pulumi-tls 5.2.0a1745477258__py3-none-any.whl → 5.2.1a1753398320__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,9 +1,8 @@
1
1
  # coding=utf-8
2
- # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,29 +21,29 @@ __all__ = ['SelfSignedCertArgs', 'SelfSignedCert']
22
21
  @pulumi.input_type
23
22
  class SelfSignedCertArgs:
24
23
  def __init__(__self__, *,
25
- allowed_uses: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
26
- private_key_pem: pulumi.Input[builtins.str],
27
- validity_period_hours: pulumi.Input[builtins.int],
28
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
30
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
32
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
33
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
24
+ allowed_uses: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
25
+ private_key_pem: pulumi.Input[_builtins.str],
26
+ validity_period_hours: pulumi.Input[_builtins.int],
27
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
29
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
34
33
  subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
35
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
34
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
36
35
  """
37
36
  The set of arguments for constructing a SelfSignedCert resource.
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
39
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
40
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
41
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
42
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
43
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
44
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
45
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
38
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
39
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
40
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
41
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
42
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
43
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
44
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
46
45
  :param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
47
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
48
47
  """
49
48
  pulumi.set(__self__, "allowed_uses", allowed_uses)
50
49
  pulumi.set(__self__, "private_key_pem", private_key_pem)
@@ -66,112 +65,112 @@ class SelfSignedCertArgs:
66
65
  if uris is not None:
67
66
  pulumi.set(__self__, "uris", uris)
68
67
 
69
- @property
68
+ @_builtins.property
70
69
  @pulumi.getter(name="allowedUses")
71
- def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
70
+ def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
72
71
  """
73
72
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
74
73
  """
75
74
  return pulumi.get(self, "allowed_uses")
76
75
 
77
76
  @allowed_uses.setter
78
- def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
77
+ def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
79
78
  pulumi.set(self, "allowed_uses", value)
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter(name="privateKeyPem")
83
- def private_key_pem(self) -> pulumi.Input[builtins.str]:
82
+ def private_key_pem(self) -> pulumi.Input[_builtins.str]:
84
83
  """
85
84
  Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
86
85
  """
87
86
  return pulumi.get(self, "private_key_pem")
88
87
 
89
88
  @private_key_pem.setter
90
- def private_key_pem(self, value: pulumi.Input[builtins.str]):
89
+ def private_key_pem(self, value: pulumi.Input[_builtins.str]):
91
90
  pulumi.set(self, "private_key_pem", value)
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter(name="validityPeriodHours")
95
- def validity_period_hours(self) -> pulumi.Input[builtins.int]:
94
+ def validity_period_hours(self) -> pulumi.Input[_builtins.int]:
96
95
  """
97
96
  Number of hours, after initial issuing, that the certificate will remain valid for.
98
97
  """
99
98
  return pulumi.get(self, "validity_period_hours")
100
99
 
101
100
  @validity_period_hours.setter
102
- def validity_period_hours(self, value: pulumi.Input[builtins.int]):
101
+ def validity_period_hours(self, value: pulumi.Input[_builtins.int]):
103
102
  pulumi.set(self, "validity_period_hours", value)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter(name="dnsNames")
107
- def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
106
+ def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
108
107
  """
109
108
  List of DNS names for which a certificate is being requested (i.e. certificate subjects).
110
109
  """
111
110
  return pulumi.get(self, "dns_names")
112
111
 
113
112
  @dns_names.setter
114
- def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
113
+ def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
115
114
  pulumi.set(self, "dns_names", value)
116
115
 
117
- @property
116
+ @_builtins.property
118
117
  @pulumi.getter(name="earlyRenewalHours")
119
- def early_renewal_hours(self) -> Optional[pulumi.Input[builtins.int]]:
118
+ def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
120
119
  return pulumi.get(self, "early_renewal_hours")
121
120
 
122
121
  @early_renewal_hours.setter
123
- def early_renewal_hours(self, value: Optional[pulumi.Input[builtins.int]]):
122
+ def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
124
123
  pulumi.set(self, "early_renewal_hours", value)
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter(name="ipAddresses")
128
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
127
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
129
128
  """
130
129
  List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
131
130
  """
132
131
  return pulumi.get(self, "ip_addresses")
133
132
 
134
133
  @ip_addresses.setter
135
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
134
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
136
135
  pulumi.set(self, "ip_addresses", value)
137
136
 
138
- @property
137
+ @_builtins.property
139
138
  @pulumi.getter(name="isCaCertificate")
140
- def is_ca_certificate(self) -> Optional[pulumi.Input[builtins.bool]]:
139
+ def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
141
140
  """
142
141
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
143
142
  """
144
143
  return pulumi.get(self, "is_ca_certificate")
145
144
 
146
145
  @is_ca_certificate.setter
147
- def is_ca_certificate(self, value: Optional[pulumi.Input[builtins.bool]]):
146
+ def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
148
147
  pulumi.set(self, "is_ca_certificate", value)
149
148
 
150
- @property
149
+ @_builtins.property
151
150
  @pulumi.getter(name="setAuthorityKeyId")
152
- def set_authority_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
151
+ def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
153
152
  """
154
153
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
155
154
  """
156
155
  return pulumi.get(self, "set_authority_key_id")
157
156
 
158
157
  @set_authority_key_id.setter
159
- def set_authority_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
158
+ def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
160
159
  pulumi.set(self, "set_authority_key_id", value)
161
160
 
162
- @property
161
+ @_builtins.property
163
162
  @pulumi.getter(name="setSubjectKeyId")
164
- def set_subject_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
163
+ def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
165
164
  """
166
165
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
167
166
  """
168
167
  return pulumi.get(self, "set_subject_key_id")
169
168
 
170
169
  @set_subject_key_id.setter
171
- def set_subject_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
170
+ def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
172
171
  pulumi.set(self, "set_subject_key_id", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter
176
175
  def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
177
176
  """
@@ -183,55 +182,55 @@ class SelfSignedCertArgs:
183
182
  def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
184
183
  pulumi.set(self, "subject", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter
188
- def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
187
+ def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
189
188
  """
190
189
  List of URIs for which a certificate is being requested (i.e. certificate subjects).
191
190
  """
192
191
  return pulumi.get(self, "uris")
193
192
 
194
193
  @uris.setter
195
- def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
194
+ def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
196
195
  pulumi.set(self, "uris", value)
197
196
 
198
197
 
199
198
  @pulumi.input_type
200
199
  class _SelfSignedCertState:
201
200
  def __init__(__self__, *,
202
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
203
- cert_pem: Optional[pulumi.Input[builtins.str]] = None,
204
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
205
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
206
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
207
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
208
- key_algorithm: Optional[pulumi.Input[builtins.str]] = None,
209
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
210
- ready_for_renewal: Optional[pulumi.Input[builtins.bool]] = None,
211
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
212
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
201
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
202
+ cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
203
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
204
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
205
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
206
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
207
+ key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
208
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
209
+ ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
210
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
211
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
213
212
  subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
214
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
215
- validity_end_time: Optional[pulumi.Input[builtins.str]] = None,
216
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
217
- validity_start_time: Optional[pulumi.Input[builtins.str]] = None):
213
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
214
+ validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
215
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
216
+ validity_start_time: Optional[pulumi.Input[_builtins.str]] = None):
218
217
  """
219
218
  Input properties used for looking up and filtering SelfSignedCert resources.
220
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
221
- :param pulumi.Input[builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
222
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
223
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
224
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
225
- :param pulumi.Input[builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
226
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
227
- :param pulumi.Input[builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
228
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
229
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
220
+ :param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
221
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
222
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
223
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
224
+ :param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
225
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
226
+ :param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
227
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
228
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
230
229
  :param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
231
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
232
- :param pulumi.Input[builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
233
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
234
- :param pulumi.Input[builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
230
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
231
+ :param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
232
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
233
+ :param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
235
234
  """
236
235
  if allowed_uses is not None:
237
236
  pulumi.set(__self__, "allowed_uses", allowed_uses)
@@ -266,136 +265,136 @@ class _SelfSignedCertState:
266
265
  if validity_start_time is not None:
267
266
  pulumi.set(__self__, "validity_start_time", validity_start_time)
268
267
 
269
- @property
268
+ @_builtins.property
270
269
  @pulumi.getter(name="allowedUses")
271
- def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
270
+ def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
272
271
  """
273
272
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
274
273
  """
275
274
  return pulumi.get(self, "allowed_uses")
276
275
 
277
276
  @allowed_uses.setter
278
- def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
277
+ def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
279
278
  pulumi.set(self, "allowed_uses", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="certPem")
283
- def cert_pem(self) -> Optional[pulumi.Input[builtins.str]]:
282
+ def cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
284
283
  """
285
284
  Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
286
285
  """
287
286
  return pulumi.get(self, "cert_pem")
288
287
 
289
288
  @cert_pem.setter
290
- def cert_pem(self, value: Optional[pulumi.Input[builtins.str]]):
289
+ def cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
291
290
  pulumi.set(self, "cert_pem", value)
292
291
 
293
- @property
292
+ @_builtins.property
294
293
  @pulumi.getter(name="dnsNames")
295
- def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
294
+ def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
296
295
  """
297
296
  List of DNS names for which a certificate is being requested (i.e. certificate subjects).
298
297
  """
299
298
  return pulumi.get(self, "dns_names")
300
299
 
301
300
  @dns_names.setter
302
- def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
301
+ def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
303
302
  pulumi.set(self, "dns_names", value)
304
303
 
305
- @property
304
+ @_builtins.property
306
305
  @pulumi.getter(name="earlyRenewalHours")
307
- def early_renewal_hours(self) -> Optional[pulumi.Input[builtins.int]]:
306
+ def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
308
307
  return pulumi.get(self, "early_renewal_hours")
309
308
 
310
309
  @early_renewal_hours.setter
311
- def early_renewal_hours(self, value: Optional[pulumi.Input[builtins.int]]):
310
+ def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
312
311
  pulumi.set(self, "early_renewal_hours", value)
313
312
 
314
- @property
313
+ @_builtins.property
315
314
  @pulumi.getter(name="ipAddresses")
316
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
315
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
317
316
  """
318
317
  List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
319
318
  """
320
319
  return pulumi.get(self, "ip_addresses")
321
320
 
322
321
  @ip_addresses.setter
323
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
322
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
324
323
  pulumi.set(self, "ip_addresses", value)
325
324
 
326
- @property
325
+ @_builtins.property
327
326
  @pulumi.getter(name="isCaCertificate")
328
- def is_ca_certificate(self) -> Optional[pulumi.Input[builtins.bool]]:
327
+ def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
329
328
  """
330
329
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
331
330
  """
332
331
  return pulumi.get(self, "is_ca_certificate")
333
332
 
334
333
  @is_ca_certificate.setter
335
- def is_ca_certificate(self, value: Optional[pulumi.Input[builtins.bool]]):
334
+ def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
336
335
  pulumi.set(self, "is_ca_certificate", value)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter(name="keyAlgorithm")
340
- def key_algorithm(self) -> Optional[pulumi.Input[builtins.str]]:
339
+ def key_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
341
340
  """
342
341
  Name of the algorithm used when generating the private key provided in `private_key_pem`.
343
342
  """
344
343
  return pulumi.get(self, "key_algorithm")
345
344
 
346
345
  @key_algorithm.setter
347
- def key_algorithm(self, value: Optional[pulumi.Input[builtins.str]]):
346
+ def key_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
348
347
  pulumi.set(self, "key_algorithm", value)
349
348
 
350
- @property
349
+ @_builtins.property
351
350
  @pulumi.getter(name="privateKeyPem")
352
- def private_key_pem(self) -> Optional[pulumi.Input[builtins.str]]:
351
+ def private_key_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
353
352
  """
354
353
  Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
355
354
  """
356
355
  return pulumi.get(self, "private_key_pem")
357
356
 
358
357
  @private_key_pem.setter
359
- def private_key_pem(self, value: Optional[pulumi.Input[builtins.str]]):
358
+ def private_key_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
360
359
  pulumi.set(self, "private_key_pem", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="readyForRenewal")
364
- def ready_for_renewal(self) -> Optional[pulumi.Input[builtins.bool]]:
363
+ def ready_for_renewal(self) -> Optional[pulumi.Input[_builtins.bool]]:
365
364
  """
366
365
  Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
367
366
  """
368
367
  return pulumi.get(self, "ready_for_renewal")
369
368
 
370
369
  @ready_for_renewal.setter
371
- def ready_for_renewal(self, value: Optional[pulumi.Input[builtins.bool]]):
370
+ def ready_for_renewal(self, value: Optional[pulumi.Input[_builtins.bool]]):
372
371
  pulumi.set(self, "ready_for_renewal", value)
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter(name="setAuthorityKeyId")
376
- def set_authority_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
375
+ def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
377
376
  """
378
377
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
379
378
  """
380
379
  return pulumi.get(self, "set_authority_key_id")
381
380
 
382
381
  @set_authority_key_id.setter
383
- def set_authority_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
382
+ def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
384
383
  pulumi.set(self, "set_authority_key_id", value)
385
384
 
386
- @property
385
+ @_builtins.property
387
386
  @pulumi.getter(name="setSubjectKeyId")
388
- def set_subject_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
387
+ def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
389
388
  """
390
389
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
391
390
  """
392
391
  return pulumi.get(self, "set_subject_key_id")
393
392
 
394
393
  @set_subject_key_id.setter
395
- def set_subject_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
394
+ def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
396
395
  pulumi.set(self, "set_subject_key_id", value)
397
396
 
398
- @property
397
+ @_builtins.property
399
398
  @pulumi.getter
400
399
  def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
401
400
  """
@@ -407,86 +406,87 @@ class _SelfSignedCertState:
407
406
  def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
408
407
  pulumi.set(self, "subject", value)
409
408
 
410
- @property
409
+ @_builtins.property
411
410
  @pulumi.getter
412
- def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
411
+ def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
413
412
  """
414
413
  List of URIs for which a certificate is being requested (i.e. certificate subjects).
415
414
  """
416
415
  return pulumi.get(self, "uris")
417
416
 
418
417
  @uris.setter
419
- def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
418
+ def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
420
419
  pulumi.set(self, "uris", value)
421
420
 
422
- @property
421
+ @_builtins.property
423
422
  @pulumi.getter(name="validityEndTime")
424
- def validity_end_time(self) -> Optional[pulumi.Input[builtins.str]]:
423
+ def validity_end_time(self) -> Optional[pulumi.Input[_builtins.str]]:
425
424
  """
426
425
  The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
427
426
  """
428
427
  return pulumi.get(self, "validity_end_time")
429
428
 
430
429
  @validity_end_time.setter
431
- def validity_end_time(self, value: Optional[pulumi.Input[builtins.str]]):
430
+ def validity_end_time(self, value: Optional[pulumi.Input[_builtins.str]]):
432
431
  pulumi.set(self, "validity_end_time", value)
433
432
 
434
- @property
433
+ @_builtins.property
435
434
  @pulumi.getter(name="validityPeriodHours")
436
- def validity_period_hours(self) -> Optional[pulumi.Input[builtins.int]]:
435
+ def validity_period_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
437
436
  """
438
437
  Number of hours, after initial issuing, that the certificate will remain valid for.
439
438
  """
440
439
  return pulumi.get(self, "validity_period_hours")
441
440
 
442
441
  @validity_period_hours.setter
443
- def validity_period_hours(self, value: Optional[pulumi.Input[builtins.int]]):
442
+ def validity_period_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
444
443
  pulumi.set(self, "validity_period_hours", value)
445
444
 
446
- @property
445
+ @_builtins.property
447
446
  @pulumi.getter(name="validityStartTime")
448
- def validity_start_time(self) -> Optional[pulumi.Input[builtins.str]]:
447
+ def validity_start_time(self) -> Optional[pulumi.Input[_builtins.str]]:
449
448
  """
450
449
  The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
451
450
  """
452
451
  return pulumi.get(self, "validity_start_time")
453
452
 
454
453
  @validity_start_time.setter
455
- def validity_start_time(self, value: Optional[pulumi.Input[builtins.str]]):
454
+ def validity_start_time(self, value: Optional[pulumi.Input[_builtins.str]]):
456
455
  pulumi.set(self, "validity_start_time", value)
457
456
 
458
457
 
458
+ @pulumi.type_token("tls:index/selfSignedCert:SelfSignedCert")
459
459
  class SelfSignedCert(pulumi.CustomResource):
460
460
  @overload
461
461
  def __init__(__self__,
462
462
  resource_name: str,
463
463
  opts: Optional[pulumi.ResourceOptions] = None,
464
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
465
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
466
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
467
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
468
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
469
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
470
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
471
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
464
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
465
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
466
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
467
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
468
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
469
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
470
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
471
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
472
472
  subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
473
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
474
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
473
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
474
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
475
475
  __props__=None):
476
476
  """
477
477
  Create a SelfSignedCert resource with the given unique name, props, and options.
478
478
  :param str resource_name: The name of the resource.
479
479
  :param pulumi.ResourceOptions opts: Options for the resource.
480
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
481
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
482
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
483
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
484
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
485
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
486
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
480
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
481
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
482
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
483
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
484
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
485
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
486
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
487
487
  :param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
488
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
489
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
488
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
489
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
490
490
  """
491
491
  ...
492
492
  @overload
@@ -511,17 +511,17 @@ class SelfSignedCert(pulumi.CustomResource):
511
511
  def _internal_init(__self__,
512
512
  resource_name: str,
513
513
  opts: Optional[pulumi.ResourceOptions] = None,
514
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
515
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
516
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
517
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
518
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
519
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
520
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
521
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
514
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
515
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
516
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
517
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
518
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
519
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
520
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
521
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
522
522
  subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
523
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
524
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
523
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
524
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
525
525
  __props__=None):
526
526
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
527
527
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -565,22 +565,22 @@ class SelfSignedCert(pulumi.CustomResource):
565
565
  def get(resource_name: str,
566
566
  id: pulumi.Input[str],
567
567
  opts: Optional[pulumi.ResourceOptions] = None,
568
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
569
- cert_pem: Optional[pulumi.Input[builtins.str]] = None,
570
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
571
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
572
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
573
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
574
- key_algorithm: Optional[pulumi.Input[builtins.str]] = None,
575
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
576
- ready_for_renewal: Optional[pulumi.Input[builtins.bool]] = None,
577
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
578
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
568
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
569
+ cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
570
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
571
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
572
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
573
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
574
+ key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
575
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
576
+ ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
577
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
578
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
579
579
  subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
580
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
581
- validity_end_time: Optional[pulumi.Input[builtins.str]] = None,
582
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
583
- validity_start_time: Optional[pulumi.Input[builtins.str]] = None) -> 'SelfSignedCert':
580
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
581
+ validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
582
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
583
+ validity_start_time: Optional[pulumi.Input[_builtins.str]] = None) -> 'SelfSignedCert':
584
584
  """
585
585
  Get an existing SelfSignedCert resource's state with the given name, id, and optional extra
586
586
  properties used to qualify the lookup.
@@ -588,21 +588,21 @@ class SelfSignedCert(pulumi.CustomResource):
588
588
  :param str resource_name: The unique name of the resulting resource.
589
589
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
590
590
  :param pulumi.ResourceOptions opts: Options for the resource.
591
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
592
- :param pulumi.Input[builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
593
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
594
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
595
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
596
- :param pulumi.Input[builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
597
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
598
- :param pulumi.Input[builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
599
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
600
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
591
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
592
+ :param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
593
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
594
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
595
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
596
+ :param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
597
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
598
+ :param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
599
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
600
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
601
601
  :param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
602
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
603
- :param pulumi.Input[builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
604
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
605
- :param pulumi.Input[builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
602
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
603
+ :param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
604
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
605
+ :param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
606
606
  """
607
607
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
608
608
 
@@ -626,92 +626,92 @@ class SelfSignedCert(pulumi.CustomResource):
626
626
  __props__.__dict__["validity_start_time"] = validity_start_time
627
627
  return SelfSignedCert(resource_name, opts=opts, __props__=__props__)
628
628
 
629
- @property
629
+ @_builtins.property
630
630
  @pulumi.getter(name="allowedUses")
631
- def allowed_uses(self) -> pulumi.Output[Sequence[builtins.str]]:
631
+ def allowed_uses(self) -> pulumi.Output[Sequence[_builtins.str]]:
632
632
  """
633
633
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
634
634
  """
635
635
  return pulumi.get(self, "allowed_uses")
636
636
 
637
- @property
637
+ @_builtins.property
638
638
  @pulumi.getter(name="certPem")
639
- def cert_pem(self) -> pulumi.Output[builtins.str]:
639
+ def cert_pem(self) -> pulumi.Output[_builtins.str]:
640
640
  """
641
641
  Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
642
642
  """
643
643
  return pulumi.get(self, "cert_pem")
644
644
 
645
- @property
645
+ @_builtins.property
646
646
  @pulumi.getter(name="dnsNames")
647
- def dns_names(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
647
+ def dns_names(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
648
648
  """
649
649
  List of DNS names for which a certificate is being requested (i.e. certificate subjects).
650
650
  """
651
651
  return pulumi.get(self, "dns_names")
652
652
 
653
- @property
653
+ @_builtins.property
654
654
  @pulumi.getter(name="earlyRenewalHours")
655
- def early_renewal_hours(self) -> pulumi.Output[builtins.int]:
655
+ def early_renewal_hours(self) -> pulumi.Output[_builtins.int]:
656
656
  return pulumi.get(self, "early_renewal_hours")
657
657
 
658
- @property
658
+ @_builtins.property
659
659
  @pulumi.getter(name="ipAddresses")
660
- def ip_addresses(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
660
+ def ip_addresses(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
661
661
  """
662
662
  List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
663
663
  """
664
664
  return pulumi.get(self, "ip_addresses")
665
665
 
666
- @property
666
+ @_builtins.property
667
667
  @pulumi.getter(name="isCaCertificate")
668
- def is_ca_certificate(self) -> pulumi.Output[builtins.bool]:
668
+ def is_ca_certificate(self) -> pulumi.Output[_builtins.bool]:
669
669
  """
670
670
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
671
671
  """
672
672
  return pulumi.get(self, "is_ca_certificate")
673
673
 
674
- @property
674
+ @_builtins.property
675
675
  @pulumi.getter(name="keyAlgorithm")
676
- def key_algorithm(self) -> pulumi.Output[builtins.str]:
676
+ def key_algorithm(self) -> pulumi.Output[_builtins.str]:
677
677
  """
678
678
  Name of the algorithm used when generating the private key provided in `private_key_pem`.
679
679
  """
680
680
  return pulumi.get(self, "key_algorithm")
681
681
 
682
- @property
682
+ @_builtins.property
683
683
  @pulumi.getter(name="privateKeyPem")
684
- def private_key_pem(self) -> pulumi.Output[builtins.str]:
684
+ def private_key_pem(self) -> pulumi.Output[_builtins.str]:
685
685
  """
686
686
  Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
687
687
  """
688
688
  return pulumi.get(self, "private_key_pem")
689
689
 
690
- @property
690
+ @_builtins.property
691
691
  @pulumi.getter(name="readyForRenewal")
692
- def ready_for_renewal(self) -> pulumi.Output[builtins.bool]:
692
+ def ready_for_renewal(self) -> pulumi.Output[_builtins.bool]:
693
693
  """
694
694
  Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
695
695
  """
696
696
  return pulumi.get(self, "ready_for_renewal")
697
697
 
698
- @property
698
+ @_builtins.property
699
699
  @pulumi.getter(name="setAuthorityKeyId")
700
- def set_authority_key_id(self) -> pulumi.Output[builtins.bool]:
700
+ def set_authority_key_id(self) -> pulumi.Output[_builtins.bool]:
701
701
  """
702
702
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
703
703
  """
704
704
  return pulumi.get(self, "set_authority_key_id")
705
705
 
706
- @property
706
+ @_builtins.property
707
707
  @pulumi.getter(name="setSubjectKeyId")
708
- def set_subject_key_id(self) -> pulumi.Output[builtins.bool]:
708
+ def set_subject_key_id(self) -> pulumi.Output[_builtins.bool]:
709
709
  """
710
710
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
711
711
  """
712
712
  return pulumi.get(self, "set_subject_key_id")
713
713
 
714
- @property
714
+ @_builtins.property
715
715
  @pulumi.getter
716
716
  def subject(self) -> pulumi.Output[Optional['outputs.SelfSignedCertSubject']]:
717
717
  """
@@ -719,33 +719,33 @@ class SelfSignedCert(pulumi.CustomResource):
719
719
  """
720
720
  return pulumi.get(self, "subject")
721
721
 
722
- @property
722
+ @_builtins.property
723
723
  @pulumi.getter
724
- def uris(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
724
+ def uris(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
725
725
  """
726
726
  List of URIs for which a certificate is being requested (i.e. certificate subjects).
727
727
  """
728
728
  return pulumi.get(self, "uris")
729
729
 
730
- @property
730
+ @_builtins.property
731
731
  @pulumi.getter(name="validityEndTime")
732
- def validity_end_time(self) -> pulumi.Output[builtins.str]:
732
+ def validity_end_time(self) -> pulumi.Output[_builtins.str]:
733
733
  """
734
734
  The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
735
735
  """
736
736
  return pulumi.get(self, "validity_end_time")
737
737
 
738
- @property
738
+ @_builtins.property
739
739
  @pulumi.getter(name="validityPeriodHours")
740
- def validity_period_hours(self) -> pulumi.Output[builtins.int]:
740
+ def validity_period_hours(self) -> pulumi.Output[_builtins.int]:
741
741
  """
742
742
  Number of hours, after initial issuing, that the certificate will remain valid for.
743
743
  """
744
744
  return pulumi.get(self, "validity_period_hours")
745
745
 
746
- @property
746
+ @_builtins.property
747
747
  @pulumi.getter(name="validityStartTime")
748
- def validity_start_time(self) -> pulumi.Output[builtins.str]:
748
+ def validity_start_time(self) -> pulumi.Output[_builtins.str]:
749
749
  """
750
750
  The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
751
751
  """