pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -51,22 +52,22 @@ class GetDecryptResult:
|
|
51
52
|
|
52
53
|
@property
|
53
54
|
@pulumi.getter
|
54
|
-
def backend(self) -> str:
|
55
|
+
def backend(self) -> builtins.str:
|
55
56
|
return pulumi.get(self, "backend")
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def ciphertext(self) -> str:
|
60
|
+
def ciphertext(self) -> builtins.str:
|
60
61
|
return pulumi.get(self, "ciphertext")
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter
|
64
|
-
def context(self) -> Optional[str]:
|
65
|
+
def context(self) -> Optional[builtins.str]:
|
65
66
|
return pulumi.get(self, "context")
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter
|
69
|
-
def id(self) -> str:
|
70
|
+
def id(self) -> builtins.str:
|
70
71
|
"""
|
71
72
|
The provider-assigned unique ID for this managed resource.
|
72
73
|
"""
|
@@ -74,17 +75,17 @@ class GetDecryptResult:
|
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter
|
77
|
-
def key(self) -> str:
|
78
|
+
def key(self) -> builtins.str:
|
78
79
|
return pulumi.get(self, "key")
|
79
80
|
|
80
81
|
@property
|
81
82
|
@pulumi.getter
|
82
|
-
def namespace(self) -> Optional[str]:
|
83
|
+
def namespace(self) -> Optional[builtins.str]:
|
83
84
|
return pulumi.get(self, "namespace")
|
84
85
|
|
85
86
|
@property
|
86
87
|
@pulumi.getter
|
87
|
-
def plaintext(self) -> str:
|
88
|
+
def plaintext(self) -> builtins.str:
|
88
89
|
"""
|
89
90
|
Decrypted plaintext returned from Vault
|
90
91
|
"""
|
@@ -106,11 +107,11 @@ class AwaitableGetDecryptResult(GetDecryptResult):
|
|
106
107
|
plaintext=self.plaintext)
|
107
108
|
|
108
109
|
|
109
|
-
def get_decrypt(backend: Optional[str] = None,
|
110
|
-
ciphertext: Optional[str] = None,
|
111
|
-
context: Optional[str] = None,
|
112
|
-
key: Optional[str] = None,
|
113
|
-
namespace: Optional[str] = None,
|
110
|
+
def get_decrypt(backend: Optional[builtins.str] = None,
|
111
|
+
ciphertext: Optional[builtins.str] = None,
|
112
|
+
context: Optional[builtins.str] = None,
|
113
|
+
key: Optional[builtins.str] = None,
|
114
|
+
namespace: Optional[builtins.str] = None,
|
114
115
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetDecryptResult:
|
115
116
|
"""
|
116
117
|
This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
|
@@ -143,11 +144,11 @@ def get_decrypt(backend: Optional[str] = None,
|
|
143
144
|
key=pulumi.get(__ret__, 'key'),
|
144
145
|
namespace=pulumi.get(__ret__, 'namespace'),
|
145
146
|
plaintext=pulumi.get(__ret__, 'plaintext'))
|
146
|
-
def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
147
|
-
ciphertext: Optional[pulumi.Input[str]] = None,
|
148
|
-
context: Optional[pulumi.Input[Optional[str]]] = None,
|
149
|
-
key: Optional[pulumi.Input[str]] = None,
|
150
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
147
|
+
def get_decrypt_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
148
|
+
ciphertext: Optional[pulumi.Input[builtins.str]] = None,
|
149
|
+
context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
150
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
151
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
151
152
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDecryptResult]:
|
152
153
|
"""
|
153
154
|
This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -54,12 +55,12 @@ class GetEncryptResult:
|
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter
|
57
|
-
def backend(self) -> str:
|
58
|
+
def backend(self) -> builtins.str:
|
58
59
|
return pulumi.get(self, "backend")
|
59
60
|
|
60
61
|
@property
|
61
62
|
@pulumi.getter
|
62
|
-
def ciphertext(self) -> str:
|
63
|
+
def ciphertext(self) -> builtins.str:
|
63
64
|
"""
|
64
65
|
Encrypted ciphertext returned from Vault
|
65
66
|
"""
|
@@ -67,12 +68,12 @@ class GetEncryptResult:
|
|
67
68
|
|
68
69
|
@property
|
69
70
|
@pulumi.getter
|
70
|
-
def context(self) -> Optional[str]:
|
71
|
+
def context(self) -> Optional[builtins.str]:
|
71
72
|
return pulumi.get(self, "context")
|
72
73
|
|
73
74
|
@property
|
74
75
|
@pulumi.getter
|
75
|
-
def id(self) -> str:
|
76
|
+
def id(self) -> builtins.str:
|
76
77
|
"""
|
77
78
|
The provider-assigned unique ID for this managed resource.
|
78
79
|
"""
|
@@ -80,22 +81,22 @@ class GetEncryptResult:
|
|
80
81
|
|
81
82
|
@property
|
82
83
|
@pulumi.getter
|
83
|
-
def key(self) -> str:
|
84
|
+
def key(self) -> builtins.str:
|
84
85
|
return pulumi.get(self, "key")
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter(name="keyVersion")
|
88
|
-
def key_version(self) -> Optional[int]:
|
89
|
+
def key_version(self) -> Optional[builtins.int]:
|
89
90
|
return pulumi.get(self, "key_version")
|
90
91
|
|
91
92
|
@property
|
92
93
|
@pulumi.getter
|
93
|
-
def namespace(self) -> Optional[str]:
|
94
|
+
def namespace(self) -> Optional[builtins.str]:
|
94
95
|
return pulumi.get(self, "namespace")
|
95
96
|
|
96
97
|
@property
|
97
98
|
@pulumi.getter
|
98
|
-
def plaintext(self) -> str:
|
99
|
+
def plaintext(self) -> builtins.str:
|
99
100
|
return pulumi.get(self, "plaintext")
|
100
101
|
|
101
102
|
|
@@ -115,12 +116,12 @@ class AwaitableGetEncryptResult(GetEncryptResult):
|
|
115
116
|
plaintext=self.plaintext)
|
116
117
|
|
117
118
|
|
118
|
-
def get_encrypt(backend: Optional[str] = None,
|
119
|
-
context: Optional[str] = None,
|
120
|
-
key: Optional[str] = None,
|
121
|
-
key_version: Optional[int] = None,
|
122
|
-
namespace: Optional[str] = None,
|
123
|
-
plaintext: Optional[str] = None,
|
119
|
+
def get_encrypt(backend: Optional[builtins.str] = None,
|
120
|
+
context: Optional[builtins.str] = None,
|
121
|
+
key: Optional[builtins.str] = None,
|
122
|
+
key_version: Optional[builtins.int] = None,
|
123
|
+
namespace: Optional[builtins.str] = None,
|
124
|
+
plaintext: Optional[builtins.str] = None,
|
124
125
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetEncryptResult:
|
125
126
|
"""
|
126
127
|
This is a data source which can be used to encrypt plaintext using a Vault Transit key.
|
@@ -144,12 +145,12 @@ def get_encrypt(backend: Optional[str] = None,
|
|
144
145
|
key_version=pulumi.get(__ret__, 'key_version'),
|
145
146
|
namespace=pulumi.get(__ret__, 'namespace'),
|
146
147
|
plaintext=pulumi.get(__ret__, 'plaintext'))
|
147
|
-
def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
|
148
|
-
context: Optional[pulumi.Input[Optional[str]]] = None,
|
149
|
-
key: Optional[pulumi.Input[str]] = None,
|
150
|
-
key_version: Optional[pulumi.Input[Optional[int]]] = None,
|
151
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
152
|
-
plaintext: Optional[pulumi.Input[str]] = None,
|
148
|
+
def get_encrypt_output(backend: Optional[pulumi.Input[builtins.str]] = None,
|
149
|
+
context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
150
|
+
key: Optional[pulumi.Input[builtins.str]] = None,
|
151
|
+
key_version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
152
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
153
|
+
plaintext: Optional[pulumi.Input[builtins.str]] = None,
|
153
154
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncryptResult]:
|
154
155
|
"""
|
155
156
|
This is a data source which can be used to encrypt plaintext using a Vault Transit key.
|
pulumi_vault/transit/get_sign.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -81,12 +82,12 @@ class GetSignResult:
|
|
81
82
|
|
82
83
|
@property
|
83
84
|
@pulumi.getter(name="batchInputs")
|
84
|
-
def batch_inputs(self) -> Optional[Sequence[Mapping[str, str]]]:
|
85
|
+
def batch_inputs(self) -> Optional[Sequence[Mapping[str, builtins.str]]]:
|
85
86
|
return pulumi.get(self, "batch_inputs")
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter(name="batchResults")
|
89
|
-
def batch_results(self) -> Sequence[Mapping[str, str]]:
|
90
|
+
def batch_results(self) -> Sequence[Mapping[str, builtins.str]]:
|
90
91
|
"""
|
91
92
|
The results returned from Vault if using `batch_input`
|
92
93
|
"""
|
@@ -94,17 +95,17 @@ class GetSignResult:
|
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter
|
97
|
-
def context(self) -> Optional[str]:
|
98
|
+
def context(self) -> Optional[builtins.str]:
|
98
99
|
return pulumi.get(self, "context")
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="hashAlgorithm")
|
102
|
-
def hash_algorithm(self) -> Optional[str]:
|
103
|
+
def hash_algorithm(self) -> Optional[builtins.str]:
|
103
104
|
return pulumi.get(self, "hash_algorithm")
|
104
105
|
|
105
106
|
@property
|
106
107
|
@pulumi.getter
|
107
|
-
def id(self) -> str:
|
108
|
+
def id(self) -> builtins.str:
|
108
109
|
"""
|
109
110
|
The provider-assigned unique ID for this managed resource.
|
110
111
|
"""
|
@@ -112,52 +113,52 @@ class GetSignResult:
|
|
112
113
|
|
113
114
|
@property
|
114
115
|
@pulumi.getter
|
115
|
-
def input(self) -> Optional[str]:
|
116
|
+
def input(self) -> Optional[builtins.str]:
|
116
117
|
return pulumi.get(self, "input")
|
117
118
|
|
118
119
|
@property
|
119
120
|
@pulumi.getter(name="keyVersion")
|
120
|
-
def key_version(self) -> Optional[int]:
|
121
|
+
def key_version(self) -> Optional[builtins.int]:
|
121
122
|
return pulumi.get(self, "key_version")
|
122
123
|
|
123
124
|
@property
|
124
125
|
@pulumi.getter(name="marshalingAlgorithm")
|
125
|
-
def marshaling_algorithm(self) -> Optional[str]:
|
126
|
+
def marshaling_algorithm(self) -> Optional[builtins.str]:
|
126
127
|
return pulumi.get(self, "marshaling_algorithm")
|
127
128
|
|
128
129
|
@property
|
129
130
|
@pulumi.getter
|
130
|
-
def name(self) -> str:
|
131
|
+
def name(self) -> builtins.str:
|
131
132
|
return pulumi.get(self, "name")
|
132
133
|
|
133
134
|
@property
|
134
135
|
@pulumi.getter
|
135
|
-
def namespace(self) -> Optional[str]:
|
136
|
+
def namespace(self) -> Optional[builtins.str]:
|
136
137
|
return pulumi.get(self, "namespace")
|
137
138
|
|
138
139
|
@property
|
139
140
|
@pulumi.getter
|
140
|
-
def path(self) -> str:
|
141
|
+
def path(self) -> builtins.str:
|
141
142
|
return pulumi.get(self, "path")
|
142
143
|
|
143
144
|
@property
|
144
145
|
@pulumi.getter
|
145
|
-
def prehashed(self) -> Optional[bool]:
|
146
|
+
def prehashed(self) -> Optional[builtins.bool]:
|
146
147
|
return pulumi.get(self, "prehashed")
|
147
148
|
|
148
149
|
@property
|
149
150
|
@pulumi.getter
|
150
|
-
def reference(self) -> Optional[str]:
|
151
|
+
def reference(self) -> Optional[builtins.str]:
|
151
152
|
return pulumi.get(self, "reference")
|
152
153
|
|
153
154
|
@property
|
154
155
|
@pulumi.getter(name="saltLength")
|
155
|
-
def salt_length(self) -> Optional[str]:
|
156
|
+
def salt_length(self) -> Optional[builtins.str]:
|
156
157
|
return pulumi.get(self, "salt_length")
|
157
158
|
|
158
159
|
@property
|
159
160
|
@pulumi.getter
|
160
|
-
def signature(self) -> str:
|
161
|
+
def signature(self) -> builtins.str:
|
161
162
|
"""
|
162
163
|
The signature returned from Vault if using `input`
|
163
164
|
"""
|
@@ -165,12 +166,12 @@ class GetSignResult:
|
|
165
166
|
|
166
167
|
@property
|
167
168
|
@pulumi.getter(name="signatureAlgorithm")
|
168
|
-
def signature_algorithm(self) -> Optional[str]:
|
169
|
+
def signature_algorithm(self) -> Optional[builtins.str]:
|
169
170
|
return pulumi.get(self, "signature_algorithm")
|
170
171
|
|
171
172
|
@property
|
172
173
|
@pulumi.getter(name="signatureContext")
|
173
|
-
def signature_context(self) -> Optional[str]:
|
174
|
+
def signature_context(self) -> Optional[builtins.str]:
|
174
175
|
return pulumi.get(self, "signature_context")
|
175
176
|
|
176
177
|
|
@@ -199,29 +200,29 @@ class AwaitableGetSignResult(GetSignResult):
|
|
199
200
|
signature_context=self.signature_context)
|
200
201
|
|
201
202
|
|
202
|
-
def get_sign(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
203
|
-
batch_results: Optional[Sequence[Mapping[str, str]]] = None,
|
204
|
-
context: Optional[str] = None,
|
205
|
-
hash_algorithm: Optional[str] = None,
|
206
|
-
input: Optional[str] = None,
|
207
|
-
key_version: Optional[int] = None,
|
208
|
-
marshaling_algorithm: Optional[str] = None,
|
209
|
-
name: Optional[str] = None,
|
210
|
-
namespace: Optional[str] = None,
|
211
|
-
path: Optional[str] = None,
|
212
|
-
prehashed: Optional[bool] = None,
|
213
|
-
reference: Optional[str] = None,
|
214
|
-
salt_length: Optional[str] = None,
|
215
|
-
signature: Optional[str] = None,
|
216
|
-
signature_algorithm: Optional[str] = None,
|
217
|
-
signature_context: Optional[str] = None,
|
203
|
+
def get_sign(batch_inputs: Optional[Sequence[Mapping[str, builtins.str]]] = None,
|
204
|
+
batch_results: Optional[Sequence[Mapping[str, builtins.str]]] = None,
|
205
|
+
context: Optional[builtins.str] = None,
|
206
|
+
hash_algorithm: Optional[builtins.str] = None,
|
207
|
+
input: Optional[builtins.str] = None,
|
208
|
+
key_version: Optional[builtins.int] = None,
|
209
|
+
marshaling_algorithm: Optional[builtins.str] = None,
|
210
|
+
name: Optional[builtins.str] = None,
|
211
|
+
namespace: Optional[builtins.str] = None,
|
212
|
+
path: Optional[builtins.str] = None,
|
213
|
+
prehashed: Optional[builtins.bool] = None,
|
214
|
+
reference: Optional[builtins.str] = None,
|
215
|
+
salt_length: Optional[builtins.str] = None,
|
216
|
+
signature: Optional[builtins.str] = None,
|
217
|
+
signature_algorithm: Optional[builtins.str] = None,
|
218
|
+
signature_context: Optional[builtins.str] = None,
|
218
219
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSignResult:
|
219
220
|
"""
|
220
221
|
This is a data source which can be used to generate a signature using a Vault Transit key.
|
221
222
|
|
222
223
|
|
223
|
-
:param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
|
224
|
-
:param str signature: The signature returned from Vault if using `input`
|
224
|
+
:param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
|
225
|
+
:param builtins.str signature: The signature returned from Vault if using `input`
|
225
226
|
"""
|
226
227
|
__args__ = dict()
|
227
228
|
__args__['batchInputs'] = batch_inputs
|
@@ -261,29 +262,29 @@ def get_sign(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
|
261
262
|
signature=pulumi.get(__ret__, 'signature'),
|
262
263
|
signature_algorithm=pulumi.get(__ret__, 'signature_algorithm'),
|
263
264
|
signature_context=pulumi.get(__ret__, 'signature_context'))
|
264
|
-
def get_sign_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
265
|
-
batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
266
|
-
context: Optional[pulumi.Input[Optional[str]]] = None,
|
267
|
-
hash_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
|
268
|
-
input: Optional[pulumi.Input[Optional[str]]] = None,
|
269
|
-
key_version: Optional[pulumi.Input[Optional[int]]] = None,
|
270
|
-
marshaling_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
|
271
|
-
name: Optional[pulumi.Input[str]] = None,
|
272
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
273
|
-
path: Optional[pulumi.Input[str]] = None,
|
274
|
-
prehashed: Optional[pulumi.Input[Optional[bool]]] = None,
|
275
|
-
reference: Optional[pulumi.Input[Optional[str]]] = None,
|
276
|
-
salt_length: Optional[pulumi.Input[Optional[str]]] = None,
|
277
|
-
signature: Optional[pulumi.Input[Optional[str]]] = None,
|
278
|
-
signature_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
|
279
|
-
signature_context: Optional[pulumi.Input[Optional[str]]] = None,
|
265
|
+
def get_sign_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
|
266
|
+
batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
|
267
|
+
context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
268
|
+
hash_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
269
|
+
input: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
270
|
+
key_version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
271
|
+
marshaling_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
272
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
273
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
274
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
275
|
+
prehashed: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
276
|
+
reference: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
277
|
+
salt_length: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
278
|
+
signature: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
279
|
+
signature_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
280
|
+
signature_context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
280
281
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSignResult]:
|
281
282
|
"""
|
282
283
|
This is a data source which can be used to generate a signature using a Vault Transit key.
|
283
284
|
|
284
285
|
|
285
|
-
:param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
|
286
|
-
:param str signature: The signature returned from Vault if using `input`
|
286
|
+
:param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
|
287
|
+
:param builtins.str signature: The signature returned from Vault if using `input`
|
287
288
|
"""
|
288
289
|
__args__ = dict()
|
289
290
|
__args__['batchInputs'] = batch_inputs
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -87,12 +88,12 @@ class GetVerifyResult:
|
|
87
88
|
|
88
89
|
@property
|
89
90
|
@pulumi.getter(name="batchInputs")
|
90
|
-
def batch_inputs(self) -> Optional[Sequence[Mapping[str, str]]]:
|
91
|
+
def batch_inputs(self) -> Optional[Sequence[Mapping[str, builtins.str]]]:
|
91
92
|
return pulumi.get(self, "batch_inputs")
|
92
93
|
|
93
94
|
@property
|
94
95
|
@pulumi.getter(name="batchResults")
|
95
|
-
def batch_results(self) -> Sequence[Mapping[str, str]]:
|
96
|
+
def batch_results(self) -> Sequence[Mapping[str, builtins.str]]:
|
96
97
|
"""
|
97
98
|
The results returned from Vault if using `batch_input`
|
98
99
|
"""
|
@@ -100,27 +101,27 @@ class GetVerifyResult:
|
|
100
101
|
|
101
102
|
@property
|
102
103
|
@pulumi.getter
|
103
|
-
def cmac(self) -> Optional[str]:
|
104
|
+
def cmac(self) -> Optional[builtins.str]:
|
104
105
|
return pulumi.get(self, "cmac")
|
105
106
|
|
106
107
|
@property
|
107
108
|
@pulumi.getter
|
108
|
-
def context(self) -> Optional[str]:
|
109
|
+
def context(self) -> Optional[builtins.str]:
|
109
110
|
return pulumi.get(self, "context")
|
110
111
|
|
111
112
|
@property
|
112
113
|
@pulumi.getter(name="hashAlgorithm")
|
113
|
-
def hash_algorithm(self) -> Optional[str]:
|
114
|
+
def hash_algorithm(self) -> Optional[builtins.str]:
|
114
115
|
return pulumi.get(self, "hash_algorithm")
|
115
116
|
|
116
117
|
@property
|
117
118
|
@pulumi.getter
|
118
|
-
def hmac(self) -> Optional[str]:
|
119
|
+
def hmac(self) -> Optional[builtins.str]:
|
119
120
|
return pulumi.get(self, "hmac")
|
120
121
|
|
121
122
|
@property
|
122
123
|
@pulumi.getter
|
123
|
-
def id(self) -> str:
|
124
|
+
def id(self) -> builtins.str:
|
124
125
|
"""
|
125
126
|
The provider-assigned unique ID for this managed resource.
|
126
127
|
"""
|
@@ -128,62 +129,62 @@ class GetVerifyResult:
|
|
128
129
|
|
129
130
|
@property
|
130
131
|
@pulumi.getter
|
131
|
-
def input(self) -> Optional[str]:
|
132
|
+
def input(self) -> Optional[builtins.str]:
|
132
133
|
return pulumi.get(self, "input")
|
133
134
|
|
134
135
|
@property
|
135
136
|
@pulumi.getter(name="marshalingAlgorithm")
|
136
|
-
def marshaling_algorithm(self) -> Optional[str]:
|
137
|
+
def marshaling_algorithm(self) -> Optional[builtins.str]:
|
137
138
|
return pulumi.get(self, "marshaling_algorithm")
|
138
139
|
|
139
140
|
@property
|
140
141
|
@pulumi.getter
|
141
|
-
def name(self) -> str:
|
142
|
+
def name(self) -> builtins.str:
|
142
143
|
return pulumi.get(self, "name")
|
143
144
|
|
144
145
|
@property
|
145
146
|
@pulumi.getter
|
146
|
-
def namespace(self) -> Optional[str]:
|
147
|
+
def namespace(self) -> Optional[builtins.str]:
|
147
148
|
return pulumi.get(self, "namespace")
|
148
149
|
|
149
150
|
@property
|
150
151
|
@pulumi.getter
|
151
|
-
def path(self) -> str:
|
152
|
+
def path(self) -> builtins.str:
|
152
153
|
return pulumi.get(self, "path")
|
153
154
|
|
154
155
|
@property
|
155
156
|
@pulumi.getter
|
156
|
-
def prehashed(self) -> Optional[bool]:
|
157
|
+
def prehashed(self) -> Optional[builtins.bool]:
|
157
158
|
return pulumi.get(self, "prehashed")
|
158
159
|
|
159
160
|
@property
|
160
161
|
@pulumi.getter
|
161
|
-
def reference(self) -> Optional[str]:
|
162
|
+
def reference(self) -> Optional[builtins.str]:
|
162
163
|
return pulumi.get(self, "reference")
|
163
164
|
|
164
165
|
@property
|
165
166
|
@pulumi.getter(name="saltLength")
|
166
|
-
def salt_length(self) -> Optional[str]:
|
167
|
+
def salt_length(self) -> Optional[builtins.str]:
|
167
168
|
return pulumi.get(self, "salt_length")
|
168
169
|
|
169
170
|
@property
|
170
171
|
@pulumi.getter
|
171
|
-
def signature(self) -> Optional[str]:
|
172
|
+
def signature(self) -> Optional[builtins.str]:
|
172
173
|
return pulumi.get(self, "signature")
|
173
174
|
|
174
175
|
@property
|
175
176
|
@pulumi.getter(name="signatureAlgorithm")
|
176
|
-
def signature_algorithm(self) -> Optional[str]:
|
177
|
+
def signature_algorithm(self) -> Optional[builtins.str]:
|
177
178
|
return pulumi.get(self, "signature_algorithm")
|
178
179
|
|
179
180
|
@property
|
180
181
|
@pulumi.getter(name="signatureContext")
|
181
|
-
def signature_context(self) -> Optional[str]:
|
182
|
+
def signature_context(self) -> Optional[builtins.str]:
|
182
183
|
return pulumi.get(self, "signature_context")
|
183
184
|
|
184
185
|
@property
|
185
186
|
@pulumi.getter
|
186
|
-
def valid(self) -> bool:
|
187
|
+
def valid(self) -> builtins.bool:
|
187
188
|
"""
|
188
189
|
Returns `true` if the signature verification succeeded and `false` otherwise
|
189
190
|
"""
|
@@ -217,31 +218,31 @@ class AwaitableGetVerifyResult(GetVerifyResult):
|
|
217
218
|
valid=self.valid)
|
218
219
|
|
219
220
|
|
220
|
-
def get_verify(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
221
|
-
batch_results: Optional[Sequence[Mapping[str, str]]] = None,
|
222
|
-
cmac: Optional[str] = None,
|
223
|
-
context: Optional[str] = None,
|
224
|
-
hash_algorithm: Optional[str] = None,
|
225
|
-
hmac: Optional[str] = None,
|
226
|
-
input: Optional[str] = None,
|
227
|
-
marshaling_algorithm: Optional[str] = None,
|
228
|
-
name: Optional[str] = None,
|
229
|
-
namespace: Optional[str] = None,
|
230
|
-
path: Optional[str] = None,
|
231
|
-
prehashed: Optional[bool] = None,
|
232
|
-
reference: Optional[str] = None,
|
233
|
-
salt_length: Optional[str] = None,
|
234
|
-
signature: Optional[str] = None,
|
235
|
-
signature_algorithm: Optional[str] = None,
|
236
|
-
signature_context: Optional[str] = None,
|
237
|
-
valid: Optional[bool] = None,
|
221
|
+
def get_verify(batch_inputs: Optional[Sequence[Mapping[str, builtins.str]]] = None,
|
222
|
+
batch_results: Optional[Sequence[Mapping[str, builtins.str]]] = None,
|
223
|
+
cmac: Optional[builtins.str] = None,
|
224
|
+
context: Optional[builtins.str] = None,
|
225
|
+
hash_algorithm: Optional[builtins.str] = None,
|
226
|
+
hmac: Optional[builtins.str] = None,
|
227
|
+
input: Optional[builtins.str] = None,
|
228
|
+
marshaling_algorithm: Optional[builtins.str] = None,
|
229
|
+
name: Optional[builtins.str] = None,
|
230
|
+
namespace: Optional[builtins.str] = None,
|
231
|
+
path: Optional[builtins.str] = None,
|
232
|
+
prehashed: Optional[builtins.bool] = None,
|
233
|
+
reference: Optional[builtins.str] = None,
|
234
|
+
salt_length: Optional[builtins.str] = None,
|
235
|
+
signature: Optional[builtins.str] = None,
|
236
|
+
signature_algorithm: Optional[builtins.str] = None,
|
237
|
+
signature_context: Optional[builtins.str] = None,
|
238
|
+
valid: Optional[builtins.bool] = None,
|
238
239
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetVerifyResult:
|
239
240
|
"""
|
240
241
|
This is a data source which can be used to verify a signature using a Vault Transit key.
|
241
242
|
|
242
243
|
|
243
|
-
:param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
|
244
|
-
:param bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
|
244
|
+
:param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
|
245
|
+
:param builtins.bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
|
245
246
|
"""
|
246
247
|
__args__ = dict()
|
247
248
|
__args__['batchInputs'] = batch_inputs
|
@@ -285,31 +286,31 @@ def get_verify(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
|
|
285
286
|
signature_algorithm=pulumi.get(__ret__, 'signature_algorithm'),
|
286
287
|
signature_context=pulumi.get(__ret__, 'signature_context'),
|
287
288
|
valid=pulumi.get(__ret__, 'valid'))
|
288
|
-
def get_verify_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
289
|
-
batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
|
290
|
-
cmac: Optional[pulumi.Input[Optional[str]]] = None,
|
291
|
-
context: Optional[pulumi.Input[Optional[str]]] = None,
|
292
|
-
hash_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
|
293
|
-
hmac: Optional[pulumi.Input[Optional[str]]] = None,
|
294
|
-
input: Optional[pulumi.Input[Optional[str]]] = None,
|
295
|
-
marshaling_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
|
296
|
-
name: Optional[pulumi.Input[str]] = None,
|
297
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
298
|
-
path: Optional[pulumi.Input[str]] = None,
|
299
|
-
prehashed: Optional[pulumi.Input[Optional[bool]]] = None,
|
300
|
-
reference: Optional[pulumi.Input[Optional[str]]] = None,
|
301
|
-
salt_length: Optional[pulumi.Input[Optional[str]]] = None,
|
302
|
-
signature: Optional[pulumi.Input[Optional[str]]] = None,
|
303
|
-
signature_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
|
304
|
-
signature_context: Optional[pulumi.Input[Optional[str]]] = None,
|
305
|
-
valid: Optional[pulumi.Input[Optional[bool]]] = None,
|
289
|
+
def get_verify_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
|
290
|
+
batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
|
291
|
+
cmac: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
292
|
+
context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
293
|
+
hash_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
294
|
+
hmac: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
295
|
+
input: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
296
|
+
marshaling_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
297
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
298
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
299
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
300
|
+
prehashed: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
301
|
+
reference: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
302
|
+
salt_length: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
303
|
+
signature: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
304
|
+
signature_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
305
|
+
signature_context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
306
|
+
valid: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
306
307
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetVerifyResult]:
|
307
308
|
"""
|
308
309
|
This is a data source which can be used to verify a signature using a Vault Transit key.
|
309
310
|
|
310
311
|
|
311
|
-
:param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
|
312
|
-
:param bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
|
312
|
+
:param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
|
313
|
+
:param builtins.bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
|
313
314
|
"""
|
314
315
|
__args__ = dict()
|
315
316
|
__args__['batchInputs'] = batch_inputs
|