pulumi-tls 5.2.0a1743575896__py3-none-any.whl → 5.2.0a1744183475__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_tls/__init__.py +1 -0
- pulumi_tls/_inputs.py +113 -112
- pulumi_tls/cert_request.py +71 -70
- pulumi_tls/config/__init__.py +1 -0
- pulumi_tls/config/__init__.pyi +1 -0
- pulumi_tls/config/outputs.py +13 -12
- pulumi_tls/config/vars.py +1 -0
- pulumi_tls/get_certificate.py +17 -16
- pulumi_tls/get_public_key.py +17 -16
- pulumi_tls/locally_signed_cert.py +144 -143
- pulumi_tls/outputs.py +91 -90
- pulumi_tls/private_key.py +92 -91
- pulumi_tls/provider.py +1 -0
- pulumi_tls/pulumi-plugin.json +1 -1
- pulumi_tls/self_signed_cert.py +175 -174
- {pulumi_tls-5.2.0a1743575896.dist-info → pulumi_tls-5.2.0a1744183475.dist-info}/METADATA +1 -1
- pulumi_tls-5.2.0a1744183475.dist-info/RECORD +21 -0
- pulumi_tls-5.2.0a1743575896.dist-info/RECORD +0 -21
- {pulumi_tls-5.2.0a1743575896.dist-info → pulumi_tls-5.2.0a1744183475.dist-info}/WHEEL +0 -0
- {pulumi_tls-5.2.0a1743575896.dist-info → pulumi_tls-5.2.0a1744183475.dist-info}/top_level.txt +0 -0
pulumi_tls/get_public_key.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -54,7 +55,7 @@ class GetPublicKeyResult:
|
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter
|
57
|
-
def algorithm(self) -> str:
|
58
|
+
def algorithm(self) -> builtins.str:
|
58
59
|
"""
|
59
60
|
The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA`, `ED25519`.
|
60
61
|
"""
|
@@ -62,7 +63,7 @@ class GetPublicKeyResult:
|
|
62
63
|
|
63
64
|
@property
|
64
65
|
@pulumi.getter
|
65
|
-
def id(self) -> str:
|
66
|
+
def id(self) -> builtins.str:
|
66
67
|
"""
|
67
68
|
Unique identifier for this data source: hexadecimal representation of the SHA1 checksum of the data source.
|
68
69
|
"""
|
@@ -70,7 +71,7 @@ class GetPublicKeyResult:
|
|
70
71
|
|
71
72
|
@property
|
72
73
|
@pulumi.getter(name="privateKeyOpenssh")
|
73
|
-
def private_key_openssh(self) -> Optional[str]:
|
74
|
+
def private_key_openssh(self) -> Optional[builtins.str]:
|
74
75
|
"""
|
75
76
|
The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
76
77
|
"""
|
@@ -78,7 +79,7 @@ class GetPublicKeyResult:
|
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter(name="privateKeyPem")
|
81
|
-
def private_key_pem(self) -> Optional[str]:
|
82
|
+
def private_key_pem(self) -> Optional[builtins.str]:
|
82
83
|
"""
|
83
84
|
The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
84
85
|
"""
|
@@ -86,7 +87,7 @@ class GetPublicKeyResult:
|
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter(name="publicKeyFingerprintMd5")
|
89
|
-
def public_key_fingerprint_md5(self) -> str:
|
90
|
+
def public_key_fingerprint_md5(self) -> builtins.str:
|
90
91
|
"""
|
91
92
|
The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, as per the rules for `public_key_openssh` and ECDSA P224 limitations.
|
92
93
|
"""
|
@@ -94,7 +95,7 @@ class GetPublicKeyResult:
|
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter(name="publicKeyFingerprintSha256")
|
97
|
-
def public_key_fingerprint_sha256(self) -> str:
|
98
|
+
def public_key_fingerprint_sha256(self) -> builtins.str:
|
98
99
|
"""
|
99
100
|
The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, as per the rules for `public_key_openssh` and ECDSA P224 limitations.
|
100
101
|
"""
|
@@ -102,7 +103,7 @@ class GetPublicKeyResult:
|
|
102
103
|
|
103
104
|
@property
|
104
105
|
@pulumi.getter(name="publicKeyOpenssh")
|
105
|
-
def public_key_openssh(self) -> str:
|
106
|
+
def public_key_openssh(self) -> builtins.str:
|
106
107
|
"""
|
107
108
|
The public key, in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format. This is also known as ['Authorized Keys'](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not populated for `ECDSA` with curve `P224`, as it is not supported. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
108
109
|
"""
|
@@ -110,7 +111,7 @@ class GetPublicKeyResult:
|
|
110
111
|
|
111
112
|
@property
|
112
113
|
@pulumi.getter(name="publicKeyPem")
|
113
|
-
def public_key_pem(self) -> str:
|
114
|
+
def public_key_pem(self) -> builtins.str:
|
114
115
|
"""
|
115
116
|
The public key, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
116
117
|
"""
|
@@ -133,8 +134,8 @@ class AwaitableGetPublicKeyResult(GetPublicKeyResult):
|
|
133
134
|
public_key_pem=self.public_key_pem)
|
134
135
|
|
135
136
|
|
136
|
-
def get_public_key(private_key_openssh: Optional[str] = None,
|
137
|
-
private_key_pem: Optional[str] = None,
|
137
|
+
def get_public_key(private_key_openssh: Optional[builtins.str] = None,
|
138
|
+
private_key_pem: Optional[builtins.str] = None,
|
138
139
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetPublicKeyResult:
|
139
140
|
"""
|
140
141
|
Get a public key from a PEM-encoded private key.
|
@@ -156,8 +157,8 @@ def get_public_key(private_key_openssh: Optional[str] = None,
|
|
156
157
|
```
|
157
158
|
|
158
159
|
|
159
|
-
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
160
|
-
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
160
|
+
:param builtins.str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
161
|
+
:param builtins.str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
161
162
|
"""
|
162
163
|
__args__ = dict()
|
163
164
|
__args__['privateKeyOpenssh'] = private_key_openssh
|
@@ -174,8 +175,8 @@ def get_public_key(private_key_openssh: Optional[str] = None,
|
|
174
175
|
public_key_fingerprint_sha256=pulumi.get(__ret__, 'public_key_fingerprint_sha256'),
|
175
176
|
public_key_openssh=pulumi.get(__ret__, 'public_key_openssh'),
|
176
177
|
public_key_pem=pulumi.get(__ret__, 'public_key_pem'))
|
177
|
-
def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[str]]] = None,
|
178
|
-
private_key_pem: Optional[pulumi.Input[Optional[str]]] = None,
|
178
|
+
def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
179
|
+
private_key_pem: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
179
180
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetPublicKeyResult]:
|
180
181
|
"""
|
181
182
|
Get a public key from a PEM-encoded private key.
|
@@ -197,8 +198,8 @@ def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[st
|
|
197
198
|
```
|
198
199
|
|
199
200
|
|
200
|
-
:param str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
201
|
-
:param str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
201
|
+
:param builtins.str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
202
|
+
:param builtins.str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
202
203
|
"""
|
203
204
|
__args__ = dict()
|
204
205
|
__args__['privateKeyOpenssh'] = private_key_openssh
|