|
Odyssey
|
Functions | |
| def | __derive_key__ (password, salt=None) |
| def | __decrypt_data__ (password, salt, data) |
| def | main (certificate_path, secret_id, region=None) |
| def | make_directory (directory_name, mode=0o700) |
| def | get_password_from_sm (secret_id, region) |
Variables | |
| string | SALT = 'LTzkm1w/p3ReDm9kmfmnwQ==' |
| string | ENCODING = 'utf-8' |
| int | AES_KEY_BYTES = 32 |
| AWS_REGION = os.environ.get('AWS_REGION', 'us-east-2') | |
| CERTIFICATE_OUTPUT_DIR | |
Retrieve Certificates and Private Keys from AWS Query Amazon Certificate Manager and Secrets Manager to query for both the certificate, certificate chain, and the private key. This results in a reconstruction of a typical PEM file.
| def aws_get_certificate.__decrypt_data__ | ( | password, | |
| salt, | |||
| data | |||
| ) |
Decrypt given data using password and PBKDF2 key stretching
Definition at line 37 of file aws_get_certificate.py.
| def aws_get_certificate.__derive_key__ | ( | password, | |
salt = None |
|||
| ) |
Return key using PBKDF2
Definition at line 26 of file aws_get_certificate.py.
| def aws_get_certificate.main | ( | certificate_path, | |
| secret_id, | |||
region = None |
|||
| ) |
Download and decrypt certificate file from EFS Use AWS Secrets Manager to download shared key for decryption. Arguments: - `certificate_path`: Absolute path to encrypted certificate (PEM) file. The basename of this file is used for the output of the unencrypted certificate contents. - `secret_id`: AWS Secrets Manager secret identifier. This is often referred to as the "secrets path" in conversation. E.g., `test/certs/rdc/foobar.homecu.io.pem`. The `secret_id` will also be used for the path and name of the unencrypted certificate file. - `region`: AWS Region to download secrets from, defaults to environment variable `AWS_REGION`.
Definition at line 45 of file aws_get_certificate.py.
| aws_get_certificate.CERTIFICATE_OUTPUT_DIR |
Definition at line 22 of file aws_get_certificate.py.
1.8.15