pulumi-tls 5.3.0a1753339655__py3-none-any.whl → 5.3.0a1753512319__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,23 +19,23 @@ __all__ = ['LocallySignedCertArgs', 'LocallySignedCert']
20
19
  @pulumi.input_type
21
20
  class LocallySignedCertArgs:
22
21
  def __init__(__self__, *,
23
- allowed_uses: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
24
- ca_cert_pem: pulumi.Input[builtins.str],
25
- ca_private_key_pem: pulumi.Input[builtins.str],
26
- cert_request_pem: pulumi.Input[builtins.str],
27
- validity_period_hours: pulumi.Input[builtins.int],
28
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
29
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
30
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None):
22
+ allowed_uses: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
+ ca_cert_pem: pulumi.Input[_builtins.str],
24
+ ca_private_key_pem: pulumi.Input[_builtins.str],
25
+ cert_request_pem: pulumi.Input[_builtins.str],
26
+ validity_period_hours: pulumi.Input[_builtins.int],
27
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
28
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
29
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None):
31
30
  """
32
31
  The set of arguments for constructing a LocallySignedCert resource.
33
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
34
- :param pulumi.Input[builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
35
- :param pulumi.Input[builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
36
- :param pulumi.Input[builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
37
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
38
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
39
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
32
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
33
+ :param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
34
+ :param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
35
+ :param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
36
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
37
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
38
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
40
39
  """
41
40
  pulumi.set(__self__, "allowed_uses", allowed_uses)
42
41
  pulumi.set(__self__, "ca_cert_pem", ca_cert_pem)
@@ -50,130 +49,130 @@ class LocallySignedCertArgs:
50
49
  if set_subject_key_id is not None:
51
50
  pulumi.set(__self__, "set_subject_key_id", set_subject_key_id)
52
51
 
53
- @property
52
+ @_builtins.property
54
53
  @pulumi.getter(name="allowedUses")
55
- def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
54
+ def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
56
55
  """
57
56
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
58
57
  """
59
58
  return pulumi.get(self, "allowed_uses")
60
59
 
61
60
  @allowed_uses.setter
62
- def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
61
+ def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
63
62
  pulumi.set(self, "allowed_uses", value)
64
63
 
65
- @property
64
+ @_builtins.property
66
65
  @pulumi.getter(name="caCertPem")
67
- def ca_cert_pem(self) -> pulumi.Input[builtins.str]:
66
+ def ca_cert_pem(self) -> pulumi.Input[_builtins.str]:
68
67
  """
69
68
  Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
70
69
  """
71
70
  return pulumi.get(self, "ca_cert_pem")
72
71
 
73
72
  @ca_cert_pem.setter
74
- def ca_cert_pem(self, value: pulumi.Input[builtins.str]):
73
+ def ca_cert_pem(self, value: pulumi.Input[_builtins.str]):
75
74
  pulumi.set(self, "ca_cert_pem", value)
76
75
 
77
- @property
76
+ @_builtins.property
78
77
  @pulumi.getter(name="caPrivateKeyPem")
79
- def ca_private_key_pem(self) -> pulumi.Input[builtins.str]:
78
+ def ca_private_key_pem(self) -> pulumi.Input[_builtins.str]:
80
79
  """
81
80
  Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
82
81
  """
83
82
  return pulumi.get(self, "ca_private_key_pem")
84
83
 
85
84
  @ca_private_key_pem.setter
86
- def ca_private_key_pem(self, value: pulumi.Input[builtins.str]):
85
+ def ca_private_key_pem(self, value: pulumi.Input[_builtins.str]):
87
86
  pulumi.set(self, "ca_private_key_pem", value)
88
87
 
89
- @property
88
+ @_builtins.property
90
89
  @pulumi.getter(name="certRequestPem")
91
- def cert_request_pem(self) -> pulumi.Input[builtins.str]:
90
+ def cert_request_pem(self) -> pulumi.Input[_builtins.str]:
92
91
  """
93
92
  Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
94
93
  """
95
94
  return pulumi.get(self, "cert_request_pem")
96
95
 
97
96
  @cert_request_pem.setter
98
- def cert_request_pem(self, value: pulumi.Input[builtins.str]):
97
+ def cert_request_pem(self, value: pulumi.Input[_builtins.str]):
99
98
  pulumi.set(self, "cert_request_pem", value)
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="validityPeriodHours")
103
- def validity_period_hours(self) -> pulumi.Input[builtins.int]:
102
+ def validity_period_hours(self) -> pulumi.Input[_builtins.int]:
104
103
  """
105
104
  Number of hours, after initial issuing, that the certificate will remain valid for.
106
105
  """
107
106
  return pulumi.get(self, "validity_period_hours")
108
107
 
109
108
  @validity_period_hours.setter
110
- def validity_period_hours(self, value: pulumi.Input[builtins.int]):
109
+ def validity_period_hours(self, value: pulumi.Input[_builtins.int]):
111
110
  pulumi.set(self, "validity_period_hours", value)
112
111
 
113
- @property
112
+ @_builtins.property
114
113
  @pulumi.getter(name="earlyRenewalHours")
115
- def early_renewal_hours(self) -> Optional[pulumi.Input[builtins.int]]:
114
+ def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
116
115
  return pulumi.get(self, "early_renewal_hours")
117
116
 
118
117
  @early_renewal_hours.setter
119
- def early_renewal_hours(self, value: Optional[pulumi.Input[builtins.int]]):
118
+ def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
120
119
  pulumi.set(self, "early_renewal_hours", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="isCaCertificate")
124
- def is_ca_certificate(self) -> Optional[pulumi.Input[builtins.bool]]:
123
+ def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
125
124
  """
126
125
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
127
126
  """
128
127
  return pulumi.get(self, "is_ca_certificate")
129
128
 
130
129
  @is_ca_certificate.setter
131
- def is_ca_certificate(self, value: Optional[pulumi.Input[builtins.bool]]):
130
+ def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
132
131
  pulumi.set(self, "is_ca_certificate", value)
133
132
 
134
- @property
133
+ @_builtins.property
135
134
  @pulumi.getter(name="setSubjectKeyId")
136
- def set_subject_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
135
+ def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
137
136
  """
138
137
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
139
138
  """
140
139
  return pulumi.get(self, "set_subject_key_id")
141
140
 
142
141
  @set_subject_key_id.setter
143
- def set_subject_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
142
+ def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
144
143
  pulumi.set(self, "set_subject_key_id", value)
145
144
 
146
145
 
147
146
  @pulumi.input_type
148
147
  class _LocallySignedCertState:
149
148
  def __init__(__self__, *,
150
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
151
- ca_cert_pem: Optional[pulumi.Input[builtins.str]] = None,
152
- ca_key_algorithm: Optional[pulumi.Input[builtins.str]] = None,
153
- ca_private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
154
- cert_pem: Optional[pulumi.Input[builtins.str]] = None,
155
- cert_request_pem: Optional[pulumi.Input[builtins.str]] = None,
156
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
157
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
158
- ready_for_renewal: Optional[pulumi.Input[builtins.bool]] = None,
159
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
160
- validity_end_time: Optional[pulumi.Input[builtins.str]] = None,
161
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
162
- validity_start_time: Optional[pulumi.Input[builtins.str]] = None):
149
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
150
+ ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
151
+ ca_key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
152
+ ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
153
+ cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
154
+ cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
155
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
156
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
157
+ ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
158
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
159
+ validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
160
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
161
+ validity_start_time: Optional[pulumi.Input[_builtins.str]] = None):
163
162
  """
164
163
  Input properties used for looking up and filtering LocallySignedCert resources.
165
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
166
- :param pulumi.Input[builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
167
- :param pulumi.Input[builtins.str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
168
- :param pulumi.Input[builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
169
- :param pulumi.Input[builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
170
- :param pulumi.Input[builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
171
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
172
- :param pulumi.Input[builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
173
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
174
- :param pulumi.Input[builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
175
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
176
- :param pulumi.Input[builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
164
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
165
+ :param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
166
+ :param pulumi.Input[_builtins.str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
167
+ :param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
168
+ :param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
169
+ :param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
170
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
171
+ :param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
172
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
173
+ :param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
174
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
175
+ :param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
177
176
  """
178
177
  if allowed_uses is not None:
179
178
  pulumi.set(__self__, "allowed_uses", allowed_uses)
@@ -202,157 +201,157 @@ class _LocallySignedCertState:
202
201
  if validity_start_time is not None:
203
202
  pulumi.set(__self__, "validity_start_time", validity_start_time)
204
203
 
205
- @property
204
+ @_builtins.property
206
205
  @pulumi.getter(name="allowedUses")
207
- def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
206
+ def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
207
  """
209
208
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
210
209
  """
211
210
  return pulumi.get(self, "allowed_uses")
212
211
 
213
212
  @allowed_uses.setter
214
- def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
213
+ def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
214
  pulumi.set(self, "allowed_uses", value)
216
215
 
217
- @property
216
+ @_builtins.property
218
217
  @pulumi.getter(name="caCertPem")
219
- def ca_cert_pem(self) -> Optional[pulumi.Input[builtins.str]]:
218
+ def ca_cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
220
219
  """
221
220
  Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
222
221
  """
223
222
  return pulumi.get(self, "ca_cert_pem")
224
223
 
225
224
  @ca_cert_pem.setter
226
- def ca_cert_pem(self, value: Optional[pulumi.Input[builtins.str]]):
225
+ def ca_cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
227
226
  pulumi.set(self, "ca_cert_pem", value)
228
227
 
229
- @property
228
+ @_builtins.property
230
229
  @pulumi.getter(name="caKeyAlgorithm")
231
- def ca_key_algorithm(self) -> Optional[pulumi.Input[builtins.str]]:
230
+ def ca_key_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
232
231
  """
233
232
  Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
234
233
  """
235
234
  return pulumi.get(self, "ca_key_algorithm")
236
235
 
237
236
  @ca_key_algorithm.setter
238
- def ca_key_algorithm(self, value: Optional[pulumi.Input[builtins.str]]):
237
+ def ca_key_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
239
238
  pulumi.set(self, "ca_key_algorithm", value)
240
239
 
241
- @property
240
+ @_builtins.property
242
241
  @pulumi.getter(name="caPrivateKeyPem")
243
- def ca_private_key_pem(self) -> Optional[pulumi.Input[builtins.str]]:
242
+ def ca_private_key_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
244
243
  """
245
244
  Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
246
245
  """
247
246
  return pulumi.get(self, "ca_private_key_pem")
248
247
 
249
248
  @ca_private_key_pem.setter
250
- def ca_private_key_pem(self, value: Optional[pulumi.Input[builtins.str]]):
249
+ def ca_private_key_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
251
250
  pulumi.set(self, "ca_private_key_pem", value)
252
251
 
253
- @property
252
+ @_builtins.property
254
253
  @pulumi.getter(name="certPem")
255
- def cert_pem(self) -> Optional[pulumi.Input[builtins.str]]:
254
+ def cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
256
255
  """
257
256
  Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
258
257
  """
259
258
  return pulumi.get(self, "cert_pem")
260
259
 
261
260
  @cert_pem.setter
262
- def cert_pem(self, value: Optional[pulumi.Input[builtins.str]]):
261
+ def cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
263
262
  pulumi.set(self, "cert_pem", value)
264
263
 
265
- @property
264
+ @_builtins.property
266
265
  @pulumi.getter(name="certRequestPem")
267
- def cert_request_pem(self) -> Optional[pulumi.Input[builtins.str]]:
266
+ def cert_request_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
268
267
  """
269
268
  Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
270
269
  """
271
270
  return pulumi.get(self, "cert_request_pem")
272
271
 
273
272
  @cert_request_pem.setter
274
- def cert_request_pem(self, value: Optional[pulumi.Input[builtins.str]]):
273
+ def cert_request_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
275
274
  pulumi.set(self, "cert_request_pem", value)
276
275
 
277
- @property
276
+ @_builtins.property
278
277
  @pulumi.getter(name="earlyRenewalHours")
279
- def early_renewal_hours(self) -> Optional[pulumi.Input[builtins.int]]:
278
+ def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
280
279
  return pulumi.get(self, "early_renewal_hours")
281
280
 
282
281
  @early_renewal_hours.setter
283
- def early_renewal_hours(self, value: Optional[pulumi.Input[builtins.int]]):
282
+ def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
284
283
  pulumi.set(self, "early_renewal_hours", value)
285
284
 
286
- @property
285
+ @_builtins.property
287
286
  @pulumi.getter(name="isCaCertificate")
288
- def is_ca_certificate(self) -> Optional[pulumi.Input[builtins.bool]]:
287
+ def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
289
288
  """
290
289
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
291
290
  """
292
291
  return pulumi.get(self, "is_ca_certificate")
293
292
 
294
293
  @is_ca_certificate.setter
295
- def is_ca_certificate(self, value: Optional[pulumi.Input[builtins.bool]]):
294
+ def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
296
295
  pulumi.set(self, "is_ca_certificate", value)
297
296
 
298
- @property
297
+ @_builtins.property
299
298
  @pulumi.getter(name="readyForRenewal")
300
- def ready_for_renewal(self) -> Optional[pulumi.Input[builtins.bool]]:
299
+ def ready_for_renewal(self) -> Optional[pulumi.Input[_builtins.bool]]:
301
300
  """
302
301
  Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
303
302
  """
304
303
  return pulumi.get(self, "ready_for_renewal")
305
304
 
306
305
  @ready_for_renewal.setter
307
- def ready_for_renewal(self, value: Optional[pulumi.Input[builtins.bool]]):
306
+ def ready_for_renewal(self, value: Optional[pulumi.Input[_builtins.bool]]):
308
307
  pulumi.set(self, "ready_for_renewal", value)
309
308
 
310
- @property
309
+ @_builtins.property
311
310
  @pulumi.getter(name="setSubjectKeyId")
312
- def set_subject_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
311
+ def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
313
312
  """
314
313
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
315
314
  """
316
315
  return pulumi.get(self, "set_subject_key_id")
317
316
 
318
317
  @set_subject_key_id.setter
319
- def set_subject_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
318
+ def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
320
319
  pulumi.set(self, "set_subject_key_id", value)
321
320
 
322
- @property
321
+ @_builtins.property
323
322
  @pulumi.getter(name="validityEndTime")
324
- def validity_end_time(self) -> Optional[pulumi.Input[builtins.str]]:
323
+ def validity_end_time(self) -> Optional[pulumi.Input[_builtins.str]]:
325
324
  """
326
325
  The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
327
326
  """
328
327
  return pulumi.get(self, "validity_end_time")
329
328
 
330
329
  @validity_end_time.setter
331
- def validity_end_time(self, value: Optional[pulumi.Input[builtins.str]]):
330
+ def validity_end_time(self, value: Optional[pulumi.Input[_builtins.str]]):
332
331
  pulumi.set(self, "validity_end_time", value)
333
332
 
334
- @property
333
+ @_builtins.property
335
334
  @pulumi.getter(name="validityPeriodHours")
336
- def validity_period_hours(self) -> Optional[pulumi.Input[builtins.int]]:
335
+ def validity_period_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
337
336
  """
338
337
  Number of hours, after initial issuing, that the certificate will remain valid for.
339
338
  """
340
339
  return pulumi.get(self, "validity_period_hours")
341
340
 
342
341
  @validity_period_hours.setter
343
- def validity_period_hours(self, value: Optional[pulumi.Input[builtins.int]]):
342
+ def validity_period_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
344
343
  pulumi.set(self, "validity_period_hours", value)
345
344
 
346
- @property
345
+ @_builtins.property
347
346
  @pulumi.getter(name="validityStartTime")
348
- def validity_start_time(self) -> Optional[pulumi.Input[builtins.str]]:
347
+ def validity_start_time(self) -> Optional[pulumi.Input[_builtins.str]]:
349
348
  """
350
349
  The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
351
350
  """
352
351
  return pulumi.get(self, "validity_start_time")
353
352
 
354
353
  @validity_start_time.setter
355
- def validity_start_time(self, value: Optional[pulumi.Input[builtins.str]]):
354
+ def validity_start_time(self, value: Optional[pulumi.Input[_builtins.str]]):
356
355
  pulumi.set(self, "validity_start_time", value)
357
356
 
358
357
 
@@ -362,26 +361,26 @@ class LocallySignedCert(pulumi.CustomResource):
362
361
  def __init__(__self__,
363
362
  resource_name: str,
364
363
  opts: Optional[pulumi.ResourceOptions] = None,
365
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
366
- ca_cert_pem: Optional[pulumi.Input[builtins.str]] = None,
367
- ca_private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
368
- cert_request_pem: Optional[pulumi.Input[builtins.str]] = None,
369
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
370
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
371
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
372
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
364
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
365
+ ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
366
+ ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
367
+ cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
368
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
369
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
370
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
371
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
373
372
  __props__=None):
374
373
  """
375
374
  Create a LocallySignedCert resource with the given unique name, props, and options.
376
375
  :param str resource_name: The name of the resource.
377
376
  :param pulumi.ResourceOptions opts: Options for the resource.
378
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
379
- :param pulumi.Input[builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
380
- :param pulumi.Input[builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
381
- :param pulumi.Input[builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
382
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
383
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
384
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
377
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
378
+ :param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
379
+ :param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
380
+ :param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
381
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
382
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
383
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
385
384
  """
386
385
  ...
387
386
  @overload
@@ -406,14 +405,14 @@ class LocallySignedCert(pulumi.CustomResource):
406
405
  def _internal_init(__self__,
407
406
  resource_name: str,
408
407
  opts: Optional[pulumi.ResourceOptions] = None,
409
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
410
- ca_cert_pem: Optional[pulumi.Input[builtins.str]] = None,
411
- ca_private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
412
- cert_request_pem: Optional[pulumi.Input[builtins.str]] = None,
413
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
414
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
415
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
416
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
408
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
409
+ ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
410
+ ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
411
+ cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
412
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
413
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
414
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
415
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
417
416
  __props__=None):
418
417
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
419
418
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -458,19 +457,19 @@ class LocallySignedCert(pulumi.CustomResource):
458
457
  def get(resource_name: str,
459
458
  id: pulumi.Input[str],
460
459
  opts: Optional[pulumi.ResourceOptions] = None,
461
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
462
- ca_cert_pem: Optional[pulumi.Input[builtins.str]] = None,
463
- ca_key_algorithm: Optional[pulumi.Input[builtins.str]] = None,
464
- ca_private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
465
- cert_pem: Optional[pulumi.Input[builtins.str]] = None,
466
- cert_request_pem: Optional[pulumi.Input[builtins.str]] = None,
467
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
468
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
469
- ready_for_renewal: Optional[pulumi.Input[builtins.bool]] = None,
470
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
471
- validity_end_time: Optional[pulumi.Input[builtins.str]] = None,
472
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
473
- validity_start_time: Optional[pulumi.Input[builtins.str]] = None) -> 'LocallySignedCert':
460
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
461
+ ca_cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
462
+ ca_key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
463
+ ca_private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
464
+ cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
465
+ cert_request_pem: Optional[pulumi.Input[_builtins.str]] = None,
466
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
467
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
468
+ ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
469
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
470
+ validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
471
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
472
+ validity_start_time: Optional[pulumi.Input[_builtins.str]] = None) -> 'LocallySignedCert':
474
473
  """
475
474
  Get an existing LocallySignedCert resource's state with the given name, id, and optional extra
476
475
  properties used to qualify the lookup.
@@ -478,18 +477,18 @@ class LocallySignedCert(pulumi.CustomResource):
478
477
  :param str resource_name: The unique name of the resulting resource.
479
478
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
480
479
  :param pulumi.ResourceOptions opts: Options for the resource.
481
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
482
- :param pulumi.Input[builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
483
- :param pulumi.Input[builtins.str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
484
- :param pulumi.Input[builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
485
- :param pulumi.Input[builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
486
- :param pulumi.Input[builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
487
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
488
- :param pulumi.Input[builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
489
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
490
- :param pulumi.Input[builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
491
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
492
- :param pulumi.Input[builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
480
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
481
+ :param pulumi.Input[_builtins.str] ca_cert_pem: Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
482
+ :param pulumi.Input[_builtins.str] ca_key_algorithm: Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
483
+ :param pulumi.Input[_builtins.str] ca_private_key_pem: Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
484
+ :param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
485
+ :param pulumi.Input[_builtins.str] cert_request_pem: Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
486
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
487
+ :param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
488
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
489
+ :param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
490
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
491
+ :param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
493
492
  """
494
493
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
495
494
 
@@ -510,102 +509,102 @@ class LocallySignedCert(pulumi.CustomResource):
510
509
  __props__.__dict__["validity_start_time"] = validity_start_time
511
510
  return LocallySignedCert(resource_name, opts=opts, __props__=__props__)
512
511
 
513
- @property
512
+ @_builtins.property
514
513
  @pulumi.getter(name="allowedUses")
515
- def allowed_uses(self) -> pulumi.Output[Sequence[builtins.str]]:
514
+ def allowed_uses(self) -> pulumi.Output[Sequence[_builtins.str]]:
516
515
  """
517
516
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
518
517
  """
519
518
  return pulumi.get(self, "allowed_uses")
520
519
 
521
- @property
520
+ @_builtins.property
522
521
  @pulumi.getter(name="caCertPem")
523
- def ca_cert_pem(self) -> pulumi.Output[builtins.str]:
522
+ def ca_cert_pem(self) -> pulumi.Output[_builtins.str]:
524
523
  """
525
524
  Certificate data of the Certificate Authority (CA) in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
526
525
  """
527
526
  return pulumi.get(self, "ca_cert_pem")
528
527
 
529
- @property
528
+ @_builtins.property
530
529
  @pulumi.getter(name="caKeyAlgorithm")
531
- def ca_key_algorithm(self) -> pulumi.Output[builtins.str]:
530
+ def ca_key_algorithm(self) -> pulumi.Output[_builtins.str]:
532
531
  """
533
532
  Name of the algorithm used when generating the private key provided in `ca_private_key_pem`.
534
533
  """
535
534
  return pulumi.get(self, "ca_key_algorithm")
536
535
 
537
- @property
536
+ @_builtins.property
538
537
  @pulumi.getter(name="caPrivateKeyPem")
539
- def ca_private_key_pem(self) -> pulumi.Output[builtins.str]:
538
+ def ca_private_key_pem(self) -> pulumi.Output[_builtins.str]:
540
539
  """
541
540
  Private key of the Certificate Authority (CA) used to sign the certificate, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
542
541
  """
543
542
  return pulumi.get(self, "ca_private_key_pem")
544
543
 
545
- @property
544
+ @_builtins.property
546
545
  @pulumi.getter(name="certPem")
547
- def cert_pem(self) -> pulumi.Output[builtins.str]:
546
+ def cert_pem(self) -> pulumi.Output[_builtins.str]:
548
547
  """
549
548
  Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
550
549
  """
551
550
  return pulumi.get(self, "cert_pem")
552
551
 
553
- @property
552
+ @_builtins.property
554
553
  @pulumi.getter(name="certRequestPem")
555
- def cert_request_pem(self) -> pulumi.Output[builtins.str]:
554
+ def cert_request_pem(self) -> pulumi.Output[_builtins.str]:
556
555
  """
557
556
  Certificate request data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format.
558
557
  """
559
558
  return pulumi.get(self, "cert_request_pem")
560
559
 
561
- @property
560
+ @_builtins.property
562
561
  @pulumi.getter(name="earlyRenewalHours")
563
- def early_renewal_hours(self) -> pulumi.Output[builtins.int]:
562
+ def early_renewal_hours(self) -> pulumi.Output[_builtins.int]:
564
563
  return pulumi.get(self, "early_renewal_hours")
565
564
 
566
- @property
565
+ @_builtins.property
567
566
  @pulumi.getter(name="isCaCertificate")
568
- def is_ca_certificate(self) -> pulumi.Output[builtins.bool]:
567
+ def is_ca_certificate(self) -> pulumi.Output[_builtins.bool]:
569
568
  """
570
569
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
571
570
  """
572
571
  return pulumi.get(self, "is_ca_certificate")
573
572
 
574
- @property
573
+ @_builtins.property
575
574
  @pulumi.getter(name="readyForRenewal")
576
- def ready_for_renewal(self) -> pulumi.Output[builtins.bool]:
575
+ def ready_for_renewal(self) -> pulumi.Output[_builtins.bool]:
577
576
  """
578
577
  Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
579
578
  """
580
579
  return pulumi.get(self, "ready_for_renewal")
581
580
 
582
- @property
581
+ @_builtins.property
583
582
  @pulumi.getter(name="setSubjectKeyId")
584
- def set_subject_key_id(self) -> pulumi.Output[builtins.bool]:
583
+ def set_subject_key_id(self) -> pulumi.Output[_builtins.bool]:
585
584
  """
586
585
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
587
586
  """
588
587
  return pulumi.get(self, "set_subject_key_id")
589
588
 
590
- @property
589
+ @_builtins.property
591
590
  @pulumi.getter(name="validityEndTime")
592
- def validity_end_time(self) -> pulumi.Output[builtins.str]:
591
+ def validity_end_time(self) -> pulumi.Output[_builtins.str]:
593
592
  """
594
593
  The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
595
594
  """
596
595
  return pulumi.get(self, "validity_end_time")
597
596
 
598
- @property
597
+ @_builtins.property
599
598
  @pulumi.getter(name="validityPeriodHours")
600
- def validity_period_hours(self) -> pulumi.Output[builtins.int]:
599
+ def validity_period_hours(self) -> pulumi.Output[_builtins.int]:
601
600
  """
602
601
  Number of hours, after initial issuing, that the certificate will remain valid for.
603
602
  """
604
603
  return pulumi.get(self, "validity_period_hours")
605
604
 
606
- @property
605
+ @_builtins.property
607
606
  @pulumi.getter(name="validityStartTime")
608
- def validity_start_time(self) -> pulumi.Output[builtins.str]:
607
+ def validity_start_time(self) -> pulumi.Output[_builtins.str]:
609
608
  """
610
609
  The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
611
610
  """