pulumi-tls 5.3.0a1753339655__py3-none-any.whl → 5.3.0a1753512319__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_tls/__init__.py +1 -1
- pulumi_tls/_inputs.py +147 -148
- pulumi_tls/cert_request.py +90 -91
- pulumi_tls/config/__init__.py +1 -1
- pulumi_tls/config/__init__.pyi +1 -2
- pulumi_tls/config/outputs.py +17 -18
- pulumi_tls/config/vars.py +2 -3
- pulumi_tls/get_certificate.py +22 -23
- pulumi_tls/get_public_key.py +25 -26
- pulumi_tls/locally_signed_cert.py +178 -179
- pulumi_tls/outputs.py +128 -129
- pulumi_tls/private_key.py +115 -116
- pulumi_tls/provider.py +3 -4
- pulumi_tls/pulumi-plugin.json +1 -1
- pulumi_tls/self_signed_cert.py +215 -216
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/METADATA +1 -1
- pulumi_tls-5.3.0a1753512319.dist-info/RECORD +21 -0
- pulumi_tls-5.3.0a1753339655.dist-info/RECORD +0 -21
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/WHEEL +0 -0
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,23 +19,23 @@ __all__ = ['LocallySignedCertArgs', 'LocallySignedCert']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class LocallySignedCertArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
allowed_uses: pulumi.Input[Sequence[pulumi.Input[
|
24
|
-
ca_cert_pem: pulumi.Input[
|
25
|
-
ca_private_key_pem: pulumi.Input[
|
26
|
-
cert_request_pem: pulumi.Input[
|
27
|
-
validity_period_hours: pulumi.Input[
|
28
|
-
early_renewal_hours: Optional[pulumi.Input[
|
29
|
-
is_ca_certificate: Optional[pulumi.Input[
|
30
|
-
set_subject_key_id: Optional[pulumi.Input[
|
22
|
+
allowed_uses: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
23
|
+
ca_cert_pem: pulumi.Input[_builtins.str],
|
24
|
+
ca_private_key_pem: pulumi.Input[_builtins.str],
|
25
|
+
cert_request_pem: pulumi.Input[_builtins.str],
|
26
|
+
validity_period_hours: pulumi.Input[_builtins.int],
|
27
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
28
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
29
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None):
|
31
30
|
"""
|
32
31
|
The set of arguments for constructing a LocallySignedCert resource.
|
33
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
36
|
-
:param pulumi.Input[
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
33
|
+
:param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
34
|
+
:param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
35
|
+
:param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
36
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
37
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
38
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
40
39
|
"""
|
41
40
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
42
41
|
pulumi.set(__self__, "ca_cert_pem", ca_cert_pem)
|
@@ -50,130 +49,130 @@ class LocallySignedCertArgs:
|
|
50
49
|
if set_subject_key_id is not None:
|
51
50
|
pulumi.set(__self__, "set_subject_key_id", set_subject_key_id)
|
52
51
|
|
53
|
-
@property
|
52
|
+
@_builtins.property
|
54
53
|
@pulumi.getter(name="allowedUses")
|
55
|
-
def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[
|
54
|
+
def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
56
55
|
"""
|
57
56
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
58
57
|
"""
|
59
58
|
return pulumi.get(self, "allowed_uses")
|
60
59
|
|
61
60
|
@allowed_uses.setter
|
62
|
-
def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[
|
61
|
+
def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
63
62
|
pulumi.set(self, "allowed_uses", value)
|
64
63
|
|
65
|
-
@property
|
64
|
+
@_builtins.property
|
66
65
|
@pulumi.getter(name="caCertPem")
|
67
|
-
def ca_cert_pem(self) -> pulumi.Input[
|
66
|
+
def ca_cert_pem(self) -> pulumi.Input[_builtins.str]:
|
68
67
|
"""
|
69
68
|
Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
70
69
|
"""
|
71
70
|
return pulumi.get(self, "ca_cert_pem")
|
72
71
|
|
73
72
|
@ca_cert_pem.setter
|
74
|
-
def ca_cert_pem(self, value: pulumi.Input[
|
73
|
+
def ca_cert_pem(self, value: pulumi.Input[_builtins.str]):
|
75
74
|
pulumi.set(self, "ca_cert_pem", value)
|
76
75
|
|
77
|
-
@property
|
76
|
+
@_builtins.property
|
78
77
|
@pulumi.getter(name="caPrivateKeyPem")
|
79
|
-
def ca_private_key_pem(self) -> pulumi.Input[
|
78
|
+
def ca_private_key_pem(self) -> pulumi.Input[_builtins.str]:
|
80
79
|
"""
|
81
80
|
Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
82
81
|
"""
|
83
82
|
return pulumi.get(self, "ca_private_key_pem")
|
84
83
|
|
85
84
|
@ca_private_key_pem.setter
|
86
|
-
def ca_private_key_pem(self, value: pulumi.Input[
|
85
|
+
def ca_private_key_pem(self, value: pulumi.Input[_builtins.str]):
|
87
86
|
pulumi.set(self, "ca_private_key_pem", value)
|
88
87
|
|
89
|
-
@property
|
88
|
+
@_builtins.property
|
90
89
|
@pulumi.getter(name="certRequestPem")
|
91
|
-
def cert_request_pem(self) -> pulumi.Input[
|
90
|
+
def cert_request_pem(self) -> pulumi.Input[_builtins.str]:
|
92
91
|
"""
|
93
92
|
Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
94
93
|
"""
|
95
94
|
return pulumi.get(self, "cert_request_pem")
|
96
95
|
|
97
96
|
@cert_request_pem.setter
|
98
|
-
def cert_request_pem(self, value: pulumi.Input[
|
97
|
+
def cert_request_pem(self, value: pulumi.Input[_builtins.str]):
|
99
98
|
pulumi.set(self, "cert_request_pem", value)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="validityPeriodHours")
|
103
|
-
def validity_period_hours(self) -> pulumi.Input[
|
102
|
+
def validity_period_hours(self) -> pulumi.Input[_builtins.int]:
|
104
103
|
"""
|
105
104
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
106
105
|
"""
|
107
106
|
return pulumi.get(self, "validity_period_hours")
|
108
107
|
|
109
108
|
@validity_period_hours.setter
|
110
|
-
def validity_period_hours(self, value: pulumi.Input[
|
109
|
+
def validity_period_hours(self, value: pulumi.Input[_builtins.int]):
|
111
110
|
pulumi.set(self, "validity_period_hours", value)
|
112
111
|
|
113
|
-
@property
|
112
|
+
@_builtins.property
|
114
113
|
@pulumi.getter(name="earlyRenewalHours")
|
115
|
-
def early_renewal_hours(self) -> Optional[pulumi.Input[
|
114
|
+
def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
116
115
|
return pulumi.get(self, "early_renewal_hours")
|
117
116
|
|
118
117
|
@early_renewal_hours.setter
|
119
|
-
def early_renewal_hours(self, value: Optional[pulumi.Input[
|
118
|
+
def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
120
119
|
pulumi.set(self, "early_renewal_hours", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter(name="isCaCertificate")
|
124
|
-
def is_ca_certificate(self) -> Optional[pulumi.Input[
|
123
|
+
def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
125
124
|
"""
|
126
125
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
127
126
|
"""
|
128
127
|
return pulumi.get(self, "is_ca_certificate")
|
129
128
|
|
130
129
|
@is_ca_certificate.setter
|
131
|
-
def is_ca_certificate(self, value: Optional[pulumi.Input[
|
130
|
+
def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
132
131
|
pulumi.set(self, "is_ca_certificate", value)
|
133
132
|
|
134
|
-
@property
|
133
|
+
@_builtins.property
|
135
134
|
@pulumi.getter(name="setSubjectKeyId")
|
136
|
-
def set_subject_key_id(self) -> Optional[pulumi.Input[
|
135
|
+
def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
137
136
|
"""
|
138
137
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
139
138
|
"""
|
140
139
|
return pulumi.get(self, "set_subject_key_id")
|
141
140
|
|
142
141
|
@set_subject_key_id.setter
|
143
|
-
def set_subject_key_id(self, value: Optional[pulumi.Input[
|
142
|
+
def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
144
143
|
pulumi.set(self, "set_subject_key_id", value)
|
145
144
|
|
146
145
|
|
147
146
|
@pulumi.input_type
|
148
147
|
class _LocallySignedCertState:
|
149
148
|
def __init__(__self__, *,
|
150
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
151
|
-
ca_cert_pem: Optional[pulumi.Input[
|
152
|
-
ca_key_algorithm: Optional[pulumi.Input[
|
153
|
-
ca_private_key_pem: Optional[pulumi.Input[
|
154
|
-
cert_pem: Optional[pulumi.Input[
|
155
|
-
cert_request_pem: Optional[pulumi.Input[
|
156
|
-
early_renewal_hours: Optional[pulumi.Input[
|
157
|
-
is_ca_certificate: Optional[pulumi.Input[
|
158
|
-
ready_for_renewal: Optional[pulumi.Input[
|
159
|
-
set_subject_key_id: Optional[pulumi.Input[
|
160
|
-
validity_end_time: Optional[pulumi.Input[
|
161
|
-
validity_period_hours: Optional[pulumi.Input[
|
162
|
-
validity_start_time: Optional[pulumi.Input[
|
149
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
150
|
+
ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
151
|
+
ca_key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
152
|
+
ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
153
|
+
cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
154
|
+
cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
155
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
156
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
157
|
+
ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
|
158
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
159
|
+
validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
|
160
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
161
|
+
validity_start_time: Optional[pulumi.Input[_builtins.str]] = None):
|
163
162
|
"""
|
164
163
|
Input properties used for looking up and filtering LocallySignedCert resources.
|
165
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
166
|
-
:param pulumi.Input[
|
167
|
-
:param pulumi.Input[
|
168
|
-
:param pulumi.Input[
|
169
|
-
:param pulumi.Input[
|
170
|
-
:param pulumi.Input[
|
171
|
-
:param pulumi.Input[
|
172
|
-
:param pulumi.Input[
|
173
|
-
:param pulumi.Input[
|
174
|
-
:param pulumi.Input[
|
175
|
-
:param pulumi.Input[
|
176
|
-
:param pulumi.Input[
|
164
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
165
|
+
:param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
166
|
+
:param pulumi.Input[_builtins.str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
167
|
+
:param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
168
|
+
:param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
169
|
+
:param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
170
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
171
|
+
:param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
172
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
173
|
+
:param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
174
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
175
|
+
:param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
177
176
|
"""
|
178
177
|
if allowed_uses is not None:
|
179
178
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
@@ -202,157 +201,157 @@ class _LocallySignedCertState:
|
|
202
201
|
if validity_start_time is not None:
|
203
202
|
pulumi.set(__self__, "validity_start_time", validity_start_time)
|
204
203
|
|
205
|
-
@property
|
204
|
+
@_builtins.property
|
206
205
|
@pulumi.getter(name="allowedUses")
|
207
|
-
def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
206
|
+
def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
208
207
|
"""
|
209
208
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
210
209
|
"""
|
211
210
|
return pulumi.get(self, "allowed_uses")
|
212
211
|
|
213
212
|
@allowed_uses.setter
|
214
|
-
def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
213
|
+
def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
215
214
|
pulumi.set(self, "allowed_uses", value)
|
216
215
|
|
217
|
-
@property
|
216
|
+
@_builtins.property
|
218
217
|
@pulumi.getter(name="caCertPem")
|
219
|
-
def ca_cert_pem(self) -> Optional[pulumi.Input[
|
218
|
+
def ca_cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
220
219
|
"""
|
221
220
|
Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
222
221
|
"""
|
223
222
|
return pulumi.get(self, "ca_cert_pem")
|
224
223
|
|
225
224
|
@ca_cert_pem.setter
|
226
|
-
def ca_cert_pem(self, value: Optional[pulumi.Input[
|
225
|
+
def ca_cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
227
226
|
pulumi.set(self, "ca_cert_pem", value)
|
228
227
|
|
229
|
-
@property
|
228
|
+
@_builtins.property
|
230
229
|
@pulumi.getter(name="caKeyAlgorithm")
|
231
|
-
def ca_key_algorithm(self) -> Optional[pulumi.Input[
|
230
|
+
def ca_key_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
232
231
|
"""
|
233
232
|
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
234
233
|
"""
|
235
234
|
return pulumi.get(self, "ca_key_algorithm")
|
236
235
|
|
237
236
|
@ca_key_algorithm.setter
|
238
|
-
def ca_key_algorithm(self, value: Optional[pulumi.Input[
|
237
|
+
def ca_key_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
239
238
|
pulumi.set(self, "ca_key_algorithm", value)
|
240
239
|
|
241
|
-
@property
|
240
|
+
@_builtins.property
|
242
241
|
@pulumi.getter(name="caPrivateKeyPem")
|
243
|
-
def ca_private_key_pem(self) -> Optional[pulumi.Input[
|
242
|
+
def ca_private_key_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
244
243
|
"""
|
245
244
|
Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
246
245
|
"""
|
247
246
|
return pulumi.get(self, "ca_private_key_pem")
|
248
247
|
|
249
248
|
@ca_private_key_pem.setter
|
250
|
-
def ca_private_key_pem(self, value: Optional[pulumi.Input[
|
249
|
+
def ca_private_key_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
251
250
|
pulumi.set(self, "ca_private_key_pem", value)
|
252
251
|
|
253
|
-
@property
|
252
|
+
@_builtins.property
|
254
253
|
@pulumi.getter(name="certPem")
|
255
|
-
def cert_pem(self) -> Optional[pulumi.Input[
|
254
|
+
def cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
256
255
|
"""
|
257
256
|
Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
258
257
|
"""
|
259
258
|
return pulumi.get(self, "cert_pem")
|
260
259
|
|
261
260
|
@cert_pem.setter
|
262
|
-
def cert_pem(self, value: Optional[pulumi.Input[
|
261
|
+
def cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
263
262
|
pulumi.set(self, "cert_pem", value)
|
264
263
|
|
265
|
-
@property
|
264
|
+
@_builtins.property
|
266
265
|
@pulumi.getter(name="certRequestPem")
|
267
|
-
def cert_request_pem(self) -> Optional[pulumi.Input[
|
266
|
+
def cert_request_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
268
267
|
"""
|
269
268
|
Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
270
269
|
"""
|
271
270
|
return pulumi.get(self, "cert_request_pem")
|
272
271
|
|
273
272
|
@cert_request_pem.setter
|
274
|
-
def cert_request_pem(self, value: Optional[pulumi.Input[
|
273
|
+
def cert_request_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
275
274
|
pulumi.set(self, "cert_request_pem", value)
|
276
275
|
|
277
|
-
@property
|
276
|
+
@_builtins.property
|
278
277
|
@pulumi.getter(name="earlyRenewalHours")
|
279
|
-
def early_renewal_hours(self) -> Optional[pulumi.Input[
|
278
|
+
def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
280
279
|
return pulumi.get(self, "early_renewal_hours")
|
281
280
|
|
282
281
|
@early_renewal_hours.setter
|
283
|
-
def early_renewal_hours(self, value: Optional[pulumi.Input[
|
282
|
+
def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
284
283
|
pulumi.set(self, "early_renewal_hours", value)
|
285
284
|
|
286
|
-
@property
|
285
|
+
@_builtins.property
|
287
286
|
@pulumi.getter(name="isCaCertificate")
|
288
|
-
def is_ca_certificate(self) -> Optional[pulumi.Input[
|
287
|
+
def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
289
288
|
"""
|
290
289
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
291
290
|
"""
|
292
291
|
return pulumi.get(self, "is_ca_certificate")
|
293
292
|
|
294
293
|
@is_ca_certificate.setter
|
295
|
-
def is_ca_certificate(self, value: Optional[pulumi.Input[
|
294
|
+
def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
296
295
|
pulumi.set(self, "is_ca_certificate", value)
|
297
296
|
|
298
|
-
@property
|
297
|
+
@_builtins.property
|
299
298
|
@pulumi.getter(name="readyForRenewal")
|
300
|
-
def ready_for_renewal(self) -> Optional[pulumi.Input[
|
299
|
+
def ready_for_renewal(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
301
300
|
"""
|
302
301
|
Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
303
302
|
"""
|
304
303
|
return pulumi.get(self, "ready_for_renewal")
|
305
304
|
|
306
305
|
@ready_for_renewal.setter
|
307
|
-
def ready_for_renewal(self, value: Optional[pulumi.Input[
|
306
|
+
def ready_for_renewal(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
308
307
|
pulumi.set(self, "ready_for_renewal", value)
|
309
308
|
|
310
|
-
@property
|
309
|
+
@_builtins.property
|
311
310
|
@pulumi.getter(name="setSubjectKeyId")
|
312
|
-
def set_subject_key_id(self) -> Optional[pulumi.Input[
|
311
|
+
def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
313
312
|
"""
|
314
313
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
315
314
|
"""
|
316
315
|
return pulumi.get(self, "set_subject_key_id")
|
317
316
|
|
318
317
|
@set_subject_key_id.setter
|
319
|
-
def set_subject_key_id(self, value: Optional[pulumi.Input[
|
318
|
+
def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
320
319
|
pulumi.set(self, "set_subject_key_id", value)
|
321
320
|
|
322
|
-
@property
|
321
|
+
@_builtins.property
|
323
322
|
@pulumi.getter(name="validityEndTime")
|
324
|
-
def validity_end_time(self) -> Optional[pulumi.Input[
|
323
|
+
def validity_end_time(self) -> Optional[pulumi.Input[_builtins.str]]:
|
325
324
|
"""
|
326
325
|
The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
327
326
|
"""
|
328
327
|
return pulumi.get(self, "validity_end_time")
|
329
328
|
|
330
329
|
@validity_end_time.setter
|
331
|
-
def validity_end_time(self, value: Optional[pulumi.Input[
|
330
|
+
def validity_end_time(self, value: Optional[pulumi.Input[_builtins.str]]):
|
332
331
|
pulumi.set(self, "validity_end_time", value)
|
333
332
|
|
334
|
-
@property
|
333
|
+
@_builtins.property
|
335
334
|
@pulumi.getter(name="validityPeriodHours")
|
336
|
-
def validity_period_hours(self) -> Optional[pulumi.Input[
|
335
|
+
def validity_period_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
337
336
|
"""
|
338
337
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
339
338
|
"""
|
340
339
|
return pulumi.get(self, "validity_period_hours")
|
341
340
|
|
342
341
|
@validity_period_hours.setter
|
343
|
-
def validity_period_hours(self, value: Optional[pulumi.Input[
|
342
|
+
def validity_period_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
344
343
|
pulumi.set(self, "validity_period_hours", value)
|
345
344
|
|
346
|
-
@property
|
345
|
+
@_builtins.property
|
347
346
|
@pulumi.getter(name="validityStartTime")
|
348
|
-
def validity_start_time(self) -> Optional[pulumi.Input[
|
347
|
+
def validity_start_time(self) -> Optional[pulumi.Input[_builtins.str]]:
|
349
348
|
"""
|
350
349
|
The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
351
350
|
"""
|
352
351
|
return pulumi.get(self, "validity_start_time")
|
353
352
|
|
354
353
|
@validity_start_time.setter
|
355
|
-
def validity_start_time(self, value: Optional[pulumi.Input[
|
354
|
+
def validity_start_time(self, value: Optional[pulumi.Input[_builtins.str]]):
|
356
355
|
pulumi.set(self, "validity_start_time", value)
|
357
356
|
|
358
357
|
|
@@ -362,26 +361,26 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
362
361
|
def __init__(__self__,
|
363
362
|
resource_name: str,
|
364
363
|
opts: Optional[pulumi.ResourceOptions] = None,
|
365
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
366
|
-
ca_cert_pem: Optional[pulumi.Input[
|
367
|
-
ca_private_key_pem: Optional[pulumi.Input[
|
368
|
-
cert_request_pem: Optional[pulumi.Input[
|
369
|
-
early_renewal_hours: Optional[pulumi.Input[
|
370
|
-
is_ca_certificate: Optional[pulumi.Input[
|
371
|
-
set_subject_key_id: Optional[pulumi.Input[
|
372
|
-
validity_period_hours: Optional[pulumi.Input[
|
364
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
365
|
+
ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
366
|
+
ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
367
|
+
cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
368
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
369
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
370
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
371
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
373
372
|
__props__=None):
|
374
373
|
"""
|
375
374
|
Create a LocallySignedCert resource with the given unique name, props, and options.
|
376
375
|
:param str resource_name: The name of the resource.
|
377
376
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
378
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
379
|
-
:param pulumi.Input[
|
380
|
-
:param pulumi.Input[
|
381
|
-
:param pulumi.Input[
|
382
|
-
:param pulumi.Input[
|
383
|
-
:param pulumi.Input[
|
384
|
-
:param pulumi.Input[
|
377
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
378
|
+
:param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
379
|
+
:param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
380
|
+
:param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
381
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
382
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
383
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
385
384
|
"""
|
386
385
|
...
|
387
386
|
@overload
|
@@ -406,14 +405,14 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
406
405
|
def _internal_init(__self__,
|
407
406
|
resource_name: str,
|
408
407
|
opts: Optional[pulumi.ResourceOptions] = None,
|
409
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
410
|
-
ca_cert_pem: Optional[pulumi.Input[
|
411
|
-
ca_private_key_pem: Optional[pulumi.Input[
|
412
|
-
cert_request_pem: Optional[pulumi.Input[
|
413
|
-
early_renewal_hours: Optional[pulumi.Input[
|
414
|
-
is_ca_certificate: Optional[pulumi.Input[
|
415
|
-
set_subject_key_id: Optional[pulumi.Input[
|
416
|
-
validity_period_hours: Optional[pulumi.Input[
|
408
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
409
|
+
ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
411
|
+
cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
412
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
413
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
414
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
415
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
417
416
|
__props__=None):
|
418
417
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
419
418
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -458,19 +457,19 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
458
457
|
def get(resource_name: str,
|
459
458
|
id: pulumi.Input[str],
|
460
459
|
opts: Optional[pulumi.ResourceOptions] = None,
|
461
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
462
|
-
ca_cert_pem: Optional[pulumi.Input[
|
463
|
-
ca_key_algorithm: Optional[pulumi.Input[
|
464
|
-
ca_private_key_pem: Optional[pulumi.Input[
|
465
|
-
cert_pem: Optional[pulumi.Input[
|
466
|
-
cert_request_pem: Optional[pulumi.Input[
|
467
|
-
early_renewal_hours: Optional[pulumi.Input[
|
468
|
-
is_ca_certificate: Optional[pulumi.Input[
|
469
|
-
ready_for_renewal: Optional[pulumi.Input[
|
470
|
-
set_subject_key_id: Optional[pulumi.Input[
|
471
|
-
validity_end_time: Optional[pulumi.Input[
|
472
|
-
validity_period_hours: Optional[pulumi.Input[
|
473
|
-
validity_start_time: Optional[pulumi.Input[
|
460
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
461
|
+
ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
462
|
+
ca_key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
463
|
+
ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
464
|
+
cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
465
|
+
cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
466
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
467
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
468
|
+
ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
|
469
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
470
|
+
validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
|
471
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
472
|
+
validity_start_time: Optional[pulumi.Input[_builtins.str]] = None) -> 'LocallySignedCert':
|
474
473
|
"""
|
475
474
|
Get an existing LocallySignedCert resource's state with the given name, id, and optional extra
|
476
475
|
properties used to qualify the lookup.
|
@@ -478,18 +477,18 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
478
477
|
:param str resource_name: The unique name of the resulting resource.
|
479
478
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
480
479
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
481
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
482
|
-
:param pulumi.Input[
|
483
|
-
:param pulumi.Input[
|
484
|
-
:param pulumi.Input[
|
485
|
-
:param pulumi.Input[
|
486
|
-
:param pulumi.Input[
|
487
|
-
:param pulumi.Input[
|
488
|
-
:param pulumi.Input[
|
489
|
-
:param pulumi.Input[
|
490
|
-
:param pulumi.Input[
|
491
|
-
:param pulumi.Input[
|
492
|
-
:param pulumi.Input[
|
480
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
481
|
+
:param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
482
|
+
:param pulumi.Input[_builtins.str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
483
|
+
:param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
484
|
+
:param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
485
|
+
:param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
486
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
487
|
+
:param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
488
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
489
|
+
:param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
490
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
491
|
+
:param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
493
492
|
"""
|
494
493
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
495
494
|
|
@@ -510,102 +509,102 @@ class LocallySignedCert(pulumi.CustomResource):
|
|
510
509
|
__props__.__dict__["validity_start_time"] = validity_start_time
|
511
510
|
return LocallySignedCert(resource_name, opts=opts, __props__=__props__)
|
512
511
|
|
513
|
-
@property
|
512
|
+
@_builtins.property
|
514
513
|
@pulumi.getter(name="allowedUses")
|
515
|
-
def allowed_uses(self) -> pulumi.Output[Sequence[
|
514
|
+
def allowed_uses(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
516
515
|
"""
|
517
516
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
518
517
|
"""
|
519
518
|
return pulumi.get(self, "allowed_uses")
|
520
519
|
|
521
|
-
@property
|
520
|
+
@_builtins.property
|
522
521
|
@pulumi.getter(name="caCertPem")
|
523
|
-
def ca_cert_pem(self) -> pulumi.Output[
|
522
|
+
def ca_cert_pem(self) -> pulumi.Output[_builtins.str]:
|
524
523
|
"""
|
525
524
|
Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
526
525
|
"""
|
527
526
|
return pulumi.get(self, "ca_cert_pem")
|
528
527
|
|
529
|
-
@property
|
528
|
+
@_builtins.property
|
530
529
|
@pulumi.getter(name="caKeyAlgorithm")
|
531
|
-
def ca_key_algorithm(self) -> pulumi.Output[
|
530
|
+
def ca_key_algorithm(self) -> pulumi.Output[_builtins.str]:
|
532
531
|
"""
|
533
532
|
Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
|
534
533
|
"""
|
535
534
|
return pulumi.get(self, "ca_key_algorithm")
|
536
535
|
|
537
|
-
@property
|
536
|
+
@_builtins.property
|
538
537
|
@pulumi.getter(name="caPrivateKeyPem")
|
539
|
-
def ca_private_key_pem(self) -> pulumi.Output[
|
538
|
+
def ca_private_key_pem(self) -> pulumi.Output[_builtins.str]:
|
540
539
|
"""
|
541
540
|
Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
542
541
|
"""
|
543
542
|
return pulumi.get(self, "ca_private_key_pem")
|
544
543
|
|
545
|
-
@property
|
544
|
+
@_builtins.property
|
546
545
|
@pulumi.getter(name="certPem")
|
547
|
-
def cert_pem(self) -> pulumi.Output[
|
546
|
+
def cert_pem(self) -> pulumi.Output[_builtins.str]:
|
548
547
|
"""
|
549
548
|
Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
550
549
|
"""
|
551
550
|
return pulumi.get(self, "cert_pem")
|
552
551
|
|
553
|
-
@property
|
552
|
+
@_builtins.property
|
554
553
|
@pulumi.getter(name="certRequestPem")
|
555
|
-
def cert_request_pem(self) -> pulumi.Output[
|
554
|
+
def cert_request_pem(self) -> pulumi.Output[_builtins.str]:
|
556
555
|
"""
|
557
556
|
Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
|
558
557
|
"""
|
559
558
|
return pulumi.get(self, "cert_request_pem")
|
560
559
|
|
561
|
-
@property
|
560
|
+
@_builtins.property
|
562
561
|
@pulumi.getter(name="earlyRenewalHours")
|
563
|
-
def early_renewal_hours(self) -> pulumi.Output[
|
562
|
+
def early_renewal_hours(self) -> pulumi.Output[_builtins.int]:
|
564
563
|
return pulumi.get(self, "early_renewal_hours")
|
565
564
|
|
566
|
-
@property
|
565
|
+
@_builtins.property
|
567
566
|
@pulumi.getter(name="isCaCertificate")
|
568
|
-
def is_ca_certificate(self) -> pulumi.Output[
|
567
|
+
def is_ca_certificate(self) -> pulumi.Output[_builtins.bool]:
|
569
568
|
"""
|
570
569
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
571
570
|
"""
|
572
571
|
return pulumi.get(self, "is_ca_certificate")
|
573
572
|
|
574
|
-
@property
|
573
|
+
@_builtins.property
|
575
574
|
@pulumi.getter(name="readyForRenewal")
|
576
|
-
def ready_for_renewal(self) -> pulumi.Output[
|
575
|
+
def ready_for_renewal(self) -> pulumi.Output[_builtins.bool]:
|
577
576
|
"""
|
578
577
|
Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
579
578
|
"""
|
580
579
|
return pulumi.get(self, "ready_for_renewal")
|
581
580
|
|
582
|
-
@property
|
581
|
+
@_builtins.property
|
583
582
|
@pulumi.getter(name="setSubjectKeyId")
|
584
|
-
def set_subject_key_id(self) -> pulumi.Output[
|
583
|
+
def set_subject_key_id(self) -> pulumi.Output[_builtins.bool]:
|
585
584
|
"""
|
586
585
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
587
586
|
"""
|
588
587
|
return pulumi.get(self, "set_subject_key_id")
|
589
588
|
|
590
|
-
@property
|
589
|
+
@_builtins.property
|
591
590
|
@pulumi.getter(name="validityEndTime")
|
592
|
-
def validity_end_time(self) -> pulumi.Output[
|
591
|
+
def validity_end_time(self) -> pulumi.Output[_builtins.str]:
|
593
592
|
"""
|
594
593
|
The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
595
594
|
"""
|
596
595
|
return pulumi.get(self, "validity_end_time")
|
597
596
|
|
598
|
-
@property
|
597
|
+
@_builtins.property
|
599
598
|
@pulumi.getter(name="validityPeriodHours")
|
600
|
-
def validity_period_hours(self) -> pulumi.Output[
|
599
|
+
def validity_period_hours(self) -> pulumi.Output[_builtins.int]:
|
601
600
|
"""
|
602
601
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
603
602
|
"""
|
604
603
|
return pulumi.get(self, "validity_period_hours")
|
605
604
|
|
606
|
-
@property
|
605
|
+
@_builtins.property
|
607
606
|
@pulumi.getter(name="validityStartTime")
|
608
|
-
def validity_start_time(self) -> pulumi.Output[
|
607
|
+
def validity_start_time(self) -> pulumi.Output[_builtins.str]:
|
609
608
|
"""
|
610
609
|
The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
611
610
|
"""
|