfSignedCert(pulumi.CustomResource):
579
539
  early_renewal_hours: Optional[pulumi.Input[int]] = None,
580
540
  ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
581
541
  is_ca_certificate: Optional[pulumi.Input[bool]] = None,
582
- key_algorithm: Optional[pulumi.Input[str]] = None,
583
542
  private_key_pem: Optional[pulumi.Input[str]] = None,
584
543
  set_authority_key_id: Optional[pulumi.Input[bool]] = None,
585
544
  set_subject_key_id: Optional[pulumi.Input[bool]] = None,
@@ -602,7 +561,6 @@ class SelfSignedCert(pulumi.CustomResource):
602
561
  __props__.__dict__["early_renewal_hours"] = early_renewal_hours
603
562
  __props__.__dict__["ip_addresses"] = ip_addresses
604
563
  __props__.__dict__["is_ca_certificate"] = is_ca_certificate
605
- __props__.__dict__["key_algorithm"] = key_algorithm
606
564
  if private_key_pem is None and not opts.urn:
607
565
  raise TypeError("Missing required property 'private_key_pem'")
608
566
  __props__.__dict__["private_key_pem"] = None if private_key_pem is None else pulumi.Output.secret(private_key_pem)
@@ -614,6 +572,7 @@ class SelfSignedCert(pulumi.CustomResource):
614
572
  raise TypeError("Missing required property 'validity_period_hours'")
615
573
  __props__.__dict__["validity_period_hours"] = validity_period_hours
616
574
  __props__.__dict__["cert_pem"] = None
575
+ __props__.__dict__["key_algorithm"] = None
617
576
  __props__.__dict__["ready_for_renewal"] = None
618
577
  __props__.__dict__["validity_end_time"] = None
619
578
  __props__.__dict__["validity_start_time"] = None
@@ -662,10 +621,8 @@ class SelfSignedCert(pulumi.CustomResource):
662
621
  early renewal period. (default: `0`)
663
622
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
664
623
  :param pulumi.Input[bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
665
- :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
666
- :param pulumi.Input[str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
667
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
668
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
624
+ :param pulumi.Input[str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
625
+ :param pulumi.Input[str] private_key_pem: Private key in PEM (RFC 1421) interpolation function.
669
626
  :param pulumi.Input[bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
670
627
  :param pulumi.Input[bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
671
628
  :param pulumi.Input[bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
@@ -723,7 +680,7 @@ class SelfSignedCert(pulumi.CustomResource):
723
680
 
724
681
  @property
725
682
  @pulumi.getter(name="earlyRenewalHours")
726
- def early_renewal_hours(self) -> pulumi.Output[Optional[int]]:
683
+ def early_renewal_hours(self) -> pulumi.Output[int]:
727
684
  """
728
685
  The resource will consider the certificate to have expired the given number of hours before its actual expiry time. This
729
686
  can be useful to deploy an updated certificate in advance of the expiration of the current certificate. However, the old
@@ -743,7 +700,7 @@ class SelfSignedCert(pulumi.CustomResource):
743
700
 
744
701
  @property
745
702
  @pulumi.getter(name="isCaCertificate")
746
- def is_ca_certificate(self) -> pulumi.Output[Optional[bool]]:
703
+ def is_ca_certificate(self) -> pulumi.Output[bool]:
747
704
  """
748
705
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
749
706
  """
@@ -753,20 +710,15 @@ class SelfSignedCert(pulumi.CustomResource):
753
710
  @pulumi.getter(name="keyAlgorithm")
754
711
  def key_algorithm(self) -> pulumi.Output[str]:
755
712
  """
756
- Name of the algorithm used when generating the private key provided in `private_key_pem`. **NOTE**: this is deprecated and ignored, as the key algorithm is now inferred from the key.
713
+ Name of the algorithm used when generating the private key provided in `private_key_pem`.
757
714
  """
758
- warnings.warn("""This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""", DeprecationWarning)
759
- pulumi.log.warn("""key_algorithm is deprecated: This is now ignored, as the key algorithm is inferred from the `private_key_pem`.""")
760
-
761
715
  return pulumi.get(self, "key_algorithm")
762
716
 
763
717
  @property
764
718
  @pulumi.getter(name="privateKeyPem")
765
719
  def private_key_pem(self) -> pulumi.Output[str]:
766
720
  """
767
- Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong
768
- to. This can be read from a separate file using the [`file`](https://www.terraform.io/language/functions/file)
769
- interpolation function. Only an irreversible secure hash of the private key will be stored in the Terraform state.
721
+ Private key in PEM (RFC 1421) interpolation function.
770
722
  """
771
723
  return pulumi.get(self, "private_key_pem")
772
724
 
@@ -780,7 +732,7 @@ class SelfSignedCert(pulumi.CustomResource):
780
732
 
781
733
  @property
782
734
  @pulumi.getter(name="setAuthorityKeyId")
783
- def set_authority_key_id(self) -> pulumi.Output[Optional[bool]]:
735
+ def set_authority_key_id(self) -> pulumi.Output[bool]:
784
736
  """
785
737
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
786
738
  """
@@ -788,7 +740,7 @@ class SelfSignedCert(pulumi.CustomResource):
788
740
 
789
741
  @property
790
742
  @pulumi.getter(name="setSubjectKeyId")
791
- def set_subject_key_id(self) -> pulumi.Output[Optional[bool]]:
743
+ def set_subject_key_id(self) -> pulumi.Output[bool]:
792
744
  """
793
745
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
794
746
  """
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi-tls
3
- Version: 4.12.0a1700547240
3
+ Version: 5.0.0
4
4
  Summary: A Pulumi package to create TLS resources in Pulumi programs.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -17,7 +17,7 @@ Requires-Dist: semver >=2.8.1
17
17
  [![NPM version](https://badge.fury.io/js/%40pulumi%2Ftls.svg)](https://www.npmjs.com/package/@pulumi/tls)
18
18
  [![Python version](https://badge.fury.io/py/pulumi-tls.svg)](https://pypi.org/project/pulumi-tls)
19
19
  [![NuGet version](https://badge.fury.io/nu/pulumi.tls.svg)](https://badge.fury.io/nu/pulumi.tls)
20
- [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v4/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v4/go)
20
+ [![PkgGoDev](https://pkg.go.dev/badge/github.com/pulumi/pulumi-tls/sdk/v5/go)](https://pkg.go.dev/github.com/pulumi/pulumi-tls/sdk/v5/go)
21
21
  [![License](https://img.shields.io/npm/l/%40pulumi%2Fpulumi.svg)](https://github.com/pulumi/pulumi-tls/blob/master/LICENSE)
22
22
 
23
23
  # TLS Resource Provider
@@ -49,7 +49,7 @@ To use from Python, install using `pip`:
49
49
 
50
50
  To use from Go, use `go get` to grab the latest version of the library
51
51
 
52
- $ go get github.com/pulumi/pulumi-tls/sdk/v4
52
+ $ go get github.com/pulumi/pulumi-tls/sdk/v5
53
53
 
54
54
  ### .NET
55
55
 
@@ -1,21 +1,21 @@
1
1
  pulumi_tls/__init__.py,sha256=Fk7hjyRIMx42E0iGoNp4d238SBG6PAUxDzvlIndTJck,1523
2
2
  pulumi_tls/_inputs.py,sha256=JjQ3K8U2n9LfP0b1LDRcIoUVU2sjplfTdrJ09qu9v_A,13099
3
3
  pulumi_tls/_utilities.py,sha256=fRvpCIKutW049SlpPUAoouFyjnSSk1J-OY0b8SDzJaE,8081
4
- pulumi_tls/cert_request.py,sha256=b8TJuAHiE0c91HStKewJyKfjwVAZh8kgqu6yklPonx4,25733
4
+ pulumi_tls/cert_request.py,sha256=36qmjbtEgZE6QAqYk0oNVtPjn8VSha50_Tzs8XNR7Mw,20391
5
5
  pulumi_tls/get_certificate.py,sha256=lUy1OLl5oA8GbQnOeVy6F7Sfd8pWSgCnZ1g9gV9Jr30,5540
6
- pulumi_tls/get_public_key.py,sha256=TIOqs2Z9Fbz_8COdcTDKpMYQCyBctNLutGxxZwqoZHM,9980
7
- pulumi_tls/locally_signed_cert.py,sha256=CYYd0JP5NbT1yDG1RJmm2hmOB2nBtv8PmiCe8uUKOiI,44419
6
+ pulumi_tls/get_public_key.py,sha256=1vo4D1xf6z33AwgCrh4tR6qARrp7PBwUlAEli5Y-ldE,9965
7
+ pulumi_tls/locally_signed_cert.py,sha256=4NvYD8E-YpLQ-rIncp90RC7FDtJoMSYkoOjmuXHm2zM,41155
8
8
  pulumi_tls/outputs.py,sha256=3Yjo4iKbFD4gJQhCGGWwocpCAuS3V-d6nvQ9lseB3Qg,14909
9
- pulumi_tls/private_key.py,sha256=yvte9O4q1eLgPhInAaJrNmKVIxMhhbZZTjBula3AZoI,20700
9
+ pulumi_tls/private_key.py,sha256=l7YLkUhXlp-lLWST8p34AoR0zMI_Dj2qRlQEf8sjMVg,22201
10
10
  pulumi_tls/provider.py,sha256=GAIHbL660HmefqI6S05zA77JT1tVZVpxwSKnONjxqIM,4571
11
11
  pulumi_tls/pulumi-plugin.json,sha256=2ADHqCdf08udDO1YqVdDR76NxjDeYeP-Cs1zG4KQmnk,40
12
12
  pulumi_tls/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
13
- pulumi_tls/self_signed_cert.py,sha256=_tT1UM1yH9TleJRNe2QD_jEIrJPIRPNXoi4oNMbTqic,55621
13
+ pulumi_tls/self_signed_cert.py,sha256=t_MyOK6xCSMMiBeCcNZEKdafd5w903BTKt5ufrfKl4M,50239
14
14
  pulumi_tls/config/__init__.py,sha256=cfY0smRZD3fDVc93ZIAxEl_IM2pynmXB52n3Ahzi030,285
15
15
  pulumi_tls/config/__init__.pyi,sha256=kaPJpeRs8A7zNA-3MY-QL0zyxMV0oqUrYrsLj3HpqEg,474
16
16
  pulumi_tls/config/outputs.py,sha256=dA-Pt9uV2GYOUeiz1_qye69Jx-C80s3uCreEDydK-so,1457
17
17
  pulumi_tls/config/vars.py,sha256=wTZ5QbW-pH76tJ5PSA2zAFV4bPdtC5pmxQsV7jRd3c8,661
18
- pulumi_tls-4.12.0a1700547240.dist-info/METADATA,sha256=qkyVh4M9U71Q9kaxaP90X0fcGDyaTSJ2wQeuUGv0Z20,2428
19
- pulumi_tls-4.12.0a1700547240.dist-info/WHEEL,sha256=Xo9-1PvkuimrydujYJAjF7pCkriuXBpUPEjma1nZyJ0,92
20
- pulumi_tls-4.12.0a1700547240.dist-info/top_level.txt,sha256=w0yJOTuCUb1BpNsSTm0FJZPucueobFIfzPGzjYklx1U,11
21
- pulumi_tls-4.12.0a1700547240.dist-info/RECORD,,
18
+ pulumi_tls-5.0.0.dist-info/METADATA,sha256=5Mmzdwp3ExzS8POmFArZpqheOr6CLh8tNC8dByf-YTc,2416
19
+ pulumi_tls-5.0.0.dist-info/WHEEL,sha256=oiQVh_5PnQM0E3gPdiz09WCNmwiHDMaGer_elqB3coM,92
20
+ pulumi_tls-5.0.0.dist-info/top_level.txt,sha256=w0yJOTuCUb1BpNsSTm0FJZPucueobFIfzPGzjYklx1U,11
21
+ pulumi_tls-5.0.0.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: bdist_wheel (0.41.3)
2
+ Generator: bdist_wheel (0.42.0)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5