pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -51,22 +52,22 @@ class GetDecryptResult:
51
52
 
52
53
  @property
53
54
  @pulumi.getter
54
- def backend(self) -> str:
55
+ def backend(self) -> builtins.str:
55
56
  return pulumi.get(self, "backend")
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def ciphertext(self) -> str:
60
+ def ciphertext(self) -> builtins.str:
60
61
  return pulumi.get(self, "ciphertext")
61
62
 
62
63
  @property
63
64
  @pulumi.getter
64
- def context(self) -> Optional[str]:
65
+ def context(self) -> Optional[builtins.str]:
65
66
  return pulumi.get(self, "context")
66
67
 
67
68
  @property
68
69
  @pulumi.getter
69
- def id(self) -> str:
70
+ def id(self) -> builtins.str:
70
71
  """
71
72
  The provider-assigned unique ID for this managed resource.
72
73
  """
@@ -74,17 +75,17 @@ class GetDecryptResult:
74
75
 
75
76
  @property
76
77
  @pulumi.getter
77
- def key(self) -> str:
78
+ def key(self) -> builtins.str:
78
79
  return pulumi.get(self, "key")
79
80
 
80
81
  @property
81
82
  @pulumi.getter
82
- def namespace(self) -> Optional[str]:
83
+ def namespace(self) -> Optional[builtins.str]:
83
84
  return pulumi.get(self, "namespace")
84
85
 
85
86
  @property
86
87
  @pulumi.getter
87
- def plaintext(self) -> str:
88
+ def plaintext(self) -> builtins.str:
88
89
  """
89
90
  Decrypted plaintext returned from Vault
90
91
  """
@@ -106,11 +107,11 @@ class AwaitableGetDecryptResult(GetDecryptResult):
106
107
  plaintext=self.plaintext)
107
108
 
108
109
 
109
- def get_decrypt(backend: Optional[str] = None,
110
- ciphertext: Optional[str] = None,
111
- context: Optional[str] = None,
112
- key: Optional[str] = None,
113
- namespace: Optional[str] = None,
110
+ def get_decrypt(backend: Optional[builtins.str] = None,
111
+ ciphertext: Optional[builtins.str] = None,
112
+ context: Optional[builtins.str] = None,
113
+ key: Optional[builtins.str] = None,
114
+ namespace: Optional[builtins.str] = None,
114
115
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetDecryptResult:
115
116
  """
116
117
  This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
@@ -143,11 +144,11 @@ def get_decrypt(backend: Optional[str] = None,
143
144
  key=pulumi.get(__ret__, 'key'),
144
145
  namespace=pulumi.get(__ret__, 'namespace'),
145
146
  plaintext=pulumi.get(__ret__, 'plaintext'))
146
- def get_decrypt_output(backend: Optional[pulumi.Input[str]] = None,
147
- ciphertext: Optional[pulumi.Input[str]] = None,
148
- context: Optional[pulumi.Input[Optional[str]]] = None,
149
- key: Optional[pulumi.Input[str]] = None,
150
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
147
+ def get_decrypt_output(backend: Optional[pulumi.Input[builtins.str]] = None,
148
+ ciphertext: Optional[pulumi.Input[builtins.str]] = None,
149
+ context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
150
+ key: Optional[pulumi.Input[builtins.str]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
151
152
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDecryptResult]:
152
153
  """
153
154
  This is a data source which can be used to decrypt ciphertext using a Vault Transit key.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -54,12 +55,12 @@ class GetEncryptResult:
54
55
 
55
56
  @property
56
57
  @pulumi.getter
57
- def backend(self) -> str:
58
+ def backend(self) -> builtins.str:
58
59
  return pulumi.get(self, "backend")
59
60
 
60
61
  @property
61
62
  @pulumi.getter
62
- def ciphertext(self) -> str:
63
+ def ciphertext(self) -> builtins.str:
63
64
  """
64
65
  Encrypted ciphertext returned from Vault
65
66
  """
@@ -67,12 +68,12 @@ class GetEncryptResult:
67
68
 
68
69
  @property
69
70
  @pulumi.getter
70
- def context(self) -> Optional[str]:
71
+ def context(self) -> Optional[builtins.str]:
71
72
  return pulumi.get(self, "context")
72
73
 
73
74
  @property
74
75
  @pulumi.getter
75
- def id(self) -> str:
76
+ def id(self) -> builtins.str:
76
77
  """
77
78
  The provider-assigned unique ID for this managed resource.
78
79
  """
@@ -80,22 +81,22 @@ class GetEncryptResult:
80
81
 
81
82
  @property
82
83
  @pulumi.getter
83
- def key(self) -> str:
84
+ def key(self) -> builtins.str:
84
85
  return pulumi.get(self, "key")
85
86
 
86
87
  @property
87
88
  @pulumi.getter(name="keyVersion")
88
- def key_version(self) -> Optional[int]:
89
+ def key_version(self) -> Optional[builtins.int]:
89
90
  return pulumi.get(self, "key_version")
90
91
 
91
92
  @property
92
93
  @pulumi.getter
93
- def namespace(self) -> Optional[str]:
94
+ def namespace(self) -> Optional[builtins.str]:
94
95
  return pulumi.get(self, "namespace")
95
96
 
96
97
  @property
97
98
  @pulumi.getter
98
- def plaintext(self) -> str:
99
+ def plaintext(self) -> builtins.str:
99
100
  return pulumi.get(self, "plaintext")
100
101
 
101
102
 
@@ -115,12 +116,12 @@ class AwaitableGetEncryptResult(GetEncryptResult):
115
116
  plaintext=self.plaintext)
116
117
 
117
118
 
118
- def get_encrypt(backend: Optional[str] = None,
119
- context: Optional[str] = None,
120
- key: Optional[str] = None,
121
- key_version: Optional[int] = None,
122
- namespace: Optional[str] = None,
123
- plaintext: Optional[str] = None,
119
+ def get_encrypt(backend: Optional[builtins.str] = None,
120
+ context: Optional[builtins.str] = None,
121
+ key: Optional[builtins.str] = None,
122
+ key_version: Optional[builtins.int] = None,
123
+ namespace: Optional[builtins.str] = None,
124
+ plaintext: Optional[builtins.str] = None,
124
125
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetEncryptResult:
125
126
  """
126
127
  This is a data source which can be used to encrypt plaintext using a Vault Transit key.
@@ -144,12 +145,12 @@ def get_encrypt(backend: Optional[str] = None,
144
145
  key_version=pulumi.get(__ret__, 'key_version'),
145
146
  namespace=pulumi.get(__ret__, 'namespace'),
146
147
  plaintext=pulumi.get(__ret__, 'plaintext'))
147
- def get_encrypt_output(backend: Optional[pulumi.Input[str]] = None,
148
- context: Optional[pulumi.Input[Optional[str]]] = None,
149
- key: Optional[pulumi.Input[str]] = None,
150
- key_version: Optional[pulumi.Input[Optional[int]]] = None,
151
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
- plaintext: Optional[pulumi.Input[str]] = None,
148
+ def get_encrypt_output(backend: Optional[pulumi.Input[builtins.str]] = None,
149
+ context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
150
+ key: Optional[pulumi.Input[builtins.str]] = None,
151
+ key_version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
152
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
153
+ plaintext: Optional[pulumi.Input[builtins.str]] = None,
153
154
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEncryptResult]:
154
155
  """
155
156
  This is a data source which can be used to encrypt plaintext using a Vault Transit key.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -81,12 +82,12 @@ class GetSignResult:
81
82
 
82
83
  @property
83
84
  @pulumi.getter(name="batchInputs")
84
- def batch_inputs(self) -> Optional[Sequence[Mapping[str, str]]]:
85
+ def batch_inputs(self) -> Optional[Sequence[Mapping[str, builtins.str]]]:
85
86
  return pulumi.get(self, "batch_inputs")
86
87
 
87
88
  @property
88
89
  @pulumi.getter(name="batchResults")
89
- def batch_results(self) -> Sequence[Mapping[str, str]]:
90
+ def batch_results(self) -> Sequence[Mapping[str, builtins.str]]:
90
91
  """
91
92
  The results returned from Vault if using `batch_input`
92
93
  """
@@ -94,17 +95,17 @@ class GetSignResult:
94
95
 
95
96
  @property
96
97
  @pulumi.getter
97
- def context(self) -> Optional[str]:
98
+ def context(self) -> Optional[builtins.str]:
98
99
  return pulumi.get(self, "context")
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="hashAlgorithm")
102
- def hash_algorithm(self) -> Optional[str]:
103
+ def hash_algorithm(self) -> Optional[builtins.str]:
103
104
  return pulumi.get(self, "hash_algorithm")
104
105
 
105
106
  @property
106
107
  @pulumi.getter
107
- def id(self) -> str:
108
+ def id(self) -> builtins.str:
108
109
  """
109
110
  The provider-assigned unique ID for this managed resource.
110
111
  """
@@ -112,52 +113,52 @@ class GetSignResult:
112
113
 
113
114
  @property
114
115
  @pulumi.getter
115
- def input(self) -> Optional[str]:
116
+ def input(self) -> Optional[builtins.str]:
116
117
  return pulumi.get(self, "input")
117
118
 
118
119
  @property
119
120
  @pulumi.getter(name="keyVersion")
120
- def key_version(self) -> Optional[int]:
121
+ def key_version(self) -> Optional[builtins.int]:
121
122
  return pulumi.get(self, "key_version")
122
123
 
123
124
  @property
124
125
  @pulumi.getter(name="marshalingAlgorithm")
125
- def marshaling_algorithm(self) -> Optional[str]:
126
+ def marshaling_algorithm(self) -> Optional[builtins.str]:
126
127
  return pulumi.get(self, "marshaling_algorithm")
127
128
 
128
129
  @property
129
130
  @pulumi.getter
130
- def name(self) -> str:
131
+ def name(self) -> builtins.str:
131
132
  return pulumi.get(self, "name")
132
133
 
133
134
  @property
134
135
  @pulumi.getter
135
- def namespace(self) -> Optional[str]:
136
+ def namespace(self) -> Optional[builtins.str]:
136
137
  return pulumi.get(self, "namespace")
137
138
 
138
139
  @property
139
140
  @pulumi.getter
140
- def path(self) -> str:
141
+ def path(self) -> builtins.str:
141
142
  return pulumi.get(self, "path")
142
143
 
143
144
  @property
144
145
  @pulumi.getter
145
- def prehashed(self) -> Optional[bool]:
146
+ def prehashed(self) -> Optional[builtins.bool]:
146
147
  return pulumi.get(self, "prehashed")
147
148
 
148
149
  @property
149
150
  @pulumi.getter
150
- def reference(self) -> Optional[str]:
151
+ def reference(self) -> Optional[builtins.str]:
151
152
  return pulumi.get(self, "reference")
152
153
 
153
154
  @property
154
155
  @pulumi.getter(name="saltLength")
155
- def salt_length(self) -> Optional[str]:
156
+ def salt_length(self) -> Optional[builtins.str]:
156
157
  return pulumi.get(self, "salt_length")
157
158
 
158
159
  @property
159
160
  @pulumi.getter
160
- def signature(self) -> str:
161
+ def signature(self) -> builtins.str:
161
162
  """
162
163
  The signature returned from Vault if using `input`
163
164
  """
@@ -165,12 +166,12 @@ class GetSignResult:
165
166
 
166
167
  @property
167
168
  @pulumi.getter(name="signatureAlgorithm")
168
- def signature_algorithm(self) -> Optional[str]:
169
+ def signature_algorithm(self) -> Optional[builtins.str]:
169
170
  return pulumi.get(self, "signature_algorithm")
170
171
 
171
172
  @property
172
173
  @pulumi.getter(name="signatureContext")
173
- def signature_context(self) -> Optional[str]:
174
+ def signature_context(self) -> Optional[builtins.str]:
174
175
  return pulumi.get(self, "signature_context")
175
176
 
176
177
 
@@ -199,29 +200,29 @@ class AwaitableGetSignResult(GetSignResult):
199
200
  signature_context=self.signature_context)
200
201
 
201
202
 
202
- def get_sign(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
203
- batch_results: Optional[Sequence[Mapping[str, str]]] = None,
204
- context: Optional[str] = None,
205
- hash_algorithm: Optional[str] = None,
206
- input: Optional[str] = None,
207
- key_version: Optional[int] = None,
208
- marshaling_algorithm: Optional[str] = None,
209
- name: Optional[str] = None,
210
- namespace: Optional[str] = None,
211
- path: Optional[str] = None,
212
- prehashed: Optional[bool] = None,
213
- reference: Optional[str] = None,
214
- salt_length: Optional[str] = None,
215
- signature: Optional[str] = None,
216
- signature_algorithm: Optional[str] = None,
217
- signature_context: Optional[str] = None,
203
+ def get_sign(batch_inputs: Optional[Sequence[Mapping[str, builtins.str]]] = None,
204
+ batch_results: Optional[Sequence[Mapping[str, builtins.str]]] = None,
205
+ context: Optional[builtins.str] = None,
206
+ hash_algorithm: Optional[builtins.str] = None,
207
+ input: Optional[builtins.str] = None,
208
+ key_version: Optional[builtins.int] = None,
209
+ marshaling_algorithm: Optional[builtins.str] = None,
210
+ name: Optional[builtins.str] = None,
211
+ namespace: Optional[builtins.str] = None,
212
+ path: Optional[builtins.str] = None,
213
+ prehashed: Optional[builtins.bool] = None,
214
+ reference: Optional[builtins.str] = None,
215
+ salt_length: Optional[builtins.str] = None,
216
+ signature: Optional[builtins.str] = None,
217
+ signature_algorithm: Optional[builtins.str] = None,
218
+ signature_context: Optional[builtins.str] = None,
218
219
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSignResult:
219
220
  """
220
221
  This is a data source which can be used to generate a signature using a Vault Transit key.
221
222
 
222
223
 
223
- :param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
224
- :param str signature: The signature returned from Vault if using `input`
224
+ :param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
225
+ :param builtins.str signature: The signature returned from Vault if using `input`
225
226
  """
226
227
  __args__ = dict()
227
228
  __args__['batchInputs'] = batch_inputs
@@ -261,29 +262,29 @@ def get_sign(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
261
262
  signature=pulumi.get(__ret__, 'signature'),
262
263
  signature_algorithm=pulumi.get(__ret__, 'signature_algorithm'),
263
264
  signature_context=pulumi.get(__ret__, 'signature_context'))
264
- def get_sign_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
265
- batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
266
- context: Optional[pulumi.Input[Optional[str]]] = None,
267
- hash_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
268
- input: Optional[pulumi.Input[Optional[str]]] = None,
269
- key_version: Optional[pulumi.Input[Optional[int]]] = None,
270
- marshaling_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
271
- name: Optional[pulumi.Input[str]] = None,
272
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
273
- path: Optional[pulumi.Input[str]] = None,
274
- prehashed: Optional[pulumi.Input[Optional[bool]]] = None,
275
- reference: Optional[pulumi.Input[Optional[str]]] = None,
276
- salt_length: Optional[pulumi.Input[Optional[str]]] = None,
277
- signature: Optional[pulumi.Input[Optional[str]]] = None,
278
- signature_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
279
- signature_context: Optional[pulumi.Input[Optional[str]]] = None,
265
+ def get_sign_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
266
+ batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
267
+ context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
268
+ hash_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
269
+ input: Optional[pulumi.Input[Optional[builtins.str]]] = None,
270
+ key_version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
271
+ marshaling_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
272
+ name: Optional[pulumi.Input[builtins.str]] = None,
273
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
274
+ path: Optional[pulumi.Input[builtins.str]] = None,
275
+ prehashed: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
276
+ reference: Optional[pulumi.Input[Optional[builtins.str]]] = None,
277
+ salt_length: Optional[pulumi.Input[Optional[builtins.str]]] = None,
278
+ signature: Optional[pulumi.Input[Optional[builtins.str]]] = None,
279
+ signature_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
280
+ signature_context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
280
281
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSignResult]:
281
282
  """
282
283
  This is a data source which can be used to generate a signature using a Vault Transit key.
283
284
 
284
285
 
285
- :param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
286
- :param str signature: The signature returned from Vault if using `input`
286
+ :param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
287
+ :param builtins.str signature: The signature returned from Vault if using `input`
287
288
  """
288
289
  __args__ = dict()
289
290
  __args__['batchInputs'] = batch_inputs
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -87,12 +88,12 @@ class GetVerifyResult:
87
88
 
88
89
  @property
89
90
  @pulumi.getter(name="batchInputs")
90
- def batch_inputs(self) -> Optional[Sequence[Mapping[str, str]]]:
91
+ def batch_inputs(self) -> Optional[Sequence[Mapping[str, builtins.str]]]:
91
92
  return pulumi.get(self, "batch_inputs")
92
93
 
93
94
  @property
94
95
  @pulumi.getter(name="batchResults")
95
- def batch_results(self) -> Sequence[Mapping[str, str]]:
96
+ def batch_results(self) -> Sequence[Mapping[str, builtins.str]]:
96
97
  """
97
98
  The results returned from Vault if using `batch_input`
98
99
  """
@@ -100,27 +101,27 @@ class GetVerifyResult:
100
101
 
101
102
  @property
102
103
  @pulumi.getter
103
- def cmac(self) -> Optional[str]:
104
+ def cmac(self) -> Optional[builtins.str]:
104
105
  return pulumi.get(self, "cmac")
105
106
 
106
107
  @property
107
108
  @pulumi.getter
108
- def context(self) -> Optional[str]:
109
+ def context(self) -> Optional[builtins.str]:
109
110
  return pulumi.get(self, "context")
110
111
 
111
112
  @property
112
113
  @pulumi.getter(name="hashAlgorithm")
113
- def hash_algorithm(self) -> Optional[str]:
114
+ def hash_algorithm(self) -> Optional[builtins.str]:
114
115
  return pulumi.get(self, "hash_algorithm")
115
116
 
116
117
  @property
117
118
  @pulumi.getter
118
- def hmac(self) -> Optional[str]:
119
+ def hmac(self) -> Optional[builtins.str]:
119
120
  return pulumi.get(self, "hmac")
120
121
 
121
122
  @property
122
123
  @pulumi.getter
123
- def id(self) -> str:
124
+ def id(self) -> builtins.str:
124
125
  """
125
126
  The provider-assigned unique ID for this managed resource.
126
127
  """
@@ -128,62 +129,62 @@ class GetVerifyResult:
128
129
 
129
130
  @property
130
131
  @pulumi.getter
131
- def input(self) -> Optional[str]:
132
+ def input(self) -> Optional[builtins.str]:
132
133
  return pulumi.get(self, "input")
133
134
 
134
135
  @property
135
136
  @pulumi.getter(name="marshalingAlgorithm")
136
- def marshaling_algorithm(self) -> Optional[str]:
137
+ def marshaling_algorithm(self) -> Optional[builtins.str]:
137
138
  return pulumi.get(self, "marshaling_algorithm")
138
139
 
139
140
  @property
140
141
  @pulumi.getter
141
- def name(self) -> str:
142
+ def name(self) -> builtins.str:
142
143
  return pulumi.get(self, "name")
143
144
 
144
145
  @property
145
146
  @pulumi.getter
146
- def namespace(self) -> Optional[str]:
147
+ def namespace(self) -> Optional[builtins.str]:
147
148
  return pulumi.get(self, "namespace")
148
149
 
149
150
  @property
150
151
  @pulumi.getter
151
- def path(self) -> str:
152
+ def path(self) -> builtins.str:
152
153
  return pulumi.get(self, "path")
153
154
 
154
155
  @property
155
156
  @pulumi.getter
156
- def prehashed(self) -> Optional[bool]:
157
+ def prehashed(self) -> Optional[builtins.bool]:
157
158
  return pulumi.get(self, "prehashed")
158
159
 
159
160
  @property
160
161
  @pulumi.getter
161
- def reference(self) -> Optional[str]:
162
+ def reference(self) -> Optional[builtins.str]:
162
163
  return pulumi.get(self, "reference")
163
164
 
164
165
  @property
165
166
  @pulumi.getter(name="saltLength")
166
- def salt_length(self) -> Optional[str]:
167
+ def salt_length(self) -> Optional[builtins.str]:
167
168
  return pulumi.get(self, "salt_length")
168
169
 
169
170
  @property
170
171
  @pulumi.getter
171
- def signature(self) -> Optional[str]:
172
+ def signature(self) -> Optional[builtins.str]:
172
173
  return pulumi.get(self, "signature")
173
174
 
174
175
  @property
175
176
  @pulumi.getter(name="signatureAlgorithm")
176
- def signature_algorithm(self) -> Optional[str]:
177
+ def signature_algorithm(self) -> Optional[builtins.str]:
177
178
  return pulumi.get(self, "signature_algorithm")
178
179
 
179
180
  @property
180
181
  @pulumi.getter(name="signatureContext")
181
- def signature_context(self) -> Optional[str]:
182
+ def signature_context(self) -> Optional[builtins.str]:
182
183
  return pulumi.get(self, "signature_context")
183
184
 
184
185
  @property
185
186
  @pulumi.getter
186
- def valid(self) -> bool:
187
+ def valid(self) -> builtins.bool:
187
188
  """
188
189
  Returns `true` if the signature verification succeeded and `false` otherwise
189
190
  """
@@ -217,31 +218,31 @@ class AwaitableGetVerifyResult(GetVerifyResult):
217
218
  valid=self.valid)
218
219
 
219
220
 
220
- def get_verify(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
221
- batch_results: Optional[Sequence[Mapping[str, str]]] = None,
222
- cmac: Optional[str] = None,
223
- context: Optional[str] = None,
224
- hash_algorithm: Optional[str] = None,
225
- hmac: Optional[str] = None,
226
- input: Optional[str] = None,
227
- marshaling_algorithm: Optional[str] = None,
228
- name: Optional[str] = None,
229
- namespace: Optional[str] = None,
230
- path: Optional[str] = None,
231
- prehashed: Optional[bool] = None,
232
- reference: Optional[str] = None,
233
- salt_length: Optional[str] = None,
234
- signature: Optional[str] = None,
235
- signature_algorithm: Optional[str] = None,
236
- signature_context: Optional[str] = None,
237
- valid: Optional[bool] = None,
221
+ def get_verify(batch_inputs: Optional[Sequence[Mapping[str, builtins.str]]] = None,
222
+ batch_results: Optional[Sequence[Mapping[str, builtins.str]]] = None,
223
+ cmac: Optional[builtins.str] = None,
224
+ context: Optional[builtins.str] = None,
225
+ hash_algorithm: Optional[builtins.str] = None,
226
+ hmac: Optional[builtins.str] = None,
227
+ input: Optional[builtins.str] = None,
228
+ marshaling_algorithm: Optional[builtins.str] = None,
229
+ name: Optional[builtins.str] = None,
230
+ namespace: Optional[builtins.str] = None,
231
+ path: Optional[builtins.str] = None,
232
+ prehashed: Optional[builtins.bool] = None,
233
+ reference: Optional[builtins.str] = None,
234
+ salt_length: Optional[builtins.str] = None,
235
+ signature: Optional[builtins.str] = None,
236
+ signature_algorithm: Optional[builtins.str] = None,
237
+ signature_context: Optional[builtins.str] = None,
238
+ valid: Optional[builtins.bool] = None,
238
239
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetVerifyResult:
239
240
  """
240
241
  This is a data source which can be used to verify a signature using a Vault Transit key.
241
242
 
242
243
 
243
- :param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
244
- :param bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
244
+ :param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
245
+ :param builtins.bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
245
246
  """
246
247
  __args__ = dict()
247
248
  __args__['batchInputs'] = batch_inputs
@@ -285,31 +286,31 @@ def get_verify(batch_inputs: Optional[Sequence[Mapping[str, str]]] = None,
285
286
  signature_algorithm=pulumi.get(__ret__, 'signature_algorithm'),
286
287
  signature_context=pulumi.get(__ret__, 'signature_context'),
287
288
  valid=pulumi.get(__ret__, 'valid'))
288
- def get_verify_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
289
- batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, str]]]]] = None,
290
- cmac: Optional[pulumi.Input[Optional[str]]] = None,
291
- context: Optional[pulumi.Input[Optional[str]]] = None,
292
- hash_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
293
- hmac: Optional[pulumi.Input[Optional[str]]] = None,
294
- input: Optional[pulumi.Input[Optional[str]]] = None,
295
- marshaling_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
296
- name: Optional[pulumi.Input[str]] = None,
297
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
298
- path: Optional[pulumi.Input[str]] = None,
299
- prehashed: Optional[pulumi.Input[Optional[bool]]] = None,
300
- reference: Optional[pulumi.Input[Optional[str]]] = None,
301
- salt_length: Optional[pulumi.Input[Optional[str]]] = None,
302
- signature: Optional[pulumi.Input[Optional[str]]] = None,
303
- signature_algorithm: Optional[pulumi.Input[Optional[str]]] = None,
304
- signature_context: Optional[pulumi.Input[Optional[str]]] = None,
305
- valid: Optional[pulumi.Input[Optional[bool]]] = None,
289
+ def get_verify_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
290
+ batch_results: Optional[pulumi.Input[Optional[Sequence[Mapping[str, builtins.str]]]]] = None,
291
+ cmac: Optional[pulumi.Input[Optional[builtins.str]]] = None,
292
+ context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
293
+ hash_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
294
+ hmac: Optional[pulumi.Input[Optional[builtins.str]]] = None,
295
+ input: Optional[pulumi.Input[Optional[builtins.str]]] = None,
296
+ marshaling_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
297
+ name: Optional[pulumi.Input[builtins.str]] = None,
298
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
299
+ path: Optional[pulumi.Input[builtins.str]] = None,
300
+ prehashed: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
301
+ reference: Optional[pulumi.Input[Optional[builtins.str]]] = None,
302
+ salt_length: Optional[pulumi.Input[Optional[builtins.str]]] = None,
303
+ signature: Optional[pulumi.Input[Optional[builtins.str]]] = None,
304
+ signature_algorithm: Optional[pulumi.Input[Optional[builtins.str]]] = None,
305
+ signature_context: Optional[pulumi.Input[Optional[builtins.str]]] = None,
306
+ valid: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
306
307
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetVerifyResult]:
307
308
  """
308
309
  This is a data source which can be used to verify a signature using a Vault Transit key.
309
310
 
310
311
 
311
- :param Sequence[Mapping[str, str]] batch_results: The results returned from Vault if using `batch_input`
312
- :param bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
312
+ :param Sequence[Mapping[str, builtins.str]] batch_results: The results returned from Vault if using `batch_input`
313
+ :param builtins.bool valid: Returns `true` if the signature verification succeeded and `false` otherwise
313
314
  """
314
315
  __args__ = dict()
315
316
  __args__['batchInputs'] = batch_inputs