pulumi-tls 5.2.0a1745477258__py3-none-any.whl → 5.2.1a1753398320__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_tls/__init__.py +2 -2
- pulumi_tls/_inputs.py +148 -149
- pulumi_tls/_utilities.py +1 -1
- pulumi_tls/cert_request.py +92 -92
- pulumi_tls/config/__init__.py +2 -2
- pulumi_tls/config/__init__.pyi +2 -3
- pulumi_tls/config/outputs.py +18 -19
- pulumi_tls/config/vars.py +3 -4
- pulumi_tls/get_certificate.py +23 -24
- pulumi_tls/get_public_key.py +26 -27
- pulumi_tls/locally_signed_cert.py +180 -180
- pulumi_tls/outputs.py +129 -130
- pulumi_tls/private_key.py +117 -117
- pulumi_tls/provider.py +24 -4
- pulumi_tls/pulumi-plugin.json +1 -1
- pulumi_tls/self_signed_cert.py +217 -217
- {pulumi_tls-5.2.0a1745477258.dist-info → pulumi_tls-5.2.1a1753398320.dist-info}/METADATA +3 -3
- pulumi_tls-5.2.1a1753398320.dist-info/RECORD +21 -0
- {pulumi_tls-5.2.0a1745477258.dist-info → pulumi_tls-5.2.1a1753398320.dist-info}/WHEEL +1 -1
- pulumi_tls-5.2.0a1745477258.dist-info/RECORD +0 -21
- {pulumi_tls-5.2.0a1745477258.dist-info → pulumi_tls-5.2.1a1753398320.dist-info}/top_level.txt +0 -0
pulumi_tls/self_signed_cert.py
CHANGED
@@ -1,9 +1,8 @@
|
|
1
1
|
# coding=utf-8
|
2
|
-
# *** WARNING: this file was generated by
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,29 +21,29 @@ __all__ = ['SelfSignedCertArgs', 'SelfSignedCert']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class SelfSignedCertArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
allowed_uses: pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
private_key_pem: pulumi.Input[
|
27
|
-
validity_period_hours: pulumi.Input[
|
28
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
early_renewal_hours: Optional[pulumi.Input[
|
30
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
31
|
-
is_ca_certificate: Optional[pulumi.Input[
|
32
|
-
set_authority_key_id: Optional[pulumi.Input[
|
33
|
-
set_subject_key_id: Optional[pulumi.Input[
|
24
|
+
allowed_uses: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
25
|
+
private_key_pem: pulumi.Input[_builtins.str],
|
26
|
+
validity_period_hours: pulumi.Input[_builtins.int],
|
27
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
33
|
subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
|
35
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
34
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
36
35
|
"""
|
37
36
|
The set of arguments for constructing a SelfSignedCert resource.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
42
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
38
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
39
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
40
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
41
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
42
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
43
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
44
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
46
45
|
:param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
48
47
|
"""
|
49
48
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
50
49
|
pulumi.set(__self__, "private_key_pem", private_key_pem)
|
@@ -66,112 +65,112 @@ class SelfSignedCertArgs:
|
|
66
65
|
if uris is not None:
|
67
66
|
pulumi.set(__self__, "uris", uris)
|
68
67
|
|
69
|
-
@property
|
68
|
+
@_builtins.property
|
70
69
|
@pulumi.getter(name="allowedUses")
|
71
|
-
def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[
|
70
|
+
def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
72
71
|
"""
|
73
72
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
74
73
|
"""
|
75
74
|
return pulumi.get(self, "allowed_uses")
|
76
75
|
|
77
76
|
@allowed_uses.setter
|
78
|
-
def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[
|
77
|
+
def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
79
78
|
pulumi.set(self, "allowed_uses", value)
|
80
79
|
|
81
|
-
@property
|
80
|
+
@_builtins.property
|
82
81
|
@pulumi.getter(name="privateKeyPem")
|
83
|
-
def private_key_pem(self) -> pulumi.Input[
|
82
|
+
def private_key_pem(self) -> pulumi.Input[_builtins.str]:
|
84
83
|
"""
|
85
84
|
Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
86
85
|
"""
|
87
86
|
return pulumi.get(self, "private_key_pem")
|
88
87
|
|
89
88
|
@private_key_pem.setter
|
90
|
-
def private_key_pem(self, value: pulumi.Input[
|
89
|
+
def private_key_pem(self, value: pulumi.Input[_builtins.str]):
|
91
90
|
pulumi.set(self, "private_key_pem", value)
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter(name="validityPeriodHours")
|
95
|
-
def validity_period_hours(self) -> pulumi.Input[
|
94
|
+
def validity_period_hours(self) -> pulumi.Input[_builtins.int]:
|
96
95
|
"""
|
97
96
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
98
97
|
"""
|
99
98
|
return pulumi.get(self, "validity_period_hours")
|
100
99
|
|
101
100
|
@validity_period_hours.setter
|
102
|
-
def validity_period_hours(self, value: pulumi.Input[
|
101
|
+
def validity_period_hours(self, value: pulumi.Input[_builtins.int]):
|
103
102
|
pulumi.set(self, "validity_period_hours", value)
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter(name="dnsNames")
|
107
|
-
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
106
|
+
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
108
107
|
"""
|
109
108
|
List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
110
109
|
"""
|
111
110
|
return pulumi.get(self, "dns_names")
|
112
111
|
|
113
112
|
@dns_names.setter
|
114
|
-
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
113
|
+
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
115
114
|
pulumi.set(self, "dns_names", value)
|
116
115
|
|
117
|
-
@property
|
116
|
+
@_builtins.property
|
118
117
|
@pulumi.getter(name="earlyRenewalHours")
|
119
|
-
def early_renewal_hours(self) -> Optional[pulumi.Input[
|
118
|
+
def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
120
119
|
return pulumi.get(self, "early_renewal_hours")
|
121
120
|
|
122
121
|
@early_renewal_hours.setter
|
123
|
-
def early_renewal_hours(self, value: Optional[pulumi.Input[
|
122
|
+
def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
124
123
|
pulumi.set(self, "early_renewal_hours", value)
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter(name="ipAddresses")
|
128
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
127
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
129
128
|
"""
|
130
129
|
List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
131
130
|
"""
|
132
131
|
return pulumi.get(self, "ip_addresses")
|
133
132
|
|
134
133
|
@ip_addresses.setter
|
135
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
134
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
136
135
|
pulumi.set(self, "ip_addresses", value)
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter(name="isCaCertificate")
|
140
|
-
def is_ca_certificate(self) -> Optional[pulumi.Input[
|
139
|
+
def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
141
140
|
"""
|
142
141
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
143
142
|
"""
|
144
143
|
return pulumi.get(self, "is_ca_certificate")
|
145
144
|
|
146
145
|
@is_ca_certificate.setter
|
147
|
-
def is_ca_certificate(self, value: Optional[pulumi.Input[
|
146
|
+
def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
148
147
|
pulumi.set(self, "is_ca_certificate", value)
|
149
148
|
|
150
|
-
@property
|
149
|
+
@_builtins.property
|
151
150
|
@pulumi.getter(name="setAuthorityKeyId")
|
152
|
-
def set_authority_key_id(self) -> Optional[pulumi.Input[
|
151
|
+
def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
153
152
|
"""
|
154
153
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
155
154
|
"""
|
156
155
|
return pulumi.get(self, "set_authority_key_id")
|
157
156
|
|
158
157
|
@set_authority_key_id.setter
|
159
|
-
def set_authority_key_id(self, value: Optional[pulumi.Input[
|
158
|
+
def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
160
159
|
pulumi.set(self, "set_authority_key_id", value)
|
161
160
|
|
162
|
-
@property
|
161
|
+
@_builtins.property
|
163
162
|
@pulumi.getter(name="setSubjectKeyId")
|
164
|
-
def set_subject_key_id(self) -> Optional[pulumi.Input[
|
163
|
+
def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
165
164
|
"""
|
166
165
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
167
166
|
"""
|
168
167
|
return pulumi.get(self, "set_subject_key_id")
|
169
168
|
|
170
169
|
@set_subject_key_id.setter
|
171
|
-
def set_subject_key_id(self, value: Optional[pulumi.Input[
|
170
|
+
def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
172
171
|
pulumi.set(self, "set_subject_key_id", value)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter
|
176
175
|
def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
|
177
176
|
"""
|
@@ -183,55 +182,55 @@ class SelfSignedCertArgs:
|
|
183
182
|
def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
|
184
183
|
pulumi.set(self, "subject", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter
|
188
|
-
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
187
|
+
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
189
188
|
"""
|
190
189
|
List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
191
190
|
"""
|
192
191
|
return pulumi.get(self, "uris")
|
193
192
|
|
194
193
|
@uris.setter
|
195
|
-
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
194
|
+
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
196
195
|
pulumi.set(self, "uris", value)
|
197
196
|
|
198
197
|
|
199
198
|
@pulumi.input_type
|
200
199
|
class _SelfSignedCertState:
|
201
200
|
def __init__(__self__, *,
|
202
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
203
|
-
cert_pem: Optional[pulumi.Input[
|
204
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
205
|
-
early_renewal_hours: Optional[pulumi.Input[
|
206
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
207
|
-
is_ca_certificate: Optional[pulumi.Input[
|
208
|
-
key_algorithm: Optional[pulumi.Input[
|
209
|
-
private_key_pem: Optional[pulumi.Input[
|
210
|
-
ready_for_renewal: Optional[pulumi.Input[
|
211
|
-
set_authority_key_id: Optional[pulumi.Input[
|
212
|
-
set_subject_key_id: Optional[pulumi.Input[
|
201
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
202
|
+
cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
203
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
204
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
205
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
206
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
207
|
+
key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
208
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
209
|
+
ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
|
210
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
211
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
213
212
|
subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
|
214
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
215
|
-
validity_end_time: Optional[pulumi.Input[
|
216
|
-
validity_period_hours: Optional[pulumi.Input[
|
217
|
-
validity_start_time: Optional[pulumi.Input[
|
213
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
214
|
+
validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
|
215
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
216
|
+
validity_start_time: Optional[pulumi.Input[_builtins.str]] = None):
|
218
217
|
"""
|
219
218
|
Input properties used for looking up and filtering SelfSignedCert resources.
|
220
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
221
|
-
:param pulumi.Input[
|
222
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
223
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
224
|
-
:param pulumi.Input[
|
225
|
-
:param pulumi.Input[
|
226
|
-
:param pulumi.Input[
|
227
|
-
:param pulumi.Input[
|
228
|
-
:param pulumi.Input[
|
229
|
-
:param pulumi.Input[
|
219
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
220
|
+
:param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
221
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
222
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
223
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
224
|
+
:param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
225
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
226
|
+
:param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
227
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
228
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
230
229
|
:param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
231
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
232
|
-
:param pulumi.Input[
|
233
|
-
:param pulumi.Input[
|
234
|
-
:param pulumi.Input[
|
230
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
231
|
+
:param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
232
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
233
|
+
:param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
235
234
|
"""
|
236
235
|
if allowed_uses is not None:
|
237
236
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
@@ -266,136 +265,136 @@ class _SelfSignedCertState:
|
|
266
265
|
if validity_start_time is not None:
|
267
266
|
pulumi.set(__self__, "validity_start_time", validity_start_time)
|
268
267
|
|
269
|
-
@property
|
268
|
+
@_builtins.property
|
270
269
|
@pulumi.getter(name="allowedUses")
|
271
|
-
def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
270
|
+
def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
272
271
|
"""
|
273
272
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
274
273
|
"""
|
275
274
|
return pulumi.get(self, "allowed_uses")
|
276
275
|
|
277
276
|
@allowed_uses.setter
|
278
|
-
def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
277
|
+
def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
279
278
|
pulumi.set(self, "allowed_uses", value)
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter(name="certPem")
|
283
|
-
def cert_pem(self) -> Optional[pulumi.Input[
|
282
|
+
def cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
283
|
"""
|
285
284
|
Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
286
285
|
"""
|
287
286
|
return pulumi.get(self, "cert_pem")
|
288
287
|
|
289
288
|
@cert_pem.setter
|
290
|
-
def cert_pem(self, value: Optional[pulumi.Input[
|
289
|
+
def cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
291
290
|
pulumi.set(self, "cert_pem", value)
|
292
291
|
|
293
|
-
@property
|
292
|
+
@_builtins.property
|
294
293
|
@pulumi.getter(name="dnsNames")
|
295
|
-
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
294
|
+
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
296
295
|
"""
|
297
296
|
List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
298
297
|
"""
|
299
298
|
return pulumi.get(self, "dns_names")
|
300
299
|
|
301
300
|
@dns_names.setter
|
302
|
-
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
301
|
+
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
303
302
|
pulumi.set(self, "dns_names", value)
|
304
303
|
|
305
|
-
@property
|
304
|
+
@_builtins.property
|
306
305
|
@pulumi.getter(name="earlyRenewalHours")
|
307
|
-
def early_renewal_hours(self) -> Optional[pulumi.Input[
|
306
|
+
def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
308
307
|
return pulumi.get(self, "early_renewal_hours")
|
309
308
|
|
310
309
|
@early_renewal_hours.setter
|
311
|
-
def early_renewal_hours(self, value: Optional[pulumi.Input[
|
310
|
+
def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
312
311
|
pulumi.set(self, "early_renewal_hours", value)
|
313
312
|
|
314
|
-
@property
|
313
|
+
@_builtins.property
|
315
314
|
@pulumi.getter(name="ipAddresses")
|
316
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
315
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
317
316
|
"""
|
318
317
|
List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
319
318
|
"""
|
320
319
|
return pulumi.get(self, "ip_addresses")
|
321
320
|
|
322
321
|
@ip_addresses.setter
|
323
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
322
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
324
323
|
pulumi.set(self, "ip_addresses", value)
|
325
324
|
|
326
|
-
@property
|
325
|
+
@_builtins.property
|
327
326
|
@pulumi.getter(name="isCaCertificate")
|
328
|
-
def is_ca_certificate(self) -> Optional[pulumi.Input[
|
327
|
+
def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
329
328
|
"""
|
330
329
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
331
330
|
"""
|
332
331
|
return pulumi.get(self, "is_ca_certificate")
|
333
332
|
|
334
333
|
@is_ca_certificate.setter
|
335
|
-
def is_ca_certificate(self, value: Optional[pulumi.Input[
|
334
|
+
def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
336
335
|
pulumi.set(self, "is_ca_certificate", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="keyAlgorithm")
|
340
|
-
def key_algorithm(self) -> Optional[pulumi.Input[
|
339
|
+
def key_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
341
340
|
"""
|
342
341
|
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "key_algorithm")
|
345
344
|
|
346
345
|
@key_algorithm.setter
|
347
|
-
def key_algorithm(self, value: Optional[pulumi.Input[
|
346
|
+
def key_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
348
347
|
pulumi.set(self, "key_algorithm", value)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter(name="privateKeyPem")
|
352
|
-
def private_key_pem(self) -> Optional[pulumi.Input[
|
351
|
+
def private_key_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
353
352
|
"""
|
354
353
|
Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "private_key_pem")
|
357
356
|
|
358
357
|
@private_key_pem.setter
|
359
|
-
def private_key_pem(self, value: Optional[pulumi.Input[
|
358
|
+
def private_key_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
360
359
|
pulumi.set(self, "private_key_pem", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="readyForRenewal")
|
364
|
-
def ready_for_renewal(self) -> Optional[pulumi.Input[
|
363
|
+
def ready_for_renewal(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
365
364
|
"""
|
366
365
|
Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
367
366
|
"""
|
368
367
|
return pulumi.get(self, "ready_for_renewal")
|
369
368
|
|
370
369
|
@ready_for_renewal.setter
|
371
|
-
def ready_for_renewal(self, value: Optional[pulumi.Input[
|
370
|
+
def ready_for_renewal(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
372
371
|
pulumi.set(self, "ready_for_renewal", value)
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter(name="setAuthorityKeyId")
|
376
|
-
def set_authority_key_id(self) -> Optional[pulumi.Input[
|
375
|
+
def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
377
376
|
"""
|
378
377
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
379
378
|
"""
|
380
379
|
return pulumi.get(self, "set_authority_key_id")
|
381
380
|
|
382
381
|
@set_authority_key_id.setter
|
383
|
-
def set_authority_key_id(self, value: Optional[pulumi.Input[
|
382
|
+
def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
384
383
|
pulumi.set(self, "set_authority_key_id", value)
|
385
384
|
|
386
|
-
@property
|
385
|
+
@_builtins.property
|
387
386
|
@pulumi.getter(name="setSubjectKeyId")
|
388
|
-
def set_subject_key_id(self) -> Optional[pulumi.Input[
|
387
|
+
def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
389
388
|
"""
|
390
389
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
391
390
|
"""
|
392
391
|
return pulumi.get(self, "set_subject_key_id")
|
393
392
|
|
394
393
|
@set_subject_key_id.setter
|
395
|
-
def set_subject_key_id(self, value: Optional[pulumi.Input[
|
394
|
+
def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
396
395
|
pulumi.set(self, "set_subject_key_id", value)
|
397
396
|
|
398
|
-
@property
|
397
|
+
@_builtins.property
|
399
398
|
@pulumi.getter
|
400
399
|
def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
|
401
400
|
"""
|
@@ -407,86 +406,87 @@ class _SelfSignedCertState:
|
|
407
406
|
def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
|
408
407
|
pulumi.set(self, "subject", value)
|
409
408
|
|
410
|
-
@property
|
409
|
+
@_builtins.property
|
411
410
|
@pulumi.getter
|
412
|
-
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
411
|
+
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
413
412
|
"""
|
414
413
|
List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
415
414
|
"""
|
416
415
|
return pulumi.get(self, "uris")
|
417
416
|
|
418
417
|
@uris.setter
|
419
|
-
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
418
|
+
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
420
419
|
pulumi.set(self, "uris", value)
|
421
420
|
|
422
|
-
@property
|
421
|
+
@_builtins.property
|
423
422
|
@pulumi.getter(name="validityEndTime")
|
424
|
-
def validity_end_time(self) -> Optional[pulumi.Input[
|
423
|
+
def validity_end_time(self) -> Optional[pulumi.Input[_builtins.str]]:
|
425
424
|
"""
|
426
425
|
The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
427
426
|
"""
|
428
427
|
return pulumi.get(self, "validity_end_time")
|
429
428
|
|
430
429
|
@validity_end_time.setter
|
431
|
-
def validity_end_time(self, value: Optional[pulumi.Input[
|
430
|
+
def validity_end_time(self, value: Optional[pulumi.Input[_builtins.str]]):
|
432
431
|
pulumi.set(self, "validity_end_time", value)
|
433
432
|
|
434
|
-
@property
|
433
|
+
@_builtins.property
|
435
434
|
@pulumi.getter(name="validityPeriodHours")
|
436
|
-
def validity_period_hours(self) -> Optional[pulumi.Input[
|
435
|
+
def validity_period_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
437
436
|
"""
|
438
437
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
439
438
|
"""
|
440
439
|
return pulumi.get(self, "validity_period_hours")
|
441
440
|
|
442
441
|
@validity_period_hours.setter
|
443
|
-
def validity_period_hours(self, value: Optional[pulumi.Input[
|
442
|
+
def validity_period_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
444
443
|
pulumi.set(self, "validity_period_hours", value)
|
445
444
|
|
446
|
-
@property
|
445
|
+
@_builtins.property
|
447
446
|
@pulumi.getter(name="validityStartTime")
|
448
|
-
def validity_start_time(self) -> Optional[pulumi.Input[
|
447
|
+
def validity_start_time(self) -> Optional[pulumi.Input[_builtins.str]]:
|
449
448
|
"""
|
450
449
|
The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
451
450
|
"""
|
452
451
|
return pulumi.get(self, "validity_start_time")
|
453
452
|
|
454
453
|
@validity_start_time.setter
|
455
|
-
def validity_start_time(self, value: Optional[pulumi.Input[
|
454
|
+
def validity_start_time(self, value: Optional[pulumi.Input[_builtins.str]]):
|
456
455
|
pulumi.set(self, "validity_start_time", value)
|
457
456
|
|
458
457
|
|
458
|
+
@pulumi.type_token("tls:index/selfSignedCert:SelfSignedCert")
|
459
459
|
class SelfSignedCert(pulumi.CustomResource):
|
460
460
|
@overload
|
461
461
|
def __init__(__self__,
|
462
462
|
resource_name: str,
|
463
463
|
opts: Optional[pulumi.ResourceOptions] = None,
|
464
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
465
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
466
|
-
early_renewal_hours: Optional[pulumi.Input[
|
467
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
468
|
-
is_ca_certificate: Optional[pulumi.Input[
|
469
|
-
private_key_pem: Optional[pulumi.Input[
|
470
|
-
set_authority_key_id: Optional[pulumi.Input[
|
471
|
-
set_subject_key_id: Optional[pulumi.Input[
|
464
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
465
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
466
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
467
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
468
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
469
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
470
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
471
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
472
472
|
subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
|
473
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
474
|
-
validity_period_hours: Optional[pulumi.Input[
|
473
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
474
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
475
475
|
__props__=None):
|
476
476
|
"""
|
477
477
|
Create a SelfSignedCert resource with the given unique name, props, and options.
|
478
478
|
:param str resource_name: The name of the resource.
|
479
479
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
480
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
481
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
482
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
483
|
-
:param pulumi.Input[
|
484
|
-
:param pulumi.Input[
|
485
|
-
:param pulumi.Input[
|
486
|
-
:param pulumi.Input[
|
480
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
481
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
482
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
483
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
484
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
485
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
486
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
487
487
|
:param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
488
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
489
|
-
:param pulumi.Input[
|
488
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
489
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
490
490
|
"""
|
491
491
|
...
|
492
492
|
@overload
|
@@ -511,17 +511,17 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
511
511
|
def _internal_init(__self__,
|
512
512
|
resource_name: str,
|
513
513
|
opts: Optional[pulumi.ResourceOptions] = None,
|
514
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
515
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
516
|
-
early_renewal_hours: Optional[pulumi.Input[
|
517
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
518
|
-
is_ca_certificate: Optional[pulumi.Input[
|
519
|
-
private_key_pem: Optional[pulumi.Input[
|
520
|
-
set_authority_key_id: Optional[pulumi.Input[
|
521
|
-
set_subject_key_id: Optional[pulumi.Input[
|
514
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
515
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
516
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
517
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
518
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
519
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
520
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
521
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
522
522
|
subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
|
523
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
524
|
-
validity_period_hours: Optional[pulumi.Input[
|
523
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
524
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
525
525
|
__props__=None):
|
526
526
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
527
527
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -565,22 +565,22 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
565
565
|
def get(resource_name: str,
|
566
566
|
id: pulumi.Input[str],
|
567
567
|
opts: Optional[pulumi.ResourceOptions] = None,
|
568
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
569
|
-
cert_pem: Optional[pulumi.Input[
|
570
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
571
|
-
early_renewal_hours: Optional[pulumi.Input[
|
572
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
573
|
-
is_ca_certificate: Optional[pulumi.Input[
|
574
|
-
key_algorithm: Optional[pulumi.Input[
|
575
|
-
private_key_pem: Optional[pulumi.Input[
|
576
|
-
ready_for_renewal: Optional[pulumi.Input[
|
577
|
-
set_authority_key_id: Optional[pulumi.Input[
|
578
|
-
set_subject_key_id: Optional[pulumi.Input[
|
568
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
569
|
+
cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
570
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
571
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
572
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
573
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
574
|
+
key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
575
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
576
|
+
ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
|
577
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
578
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
579
579
|
subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
|
580
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
581
|
-
validity_end_time: Optional[pulumi.Input[
|
582
|
-
validity_period_hours: Optional[pulumi.Input[
|
583
|
-
validity_start_time: Optional[pulumi.Input[
|
580
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
581
|
+
validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
|
582
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
583
|
+
validity_start_time: Optional[pulumi.Input[_builtins.str]] = None) -> 'SelfSignedCert':
|
584
584
|
"""
|
585
585
|
Get an existing SelfSignedCert resource's state with the given name, id, and optional extra
|
586
586
|
properties used to qualify the lookup.
|
@@ -588,21 +588,21 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
588
588
|
:param str resource_name: The unique name of the resulting resource.
|
589
589
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
590
590
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
591
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
592
|
-
:param pulumi.Input[
|
593
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
594
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
595
|
-
:param pulumi.Input[
|
596
|
-
:param pulumi.Input[
|
597
|
-
:param pulumi.Input[
|
598
|
-
:param pulumi.Input[
|
599
|
-
:param pulumi.Input[
|
600
|
-
:param pulumi.Input[
|
591
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
592
|
+
:param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
593
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
594
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
595
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
596
|
+
:param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
597
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
598
|
+
:param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
599
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
600
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
601
601
|
:param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
602
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
603
|
-
:param pulumi.Input[
|
604
|
-
:param pulumi.Input[
|
605
|
-
:param pulumi.Input[
|
602
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
603
|
+
:param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
604
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
605
|
+
:param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
606
606
|
"""
|
607
607
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
608
608
|
|
@@ -626,92 +626,92 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
626
626
|
__props__.__dict__["validity_start_time"] = validity_start_time
|
627
627
|
return SelfSignedCert(resource_name, opts=opts, __props__=__props__)
|
628
628
|
|
629
|
-
@property
|
629
|
+
@_builtins.property
|
630
630
|
@pulumi.getter(name="allowedUses")
|
631
|
-
def allowed_uses(self) -> pulumi.Output[Sequence[
|
631
|
+
def allowed_uses(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
632
632
|
"""
|
633
633
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
634
634
|
"""
|
635
635
|
return pulumi.get(self, "allowed_uses")
|
636
636
|
|
637
|
-
@property
|
637
|
+
@_builtins.property
|
638
638
|
@pulumi.getter(name="certPem")
|
639
|
-
def cert_pem(self) -> pulumi.Output[
|
639
|
+
def cert_pem(self) -> pulumi.Output[_builtins.str]:
|
640
640
|
"""
|
641
641
|
Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
642
642
|
"""
|
643
643
|
return pulumi.get(self, "cert_pem")
|
644
644
|
|
645
|
-
@property
|
645
|
+
@_builtins.property
|
646
646
|
@pulumi.getter(name="dnsNames")
|
647
|
-
def dns_names(self) -> pulumi.Output[Optional[Sequence[
|
647
|
+
def dns_names(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
648
648
|
"""
|
649
649
|
List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
650
650
|
"""
|
651
651
|
return pulumi.get(self, "dns_names")
|
652
652
|
|
653
|
-
@property
|
653
|
+
@_builtins.property
|
654
654
|
@pulumi.getter(name="earlyRenewalHours")
|
655
|
-
def early_renewal_hours(self) -> pulumi.Output[
|
655
|
+
def early_renewal_hours(self) -> pulumi.Output[_builtins.int]:
|
656
656
|
return pulumi.get(self, "early_renewal_hours")
|
657
657
|
|
658
|
-
@property
|
658
|
+
@_builtins.property
|
659
659
|
@pulumi.getter(name="ipAddresses")
|
660
|
-
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[
|
660
|
+
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
661
661
|
"""
|
662
662
|
List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
663
663
|
"""
|
664
664
|
return pulumi.get(self, "ip_addresses")
|
665
665
|
|
666
|
-
@property
|
666
|
+
@_builtins.property
|
667
667
|
@pulumi.getter(name="isCaCertificate")
|
668
|
-
def is_ca_certificate(self) -> pulumi.Output[
|
668
|
+
def is_ca_certificate(self) -> pulumi.Output[_builtins.bool]:
|
669
669
|
"""
|
670
670
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
671
671
|
"""
|
672
672
|
return pulumi.get(self, "is_ca_certificate")
|
673
673
|
|
674
|
-
@property
|
674
|
+
@_builtins.property
|
675
675
|
@pulumi.getter(name="keyAlgorithm")
|
676
|
-
def key_algorithm(self) -> pulumi.Output[
|
676
|
+
def key_algorithm(self) -> pulumi.Output[_builtins.str]:
|
677
677
|
"""
|
678
678
|
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
679
679
|
"""
|
680
680
|
return pulumi.get(self, "key_algorithm")
|
681
681
|
|
682
|
-
@property
|
682
|
+
@_builtins.property
|
683
683
|
@pulumi.getter(name="privateKeyPem")
|
684
|
-
def private_key_pem(self) -> pulumi.Output[
|
684
|
+
def private_key_pem(self) -> pulumi.Output[_builtins.str]:
|
685
685
|
"""
|
686
686
|
Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
687
687
|
"""
|
688
688
|
return pulumi.get(self, "private_key_pem")
|
689
689
|
|
690
|
-
@property
|
690
|
+
@_builtins.property
|
691
691
|
@pulumi.getter(name="readyForRenewal")
|
692
|
-
def ready_for_renewal(self) -> pulumi.Output[
|
692
|
+
def ready_for_renewal(self) -> pulumi.Output[_builtins.bool]:
|
693
693
|
"""
|
694
694
|
Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
695
695
|
"""
|
696
696
|
return pulumi.get(self, "ready_for_renewal")
|
697
697
|
|
698
|
-
@property
|
698
|
+
@_builtins.property
|
699
699
|
@pulumi.getter(name="setAuthorityKeyId")
|
700
|
-
def set_authority_key_id(self) -> pulumi.Output[
|
700
|
+
def set_authority_key_id(self) -> pulumi.Output[_builtins.bool]:
|
701
701
|
"""
|
702
702
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
703
703
|
"""
|
704
704
|
return pulumi.get(self, "set_authority_key_id")
|
705
705
|
|
706
|
-
@property
|
706
|
+
@_builtins.property
|
707
707
|
@pulumi.getter(name="setSubjectKeyId")
|
708
|
-
def set_subject_key_id(self) -> pulumi.Output[
|
708
|
+
def set_subject_key_id(self) -> pulumi.Output[_builtins.bool]:
|
709
709
|
"""
|
710
710
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
711
711
|
"""
|
712
712
|
return pulumi.get(self, "set_subject_key_id")
|
713
713
|
|
714
|
-
@property
|
714
|
+
@_builtins.property
|
715
715
|
@pulumi.getter
|
716
716
|
def subject(self) -> pulumi.Output[Optional['outputs.SelfSignedCertSubject']]:
|
717
717
|
"""
|
@@ -719,33 +719,33 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
719
719
|
"""
|
720
720
|
return pulumi.get(self, "subject")
|
721
721
|
|
722
|
-
@property
|
722
|
+
@_builtins.property
|
723
723
|
@pulumi.getter
|
724
|
-
def uris(self) -> pulumi.Output[Optional[Sequence[
|
724
|
+
def uris(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
725
725
|
"""
|
726
726
|
List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
727
727
|
"""
|
728
728
|
return pulumi.get(self, "uris")
|
729
729
|
|
730
|
-
@property
|
730
|
+
@_builtins.property
|
731
731
|
@pulumi.getter(name="validityEndTime")
|
732
|
-
def validity_end_time(self) -> pulumi.Output[
|
732
|
+
def validity_end_time(self) -> pulumi.Output[_builtins.str]:
|
733
733
|
"""
|
734
734
|
The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
735
735
|
"""
|
736
736
|
return pulumi.get(self, "validity_end_time")
|
737
737
|
|
738
|
-
@property
|
738
|
+
@_builtins.property
|
739
739
|
@pulumi.getter(name="validityPeriodHours")
|
740
|
-
def validity_period_hours(self) -> pulumi.Output[
|
740
|
+
def validity_period_hours(self) -> pulumi.Output[_builtins.int]:
|
741
741
|
"""
|
742
742
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
743
743
|
"""
|
744
744
|
return pulumi.get(self, "validity_period_hours")
|
745
745
|
|
746
|
-
@property
|
746
|
+
@_builtins.property
|
747
747
|
@pulumi.getter(name="validityStartTime")
|
748
|
-
def validity_start_time(self) -> pulumi.Output[
|
748
|
+
def validity_start_time(self) -> pulumi.Output[_builtins.str]:
|
749
749
|
"""
|
750
750
|
The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
751
751
|
"""
|