pulumi-tls 5.3.0a1753339655__py3-none-any.whl → 5.3.0a1753512319__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_tls/__init__.py +1 -1
- pulumi_tls/_inputs.py +147 -148
- pulumi_tls/cert_request.py +90 -91
- pulumi_tls/config/__init__.py +1 -1
- pulumi_tls/config/__init__.pyi +1 -2
- pulumi_tls/config/outputs.py +17 -18
- pulumi_tls/config/vars.py +2 -3
- pulumi_tls/get_certificate.py +22 -23
- pulumi_tls/get_public_key.py +25 -26
- pulumi_tls/locally_signed_cert.py +178 -179
- pulumi_tls/outputs.py +128 -129
- pulumi_tls/private_key.py +115 -116
- pulumi_tls/provider.py +3 -4
- pulumi_tls/pulumi-plugin.json +1 -1
- pulumi_tls/self_signed_cert.py +215 -216
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/METADATA +1 -1
- pulumi_tls-5.3.0a1753512319.dist-info/RECORD +21 -0
- pulumi_tls-5.3.0a1753339655.dist-info/RECORD +0 -21
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/WHEEL +0 -0
- {pulumi_tls-5.3.0a1753339655.dist-info → pulumi_tls-5.3.0a1753512319.dist-info}/top_level.txt +0 -0
pulumi_tls/get_public_key.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -53,65 +52,65 @@ class GetPublicKeyResult:
|
|
53
52
|
raise TypeError("Expected argument 'public_key_pem' to be a str")
|
54
53
|
pulumi.set(__self__, "public_key_pem", public_key_pem)
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter
|
58
|
-
def algorithm(self) ->
|
57
|
+
def algorithm(self) -> _builtins.str:
|
59
58
|
"""
|
60
59
|
The name of the algorithm used by the given private key. Possible values are: `RSA`, `ECDSA`, `ED25519`.
|
61
60
|
"""
|
62
61
|
return pulumi.get(self, "algorithm")
|
63
62
|
|
64
|
-
@property
|
63
|
+
@_builtins.property
|
65
64
|
@pulumi.getter
|
66
|
-
def id(self) ->
|
65
|
+
def id(self) -> _builtins.str:
|
67
66
|
"""
|
68
67
|
Unique identifier for this data source: hexadecimal representation of the SHA1 checksum of the data source.
|
69
68
|
"""
|
70
69
|
return pulumi.get(self, "id")
|
71
70
|
|
72
|
-
@property
|
71
|
+
@_builtins.property
|
73
72
|
@pulumi.getter(name="privateKeyOpenssh")
|
74
|
-
def private_key_openssh(self) -> Optional[
|
73
|
+
def private_key_openssh(self) -> Optional[_builtins.str]:
|
75
74
|
"""
|
76
75
|
The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
77
76
|
"""
|
78
77
|
return pulumi.get(self, "private_key_openssh")
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter(name="privateKeyPem")
|
82
|
-
def private_key_pem(self) -> Optional[
|
81
|
+
def private_key_pem(self) -> Optional[_builtins.str]:
|
83
82
|
"""
|
84
83
|
The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
85
84
|
"""
|
86
85
|
return pulumi.get(self, "private_key_pem")
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter(name="publicKeyFingerprintMd5")
|
90
|
-
def public_key_fingerprint_md5(self) ->
|
89
|
+
def public_key_fingerprint_md5(self) -> _builtins.str:
|
91
90
|
"""
|
92
91
|
The fingerprint of the public key data in OpenSSH MD5 hash format, e.g. `aa:bb:cc:...`. Only available if the selected private key format is compatible, as per the rules for `public_key_openssh` and ECDSA P224 limitations.
|
93
92
|
"""
|
94
93
|
return pulumi.get(self, "public_key_fingerprint_md5")
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter(name="publicKeyFingerprintSha256")
|
98
|
-
def public_key_fingerprint_sha256(self) ->
|
97
|
+
def public_key_fingerprint_sha256(self) -> _builtins.str:
|
99
98
|
"""
|
100
99
|
The fingerprint of the public key data in OpenSSH SHA256 hash format, e.g. `SHA256:...`. Only available if the selected private key format is compatible, as per the rules for `public_key_openssh` and ECDSA P224 limitations.
|
101
100
|
"""
|
102
101
|
return pulumi.get(self, "public_key_fingerprint_sha256")
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter(name="publicKeyOpenssh")
|
106
|
-
def public_key_openssh(self) ->
|
105
|
+
def public_key_openssh(self) -> _builtins.str:
|
107
106
|
"""
|
108
107
|
The public key, in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format. This is also known as ['Authorized Keys'](https://www.ssh.com/academy/ssh/authorized_keys/openssh#format-of-the-authorized-keys-file) format. This is not populated for `ECDSA` with curve `P224`, as it is not supported. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
109
108
|
"""
|
110
109
|
return pulumi.get(self, "public_key_openssh")
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter(name="publicKeyPem")
|
114
|
-
def public_key_pem(self) ->
|
113
|
+
def public_key_pem(self) -> _builtins.str:
|
115
114
|
"""
|
116
115
|
The public key, in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format. **NOTE**: the [underlying](https://pkg.go.dev/encoding/pem#Encode) [libraries](https://pkg.go.dev/golang.org/x/crypto/ssh#MarshalAuthorizedKey) that generate this value append a `\\n` at the end of the PEM. In case this disrupts your use case, we recommend using `trimspace()`.
|
117
116
|
"""
|
@@ -134,8 +133,8 @@ class AwaitableGetPublicKeyResult(GetPublicKeyResult):
|
|
134
133
|
public_key_pem=self.public_key_pem)
|
135
134
|
|
136
135
|
|
137
|
-
def get_public_key(private_key_openssh: Optional[
|
138
|
-
private_key_pem: Optional[
|
136
|
+
def get_public_key(private_key_openssh: Optional[_builtins.str] = None,
|
137
|
+
private_key_pem: Optional[_builtins.str] = None,
|
139
138
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetPublicKeyResult:
|
140
139
|
"""
|
141
140
|
Get a public key from a PEM-encoded private key.
|
@@ -157,8 +156,8 @@ def get_public_key(private_key_openssh: Optional[builtins.str] = None,
|
|
157
156
|
```
|
158
157
|
|
159
158
|
|
160
|
-
:param
|
161
|
-
:param
|
159
|
+
:param _builtins.str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
160
|
+
:param _builtins.str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
162
161
|
"""
|
163
162
|
__args__ = dict()
|
164
163
|
__args__['privateKeyOpenssh'] = private_key_openssh
|
@@ -175,8 +174,8 @@ def get_public_key(private_key_openssh: Optional[builtins.str] = None,
|
|
175
174
|
public_key_fingerprint_sha256=pulumi.get(__ret__, 'public_key_fingerprint_sha256'),
|
176
175
|
public_key_openssh=pulumi.get(__ret__, 'public_key_openssh'),
|
177
176
|
public_key_pem=pulumi.get(__ret__, 'public_key_pem'))
|
178
|
-
def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[
|
179
|
-
private_key_pem: Optional[pulumi.Input[Optional[
|
177
|
+
def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
178
|
+
private_key_pem: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
180
179
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetPublicKeyResult]:
|
181
180
|
"""
|
182
181
|
Get a public key from a PEM-encoded private key.
|
@@ -198,8 +197,8 @@ def get_public_key_output(private_key_openssh: Optional[pulumi.Input[Optional[bu
|
|
198
197
|
```
|
199
198
|
|
200
199
|
|
201
|
-
:param
|
202
|
-
:param
|
200
|
+
:param _builtins.str private_key_openssh: The private key (in [OpenSSH PEM (RFC 4716)](https://datatracker.ietf.org/doc/html/rfc4716) format) to extract the public key from. This is *mutually exclusive* with `private_key_pem`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
201
|
+
:param _builtins.str private_key_pem: The private key (in [PEM (RFC 1421)](https://datatracker.ietf.org/doc/html/rfc1421) format) to extract the public key from. This is *mutually exclusive* with `private_key_openssh`. Currently-supported algorithms for keys are: `RSA`, `ECDSA`, `ED25519`.
|
203
202
|
"""
|
204
203
|
__args__ = dict()
|
205
204
|
__args__['privateKeyOpenssh'] = private_key_openssh
|