pulumi-tls 5.3.0a1753339655__py3-none-any.whl → 5.3.0a1753512319__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_tls/__init__.py +1 -1
- pulumi_tls/_inputs.py +147 -148
- pulumi_tls/cert_request.py +90 -91
- pulumi_tls/config/__init__.py +1 -1
- pulumi_tls/config/__init__.pyi +1 -2
- pulumi_tls/config/outputs.py +17 -18
- pulumi_tls/config/vars.py +2 -3
- pulumi_tls/get_certificate.py +22 -23
- pulumi_tls/get_public_key.py +25 -26
- pulumi_tls/locally_signed_cert.py +178 -179
- pulumi_tls/outputs.py +128 -129
- pulumi_tls/private_key.py +115 -116
- pulumi_tls/provider.py +3 -4
- pulumi_tls/pulumi-plugin.json +1 -1
- pulumi_tls/self_signed_cert.py +215 -216
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/METADATA +1 -1
- pulumi_tls-5.3.0a1753512319.dist-info/RECORD +21 -0
- pulumi_tls-5.3.0a1753339655.dist-info/RECORD +0 -21
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/WHEEL +0 -0
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/top_level.txt +0 -0
pulumi_tls/self_signed_cert.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,29 +21,29 @@ __all__ = ['SelfSignedCertArgs', 'SelfSignedCert']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class SelfSignedCertArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
allowed_uses: pulumi.Input[Sequence[pulumi.Input[
|
26
|
-
private_key_pem: pulumi.Input[
|
27
|
-
validity_period_hours: pulumi.Input[
|
28
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
29
|
-
early_renewal_hours: Optional[pulumi.Input[
|
30
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
31
|
-
is_ca_certificate: Optional[pulumi.Input[
|
32
|
-
set_authority_key_id: Optional[pulumi.Input[
|
33
|
-
set_subject_key_id: Optional[pulumi.Input[
|
24
|
+
allowed_uses: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
|
25
|
+
private_key_pem: pulumi.Input[_builtins.str],
|
26
|
+
validity_period_hours: pulumi.Input[_builtins.int],
|
27
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
30
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
32
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
34
33
|
subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
|
35
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
34
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
|
36
35
|
"""
|
37
36
|
The set of arguments for constructing a SelfSignedCert resource.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[
|
41
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
42
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
38
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
39
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
40
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
41
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
42
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
43
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
44
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
46
45
|
:param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
47
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
46
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
48
47
|
"""
|
49
48
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
50
49
|
pulumi.set(__self__, "private_key_pem", private_key_pem)
|
@@ -66,112 +65,112 @@ class SelfSignedCertArgs:
|
|
66
65
|
if uris is not None:
|
67
66
|
pulumi.set(__self__, "uris", uris)
|
68
67
|
|
69
|
-
@property
|
68
|
+
@_builtins.property
|
70
69
|
@pulumi.getter(name="allowedUses")
|
71
|
-
def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[
|
70
|
+
def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
|
72
71
|
"""
|
73
72
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
74
73
|
"""
|
75
74
|
return pulumi.get(self, "allowed_uses")
|
76
75
|
|
77
76
|
@allowed_uses.setter
|
78
|
-
def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[
|
77
|
+
def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
|
79
78
|
pulumi.set(self, "allowed_uses", value)
|
80
79
|
|
81
|
-
@property
|
80
|
+
@_builtins.property
|
82
81
|
@pulumi.getter(name="privateKeyPem")
|
83
|
-
def private_key_pem(self) -> pulumi.Input[
|
82
|
+
def private_key_pem(self) -> pulumi.Input[_builtins.str]:
|
84
83
|
"""
|
85
84
|
Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
86
85
|
"""
|
87
86
|
return pulumi.get(self, "private_key_pem")
|
88
87
|
|
89
88
|
@private_key_pem.setter
|
90
|
-
def private_key_pem(self, value: pulumi.Input[
|
89
|
+
def private_key_pem(self, value: pulumi.Input[_builtins.str]):
|
91
90
|
pulumi.set(self, "private_key_pem", value)
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter(name="validityPeriodHours")
|
95
|
-
def validity_period_hours(self) -> pulumi.Input[
|
94
|
+
def validity_period_hours(self) -> pulumi.Input[_builtins.int]:
|
96
95
|
"""
|
97
96
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
98
97
|
"""
|
99
98
|
return pulumi.get(self, "validity_period_hours")
|
100
99
|
|
101
100
|
@validity_period_hours.setter
|
102
|
-
def validity_period_hours(self, value: pulumi.Input[
|
101
|
+
def validity_period_hours(self, value: pulumi.Input[_builtins.int]):
|
103
102
|
pulumi.set(self, "validity_period_hours", value)
|
104
103
|
|
105
|
-
@property
|
104
|
+
@_builtins.property
|
106
105
|
@pulumi.getter(name="dnsNames")
|
107
|
-
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
106
|
+
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
108
107
|
"""
|
109
108
|
List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
110
109
|
"""
|
111
110
|
return pulumi.get(self, "dns_names")
|
112
111
|
|
113
112
|
@dns_names.setter
|
114
|
-
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
113
|
+
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
115
114
|
pulumi.set(self, "dns_names", value)
|
116
115
|
|
117
|
-
@property
|
116
|
+
@_builtins.property
|
118
117
|
@pulumi.getter(name="earlyRenewalHours")
|
119
|
-
def early_renewal_hours(self) -> Optional[pulumi.Input[
|
118
|
+
def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
120
119
|
return pulumi.get(self, "early_renewal_hours")
|
121
120
|
|
122
121
|
@early_renewal_hours.setter
|
123
|
-
def early_renewal_hours(self, value: Optional[pulumi.Input[
|
122
|
+
def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
124
123
|
pulumi.set(self, "early_renewal_hours", value)
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter(name="ipAddresses")
|
128
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
127
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
129
128
|
"""
|
130
129
|
List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
131
130
|
"""
|
132
131
|
return pulumi.get(self, "ip_addresses")
|
133
132
|
|
134
133
|
@ip_addresses.setter
|
135
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
134
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
136
135
|
pulumi.set(self, "ip_addresses", value)
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter(name="isCaCertificate")
|
140
|
-
def is_ca_certificate(self) -> Optional[pulumi.Input[
|
139
|
+
def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
141
140
|
"""
|
142
141
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
143
142
|
"""
|
144
143
|
return pulumi.get(self, "is_ca_certificate")
|
145
144
|
|
146
145
|
@is_ca_certificate.setter
|
147
|
-
def is_ca_certificate(self, value: Optional[pulumi.Input[
|
146
|
+
def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
148
147
|
pulumi.set(self, "is_ca_certificate", value)
|
149
148
|
|
150
|
-
@property
|
149
|
+
@_builtins.property
|
151
150
|
@pulumi.getter(name="setAuthorityKeyId")
|
152
|
-
def set_authority_key_id(self) -> Optional[pulumi.Input[
|
151
|
+
def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
153
152
|
"""
|
154
153
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
155
154
|
"""
|
156
155
|
return pulumi.get(self, "set_authority_key_id")
|
157
156
|
|
158
157
|
@set_authority_key_id.setter
|
159
|
-
def set_authority_key_id(self, value: Optional[pulumi.Input[
|
158
|
+
def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
160
159
|
pulumi.set(self, "set_authority_key_id", value)
|
161
160
|
|
162
|
-
@property
|
161
|
+
@_builtins.property
|
163
162
|
@pulumi.getter(name="setSubjectKeyId")
|
164
|
-
def set_subject_key_id(self) -> Optional[pulumi.Input[
|
163
|
+
def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
165
164
|
"""
|
166
165
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
167
166
|
"""
|
168
167
|
return pulumi.get(self, "set_subject_key_id")
|
169
168
|
|
170
169
|
@set_subject_key_id.setter
|
171
|
-
def set_subject_key_id(self, value: Optional[pulumi.Input[
|
170
|
+
def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
172
171
|
pulumi.set(self, "set_subject_key_id", value)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter
|
176
175
|
def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
|
177
176
|
"""
|
@@ -183,55 +182,55 @@ class SelfSignedCertArgs:
|
|
183
182
|
def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
|
184
183
|
pulumi.set(self, "subject", value)
|
185
184
|
|
186
|
-
@property
|
185
|
+
@_builtins.property
|
187
186
|
@pulumi.getter
|
188
|
-
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
187
|
+
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
189
188
|
"""
|
190
189
|
List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
191
190
|
"""
|
192
191
|
return pulumi.get(self, "uris")
|
193
192
|
|
194
193
|
@uris.setter
|
195
|
-
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
194
|
+
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
196
195
|
pulumi.set(self, "uris", value)
|
197
196
|
|
198
197
|
|
199
198
|
@pulumi.input_type
|
200
199
|
class _SelfSignedCertState:
|
201
200
|
def __init__(__self__, *,
|
202
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
203
|
-
cert_pem: Optional[pulumi.Input[
|
204
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
205
|
-
early_renewal_hours: Optional[pulumi.Input[
|
206
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
207
|
-
is_ca_certificate: Optional[pulumi.Input[
|
208
|
-
key_algorithm: Optional[pulumi.Input[
|
209
|
-
private_key_pem: Optional[pulumi.Input[
|
210
|
-
ready_for_renewal: Optional[pulumi.Input[
|
211
|
-
set_authority_key_id: Optional[pulumi.Input[
|
212
|
-
set_subject_key_id: Optional[pulumi.Input[
|
201
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
202
|
+
cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
203
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
204
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
205
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
206
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
207
|
+
key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
208
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
209
|
+
ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
|
210
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
211
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
213
212
|
subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
|
214
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
215
|
-
validity_end_time: Optional[pulumi.Input[
|
216
|
-
validity_period_hours: Optional[pulumi.Input[
|
217
|
-
validity_start_time: Optional[pulumi.Input[
|
213
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
214
|
+
validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
|
215
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
216
|
+
validity_start_time: Optional[pulumi.Input[_builtins.str]] = None):
|
218
217
|
"""
|
219
218
|
Input properties used for looking up and filtering SelfSignedCert resources.
|
220
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
221
|
-
:param pulumi.Input[
|
222
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
223
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
224
|
-
:param pulumi.Input[
|
225
|
-
:param pulumi.Input[
|
226
|
-
:param pulumi.Input[
|
227
|
-
:param pulumi.Input[
|
228
|
-
:param pulumi.Input[
|
229
|
-
:param pulumi.Input[
|
219
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
220
|
+
:param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
221
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
222
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
223
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
224
|
+
:param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
225
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
226
|
+
:param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
227
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
228
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
230
229
|
:param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
231
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
232
|
-
:param pulumi.Input[
|
233
|
-
:param pulumi.Input[
|
234
|
-
:param pulumi.Input[
|
230
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
231
|
+
:param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
232
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
233
|
+
:param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
235
234
|
"""
|
236
235
|
if allowed_uses is not None:
|
237
236
|
pulumi.set(__self__, "allowed_uses", allowed_uses)
|
@@ -266,136 +265,136 @@ class _SelfSignedCertState:
|
|
266
265
|
if validity_start_time is not None:
|
267
266
|
pulumi.set(__self__, "validity_start_time", validity_start_time)
|
268
267
|
|
269
|
-
@property
|
268
|
+
@_builtins.property
|
270
269
|
@pulumi.getter(name="allowedUses")
|
271
|
-
def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
270
|
+
def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
272
271
|
"""
|
273
272
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
274
273
|
"""
|
275
274
|
return pulumi.get(self, "allowed_uses")
|
276
275
|
|
277
276
|
@allowed_uses.setter
|
278
|
-
def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
277
|
+
def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
279
278
|
pulumi.set(self, "allowed_uses", value)
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter(name="certPem")
|
283
|
-
def cert_pem(self) -> Optional[pulumi.Input[
|
282
|
+
def cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
284
283
|
"""
|
285
284
|
Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
286
285
|
"""
|
287
286
|
return pulumi.get(self, "cert_pem")
|
288
287
|
|
289
288
|
@cert_pem.setter
|
290
|
-
def cert_pem(self, value: Optional[pulumi.Input[
|
289
|
+
def cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
291
290
|
pulumi.set(self, "cert_pem", value)
|
292
291
|
|
293
|
-
@property
|
292
|
+
@_builtins.property
|
294
293
|
@pulumi.getter(name="dnsNames")
|
295
|
-
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
294
|
+
def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
296
295
|
"""
|
297
296
|
List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
298
297
|
"""
|
299
298
|
return pulumi.get(self, "dns_names")
|
300
299
|
|
301
300
|
@dns_names.setter
|
302
|
-
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
301
|
+
def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
303
302
|
pulumi.set(self, "dns_names", value)
|
304
303
|
|
305
|
-
@property
|
304
|
+
@_builtins.property
|
306
305
|
@pulumi.getter(name="earlyRenewalHours")
|
307
|
-
def early_renewal_hours(self) -> Optional[pulumi.Input[
|
306
|
+
def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
308
307
|
return pulumi.get(self, "early_renewal_hours")
|
309
308
|
|
310
309
|
@early_renewal_hours.setter
|
311
|
-
def early_renewal_hours(self, value: Optional[pulumi.Input[
|
310
|
+
def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
312
311
|
pulumi.set(self, "early_renewal_hours", value)
|
313
312
|
|
314
|
-
@property
|
313
|
+
@_builtins.property
|
315
314
|
@pulumi.getter(name="ipAddresses")
|
316
|
-
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
315
|
+
def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
317
316
|
"""
|
318
317
|
List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
319
318
|
"""
|
320
319
|
return pulumi.get(self, "ip_addresses")
|
321
320
|
|
322
321
|
@ip_addresses.setter
|
323
|
-
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
322
|
+
def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
324
323
|
pulumi.set(self, "ip_addresses", value)
|
325
324
|
|
326
|
-
@property
|
325
|
+
@_builtins.property
|
327
326
|
@pulumi.getter(name="isCaCertificate")
|
328
|
-
def is_ca_certificate(self) -> Optional[pulumi.Input[
|
327
|
+
def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
329
328
|
"""
|
330
329
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
331
330
|
"""
|
332
331
|
return pulumi.get(self, "is_ca_certificate")
|
333
332
|
|
334
333
|
@is_ca_certificate.setter
|
335
|
-
def is_ca_certificate(self, value: Optional[pulumi.Input[
|
334
|
+
def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
336
335
|
pulumi.set(self, "is_ca_certificate", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter(name="keyAlgorithm")
|
340
|
-
def key_algorithm(self) -> Optional[pulumi.Input[
|
339
|
+
def key_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
|
341
340
|
"""
|
342
341
|
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
343
342
|
"""
|
344
343
|
return pulumi.get(self, "key_algorithm")
|
345
344
|
|
346
345
|
@key_algorithm.setter
|
347
|
-
def key_algorithm(self, value: Optional[pulumi.Input[
|
346
|
+
def key_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
|
348
347
|
pulumi.set(self, "key_algorithm", value)
|
349
348
|
|
350
|
-
@property
|
349
|
+
@_builtins.property
|
351
350
|
@pulumi.getter(name="privateKeyPem")
|
352
|
-
def private_key_pem(self) -> Optional[pulumi.Input[
|
351
|
+
def private_key_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
|
353
352
|
"""
|
354
353
|
Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
355
354
|
"""
|
356
355
|
return pulumi.get(self, "private_key_pem")
|
357
356
|
|
358
357
|
@private_key_pem.setter
|
359
|
-
def private_key_pem(self, value: Optional[pulumi.Input[
|
358
|
+
def private_key_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
|
360
359
|
pulumi.set(self, "private_key_pem", value)
|
361
360
|
|
362
|
-
@property
|
361
|
+
@_builtins.property
|
363
362
|
@pulumi.getter(name="readyForRenewal")
|
364
|
-
def ready_for_renewal(self) -> Optional[pulumi.Input[
|
363
|
+
def ready_for_renewal(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
365
364
|
"""
|
366
365
|
Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
367
366
|
"""
|
368
367
|
return pulumi.get(self, "ready_for_renewal")
|
369
368
|
|
370
369
|
@ready_for_renewal.setter
|
371
|
-
def ready_for_renewal(self, value: Optional[pulumi.Input[
|
370
|
+
def ready_for_renewal(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
372
371
|
pulumi.set(self, "ready_for_renewal", value)
|
373
372
|
|
374
|
-
@property
|
373
|
+
@_builtins.property
|
375
374
|
@pulumi.getter(name="setAuthorityKeyId")
|
376
|
-
def set_authority_key_id(self) -> Optional[pulumi.Input[
|
375
|
+
def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
377
376
|
"""
|
378
377
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
379
378
|
"""
|
380
379
|
return pulumi.get(self, "set_authority_key_id")
|
381
380
|
|
382
381
|
@set_authority_key_id.setter
|
383
|
-
def set_authority_key_id(self, value: Optional[pulumi.Input[
|
382
|
+
def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
384
383
|
pulumi.set(self, "set_authority_key_id", value)
|
385
384
|
|
386
|
-
@property
|
385
|
+
@_builtins.property
|
387
386
|
@pulumi.getter(name="setSubjectKeyId")
|
388
|
-
def set_subject_key_id(self) -> Optional[pulumi.Input[
|
387
|
+
def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
389
388
|
"""
|
390
389
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
391
390
|
"""
|
392
391
|
return pulumi.get(self, "set_subject_key_id")
|
393
392
|
|
394
393
|
@set_subject_key_id.setter
|
395
|
-
def set_subject_key_id(self, value: Optional[pulumi.Input[
|
394
|
+
def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
396
395
|
pulumi.set(self, "set_subject_key_id", value)
|
397
396
|
|
398
|
-
@property
|
397
|
+
@_builtins.property
|
399
398
|
@pulumi.getter
|
400
399
|
def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
|
401
400
|
"""
|
@@ -407,52 +406,52 @@ class _SelfSignedCertState:
|
|
407
406
|
def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
|
408
407
|
pulumi.set(self, "subject", value)
|
409
408
|
|
410
|
-
@property
|
409
|
+
@_builtins.property
|
411
410
|
@pulumi.getter
|
412
|
-
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
411
|
+
def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
413
412
|
"""
|
414
413
|
List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
415
414
|
"""
|
416
415
|
return pulumi.get(self, "uris")
|
417
416
|
|
418
417
|
@uris.setter
|
419
|
-
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
418
|
+
def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
420
419
|
pulumi.set(self, "uris", value)
|
421
420
|
|
422
|
-
@property
|
421
|
+
@_builtins.property
|
423
422
|
@pulumi.getter(name="validityEndTime")
|
424
|
-
def validity_end_time(self) -> Optional[pulumi.Input[
|
423
|
+
def validity_end_time(self) -> Optional[pulumi.Input[_builtins.str]]:
|
425
424
|
"""
|
426
425
|
The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
427
426
|
"""
|
428
427
|
return pulumi.get(self, "validity_end_time")
|
429
428
|
|
430
429
|
@validity_end_time.setter
|
431
|
-
def validity_end_time(self, value: Optional[pulumi.Input[
|
430
|
+
def validity_end_time(self, value: Optional[pulumi.Input[_builtins.str]]):
|
432
431
|
pulumi.set(self, "validity_end_time", value)
|
433
432
|
|
434
|
-
@property
|
433
|
+
@_builtins.property
|
435
434
|
@pulumi.getter(name="validityPeriodHours")
|
436
|
-
def validity_period_hours(self) -> Optional[pulumi.Input[
|
435
|
+
def validity_period_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
|
437
436
|
"""
|
438
437
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
439
438
|
"""
|
440
439
|
return pulumi.get(self, "validity_period_hours")
|
441
440
|
|
442
441
|
@validity_period_hours.setter
|
443
|
-
def validity_period_hours(self, value: Optional[pulumi.Input[
|
442
|
+
def validity_period_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
|
444
443
|
pulumi.set(self, "validity_period_hours", value)
|
445
444
|
|
446
|
-
@property
|
445
|
+
@_builtins.property
|
447
446
|
@pulumi.getter(name="validityStartTime")
|
448
|
-
def validity_start_time(self) -> Optional[pulumi.Input[
|
447
|
+
def validity_start_time(self) -> Optional[pulumi.Input[_builtins.str]]:
|
449
448
|
"""
|
450
449
|
The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
451
450
|
"""
|
452
451
|
return pulumi.get(self, "validity_start_time")
|
453
452
|
|
454
453
|
@validity_start_time.setter
|
455
|
-
def validity_start_time(self, value: Optional[pulumi.Input[
|
454
|
+
def validity_start_time(self, value: Optional[pulumi.Input[_builtins.str]]):
|
456
455
|
pulumi.set(self, "validity_start_time", value)
|
457
456
|
|
458
457
|
|
@@ -462,32 +461,32 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
462
461
|
def __init__(__self__,
|
463
462
|
resource_name: str,
|
464
463
|
opts: Optional[pulumi.ResourceOptions] = None,
|
465
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
466
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
467
|
-
early_renewal_hours: Optional[pulumi.Input[
|
468
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
469
|
-
is_ca_certificate: Optional[pulumi.Input[
|
470
|
-
private_key_pem: Optional[pulumi.Input[
|
471
|
-
set_authority_key_id: Optional[pulumi.Input[
|
472
|
-
set_subject_key_id: Optional[pulumi.Input[
|
464
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
465
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
466
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
467
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
468
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
469
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
470
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
471
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
473
472
|
subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
|
474
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
475
|
-
validity_period_hours: Optional[pulumi.Input[
|
473
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
474
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
476
475
|
__props__=None):
|
477
476
|
"""
|
478
477
|
Create a SelfSignedCert resource with the given unique name, props, and options.
|
479
478
|
:param str resource_name: The name of the resource.
|
480
479
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
481
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
482
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
483
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
484
|
-
:param pulumi.Input[
|
485
|
-
:param pulumi.Input[
|
486
|
-
:param pulumi.Input[
|
487
|
-
:param pulumi.Input[
|
480
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
481
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
482
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
483
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
484
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
485
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
486
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
488
487
|
:param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
489
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
490
|
-
:param pulumi.Input[
|
488
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
489
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
491
490
|
"""
|
492
491
|
...
|
493
492
|
@overload
|
@@ -512,17 +511,17 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
512
511
|
def _internal_init(__self__,
|
513
512
|
resource_name: str,
|
514
513
|
opts: Optional[pulumi.ResourceOptions] = None,
|
515
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
516
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
517
|
-
early_renewal_hours: Optional[pulumi.Input[
|
518
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
519
|
-
is_ca_certificate: Optional[pulumi.Input[
|
520
|
-
private_key_pem: Optional[pulumi.Input[
|
521
|
-
set_authority_key_id: Optional[pulumi.Input[
|
522
|
-
set_subject_key_id: Optional[pulumi.Input[
|
514
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
515
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
516
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
517
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
518
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
519
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
520
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
521
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
523
522
|
subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
|
524
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
525
|
-
validity_period_hours: Optional[pulumi.Input[
|
523
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
524
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
526
525
|
__props__=None):
|
527
526
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
528
527
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -566,22 +565,22 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
566
565
|
def get(resource_name: str,
|
567
566
|
id: pulumi.Input[str],
|
568
567
|
opts: Optional[pulumi.ResourceOptions] = None,
|
569
|
-
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
570
|
-
cert_pem: Optional[pulumi.Input[
|
571
|
-
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[
|
572
|
-
early_renewal_hours: Optional[pulumi.Input[
|
573
|
-
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[
|
574
|
-
is_ca_certificate: Optional[pulumi.Input[
|
575
|
-
key_algorithm: Optional[pulumi.Input[
|
576
|
-
private_key_pem: Optional[pulumi.Input[
|
577
|
-
ready_for_renewal: Optional[pulumi.Input[
|
578
|
-
set_authority_key_id: Optional[pulumi.Input[
|
579
|
-
set_subject_key_id: Optional[pulumi.Input[
|
568
|
+
allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
569
|
+
cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
570
|
+
dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
571
|
+
early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
572
|
+
ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
573
|
+
is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
|
574
|
+
key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
|
575
|
+
private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
|
576
|
+
ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
|
577
|
+
set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
578
|
+
set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
|
580
579
|
subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
|
581
|
-
uris: Optional[pulumi.Input[Sequence[pulumi.Input[
|
582
|
-
validity_end_time: Optional[pulumi.Input[
|
583
|
-
validity_period_hours: Optional[pulumi.Input[
|
584
|
-
validity_start_time: Optional[pulumi.Input[
|
580
|
+
uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
581
|
+
validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
|
582
|
+
validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
|
583
|
+
validity_start_time: Optional[pulumi.Input[_builtins.str]] = None) -> 'SelfSignedCert':
|
585
584
|
"""
|
586
585
|
Get an existing SelfSignedCert resource's state with the given name, id, and optional extra
|
587
586
|
properties used to qualify the lookup.
|
@@ -589,21 +588,21 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
589
588
|
:param str resource_name: The unique name of the resulting resource.
|
590
589
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
591
590
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
592
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
593
|
-
:param pulumi.Input[
|
594
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
595
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
596
|
-
:param pulumi.Input[
|
597
|
-
:param pulumi.Input[
|
598
|
-
:param pulumi.Input[
|
599
|
-
:param pulumi.Input[
|
600
|
-
:param pulumi.Input[
|
601
|
-
:param pulumi.Input[
|
591
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
592
|
+
:param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
593
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
594
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
595
|
+
:param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
596
|
+
:param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
597
|
+
:param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
598
|
+
:param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
599
|
+
:param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
600
|
+
:param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
602
601
|
:param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
|
603
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
604
|
-
:param pulumi.Input[
|
605
|
-
:param pulumi.Input[
|
606
|
-
:param pulumi.Input[
|
602
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
603
|
+
:param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
604
|
+
:param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
|
605
|
+
:param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
607
606
|
"""
|
608
607
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
609
608
|
|
@@ -627,92 +626,92 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
627
626
|
__props__.__dict__["validity_start_time"] = validity_start_time
|
628
627
|
return SelfSignedCert(resource_name, opts=opts, __props__=__props__)
|
629
628
|
|
630
|
-
@property
|
629
|
+
@_builtins.property
|
631
630
|
@pulumi.getter(name="allowedUses")
|
632
|
-
def allowed_uses(self) -> pulumi.Output[Sequence[
|
631
|
+
def allowed_uses(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
633
632
|
"""
|
634
633
|
List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
|
635
634
|
"""
|
636
635
|
return pulumi.get(self, "allowed_uses")
|
637
636
|
|
638
|
-
@property
|
637
|
+
@_builtins.property
|
639
638
|
@pulumi.getter(name="certPem")
|
640
|
-
def cert_pem(self) -> pulumi.Output[
|
639
|
+
def cert_pem(self) -> pulumi.Output[_builtins.str]:
|
641
640
|
"""
|
642
641
|
Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
643
642
|
"""
|
644
643
|
return pulumi.get(self, "cert_pem")
|
645
644
|
|
646
|
-
@property
|
645
|
+
@_builtins.property
|
647
646
|
@pulumi.getter(name="dnsNames")
|
648
|
-
def dns_names(self) -> pulumi.Output[Optional[Sequence[
|
647
|
+
def dns_names(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
649
648
|
"""
|
650
649
|
List of DNS names for which a certificate is being requested (i.e. certificate subjects).
|
651
650
|
"""
|
652
651
|
return pulumi.get(self, "dns_names")
|
653
652
|
|
654
|
-
@property
|
653
|
+
@_builtins.property
|
655
654
|
@pulumi.getter(name="earlyRenewalHours")
|
656
|
-
def early_renewal_hours(self) -> pulumi.Output[
|
655
|
+
def early_renewal_hours(self) -> pulumi.Output[_builtins.int]:
|
657
656
|
return pulumi.get(self, "early_renewal_hours")
|
658
657
|
|
659
|
-
@property
|
658
|
+
@_builtins.property
|
660
659
|
@pulumi.getter(name="ipAddresses")
|
661
|
-
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[
|
660
|
+
def ip_addresses(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
662
661
|
"""
|
663
662
|
List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
|
664
663
|
"""
|
665
664
|
return pulumi.get(self, "ip_addresses")
|
666
665
|
|
667
|
-
@property
|
666
|
+
@_builtins.property
|
668
667
|
@pulumi.getter(name="isCaCertificate")
|
669
|
-
def is_ca_certificate(self) -> pulumi.Output[
|
668
|
+
def is_ca_certificate(self) -> pulumi.Output[_builtins.bool]:
|
670
669
|
"""
|
671
670
|
Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
|
672
671
|
"""
|
673
672
|
return pulumi.get(self, "is_ca_certificate")
|
674
673
|
|
675
|
-
@property
|
674
|
+
@_builtins.property
|
676
675
|
@pulumi.getter(name="keyAlgorithm")
|
677
|
-
def key_algorithm(self) -> pulumi.Output[
|
676
|
+
def key_algorithm(self) -> pulumi.Output[_builtins.str]:
|
678
677
|
"""
|
679
678
|
Name of the algorithm used when generating the private key provided in `private_key_pem`.
|
680
679
|
"""
|
681
680
|
return pulumi.get(self, "key_algorithm")
|
682
681
|
|
683
|
-
@property
|
682
|
+
@_builtins.property
|
684
683
|
@pulumi.getter(name="privateKeyPem")
|
685
|
-
def private_key_pem(self) -> pulumi.Output[
|
684
|
+
def private_key_pem(self) -> pulumi.Output[_builtins.str]:
|
686
685
|
"""
|
687
686
|
Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
|
688
687
|
"""
|
689
688
|
return pulumi.get(self, "private_key_pem")
|
690
689
|
|
691
|
-
@property
|
690
|
+
@_builtins.property
|
692
691
|
@pulumi.getter(name="readyForRenewal")
|
693
|
-
def ready_for_renewal(self) -> pulumi.Output[
|
692
|
+
def ready_for_renewal(self) -> pulumi.Output[_builtins.bool]:
|
694
693
|
"""
|
695
694
|
Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
|
696
695
|
"""
|
697
696
|
return pulumi.get(self, "ready_for_renewal")
|
698
697
|
|
699
|
-
@property
|
698
|
+
@_builtins.property
|
700
699
|
@pulumi.getter(name="setAuthorityKeyId")
|
701
|
-
def set_authority_key_id(self) -> pulumi.Output[
|
700
|
+
def set_authority_key_id(self) -> pulumi.Output[_builtins.bool]:
|
702
701
|
"""
|
703
702
|
Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
704
703
|
"""
|
705
704
|
return pulumi.get(self, "set_authority_key_id")
|
706
705
|
|
707
|
-
@property
|
706
|
+
@_builtins.property
|
708
707
|
@pulumi.getter(name="setSubjectKeyId")
|
709
|
-
def set_subject_key_id(self) -> pulumi.Output[
|
708
|
+
def set_subject_key_id(self) -> pulumi.Output[_builtins.bool]:
|
710
709
|
"""
|
711
710
|
Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
|
712
711
|
"""
|
713
712
|
return pulumi.get(self, "set_subject_key_id")
|
714
713
|
|
715
|
-
@property
|
714
|
+
@_builtins.property
|
716
715
|
@pulumi.getter
|
717
716
|
def subject(self) -> pulumi.Output[Optional['outputs.SelfSignedCertSubject']]:
|
718
717
|
"""
|
@@ -720,33 +719,33 @@ class SelfSignedCert(pulumi.CustomResource):
|
|
720
719
|
"""
|
721
720
|
return pulumi.get(self, "subject")
|
722
721
|
|
723
|
-
@property
|
722
|
+
@_builtins.property
|
724
723
|
@pulumi.getter
|
725
|
-
def uris(self) -> pulumi.Output[Optional[Sequence[
|
724
|
+
def uris(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
726
725
|
"""
|
727
726
|
List of URIs for which a certificate is being requested (i.e. certificate subjects).
|
728
727
|
"""
|
729
728
|
return pulumi.get(self, "uris")
|
730
729
|
|
731
|
-
@property
|
730
|
+
@_builtins.property
|
732
731
|
@pulumi.getter(name="validityEndTime")
|
733
|
-
def validity_end_time(self) -> pulumi.Output[
|
732
|
+
def validity_end_time(self) -> pulumi.Output[_builtins.str]:
|
734
733
|
"""
|
735
734
|
The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
736
735
|
"""
|
737
736
|
return pulumi.get(self, "validity_end_time")
|
738
737
|
|
739
|
-
@property
|
738
|
+
@_builtins.property
|
740
739
|
@pulumi.getter(name="validityPeriodHours")
|
741
|
-
def validity_period_hours(self) -> pulumi.Output[
|
740
|
+
def validity_period_hours(self) -> pulumi.Output[_builtins.int]:
|
742
741
|
"""
|
743
742
|
Number of hours, after initial issuing, that the certificate will remain valid for.
|
744
743
|
"""
|
745
744
|
return pulumi.get(self, "validity_period_hours")
|
746
745
|
|
747
|
-
@property
|
746
|
+
@_builtins.property
|
748
747
|
@pulumi.getter(name="validityStartTime")
|
749
|
-
def validity_start_time(self) -> pulumi.Output[
|
748
|
+
def validity_start_time(self) -> pulumi.Output[_builtins.str]:
|
750
749
|
"""
|
751
750
|
The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
|
752
751
|
"""
|