import * as pulumi from "@pulumi/pulumi"; /** * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as cloudflare from "@pulumi/cloudflare"; * * const exampleZeroTrustGatewayCertificate = new cloudflare.ZeroTrustGatewayCertificate("example_zero_trust_gateway_certificate", { * accountId: "699d98642c564d2e855e9661899b7252", * validityPeriodDays: 1826, * }); * ``` * * ## Import * * ```sh * $ pulumi import cloudflare:index/zeroTrustGatewayCertificate:ZeroTrustGatewayCertificate example '/' * ``` */ export declare class ZeroTrustGatewayCertificate extends pulumi.CustomResource { /** * Get an existing ZeroTrustGatewayCertificate resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name: string, id: pulumi.Input, state?: ZeroTrustGatewayCertificateState, opts?: pulumi.CustomResourceOptions): ZeroTrustGatewayCertificate; /** * Returns true if the given object is an instance of ZeroTrustGatewayCertificate. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj: any): obj is ZeroTrustGatewayCertificate; readonly accountId: pulumi.Output; readonly activate: pulumi.Output; /** * Indicate the read-only deployment status of the certificate on Cloudflare's edge. Gateway TLS interception can use certificates in the 'available' (previously called 'active') state. * Available values: "pending*deployment", "available", "pending*deletion", "inactive". */ readonly bindingStatus: pulumi.Output; /** * Provide the CA certificate (read-only). */ readonly certificate: pulumi.Output; readonly createdAt: pulumi.Output; readonly expiresOn: pulumi.Output; /** * Provide the SHA256 fingerprint of the certificate (read-only). */ readonly fingerprint: pulumi.Output; /** * Indicate whether Gateway TLS interception uses this certificate (read-only). You cannot set this value directly. To configure interception, use the Gateway configuration setting named `certificate` (read-only). */ readonly inUse: pulumi.Output; /** * Indicate the organization that issued the certificate (read-only). */ readonly issuerOrg: pulumi.Output; /** * Provide the entire issuer field of the certificate (read-only). */ readonly issuerRaw: pulumi.Output; /** * Indicate the read-only certificate type, BYO-PKI (custom) or Gateway-managed. * Available values: "custom", "gatewayManaged". */ readonly type: pulumi.Output; readonly updatedAt: pulumi.Output; readonly uploadedOn: pulumi.Output; /** * Sets the certificate validity period in days (range: 1-10,950 days / ~30 years). Defaults to 1,825 days (5 years). **Important**: This field is only settable during the certificate creation. Certificates becomes immutable after creation - use the `/activate` and `/deactivate` endpoints to manage certificate lifecycle. */ readonly validityPeriodDays: pulumi.Output; /** * Create a ZeroTrustGatewayCertificate resource with the given unique name, arguments, and options. * * @param name The _unique_ name of the resource. * @param args The arguments to use to populate this resource's properties. * @param opts A bag of options that control this resource's behavior. */ constructor(name: string, args: ZeroTrustGatewayCertificateArgs, opts?: pulumi.CustomResourceOptions); } /** * Input properties used for looking up and filtering ZeroTrustGatewayCertificate resources. */ export interface ZeroTrustGatewayCertificateState { accountId?: pulumi.Input; activate?: pulumi.Input; /** * Indicate the read-only deployment status of the certificate on Cloudflare's edge. Gateway TLS interception can use certificates in the 'available' (previously called 'active') state. * Available values: "pending*deployment", "available", "pending*deletion", "inactive". */ bindingStatus?: pulumi.Input; /** * Provide the CA certificate (read-only). */ certificate?: pulumi.Input; createdAt?: pulumi.Input; expiresOn?: pulumi.Input; /** * Provide the SHA256 fingerprint of the certificate (read-only). */ fingerprint?: pulumi.Input; /** * Indicate whether Gateway TLS interception uses this certificate (read-only). You cannot set this value directly. To configure interception, use the Gateway configuration setting named `certificate` (read-only). */ inUse?: pulumi.Input; /** * Indicate the organization that issued the certificate (read-only). */ issuerOrg?: pulumi.Input; /** * Provide the entire issuer field of the certificate (read-only). */ issuerRaw?: pulumi.Input; /** * Indicate the read-only certificate type, BYO-PKI (custom) or Gateway-managed. * Available values: "custom", "gatewayManaged". */ type?: pulumi.Input; updatedAt?: pulumi.Input; uploadedOn?: pulumi.Input; /** * Sets the certificate validity period in days (range: 1-10,950 days / ~30 years). Defaults to 1,825 days (5 years). **Important**: This field is only settable during the certificate creation. Certificates becomes immutable after creation - use the `/activate` and `/deactivate` endpoints to manage certificate lifecycle. */ validityPeriodDays?: pulumi.Input; } /** * The set of arguments for constructing a ZeroTrustGatewayCertificate resource. */ export interface ZeroTrustGatewayCertificateArgs { accountId: pulumi.Input; activate?: pulumi.Input; /** * Sets the certificate validity period in days (range: 1-10,950 days / ~30 years). Defaults to 1,825 days (5 years). **Important**: This field is only settable during the certificate creation. Certificates becomes immutable after creation - use the `/activate` and `/deactivate` endpoints to manage certificate lifecycle. */ validityPeriodDays?: pulumi.Input; }