tls.SelfSignedCert
Explore with Pulumi AI
Create SelfSignedCert Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SelfSignedCert(name: string, args: SelfSignedCertArgs, opts?: CustomResourceOptions);
@overload
def SelfSignedCert(resource_name: str,
args: SelfSignedCertArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SelfSignedCert(resource_name: str,
opts: Optional[ResourceOptions] = None,
allowed_uses: Optional[Sequence[str]] = None,
private_key_pem: Optional[str] = None,
validity_period_hours: Optional[int] = None,
dns_names: Optional[Sequence[str]] = None,
early_renewal_hours: Optional[int] = None,
ip_addresses: Optional[Sequence[str]] = None,
is_ca_certificate: Optional[bool] = None,
set_authority_key_id: Optional[bool] = None,
set_subject_key_id: Optional[bool] = None,
subject: Optional[SelfSignedCertSubjectArgs] = None,
uris: Optional[Sequence[str]] = None)
func NewSelfSignedCert(ctx *Context, name string, args SelfSignedCertArgs, opts ...ResourceOption) (*SelfSignedCert, error)
public SelfSignedCert(string name, SelfSignedCertArgs args, CustomResourceOptions? opts = null)
public SelfSignedCert(String name, SelfSignedCertArgs args)
public SelfSignedCert(String name, SelfSignedCertArgs args, CustomResourceOptions options)
type: tls:SelfSignedCert
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SelfSignedCertArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SelfSignedCertArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SelfSignedCertArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SelfSignedCertArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SelfSignedCertArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var selfSignedCertResource = new Tls.SelfSignedCert("selfSignedCertResource", new()
{
AllowedUses = new[]
{
"string",
},
PrivateKeyPem = "string",
ValidityPeriodHours = 0,
DnsNames = new[]
{
"string",
},
EarlyRenewalHours = 0,
IpAddresses = new[]
{
"string",
},
IsCaCertificate = false,
SetAuthorityKeyId = false,
SetSubjectKeyId = false,
Subject = new Tls.Inputs.SelfSignedCertSubjectArgs
{
CommonName = "string",
Country = "string",
Locality = "string",
Organization = "string",
OrganizationalUnit = "string",
PostalCode = "string",
Province = "string",
SerialNumber = "string",
StreetAddresses = new[]
{
"string",
},
},
Uris = new[]
{
"string",
},
});
example, err := tls.NewSelfSignedCert(ctx, "selfSignedCertResource", &tls.SelfSignedCertArgs{
AllowedUses: pulumi.StringArray{
pulumi.String("string"),
},
PrivateKeyPem: pulumi.String("string"),
ValidityPeriodHours: pulumi.Int(0),
DnsNames: pulumi.StringArray{
pulumi.String("string"),
},
EarlyRenewalHours: pulumi.Int(0),
IpAddresses: pulumi.StringArray{
pulumi.String("string"),
},
IsCaCertificate: pulumi.Bool(false),
SetAuthorityKeyId: pulumi.Bool(false),
SetSubjectKeyId: pulumi.Bool(false),
Subject: &tls.SelfSignedCertSubjectArgs{
CommonName: pulumi.String("string"),
Country: pulumi.String("string"),
Locality: pulumi.String("string"),
Organization: pulumi.String("string"),
OrganizationalUnit: pulumi.String("string"),
PostalCode: pulumi.String("string"),
Province: pulumi.String("string"),
SerialNumber: pulumi.String("string"),
StreetAddresses: pulumi.StringArray{
pulumi.String("string"),
},
},
Uris: pulumi.StringArray{
pulumi.String("string"),
},
})
var selfSignedCertResource = new SelfSignedCert("selfSignedCertResource", SelfSignedCertArgs.builder()
.allowedUses("string")
.privateKeyPem("string")
.validityPeriodHours(0)
.dnsNames("string")
.earlyRenewalHours(0)
.ipAddresses("string")
.isCaCertificate(false)
.setAuthorityKeyId(false)
.setSubjectKeyId(false)
.subject(SelfSignedCertSubjectArgs.builder()
.commonName("string")
.country("string")
.locality("string")
.organization("string")
.organizationalUnit("string")
.postalCode("string")
.province("string")
.serialNumber("string")
.streetAddresses("string")
.build())
.uris("string")
.build());
self_signed_cert_resource = tls.SelfSignedCert("selfSignedCertResource",
allowed_uses=["string"],
private_key_pem="string",
validity_period_hours=0,
dns_names=["string"],
early_renewal_hours=0,
ip_addresses=["string"],
is_ca_certificate=False,
set_authority_key_id=False,
set_subject_key_id=False,
subject={
"common_name": "string",
"country": "string",
"locality": "string",
"organization": "string",
"organizational_unit": "string",
"postal_code": "string",
"province": "string",
"serial_number": "string",
"street_addresses": ["string"],
},
uris=["string"])
const selfSignedCertResource = new tls.SelfSignedCert("selfSignedCertResource", {
allowedUses: ["string"],
privateKeyPem: "string",
validityPeriodHours: 0,
dnsNames: ["string"],
earlyRenewalHours: 0,
ipAddresses: ["string"],
isCaCertificate: false,
setAuthorityKeyId: false,
setSubjectKeyId: false,
subject: {
commonName: "string",
country: "string",
locality: "string",
organization: "string",
organizationalUnit: "string",
postalCode: "string",
province: "string",
serialNumber: "string",
streetAddresses: ["string"],
},
uris: ["string"],
});
type: tls:SelfSignedCert
properties:
allowedUses:
- string
dnsNames:
- string
earlyRenewalHours: 0
ipAddresses:
- string
isCaCertificate: false
privateKeyPem: string
setAuthorityKeyId: false
setSubjectKeyId: false
subject:
commonName: string
country: string
locality: string
organization: string
organizationalUnit: string
postalCode: string
province: string
serialNumber: string
streetAddresses:
- string
uris:
- string
validityPeriodHours: 0
SelfSignedCert Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SelfSignedCert resource accepts the following input properties:
- Allowed
Uses List<string> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - Private
Key stringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - Validity
Period intHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- Dns
Names List<string> - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- Early
Renewal intHours - Ip
Addresses List<string> - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- Is
Ca boolCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - bool
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - Set
Subject boolKey Id - Should the generated certificate include a subject key identifier (default:
false
). - Subject
Self
Signed Cert Subject - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- Uris List<string>
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- Allowed
Uses []string - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - Private
Key stringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - Validity
Period intHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- Dns
Names []string - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- Early
Renewal intHours - Ip
Addresses []string - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- Is
Ca boolCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - bool
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - Set
Subject boolKey Id - Should the generated certificate include a subject key identifier (default:
false
). - Subject
Self
Signed Cert Subject Args - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- Uris []string
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- allowed
Uses List<String> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - private
Key StringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - validity
Period IntegerHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- dns
Names List<String> - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early
Renewal IntegerHours - ip
Addresses List<String> - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is
Ca BooleanCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - Boolean
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set
Subject BooleanKey Id - Should the generated certificate include a subject key identifier (default:
false
). - subject
Self
Signed Cert Subject - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris List<String>
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- allowed
Uses string[] - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - private
Key stringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - validity
Period numberHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- dns
Names string[] - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early
Renewal numberHours - ip
Addresses string[] - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is
Ca booleanCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - boolean
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set
Subject booleanKey Id - Should the generated certificate include a subject key identifier (default:
false
). - subject
Self
Signed Cert Subject - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris string[]
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- allowed_
uses Sequence[str] - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - private_
key_ strpem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - validity_
period_ inthours - Number of hours, after initial issuing, that the certificate will remain valid for.
- dns_
names Sequence[str] - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early_
renewal_ inthours - ip_
addresses Sequence[str] - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is_
ca_ boolcertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - bool
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set_
subject_ boolkey_ id - Should the generated certificate include a subject key identifier (default:
false
). - subject
Self
Signed Cert Subject Args - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris Sequence[str]
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- allowed
Uses List<String> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - private
Key StringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - validity
Period NumberHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- dns
Names List<String> - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early
Renewal NumberHours - ip
Addresses List<String> - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is
Ca BooleanCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - Boolean
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set
Subject BooleanKey Id - Should the generated certificate include a subject key identifier (default:
false
). - subject Property Map
- The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris List<String>
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
Outputs
All input properties are implicitly available as output properties. Additionally, the SelfSignedCert resource produces the following output properties:
- Cert
Pem string - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - Id string
- The provider-assigned unique ID for this managed resource.
- Key
Algorithm string - Name of the algorithm used when generating the private key provided in
private_key_pem
. - Ready
For boolRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - Validity
End stringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- Validity
Start stringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- Cert
Pem string - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - Id string
- The provider-assigned unique ID for this managed resource.
- Key
Algorithm string - Name of the algorithm used when generating the private key provided in
private_key_pem
. - Ready
For boolRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - Validity
End stringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- Validity
Start stringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- cert
Pem String - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - id String
- The provider-assigned unique ID for this managed resource.
- key
Algorithm String - Name of the algorithm used when generating the private key provided in
private_key_pem
. - ready
For BooleanRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - validity
End StringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity
Start StringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- cert
Pem string - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - id string
- The provider-assigned unique ID for this managed resource.
- key
Algorithm string - Name of the algorithm used when generating the private key provided in
private_key_pem
. - ready
For booleanRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - validity
End stringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity
Start stringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- cert_
pem str - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - id str
- The provider-assigned unique ID for this managed resource.
- key_
algorithm str - Name of the algorithm used when generating the private key provided in
private_key_pem
. - ready_
for_ boolrenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - validity_
end_ strtime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity_
start_ strtime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- cert
Pem String - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - id String
- The provider-assigned unique ID for this managed resource.
- key
Algorithm String - Name of the algorithm used when generating the private key provided in
private_key_pem
. - ready
For BooleanRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - validity
End StringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity
Start StringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
Look up Existing SelfSignedCert Resource
Get an existing SelfSignedCert resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SelfSignedCertState, opts?: CustomResourceOptions): SelfSignedCert
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
allowed_uses: Optional[Sequence[str]] = None,
cert_pem: Optional[str] = None,
dns_names: Optional[Sequence[str]] = None,
early_renewal_hours: Optional[int] = None,
ip_addresses: Optional[Sequence[str]] = None,
is_ca_certificate: Optional[bool] = None,
key_algorithm: Optional[str] = None,
private_key_pem: Optional[str] = None,
ready_for_renewal: Optional[bool] = None,
set_authority_key_id: Optional[bool] = None,
set_subject_key_id: Optional[bool] = None,
subject: Optional[SelfSignedCertSubjectArgs] = None,
uris: Optional[Sequence[str]] = None,
validity_end_time: Optional[str] = None,
validity_period_hours: Optional[int] = None,
validity_start_time: Optional[str] = None) -> SelfSignedCert
func GetSelfSignedCert(ctx *Context, name string, id IDInput, state *SelfSignedCertState, opts ...ResourceOption) (*SelfSignedCert, error)
public static SelfSignedCert Get(string name, Input<string> id, SelfSignedCertState? state, CustomResourceOptions? opts = null)
public static SelfSignedCert get(String name, Output<String> id, SelfSignedCertState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Allowed
Uses List<string> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - Cert
Pem string - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - Dns
Names List<string> - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- Early
Renewal intHours - Ip
Addresses List<string> - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- Is
Ca boolCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - Key
Algorithm string - Name of the algorithm used when generating the private key provided in
private_key_pem
. - Private
Key stringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - Ready
For boolRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - bool
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - Set
Subject boolKey Id - Should the generated certificate include a subject key identifier (default:
false
). - Subject
Self
Signed Cert Subject - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- Uris List<string>
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- Validity
End stringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- Validity
Period intHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- Validity
Start stringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- Allowed
Uses []string - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - Cert
Pem string - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - Dns
Names []string - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- Early
Renewal intHours - Ip
Addresses []string - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- Is
Ca boolCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - Key
Algorithm string - Name of the algorithm used when generating the private key provided in
private_key_pem
. - Private
Key stringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - Ready
For boolRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - bool
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - Set
Subject boolKey Id - Should the generated certificate include a subject key identifier (default:
false
). - Subject
Self
Signed Cert Subject Args - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- Uris []string
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- Validity
End stringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- Validity
Period intHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- Validity
Start stringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- allowed
Uses List<String> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - cert
Pem String - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - dns
Names List<String> - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early
Renewal IntegerHours - ip
Addresses List<String> - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is
Ca BooleanCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - key
Algorithm String - Name of the algorithm used when generating the private key provided in
private_key_pem
. - private
Key StringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - ready
For BooleanRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - Boolean
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set
Subject BooleanKey Id - Should the generated certificate include a subject key identifier (default:
false
). - subject
Self
Signed Cert Subject - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris List<String>
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- validity
End StringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity
Period IntegerHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- validity
Start StringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- allowed
Uses string[] - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - cert
Pem string - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - dns
Names string[] - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early
Renewal numberHours - ip
Addresses string[] - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is
Ca booleanCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - key
Algorithm string - Name of the algorithm used when generating the private key provided in
private_key_pem
. - private
Key stringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - ready
For booleanRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - boolean
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set
Subject booleanKey Id - Should the generated certificate include a subject key identifier (default:
false
). - subject
Self
Signed Cert Subject - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris string[]
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- validity
End stringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity
Period numberHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- validity
Start stringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- allowed_
uses Sequence[str] - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - cert_
pem str - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - dns_
names Sequence[str] - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early_
renewal_ inthours - ip_
addresses Sequence[str] - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is_
ca_ boolcertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - key_
algorithm str - Name of the algorithm used when generating the private key provided in
private_key_pem
. - private_
key_ strpem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - ready_
for_ boolrenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - bool
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set_
subject_ boolkey_ id - Should the generated certificate include a subject key identifier (default:
false
). - subject
Self
Signed Cert Subject Args - The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris Sequence[str]
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- validity_
end_ strtime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity_
period_ inthours - Number of hours, after initial issuing, that the certificate will remain valid for.
- validity_
start_ strtime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
- allowed
Uses List<String> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - cert
Pem String - Certificate data in PEM (RFC 1421) format. NOTE: the underlying libraries that generate this value append a
\n
at the end of the PEM. In case this disrupts your use case, we recommend usingtrimspace()
. - dns
Names List<String> - List of DNS names for which a certificate is being requested (i.e. certificate subjects).
- early
Renewal NumberHours - ip
Addresses List<String> - List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
- is
Ca BooleanCertificate - Is the generated certificate representing a Certificate Authority (CA) (default:
false
). - key
Algorithm String - Name of the algorithm used when generating the private key provided in
private_key_pem
. - private
Key StringPem - Private key in PEM (RFC 1421) format, that the certificate will belong to. This can be read from a separate file using the
file
interpolation function. - ready
For BooleanRenewal - Is the certificate either expired (i.e. beyond the
validity_period_hours
) or ready for an early renewal (i.e. within theearly_renewal_hours
)? - Boolean
- Should the generated certificate include an authority key identifier: for self-signed certificates this is the same value as the subject key identifier (default:
false
). - set
Subject BooleanKey Id - Should the generated certificate include a subject key identifier (default:
false
). - subject Property Map
- The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
- uris List<String>
- List of URIs for which a certificate is being requested (i.e. certificate subjects).
- validity
End StringTime - The time until which the certificate is invalid, expressed as an RFC3339 timestamp.
- validity
Period NumberHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- validity
Start StringTime - The time after which the certificate is valid, expressed as an RFC3339 timestamp.
Supporting Types
SelfSignedCertSubject, SelfSignedCertSubjectArgs
- Common
Name string - Distinguished name:
CN
- Country string
- Distinguished name:
C
- Locality string
- Distinguished name:
L
- Organization string
- Distinguished name:
O
- Organizational
Unit string - Distinguished name:
OU
- Postal
Code string - Distinguished name:
PC
- Province string
- Distinguished name:
ST
- Serial
Number string - Distinguished name:
SERIALNUMBER
- Street
Addresses List<string> - Distinguished name:
STREET
- Common
Name string - Distinguished name:
CN
- Country string
- Distinguished name:
C
- Locality string
- Distinguished name:
L
- Organization string
- Distinguished name:
O
- Organizational
Unit string - Distinguished name:
OU
- Postal
Code string - Distinguished name:
PC
- Province string
- Distinguished name:
ST
- Serial
Number string - Distinguished name:
SERIALNUMBER
- Street
Addresses []string - Distinguished name:
STREET
- common
Name String - Distinguished name:
CN
- country String
- Distinguished name:
C
- locality String
- Distinguished name:
L
- organization String
- Distinguished name:
O
- organizational
Unit String - Distinguished name:
OU
- postal
Code String - Distinguished name:
PC
- province String
- Distinguished name:
ST
- serial
Number String - Distinguished name:
SERIALNUMBER
- street
Addresses List<String> - Distinguished name:
STREET
- common
Name string - Distinguished name:
CN
- country string
- Distinguished name:
C
- locality string
- Distinguished name:
L
- organization string
- Distinguished name:
O
- organizational
Unit string - Distinguished name:
OU
- postal
Code string - Distinguished name:
PC
- province string
- Distinguished name:
ST
- serial
Number string - Distinguished name:
SERIALNUMBER
- street
Addresses string[] - Distinguished name:
STREET
- common_
name str - Distinguished name:
CN
- country str
- Distinguished name:
C
- locality str
- Distinguished name:
L
- organization str
- Distinguished name:
O
- organizational_
unit str - Distinguished name:
OU
- postal_
code str - Distinguished name:
PC
- province str
- Distinguished name:
ST
- serial_
number str - Distinguished name:
SERIALNUMBER
- street_
addresses Sequence[str] - Distinguished name:
STREET
- common
Name String - Distinguished name:
CN
- country String
- Distinguished name:
C
- locality String
- Distinguished name:
L
- organization String
- Distinguished name:
O
- organizational
Unit String - Distinguished name:
OU
- postal
Code String - Distinguished name:
PC
- province String
- Distinguished name:
ST
- serial
Number String - Distinguished name:
SERIALNUMBER
- street
Addresses List<String> - Distinguished name:
STREET
Package Details
- Repository
- TLS pulumi/pulumi-tls
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
tls
Terraform Provider.