pulumi-tls 5.3.0a1753339655__py3-none-any.whl → 5.3.0a1754463206__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,29 +21,29 @@ __all__ = ['SelfSignedCertArgs', 'SelfSignedCert']
22
21
  @pulumi.input_type
23
22
  class SelfSignedCertArgs:
24
23
  def __init__(__self__, *,
25
- allowed_uses: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
26
- private_key_pem: pulumi.Input[builtins.str],
27
- validity_period_hours: pulumi.Input[builtins.int],
28
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
30
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
31
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
32
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
33
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
24
+ allowed_uses: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
25
+ private_key_pem: pulumi.Input[_builtins.str],
26
+ validity_period_hours: pulumi.Input[_builtins.int],
27
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
29
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
34
33
  subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
35
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
34
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
36
35
  """
37
36
  The set of arguments for constructing a SelfSignedCert resource.
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
39
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
40
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
41
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
42
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
43
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
44
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
45
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
38
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
39
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
40
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
41
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
42
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
43
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
44
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
46
45
  :param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
47
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
48
47
  """
49
48
  pulumi.set(__self__, "allowed_uses", allowed_uses)
50
49
  pulumi.set(__self__, "private_key_pem", private_key_pem)
@@ -66,112 +65,112 @@ class SelfSignedCertArgs:
66
65
  if uris is not None:
67
66
  pulumi.set(__self__, "uris", uris)
68
67
 
69
- @property
68
+ @_builtins.property
70
69
  @pulumi.getter(name="allowedUses")
71
- def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
70
+ def allowed_uses(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
72
71
  """
73
72
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
74
73
  """
75
74
  return pulumi.get(self, "allowed_uses")
76
75
 
77
76
  @allowed_uses.setter
78
- def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
77
+ def allowed_uses(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
79
78
  pulumi.set(self, "allowed_uses", value)
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter(name="privateKeyPem")
83
- def private_key_pem(self) -> pulumi.Input[builtins.str]:
82
+ def private_key_pem(self) -> pulumi.Input[_builtins.str]:
84
83
  """
85
84
  Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
86
85
  """
87
86
  return pulumi.get(self, "private_key_pem")
88
87
 
89
88
  @private_key_pem.setter
90
- def private_key_pem(self, value: pulumi.Input[builtins.str]):
89
+ def private_key_pem(self, value: pulumi.Input[_builtins.str]):
91
90
  pulumi.set(self, "private_key_pem", value)
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter(name="validityPeriodHours")
95
- def validity_period_hours(self) -> pulumi.Input[builtins.int]:
94
+ def validity_period_hours(self) -> pulumi.Input[_builtins.int]:
96
95
  """
97
96
  Number of hours, after initial issuing, that the certificate will remain valid for.
98
97
  """
99
98
  return pulumi.get(self, "validity_period_hours")
100
99
 
101
100
  @validity_period_hours.setter
102
- def validity_period_hours(self, value: pulumi.Input[builtins.int]):
101
+ def validity_period_hours(self, value: pulumi.Input[_builtins.int]):
103
102
  pulumi.set(self, "validity_period_hours", value)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter(name="dnsNames")
107
- def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
106
+ def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
108
107
  """
109
108
  List of DNS names for which a certificate is being requested (i.e. certificate subjects).
110
109
  """
111
110
  return pulumi.get(self, "dns_names")
112
111
 
113
112
  @dns_names.setter
114
- def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
113
+ def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
115
114
  pulumi.set(self, "dns_names", value)
116
115
 
117
- @property
116
+ @_builtins.property
118
117
  @pulumi.getter(name="earlyRenewalHours")
119
- def early_renewal_hours(self) -> Optional[pulumi.Input[builtins.int]]:
118
+ def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
120
119
  return pulumi.get(self, "early_renewal_hours")
121
120
 
122
121
  @early_renewal_hours.setter
123
- def early_renewal_hours(self, value: Optional[pulumi.Input[builtins.int]]):
122
+ def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
124
123
  pulumi.set(self, "early_renewal_hours", value)
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter(name="ipAddresses")
128
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
127
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
129
128
  """
130
129
  List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
131
130
  """
132
131
  return pulumi.get(self, "ip_addresses")
133
132
 
134
133
  @ip_addresses.setter
135
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
134
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
136
135
  pulumi.set(self, "ip_addresses", value)
137
136
 
138
- @property
137
+ @_builtins.property
139
138
  @pulumi.getter(name="isCaCertificate")
140
- def is_ca_certificate(self) -> Optional[pulumi.Input[builtins.bool]]:
139
+ def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
141
140
  """
142
141
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
143
142
  """
144
143
  return pulumi.get(self, "is_ca_certificate")
145
144
 
146
145
  @is_ca_certificate.setter
147
- def is_ca_certificate(self, value: Optional[pulumi.Input[builtins.bool]]):
146
+ def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
148
147
  pulumi.set(self, "is_ca_certificate", value)
149
148
 
150
- @property
149
+ @_builtins.property
151
150
  @pulumi.getter(name="setAuthorityKeyId")
152
- def set_authority_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
151
+ def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
153
152
  """
154
153
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
155
154
  """
156
155
  return pulumi.get(self, "set_authority_key_id")
157
156
 
158
157
  @set_authority_key_id.setter
159
- def set_authority_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
158
+ def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
160
159
  pulumi.set(self, "set_authority_key_id", value)
161
160
 
162
- @property
161
+ @_builtins.property
163
162
  @pulumi.getter(name="setSubjectKeyId")
164
- def set_subject_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
163
+ def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
165
164
  """
166
165
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
167
166
  """
168
167
  return pulumi.get(self, "set_subject_key_id")
169
168
 
170
169
  @set_subject_key_id.setter
171
- def set_subject_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
170
+ def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
172
171
  pulumi.set(self, "set_subject_key_id", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter
176
175
  def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
177
176
  """
@@ -183,55 +182,55 @@ class SelfSignedCertArgs:
183
182
  def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
184
183
  pulumi.set(self, "subject", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter
188
- def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
187
+ def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
189
188
  """
190
189
  List of URIs for which a certificate is being requested (i.e. certificate subjects).
191
190
  """
192
191
  return pulumi.get(self, "uris")
193
192
 
194
193
  @uris.setter
195
- def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
194
+ def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
196
195
  pulumi.set(self, "uris", value)
197
196
 
198
197
 
199
198
  @pulumi.input_type
200
199
  class _SelfSignedCertState:
201
200
  def __init__(__self__, *,
202
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
203
- cert_pem: Optional[pulumi.Input[builtins.str]] = None,
204
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
205
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
206
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
207
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
208
- key_algorithm: Optional[pulumi.Input[builtins.str]] = None,
209
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
210
- ready_for_renewal: Optional[pulumi.Input[builtins.bool]] = None,
211
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
212
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
201
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
202
+ cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
203
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
204
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
205
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
206
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
207
+ key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
208
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
209
+ ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
210
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
211
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
213
212
  subject: Optional[pulumi.Input['SelfSignedCertSubjectArgs']] = None,
214
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
215
- validity_end_time: Optional[pulumi.Input[builtins.str]] = None,
216
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
217
- validity_start_time: Optional[pulumi.Input[builtins.str]] = None):
213
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
214
+ validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
215
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
216
+ validity_start_time: Optional[pulumi.Input[_builtins.str]] = None):
218
217
  """
219
218
  Input properties used for looking up and filtering SelfSignedCert resources.
220
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
221
- :param pulumi.Input[builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
222
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
223
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
224
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
225
- :param pulumi.Input[builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
226
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
227
- :param pulumi.Input[builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
228
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
229
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
220
+ :param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
221
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
222
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
223
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
224
+ :param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
225
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
226
+ :param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
227
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
228
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
230
229
  :param pulumi.Input['SelfSignedCertSubjectArgs'] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
231
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
232
- :param pulumi.Input[builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
233
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
234
- :param pulumi.Input[builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
230
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
231
+ :param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
232
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
233
+ :param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
235
234
  """
236
235
  if allowed_uses is not None:
237
236
  pulumi.set(__self__, "allowed_uses", allowed_uses)
@@ -266,136 +265,136 @@ class _SelfSignedCertState:
266
265
  if validity_start_time is not None:
267
266
  pulumi.set(__self__, "validity_start_time", validity_start_time)
268
267
 
269
- @property
268
+ @_builtins.property
270
269
  @pulumi.getter(name="allowedUses")
271
- def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
270
+ def allowed_uses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
272
271
  """
273
272
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
274
273
  """
275
274
  return pulumi.get(self, "allowed_uses")
276
275
 
277
276
  @allowed_uses.setter
278
- def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
277
+ def allowed_uses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
279
278
  pulumi.set(self, "allowed_uses", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="certPem")
283
- def cert_pem(self) -> Optional[pulumi.Input[builtins.str]]:
282
+ def cert_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
284
283
  """
285
284
  Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
286
285
  """
287
286
  return pulumi.get(self, "cert_pem")
288
287
 
289
288
  @cert_pem.setter
290
- def cert_pem(self, value: Optional[pulumi.Input[builtins.str]]):
289
+ def cert_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
291
290
  pulumi.set(self, "cert_pem", value)
292
291
 
293
- @property
292
+ @_builtins.property
294
293
  @pulumi.getter(name="dnsNames")
295
- def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
294
+ def dns_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
296
295
  """
297
296
  List of DNS names for which a certificate is being requested (i.e. certificate subjects).
298
297
  """
299
298
  return pulumi.get(self, "dns_names")
300
299
 
301
300
  @dns_names.setter
302
- def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
301
+ def dns_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
303
302
  pulumi.set(self, "dns_names", value)
304
303
 
305
- @property
304
+ @_builtins.property
306
305
  @pulumi.getter(name="earlyRenewalHours")
307
- def early_renewal_hours(self) -> Optional[pulumi.Input[builtins.int]]:
306
+ def early_renewal_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
308
307
  return pulumi.get(self, "early_renewal_hours")
309
308
 
310
309
  @early_renewal_hours.setter
311
- def early_renewal_hours(self, value: Optional[pulumi.Input[builtins.int]]):
310
+ def early_renewal_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
312
311
  pulumi.set(self, "early_renewal_hours", value)
313
312
 
314
- @property
313
+ @_builtins.property
315
314
  @pulumi.getter(name="ipAddresses")
316
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
315
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
317
316
  """
318
317
  List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
319
318
  """
320
319
  return pulumi.get(self, "ip_addresses")
321
320
 
322
321
  @ip_addresses.setter
323
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
322
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
324
323
  pulumi.set(self, "ip_addresses", value)
325
324
 
326
- @property
325
+ @_builtins.property
327
326
  @pulumi.getter(name="isCaCertificate")
328
- def is_ca_certificate(self) -> Optional[pulumi.Input[builtins.bool]]:
327
+ def is_ca_certificate(self) -> Optional[pulumi.Input[_builtins.bool]]:
329
328
  """
330
329
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
331
330
  """
332
331
  return pulumi.get(self, "is_ca_certificate")
333
332
 
334
333
  @is_ca_certificate.setter
335
- def is_ca_certificate(self, value: Optional[pulumi.Input[builtins.bool]]):
334
+ def is_ca_certificate(self, value: Optional[pulumi.Input[_builtins.bool]]):
336
335
  pulumi.set(self, "is_ca_certificate", value)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter(name="keyAlgorithm")
340
- def key_algorithm(self) -> Optional[pulumi.Input[builtins.str]]:
339
+ def key_algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
341
340
  """
342
341
  Name of the algorithm used when generating the private key provided in `private_key_pem`.
343
342
  """
344
343
  return pulumi.get(self, "key_algorithm")
345
344
 
346
345
  @key_algorithm.setter
347
- def key_algorithm(self, value: Optional[pulumi.Input[builtins.str]]):
346
+ def key_algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
348
347
  pulumi.set(self, "key_algorithm", value)
349
348
 
350
- @property
349
+ @_builtins.property
351
350
  @pulumi.getter(name="privateKeyPem")
352
- def private_key_pem(self) -> Optional[pulumi.Input[builtins.str]]:
351
+ def private_key_pem(self) -> Optional[pulumi.Input[_builtins.str]]:
353
352
  """
354
353
  Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
355
354
  """
356
355
  return pulumi.get(self, "private_key_pem")
357
356
 
358
357
  @private_key_pem.setter
359
- def private_key_pem(self, value: Optional[pulumi.Input[builtins.str]]):
358
+ def private_key_pem(self, value: Optional[pulumi.Input[_builtins.str]]):
360
359
  pulumi.set(self, "private_key_pem", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="readyForRenewal")
364
- def ready_for_renewal(self) -> Optional[pulumi.Input[builtins.bool]]:
363
+ def ready_for_renewal(self) -> Optional[pulumi.Input[_builtins.bool]]:
365
364
  """
366
365
  Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
367
366
  """
368
367
  return pulumi.get(self, "ready_for_renewal")
369
368
 
370
369
  @ready_for_renewal.setter
371
- def ready_for_renewal(self, value: Optional[pulumi.Input[builtins.bool]]):
370
+ def ready_for_renewal(self, value: Optional[pulumi.Input[_builtins.bool]]):
372
371
  pulumi.set(self, "ready_for_renewal", value)
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter(name="setAuthorityKeyId")
376
- def set_authority_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
375
+ def set_authority_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
377
376
  """
378
377
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
379
378
  """
380
379
  return pulumi.get(self, "set_authority_key_id")
381
380
 
382
381
  @set_authority_key_id.setter
383
- def set_authority_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
382
+ def set_authority_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
384
383
  pulumi.set(self, "set_authority_key_id", value)
385
384
 
386
- @property
385
+ @_builtins.property
387
386
  @pulumi.getter(name="setSubjectKeyId")
388
- def set_subject_key_id(self) -> Optional[pulumi.Input[builtins.bool]]:
387
+ def set_subject_key_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
389
388
  """
390
389
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
391
390
  """
392
391
  return pulumi.get(self, "set_subject_key_id")
393
392
 
394
393
  @set_subject_key_id.setter
395
- def set_subject_key_id(self, value: Optional[pulumi.Input[builtins.bool]]):
394
+ def set_subject_key_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
396
395
  pulumi.set(self, "set_subject_key_id", value)
397
396
 
398
- @property
397
+ @_builtins.property
399
398
  @pulumi.getter
400
399
  def subject(self) -> Optional[pulumi.Input['SelfSignedCertSubjectArgs']]:
401
400
  """
@@ -407,52 +406,52 @@ class _SelfSignedCertState:
407
406
  def subject(self, value: Optional[pulumi.Input['SelfSignedCertSubjectArgs']]):
408
407
  pulumi.set(self, "subject", value)
409
408
 
410
- @property
409
+ @_builtins.property
411
410
  @pulumi.getter
412
- def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
411
+ def uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
413
412
  """
414
413
  List of URIs for which a certificate is being requested (i.e. certificate subjects).
415
414
  """
416
415
  return pulumi.get(self, "uris")
417
416
 
418
417
  @uris.setter
419
- def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
418
+ def uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
420
419
  pulumi.set(self, "uris", value)
421
420
 
422
- @property
421
+ @_builtins.property
423
422
  @pulumi.getter(name="validityEndTime")
424
- def validity_end_time(self) -> Optional[pulumi.Input[builtins.str]]:
423
+ def validity_end_time(self) -> Optional[pulumi.Input[_builtins.str]]:
425
424
  """
426
425
  The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
427
426
  """
428
427
  return pulumi.get(self, "validity_end_time")
429
428
 
430
429
  @validity_end_time.setter
431
- def validity_end_time(self, value: Optional[pulumi.Input[builtins.str]]):
430
+ def validity_end_time(self, value: Optional[pulumi.Input[_builtins.str]]):
432
431
  pulumi.set(self, "validity_end_time", value)
433
432
 
434
- @property
433
+ @_builtins.property
435
434
  @pulumi.getter(name="validityPeriodHours")
436
- def validity_period_hours(self) -> Optional[pulumi.Input[builtins.int]]:
435
+ def validity_period_hours(self) -> Optional[pulumi.Input[_builtins.int]]:
437
436
  """
438
437
  Number of hours, after initial issuing, that the certificate will remain valid for.
439
438
  """
440
439
  return pulumi.get(self, "validity_period_hours")
441
440
 
442
441
  @validity_period_hours.setter
443
- def validity_period_hours(self, value: Optional[pulumi.Input[builtins.int]]):
442
+ def validity_period_hours(self, value: Optional[pulumi.Input[_builtins.int]]):
444
443
  pulumi.set(self, "validity_period_hours", value)
445
444
 
446
- @property
445
+ @_builtins.property
447
446
  @pulumi.getter(name="validityStartTime")
448
- def validity_start_time(self) -> Optional[pulumi.Input[builtins.str]]:
447
+ def validity_start_time(self) -> Optional[pulumi.Input[_builtins.str]]:
449
448
  """
450
449
  The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
451
450
  """
452
451
  return pulumi.get(self, "validity_start_time")
453
452
 
454
453
  @validity_start_time.setter
455
- def validity_start_time(self, value: Optional[pulumi.Input[builtins.str]]):
454
+ def validity_start_time(self, value: Optional[pulumi.Input[_builtins.str]]):
456
455
  pulumi.set(self, "validity_start_time", value)
457
456
 
458
457
 
@@ -462,32 +461,32 @@ class SelfSignedCert(pulumi.CustomResource):
462
461
  def __init__(__self__,
463
462
  resource_name: str,
464
463
  opts: Optional[pulumi.ResourceOptions] = None,
465
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
466
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
467
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
468
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
469
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
470
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
471
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
472
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
464
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
465
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
466
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
467
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
468
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
469
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
470
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
471
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
473
472
  subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
474
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
475
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
473
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
474
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
476
475
  __props__=None):
477
476
  """
478
477
  Create a SelfSignedCert resource with the given unique name, props, and options.
479
478
  :param str resource_name: The name of the resource.
480
479
  :param pulumi.ResourceOptions opts: Options for the resource.
481
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
482
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
483
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
484
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
485
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
486
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
487
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
480
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
481
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
482
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
483
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
484
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
485
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
486
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
488
487
  :param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
489
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
490
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
488
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
489
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
491
490
  """
492
491
  ...
493
492
  @overload
@@ -512,17 +511,17 @@ class SelfSignedCert(pulumi.CustomResource):
512
511
  def _internal_init(__self__,
513
512
  resource_name: str,
514
513
  opts: Optional[pulumi.ResourceOptions] = None,
515
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
516
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
517
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
518
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
519
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
520
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
521
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
522
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
514
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
515
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
516
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
517
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
518
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
519
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
520
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
521
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
523
522
  subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
524
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
525
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
523
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
524
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
526
525
  __props__=None):
527
526
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
528
527
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -566,22 +565,22 @@ class SelfSignedCert(pulumi.CustomResource):
566
565
  def get(resource_name: str,
567
566
  id: pulumi.Input[str],
568
567
  opts: Optional[pulumi.ResourceOptions] = None,
569
- allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
570
- cert_pem: Optional[pulumi.Input[builtins.str]] = None,
571
- dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
572
- early_renewal_hours: Optional[pulumi.Input[builtins.int]] = None,
573
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
574
- is_ca_certificate: Optional[pulumi.Input[builtins.bool]] = None,
575
- key_algorithm: Optional[pulumi.Input[builtins.str]] = None,
576
- private_key_pem: Optional[pulumi.Input[builtins.str]] = None,
577
- ready_for_renewal: Optional[pulumi.Input[builtins.bool]] = None,
578
- set_authority_key_id: Optional[pulumi.Input[builtins.bool]] = None,
579
- set_subject_key_id: Optional[pulumi.Input[builtins.bool]] = None,
568
+ allowed_uses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
569
+ cert_pem: Optional[pulumi.Input[_builtins.str]] = None,
570
+ dns_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
571
+ early_renewal_hours: Optional[pulumi.Input[_builtins.int]] = None,
572
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
573
+ is_ca_certificate: Optional[pulumi.Input[_builtins.bool]] = None,
574
+ key_algorithm: Optional[pulumi.Input[_builtins.str]] = None,
575
+ private_key_pem: Optional[pulumi.Input[_builtins.str]] = None,
576
+ ready_for_renewal: Optional[pulumi.Input[_builtins.bool]] = None,
577
+ set_authority_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
578
+ set_subject_key_id: Optional[pulumi.Input[_builtins.bool]] = None,
580
579
  subject: Optional[pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']]] = None,
581
- uris: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
582
- validity_end_time: Optional[pulumi.Input[builtins.str]] = None,
583
- validity_period_hours: Optional[pulumi.Input[builtins.int]] = None,
584
- validity_start_time: Optional[pulumi.Input[builtins.str]] = None) -> 'SelfSignedCert':
580
+ uris: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
581
+ validity_end_time: Optional[pulumi.Input[_builtins.str]] = None,
582
+ validity_period_hours: Optional[pulumi.Input[_builtins.int]] = None,
583
+ validity_start_time: Optional[pulumi.Input[_builtins.str]] = None) -> 'SelfSignedCert':
585
584
  """
586
585
  Get an existing SelfSignedCert resource's state with the given name, id, and optional extra
587
586
  properties used to qualify the lookup.
@@ -589,21 +588,21 @@ class SelfSignedCert(pulumi.CustomResource):
589
588
  :param str resource_name: The unique name of the resulting resource.
590
589
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
591
590
  :param pulumi.ResourceOptions opts: Options for the resource.
592
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
593
- :param pulumi.Input[builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
594
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
595
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
596
- :param pulumi.Input[builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
597
- :param pulumi.Input[builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
598
- :param pulumi.Input[builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
599
- :param pulumi.Input[builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
600
- :param pulumi.Input[builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
601
- :param pulumi.Input[builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
591
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uses: List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
592
+ :param pulumi.Input[_builtins.str] cert_pem: Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
593
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] dns_names: List of DNS names for which a certificate is being requested (i.e. certificate subjects).
594
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
595
+ :param pulumi.Input[_builtins.bool] is_ca_certificate: Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
596
+ :param pulumi.Input[_builtins.str] key_algorithm: Name of the algorithm used when generating the private key provided in `private_key_pem`.
597
+ :param pulumi.Input[_builtins.str] private_key_pem: Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
598
+ :param pulumi.Input[_builtins.bool] ready_for_renewal: Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
599
+ :param pulumi.Input[_builtins.bool] set_authority_key_id: Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
600
+ :param pulumi.Input[_builtins.bool] set_subject_key_id: Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
602
601
  :param pulumi.Input[Union['SelfSignedCertSubjectArgs', 'SelfSignedCertSubjectArgsDict']] subject: The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon [Issuer Distinguished Names (RFC5280)](https://tools.ietf.org/html/rfc5280#section-4.1.2.4) section.
603
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
604
- :param pulumi.Input[builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
605
- :param pulumi.Input[builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
606
- :param pulumi.Input[builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
602
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] uris: List of URIs for which a certificate is being requested (i.e. certificate subjects).
603
+ :param pulumi.Input[_builtins.str] validity_end_time: The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
604
+ :param pulumi.Input[_builtins.int] validity_period_hours: Number of hours, after initial issuing, that the certificate will remain valid for.
605
+ :param pulumi.Input[_builtins.str] validity_start_time: The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
607
606
  """
608
607
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
609
608
 
@@ -627,92 +626,92 @@ class SelfSignedCert(pulumi.CustomResource):
627
626
  __props__.__dict__["validity_start_time"] = validity_start_time
628
627
  return SelfSignedCert(resource_name, opts=opts, __props__=__props__)
629
628
 
630
- @property
629
+ @_builtins.property
631
630
  @pulumi.getter(name="allowedUses")
632
- def allowed_uses(self) -> pulumi.Output[Sequence[builtins.str]]:
631
+ def allowed_uses(self) -> pulumi.Output[Sequence[_builtins.str]]:
633
632
  """
634
633
  List of key usages allowed for the issued certificate. Values are defined in [RFC 5280](https://datatracker.ietf.org/doc/html/rfc5280) and combine flags defined by both [Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.3) and [Extended Key Usages](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.12). Accepted values: `any_extended`, `cert_signing`, `client_auth`, `code_signing`, `content_commitment`, `crl_signing`, `data_encipherment`, `decipher_only`, `digital_signature`, `email_protection`, `encipher_only`, `ipsec_end_system`, `ipsec_tunnel`, `ipsec_user`, `key_agreement`, `key_encipherment`, `microsoft_commercial_code_signing`, `microsoft_kernel_code_signing`, `microsoft_server_gated_crypto`, `netscape_server_gated_crypto`, `ocsp_signing`, `server_auth`, `timestamping`.
635
634
  """
636
635
  return pulumi.get(self, "allowed_uses")
637
636
 
638
- @property
637
+ @_builtins.property
639
638
  @pulumi.getter(name="certPem")
640
- def cert_pem(self) -> pulumi.Output[builtins.str]:
639
+ def cert_pem(self) -> pulumi.Output[_builtins.str]:
641
640
  """
642
641
  Certificate data in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
643
642
  """
644
643
  return pulumi.get(self, "cert_pem")
645
644
 
646
- @property
645
+ @_builtins.property
647
646
  @pulumi.getter(name="dnsNames")
648
- def dns_names(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
647
+ def dns_names(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
649
648
  """
650
649
  List of DNS names for which a certificate is being requested (i.e. certificate subjects).
651
650
  """
652
651
  return pulumi.get(self, "dns_names")
653
652
 
654
- @property
653
+ @_builtins.property
655
654
  @pulumi.getter(name="earlyRenewalHours")
656
- def early_renewal_hours(self) -> pulumi.Output[builtins.int]:
655
+ def early_renewal_hours(self) -> pulumi.Output[_builtins.int]:
657
656
  return pulumi.get(self, "early_renewal_hours")
658
657
 
659
- @property
658
+ @_builtins.property
660
659
  @pulumi.getter(name="ipAddresses")
661
- def ip_addresses(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
660
+ def ip_addresses(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
662
661
  """
663
662
  List of IP addresses for which a certificate is being requested (i.e. certificate subjects).
664
663
  """
665
664
  return pulumi.get(self, "ip_addresses")
666
665
 
667
- @property
666
+ @_builtins.property
668
667
  @pulumi.getter(name="isCaCertificate")
669
- def is_ca_certificate(self) -> pulumi.Output[builtins.bool]:
668
+ def is_ca_certificate(self) -> pulumi.Output[_builtins.bool]:
670
669
  """
671
670
  Is the generated certificate representing a Certificate Authority (CA) (default: `false`).
672
671
  """
673
672
  return pulumi.get(self, "is_ca_certificate")
674
673
 
675
- @property
674
+ @_builtins.property
676
675
  @pulumi.getter(name="keyAlgorithm")
677
- def key_algorithm(self) -> pulumi.Output[builtins.str]:
676
+ def key_algorithm(self) -> pulumi.Output[_builtins.str]:
678
677
  """
679
678
  Name of the algorithm used when generating the private key provided in `private_key_pem`.
680
679
  """
681
680
  return pulumi.get(self, "key_algorithm")
682
681
 
683
- @property
682
+ @_builtins.property
684
683
  @pulumi.getter(name="privateKeyPem")
685
- def private_key_pem(self) -> pulumi.Output[builtins.str]:
684
+ def private_key_pem(self) -> pulumi.Output[_builtins.str]:
686
685
  """
687
686
  Private key in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format, that the certificate will belong to.
688
687
  """
689
688
  return pulumi.get(self, "private_key_pem")
690
689
 
691
- @property
690
+ @_builtins.property
692
691
  @pulumi.getter(name="readyForRenewal")
693
- def ready_for_renewal(self) -> pulumi.Output[builtins.bool]:
692
+ def ready_for_renewal(self) -> pulumi.Output[_builtins.bool]:
694
693
  """
695
694
  Is the certificate either expired (i.e. beyond the `validity_period_hours`) or ready for an early renewal (i.e. within the `early_renewal_hours`)?
696
695
  """
697
696
  return pulumi.get(self, "ready_for_renewal")
698
697
 
699
- @property
698
+ @_builtins.property
700
699
  @pulumi.getter(name="setAuthorityKeyId")
701
- def set_authority_key_id(self) -> pulumi.Output[builtins.bool]:
700
+ def set_authority_key_id(self) -> pulumi.Output[_builtins.bool]:
702
701
  """
703
702
  Should the generated certificate include an [authority key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.1): for self-signed certificates this is the same value as the [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
704
703
  """
705
704
  return pulumi.get(self, "set_authority_key_id")
706
705
 
707
- @property
706
+ @_builtins.property
708
707
  @pulumi.getter(name="setSubjectKeyId")
709
- def set_subject_key_id(self) -> pulumi.Output[builtins.bool]:
708
+ def set_subject_key_id(self) -> pulumi.Output[_builtins.bool]:
710
709
  """
711
710
  Should the generated certificate include a [subject key identifier](https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1.2) (default: `false`).
712
711
  """
713
712
  return pulumi.get(self, "set_subject_key_id")
714
713
 
715
- @property
714
+ @_builtins.property
716
715
  @pulumi.getter
717
716
  def subject(self) -> pulumi.Output[Optional['outputs.SelfSignedCertSubject']]:
718
717
  """
@@ -720,33 +719,33 @@ class SelfSignedCert(pulumi.CustomResource):
720
719
  """
721
720
  return pulumi.get(self, "subject")
722
721
 
723
- @property
722
+ @_builtins.property
724
723
  @pulumi.getter
725
- def uris(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
724
+ def uris(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
726
725
  """
727
726
  List of URIs for which a certificate is being requested (i.e. certificate subjects).
728
727
  """
729
728
  return pulumi.get(self, "uris")
730
729
 
731
- @property
730
+ @_builtins.property
732
731
  @pulumi.getter(name="validityEndTime")
733
- def validity_end_time(self) -> pulumi.Output[builtins.str]:
732
+ def validity_end_time(self) -> pulumi.Output[_builtins.str]:
734
733
  """
735
734
  The time until which the certificate is invalid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
736
735
  """
737
736
  return pulumi.get(self, "validity_end_time")
738
737
 
739
- @property
738
+ @_builtins.property
740
739
  @pulumi.getter(name="validityPeriodHours")
741
- def validity_period_hours(self) -> pulumi.Output[builtins.int]:
740
+ def validity_period_hours(self) -> pulumi.Output[_builtins.int]:
742
741
  """
743
742
  Number of hours, after initial issuing, that the certificate will remain valid for.
744
743
  """
745
744
  return pulumi.get(self, "validity_period_hours")
746
745
 
747
- @property
746
+ @_builtins.property
748
747
  @pulumi.getter(name="validityStartTime")
749
- def validity_start_time(self) -> pulumi.Output[builtins.str]:
748
+ def validity_start_time(self) -> pulumi.Output[_builtins.str]:
750
749
  """
751
750
  The time after which the certificate is valid, expressed as an [RFC3339](https://tools.ietf.org/html/rfc3339) timestamp.
752
751
  """