Google Cloud Native is in preview. Google Cloud Classic is fully supported.
google-native.binaryauthorization/v1.Attestor
Explore with Pulumi AI
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Creates an attestor, and returns a copy of the new attestor. Returns NOT_FOUND
if the project does not exist, INVALID_ARGUMENT
if the request is malformed, ALREADY_EXISTS
if the attestor already exists.
Create Attestor Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Attestor(name: string, args: AttestorArgs, opts?: CustomResourceOptions);
@overload
def Attestor(resource_name: str,
args: AttestorArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Attestor(resource_name: str,
opts: Optional[ResourceOptions] = None,
attestor_id: Optional[str] = None,
description: Optional[str] = None,
etag: Optional[str] = None,
name: Optional[str] = None,
project: Optional[str] = None,
user_owned_grafeas_note: Optional[UserOwnedGrafeasNoteArgs] = None)
func NewAttestor(ctx *Context, name string, args AttestorArgs, opts ...ResourceOption) (*Attestor, error)
public Attestor(string name, AttestorArgs args, CustomResourceOptions? opts = null)
public Attestor(String name, AttestorArgs args)
public Attestor(String name, AttestorArgs args, CustomResourceOptions options)
type: google-native:binaryauthorization/v1:Attestor
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AttestorArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AttestorArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AttestorArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AttestorArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AttestorArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var attestorResource = new GoogleNative.BinaryAuthorization.V1.Attestor("attestorResource", new()
{
AttestorId = "string",
Description = "string",
Etag = "string",
Name = "string",
Project = "string",
UserOwnedGrafeasNote = new GoogleNative.BinaryAuthorization.V1.Inputs.UserOwnedGrafeasNoteArgs
{
NoteReference = "string",
PublicKeys = new[]
{
new GoogleNative.BinaryAuthorization.V1.Inputs.AttestorPublicKeyArgs
{
AsciiArmoredPgpPublicKey = "string",
Comment = "string",
Id = "string",
PkixPublicKey = new GoogleNative.BinaryAuthorization.V1.Inputs.PkixPublicKeyArgs
{
KeyId = "string",
PublicKeyPem = "string",
SignatureAlgorithm = GoogleNative.BinaryAuthorization.V1.PkixPublicKeySignatureAlgorithm.SignatureAlgorithmUnspecified,
},
},
},
},
});
example, err := binaryauthorization.NewAttestor(ctx, "attestorResource", &binaryauthorization.AttestorArgs{
AttestorId: pulumi.String("string"),
Description: pulumi.String("string"),
Etag: pulumi.String("string"),
Name: pulumi.String("string"),
Project: pulumi.String("string"),
UserOwnedGrafeasNote: &binaryauthorization.UserOwnedGrafeasNoteArgs{
NoteReference: pulumi.String("string"),
PublicKeys: binaryauthorization.AttestorPublicKeyArray{
&binaryauthorization.AttestorPublicKeyArgs{
AsciiArmoredPgpPublicKey: pulumi.String("string"),
Comment: pulumi.String("string"),
Id: pulumi.String("string"),
PkixPublicKey: &binaryauthorization.PkixPublicKeyArgs{
KeyId: pulumi.String("string"),
PublicKeyPem: pulumi.String("string"),
SignatureAlgorithm: binaryauthorization.PkixPublicKeySignatureAlgorithmSignatureAlgorithmUnspecified,
},
},
},
},
})
var attestorResource = new Attestor("attestorResource", AttestorArgs.builder()
.attestorId("string")
.description("string")
.etag("string")
.name("string")
.project("string")
.userOwnedGrafeasNote(UserOwnedGrafeasNoteArgs.builder()
.noteReference("string")
.publicKeys(AttestorPublicKeyArgs.builder()
.asciiArmoredPgpPublicKey("string")
.comment("string")
.id("string")
.pkixPublicKey(PkixPublicKeyArgs.builder()
.keyId("string")
.publicKeyPem("string")
.signatureAlgorithm("SIGNATURE_ALGORITHM_UNSPECIFIED")
.build())
.build())
.build())
.build());
attestor_resource = google_native.binaryauthorization.v1.Attestor("attestorResource",
attestor_id="string",
description="string",
etag="string",
name="string",
project="string",
user_owned_grafeas_note=google_native.binaryauthorization.v1.UserOwnedGrafeasNoteArgs(
note_reference="string",
public_keys=[google_native.binaryauthorization.v1.AttestorPublicKeyArgs(
ascii_armored_pgp_public_key="string",
comment="string",
id="string",
pkix_public_key=google_native.binaryauthorization.v1.PkixPublicKeyArgs(
key_id="string",
public_key_pem="string",
signature_algorithm=google_native.binaryauthorization.v1.PkixPublicKeySignatureAlgorithm.SIGNATURE_ALGORITHM_UNSPECIFIED,
),
)],
))
const attestorResource = new google_native.binaryauthorization.v1.Attestor("attestorResource", {
attestorId: "string",
description: "string",
etag: "string",
name: "string",
project: "string",
userOwnedGrafeasNote: {
noteReference: "string",
publicKeys: [{
asciiArmoredPgpPublicKey: "string",
comment: "string",
id: "string",
pkixPublicKey: {
keyId: "string",
publicKeyPem: "string",
signatureAlgorithm: google_native.binaryauthorization.v1.PkixPublicKeySignatureAlgorithm.SignatureAlgorithmUnspecified,
},
}],
},
});
type: google-native:binaryauthorization/v1:Attestor
properties:
attestorId: string
description: string
etag: string
name: string
project: string
userOwnedGrafeasNote:
noteReference: string
publicKeys:
- asciiArmoredPgpPublicKey: string
comment: string
id: string
pkixPublicKey:
keyId: string
publicKeyPem: string
signatureAlgorithm: SIGNATURE_ALGORITHM_UNSPECIFIED
Attestor Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Attestor resource accepts the following input properties:
- Attestor
Id string - Required. The attestors ID.
- Description string
- Optional. A descriptive comment. This field may be updated. The field may be displayed in chooser dialogs.
- Etag string
- Optional. A checksum, returned by the server, that can be sent on update requests to ensure the attestor has an up-to-date value before attempting to update it. See https://google.aip.dev/154.
- Name string
- The resource name, in the format:
projects/*/attestors/*
. This field may not be updated. - Project string
- User
Owned Pulumi.Grafeas Note Google Native. Binary Authorization. V1. Inputs. User Owned Grafeas Note - This specifies how an attestation will be read, and how it will be used during policy enforcement.
- Attestor
Id string - Required. The attestors ID.
- Description string
- Optional. A descriptive comment. This field may be updated. The field may be displayed in chooser dialogs.
- Etag string
- Optional. A checksum, returned by the server, that can be sent on update requests to ensure the attestor has an up-to-date value before attempting to update it. See https://google.aip.dev/154.
- Name string
- The resource name, in the format:
projects/*/attestors/*
. This field may not be updated. - Project string
- User
Owned UserGrafeas Note Owned Grafeas Note Args - This specifies how an attestation will be read, and how it will be used during policy enforcement.
- attestor
Id String - Required. The attestors ID.
- description String
- Optional. A descriptive comment. This field may be updated. The field may be displayed in chooser dialogs.
- etag String
- Optional. A checksum, returned by the server, that can be sent on update requests to ensure the attestor has an up-to-date value before attempting to update it. See https://google.aip.dev/154.
- name String
- The resource name, in the format:
projects/*/attestors/*
. This field may not be updated. - project String
- user
Owned UserGrafeas Note Owned Grafeas Note - This specifies how an attestation will be read, and how it will be used during policy enforcement.
- attestor
Id string - Required. The attestors ID.
- description string
- Optional. A descriptive comment. This field may be updated. The field may be displayed in chooser dialogs.
- etag string
- Optional. A checksum, returned by the server, that can be sent on update requests to ensure the attestor has an up-to-date value before attempting to update it. See https://google.aip.dev/154.
- name string
- The resource name, in the format:
projects/*/attestors/*
. This field may not be updated. - project string
- user
Owned UserGrafeas Note Owned Grafeas Note - This specifies how an attestation will be read, and how it will be used during policy enforcement.
- attestor_
id str - Required. The attestors ID.
- description str
- Optional. A descriptive comment. This field may be updated. The field may be displayed in chooser dialogs.
- etag str
- Optional. A checksum, returned by the server, that can be sent on update requests to ensure the attestor has an up-to-date value before attempting to update it. See https://google.aip.dev/154.
- name str
- The resource name, in the format:
projects/*/attestors/*
. This field may not be updated. - project str
- user_
owned_ Usergrafeas_ note Owned Grafeas Note Args - This specifies how an attestation will be read, and how it will be used during policy enforcement.
- attestor
Id String - Required. The attestors ID.
- description String
- Optional. A descriptive comment. This field may be updated. The field may be displayed in chooser dialogs.
- etag String
- Optional. A checksum, returned by the server, that can be sent on update requests to ensure the attestor has an up-to-date value before attempting to update it. See https://google.aip.dev/154.
- name String
- The resource name, in the format:
projects/*/attestors/*
. This field may not be updated. - project String
- user
Owned Property MapGrafeas Note - This specifies how an attestation will be read, and how it will be used during policy enforcement.
Outputs
All input properties are implicitly available as output properties. Additionally, the Attestor resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Update
Time string - Time when the attestor was last updated.
- Id string
- The provider-assigned unique ID for this managed resource.
- Update
Time string - Time when the attestor was last updated.
- id String
- The provider-assigned unique ID for this managed resource.
- update
Time String - Time when the attestor was last updated.
- id string
- The provider-assigned unique ID for this managed resource.
- update
Time string - Time when the attestor was last updated.
- id str
- The provider-assigned unique ID for this managed resource.
- update_
time str - Time when the attestor was last updated.
- id String
- The provider-assigned unique ID for this managed resource.
- update
Time String - Time when the attestor was last updated.
Supporting Types
AttestorPublicKey, AttestorPublicKeyArgs
- Ascii
Armored stringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - Comment string
- Optional. A descriptive comment. This field may be updated.
- Id string
- The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. Additional restrictions on this field can be imposed based on which public key type is encapsulated. See the documentation on
public_key
cases below for details. - Pkix
Public Pulumi.Key Google Native. Binary Authorization. V1. Inputs. Pkix Public Key - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- Ascii
Armored stringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - Comment string
- Optional. A descriptive comment. This field may be updated.
- Id string
- The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. Additional restrictions on this field can be imposed based on which public key type is encapsulated. See the documentation on
public_key
cases below for details. - Pkix
Public PkixKey Public Key - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii
Armored StringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment String
- Optional. A descriptive comment. This field may be updated.
- id String
- The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. Additional restrictions on this field can be imposed based on which public key type is encapsulated. See the documentation on
public_key
cases below for details. - pkix
Public PkixKey Public Key - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii
Armored stringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment string
- Optional. A descriptive comment. This field may be updated.
- id string
- The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. Additional restrictions on this field can be imposed based on which public key type is encapsulated. See the documentation on
public_key
cases below for details. - pkix
Public PkixKey Public Key - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii_
armored_ strpgp_ public_ key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment str
- Optional. A descriptive comment. This field may be updated.
- id str
- The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. Additional restrictions on this field can be imposed based on which public key type is encapsulated. See the documentation on
public_key
cases below for details. - pkix_
public_ Pkixkey Public Key - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii
Armored StringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment String
- Optional. A descriptive comment. This field may be updated.
- id String
- The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. Additional restrictions on this field can be imposed based on which public key type is encapsulated. See the documentation on
public_key
cases below for details. - pkix
Public Property MapKey - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
AttestorPublicKeyResponse, AttestorPublicKeyResponseArgs
- Ascii
Armored stringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - Comment string
- Optional. A descriptive comment. This field may be updated.
- Pkix
Public Pulumi.Key Google Native. Binary Authorization. V1. Inputs. Pkix Public Key Response - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- Ascii
Armored stringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - Comment string
- Optional. A descriptive comment. This field may be updated.
- Pkix
Public PkixKey Public Key Response - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii
Armored StringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment String
- Optional. A descriptive comment. This field may be updated.
- pkix
Public PkixKey Public Key Response - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii
Armored stringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment string
- Optional. A descriptive comment. This field may be updated.
- pkix
Public PkixKey Public Key Response - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii_
armored_ strpgp_ public_ key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment str
- Optional. A descriptive comment. This field may be updated.
- pkix_
public_ Pkixkey Public Key Response - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
- ascii
Armored StringPgp Public Key - ASCII-armored representation of a PGP public key, as the entire output by the command
gpg --export --armor foo@example.com
(either LF or CRLF line endings). When using this field,id
should be left blank. The Binary Authorization API handlers will calculate the ID and fill it in automatically. Binary Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. Ifid
is provided by the caller, it will be overwritten by the API-calculated ID. - comment String
- Optional. A descriptive comment. This field may be updated.
- pkix
Public Property MapKey - A raw PKIX SubjectPublicKeyInfo format public key. NOTE:
id
may be explicitly provided by the caller when using this type of public key, but it MUST be a valid RFC3986 URI. Ifid
is left blank, a default one will be computed based on the digest of the DER encoding of the public key.
PkixPublicKey, PkixPublicKeyArgs
- Key
Id string - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - Public
Key stringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- Signature
Algorithm Pulumi.Google Native. Binary Authorization. V1. Pkix Public Key Signature Algorithm - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- Key
Id string - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - Public
Key stringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- Signature
Algorithm PkixPublic Key Signature Algorithm - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key
Id String - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public
Key StringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature
Algorithm PkixPublic Key Signature Algorithm - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key
Id string - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public
Key stringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature
Algorithm PkixPublic Key Signature Algorithm - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key_
id str - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public_
key_ strpem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature_
algorithm PkixPublic Key Signature Algorithm - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key
Id String - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public
Key StringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature
Algorithm "SIGNATURE_ALGORITHM_UNSPECIFIED" | "RSA_PSS_2048_SHA256" | "RSA_SIGN_PSS_2048_SHA256" | "RSA_PSS_3072_SHA256" | "RSA_SIGN_PSS_3072_SHA256" | "RSA_PSS_4096_SHA256" | "RSA_SIGN_PSS_4096_SHA256" | "RSA_PSS_4096_SHA512" | "RSA_SIGN_PSS_4096_SHA512" | "RSA_SIGN_PKCS1_2048_SHA256" | "RSA_SIGN_PKCS1_3072_SHA256" | "RSA_SIGN_PKCS1_4096_SHA256" | "RSA_SIGN_PKCS1_4096_SHA512" | "ECDSA_P256_SHA256" | "EC_SIGN_P256_SHA256" | "ECDSA_P384_SHA384" | "EC_SIGN_P384_SHA384" | "ECDSA_P521_SHA512" | "EC_SIGN_P521_SHA512" - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
PkixPublicKeyResponse, PkixPublicKeyResponseArgs
- Key
Id string - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - Public
Key stringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- Signature
Algorithm string - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- Key
Id string - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - Public
Key stringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- Signature
Algorithm string - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key
Id String - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public
Key StringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature
Algorithm String - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key
Id string - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public
Key stringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature
Algorithm string - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key_
id str - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public_
key_ strpem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature_
algorithm str - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
- key
Id String - Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If
key_id
is left blank and thisPkixPublicKey
is not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKey
is used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey
), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value. - public
Key StringPem - A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature
Algorithm String - The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in
public_key_pem
(i.e. this algorithm must match that of the public key).
PkixPublicKeySignatureAlgorithm, PkixPublicKeySignatureAlgorithmArgs
- Signature
Algorithm Unspecified - SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified.
- Rsa
Pss2048Sha256 - RSA_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Rsa
Sign Pss2048Sha256 - RSA_SIGN_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Rsa
Pss3072Sha256 - RSA_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Rsa
Sign Pss3072Sha256 - RSA_SIGN_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Rsa
Pss4096Sha256 - RSA_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Rsa
Sign Pss4096Sha256 - RSA_SIGN_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Rsa
Pss4096Sha512 - RSA_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Rsa
Sign Pss4096Sha512 - RSA_SIGN_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Rsa
Sign Pkcs12048Sha256 - RSA_SIGN_PKCS1_2048_SHA256RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
- Rsa
Sign Pkcs13072Sha256 - RSA_SIGN_PKCS1_3072_SHA256RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
- Rsa
Sign Pkcs14096Sha256 - RSA_SIGN_PKCS1_4096_SHA256RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
- Rsa
Sign Pkcs14096Sha512 - RSA_SIGN_PKCS1_4096_SHA512RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
- Ecdsa
P256Sha256 - ECDSA_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Ec
Sign P256Sha256 - EC_SIGN_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Ecdsa
P384Sha384 - ECDSA_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Ec
Sign P384Sha384 - EC_SIGN_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Ecdsa
P521Sha512 - ECDSA_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- Ec
Sign P521Sha512 - EC_SIGN_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- Pkix
Public Key Signature Algorithm Signature Algorithm Unspecified - SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified.
- Pkix
Public Key Signature Algorithm Rsa Pss2048Sha256 - RSA_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pss2048Sha256 - RSA_SIGN_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Pss3072Sha256 - RSA_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pss3072Sha256 - RSA_SIGN_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Pss4096Sha256 - RSA_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pss4096Sha256 - RSA_SIGN_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Pss4096Sha512 - RSA_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pss4096Sha512 - RSA_SIGN_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pkcs12048Sha256 - RSA_SIGN_PKCS1_2048_SHA256RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pkcs13072Sha256 - RSA_SIGN_PKCS1_3072_SHA256RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pkcs14096Sha256 - RSA_SIGN_PKCS1_4096_SHA256RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
- Pkix
Public Key Signature Algorithm Rsa Sign Pkcs14096Sha512 - RSA_SIGN_PKCS1_4096_SHA512RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
- Pkix
Public Key Signature Algorithm Ecdsa P256Sha256 - ECDSA_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Ec Sign P256Sha256 - EC_SIGN_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Pkix
Public Key Signature Algorithm Ecdsa P384Sha384 - ECDSA_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Pkix
Public Key Signature Algorithm Ec Sign P384Sha384 - EC_SIGN_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Pkix
Public Key Signature Algorithm Ecdsa P521Sha512 - ECDSA_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- Pkix
Public Key Signature Algorithm Ec Sign P521Sha512 - EC_SIGN_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- Signature
Algorithm Unspecified - SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified.
- Rsa
Pss2048Sha256 - RSA_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Rsa
Sign Pss2048Sha256 - RSA_SIGN_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Rsa
Pss3072Sha256 - RSA_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Rsa
Sign Pss3072Sha256 - RSA_SIGN_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Rsa
Pss4096Sha256 - RSA_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Rsa
Sign Pss4096Sha256 - RSA_SIGN_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Rsa
Pss4096Sha512 - RSA_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Rsa
Sign Pss4096Sha512 - RSA_SIGN_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Rsa
Sign Pkcs12048Sha256 - RSA_SIGN_PKCS1_2048_SHA256RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
- Rsa
Sign Pkcs13072Sha256 - RSA_SIGN_PKCS1_3072_SHA256RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
- Rsa
Sign Pkcs14096Sha256 - RSA_SIGN_PKCS1_4096_SHA256RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
- Rsa
Sign Pkcs14096Sha512 - RSA_SIGN_PKCS1_4096_SHA512RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
- Ecdsa
P256Sha256 - ECDSA_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Ec
Sign P256Sha256 - EC_SIGN_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Ecdsa
P384Sha384 - ECDSA_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Ec
Sign P384Sha384 - EC_SIGN_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Ecdsa
P521Sha512 - ECDSA_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- Ec
Sign P521Sha512 - EC_SIGN_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- Signature
Algorithm Unspecified - SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified.
- Rsa
Pss2048Sha256 - RSA_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Rsa
Sign Pss2048Sha256 - RSA_SIGN_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- Rsa
Pss3072Sha256 - RSA_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Rsa
Sign Pss3072Sha256 - RSA_SIGN_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- Rsa
Pss4096Sha256 - RSA_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Rsa
Sign Pss4096Sha256 - RSA_SIGN_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- Rsa
Pss4096Sha512 - RSA_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Rsa
Sign Pss4096Sha512 - RSA_SIGN_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- Rsa
Sign Pkcs12048Sha256 - RSA_SIGN_PKCS1_2048_SHA256RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
- Rsa
Sign Pkcs13072Sha256 - RSA_SIGN_PKCS1_3072_SHA256RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
- Rsa
Sign Pkcs14096Sha256 - RSA_SIGN_PKCS1_4096_SHA256RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
- Rsa
Sign Pkcs14096Sha512 - RSA_SIGN_PKCS1_4096_SHA512RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
- Ecdsa
P256Sha256 - ECDSA_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Ec
Sign P256Sha256 - EC_SIGN_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- Ecdsa
P384Sha384 - ECDSA_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Ec
Sign P384Sha384 - EC_SIGN_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- Ecdsa
P521Sha512 - ECDSA_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- Ec
Sign P521Sha512 - EC_SIGN_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- SIGNATURE_ALGORITHM_UNSPECIFIED
- SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified.
- RSA_PSS2048_SHA256
- RSA_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- RSA_SIGN_PSS2048_SHA256
- RSA_SIGN_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- RSA_PSS3072_SHA256
- RSA_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- RSA_SIGN_PSS3072_SHA256
- RSA_SIGN_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- RSA_PSS4096_SHA256
- RSA_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- RSA_SIGN_PSS4096_SHA256
- RSA_SIGN_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- RSA_PSS4096_SHA512
- RSA_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- RSA_SIGN_PSS4096_SHA512
- RSA_SIGN_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- RSA_SIGN_PKCS12048_SHA256
- RSA_SIGN_PKCS1_2048_SHA256RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
- RSA_SIGN_PKCS13072_SHA256
- RSA_SIGN_PKCS1_3072_SHA256RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
- RSA_SIGN_PKCS14096_SHA256
- RSA_SIGN_PKCS1_4096_SHA256RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
- RSA_SIGN_PKCS14096_SHA512
- RSA_SIGN_PKCS1_4096_SHA512RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
- ECDSA_P256_SHA256
- ECDSA_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- EC_SIGN_P256_SHA256
- EC_SIGN_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- ECDSA_P384_SHA384
- ECDSA_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- EC_SIGN_P384_SHA384
- EC_SIGN_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- ECDSA_P521_SHA512
- ECDSA_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- EC_SIGN_P521_SHA512
- EC_SIGN_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- "SIGNATURE_ALGORITHM_UNSPECIFIED"
- SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified.
- "RSA_PSS_2048_SHA256"
- RSA_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- "RSA_SIGN_PSS_2048_SHA256"
- RSA_SIGN_PSS_2048_SHA256RSASSA-PSS 2048 bit key with a SHA256 digest.
- "RSA_PSS_3072_SHA256"
- RSA_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- "RSA_SIGN_PSS_3072_SHA256"
- RSA_SIGN_PSS_3072_SHA256RSASSA-PSS 3072 bit key with a SHA256 digest.
- "RSA_PSS_4096_SHA256"
- RSA_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- "RSA_SIGN_PSS_4096_SHA256"
- RSA_SIGN_PSS_4096_SHA256RSASSA-PSS 4096 bit key with a SHA256 digest.
- "RSA_PSS_4096_SHA512"
- RSA_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- "RSA_SIGN_PSS_4096_SHA512"
- RSA_SIGN_PSS_4096_SHA512RSASSA-PSS 4096 bit key with a SHA512 digest.
- "RSA_SIGN_PKCS1_2048_SHA256"
- RSA_SIGN_PKCS1_2048_SHA256RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest.
- "RSA_SIGN_PKCS1_3072_SHA256"
- RSA_SIGN_PKCS1_3072_SHA256RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest.
- "RSA_SIGN_PKCS1_4096_SHA256"
- RSA_SIGN_PKCS1_4096_SHA256RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest.
- "RSA_SIGN_PKCS1_4096_SHA512"
- RSA_SIGN_PKCS1_4096_SHA512RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest.
- "ECDSA_P256_SHA256"
- ECDSA_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- "EC_SIGN_P256_SHA256"
- EC_SIGN_P256_SHA256ECDSA on the NIST P-256 curve with a SHA256 digest.
- "ECDSA_P384_SHA384"
- ECDSA_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- "EC_SIGN_P384_SHA384"
- EC_SIGN_P384_SHA384ECDSA on the NIST P-384 curve with a SHA384 digest.
- "ECDSA_P521_SHA512"
- ECDSA_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
- "EC_SIGN_P521_SHA512"
- EC_SIGN_P521_SHA512ECDSA on the NIST P-521 curve with a SHA512 digest.
UserOwnedGrafeasNote, UserOwnedGrafeasNoteArgs
- Note
Reference string - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - Public
Keys List<Pulumi.Google Native. Binary Authorization. V1. Inputs. Attestor Public Key> - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- Note
Reference string - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - Public
Keys []AttestorPublic Key - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- note
Reference String - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public
Keys List<AttestorPublic Key> - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- note
Reference string - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public
Keys AttestorPublic Key[] - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- note_
reference str - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public_
keys Sequence[AttestorPublic Key] - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- note
Reference String - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public
Keys List<Property Map> - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
UserOwnedGrafeasNoteResponse, UserOwnedGrafeasNoteResponseArgs
- Delegation
Service stringAccount Email - This field will contain the service account email address that this attestor will use as the principal when querying Container Analysis. Attestor administrators must grant this service account the IAM role needed to read attestations from the note_reference in Container Analysis (
containeranalysis.notes.occurrences.viewer
). This email address is fixed for the lifetime of the attestor, but callers should not make any other assumptions about the service account email; future versions may use an email based on a different naming pattern. - Note
Reference string - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - Public
Keys List<Pulumi.Google Native. Binary Authorization. V1. Inputs. Attestor Public Key Response> - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- Delegation
Service stringAccount Email - This field will contain the service account email address that this attestor will use as the principal when querying Container Analysis. Attestor administrators must grant this service account the IAM role needed to read attestations from the note_reference in Container Analysis (
containeranalysis.notes.occurrences.viewer
). This email address is fixed for the lifetime of the attestor, but callers should not make any other assumptions about the service account email; future versions may use an email based on a different naming pattern. - Note
Reference string - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - Public
Keys []AttestorPublic Key Response - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- delegation
Service StringAccount Email - This field will contain the service account email address that this attestor will use as the principal when querying Container Analysis. Attestor administrators must grant this service account the IAM role needed to read attestations from the note_reference in Container Analysis (
containeranalysis.notes.occurrences.viewer
). This email address is fixed for the lifetime of the attestor, but callers should not make any other assumptions about the service account email; future versions may use an email based on a different naming pattern. - note
Reference String - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public
Keys List<AttestorPublic Key Response> - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- delegation
Service stringAccount Email - This field will contain the service account email address that this attestor will use as the principal when querying Container Analysis. Attestor administrators must grant this service account the IAM role needed to read attestations from the note_reference in Container Analysis (
containeranalysis.notes.occurrences.viewer
). This email address is fixed for the lifetime of the attestor, but callers should not make any other assumptions about the service account email; future versions may use an email based on a different naming pattern. - note
Reference string - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public
Keys AttestorPublic Key Response[] - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- delegation_
service_ straccount_ email - This field will contain the service account email address that this attestor will use as the principal when querying Container Analysis. Attestor administrators must grant this service account the IAM role needed to read attestations from the note_reference in Container Analysis (
containeranalysis.notes.occurrences.viewer
). This email address is fixed for the lifetime of the attestor, but callers should not make any other assumptions about the service account email; future versions may use an email based on a different naming pattern. - note_
reference str - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public_
keys Sequence[AttestorPublic Key Response] - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
- delegation
Service StringAccount Email - This field will contain the service account email address that this attestor will use as the principal when querying Container Analysis. Attestor administrators must grant this service account the IAM role needed to read attestations from the note_reference in Container Analysis (
containeranalysis.notes.occurrences.viewer
). This email address is fixed for the lifetime of the attestor, but callers should not make any other assumptions about the service account email; future versions may use an email based on a different naming pattern. - note
Reference String - The Grafeas resource name of a Attestation.Authority Note, created by the user, in the format:
projects/*/notes/*
. This field may not be updated. An attestation by this attestor is stored as a Grafeas Attestation.Authority Occurrence that names a container image and that links to this Note. Grafeas is an external dependency. - public
Keys List<Property Map> - Optional. Public keys that verify attestations signed by this attestor. This field may be updated. If this field is non-empty, one of the specified public keys must verify that an attestation was signed by this attestor for the image specified in the admission request. If this field is empty, this attestor always returns that no valid attestations exist.
Package Details
- Repository
- Google Cloud Native pulumi/pulumi-google-native
- License
- Apache-2.0
Google Cloud Native is in preview. Google Cloud Classic is fully supported.