{"attribution":"This Pulumi package is based on the [`cosign` Terraform Provider](https://github.com/chainguard-dev/terraform-provider-cosign).","config":{"variables":{"defaultAttestationEntryType":{"description":"Default Rekor entry type to use for attestations. Valid values are 'intoto' (default) or 'dsse'.","type":"string"}}},"description":"A Pulumi provider dynamically bridged from cosign.","functions":{"cosign:index/getVerify:getVerify":{"description":"This verifies the provided image against the specified policy.\n","inputs":{"description":"A collection of arguments for invoking getVerify.\n","properties":{"image":{"description":"The image tag or digest of the container image to verify.\n","type":"string"},"policy":{"description":"The sigstore policy-controller policy to verify the image against.\n","type":"string"}},"required":["image","policy"],"type":"object"},"outputs":{"description":"A collection of values returned by getVerify.\n","properties":{"id":{"description":"This contains the digest of the image that was verified against the provided policy.\n","type":"string"},"image":{"description":"The image tag or digest of the container image to verify.\n","type":"string"},"policy":{"description":"The sigstore policy-controller policy to verify the image against.\n","type":"string"},"verifiedRef":{"description":"This contains the digest of the image that was verified against the provided policy.\n","type":"string"}},"required":["id","image","policy","verifiedRef"],"type":"object"}},"pulumi:providers:cosign/terraformConfig":{"description":"This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.","inputs":{"properties":{"__self__":{"$ref":"#/resources/pulumi:providers:cosign"}},"required":["__self__"],"type":"object"},"outputs":{"properties":{"result":{"additionalProperties":{"$ref":"pulumi.json#/Any"},"type":"object"}},"required":["result"],"type":"object"}}},"language":{"csharp":{"compatibility":"tfbridge20","liftSingleValueMethodReturns":true,"respectSchemaVersion":true},"go":{"generateExtraInputTypes":true,"importBasePath":"github.com/pulumi/pulumi-terraform-provider/sdks/go/cosign/cosign","liftSingleValueMethodReturns":true,"respectSchemaVersion":true,"rootPackageName":"cosign"},"java":{"basePackage":"","buildFiles":"","gradleNexusPublishPluginVersion":"","gradleTest":""},"nodejs":{"compatibility":"tfbridge20","disableUnionOutputTypes":true,"liftSingleValueMethodReturns":true,"packageDescription":"A Pulumi provider dynamically bridged from cosign.","readme":"> This provider is a derived work of the [Terraform Provider](https://github.com/chainguard-dev/terraform-provider-cosign)\n> distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n> please consult the source [`terraform-provider-cosign` repo](https://github.com/chainguard-dev/terraform-provider-cosign/issues).","respectSchemaVersion":true},"python":{"compatibility":"tfbridge20","pyproject":{"enabled":true},"readme":"> This provider is a derived work of the [Terraform Provider](https://github.com/chainguard-dev/terraform-provider-cosign)\n> distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n> please consult the source [`terraform-provider-cosign` repo](https://github.com/chainguard-dev/terraform-provider-cosign/issues).","respectSchemaVersion":true}},"meta":{"moduleFormat":"(.*)(?:/[^/]*)"},"name":"cosign","parameterization":{"baseProvider":{"name":"terraform-provider","version":"1.0.1"},"parameter":"eyJyZW1vdGUiOnsidXJsIjoicmVnaXN0cnkub3BlbnRvZnUub3JnL2NoYWluZ3VhcmQtZGV2L2Nvc2lnbiIsInZlcnNpb24iOiIwLjIuNyJ9fQ=="},"provider":{"description":"The provider type for the cosign package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n","inputProperties":{"defaultAttestationEntryType":{"description":"Default Rekor entry type to use for attestations. Valid values are 'intoto' (default) or 'dsse'.","type":"string"}},"methods":{"terraformConfig":"pulumi:providers:cosign/terraformConfig"},"properties":{"defaultAttestationEntryType":{"description":"Default Rekor entry type to use for attestations. Valid values are 'intoto' (default) or 'dsse'.","type":"string"}},"type":"object"},"publisher":"chainguard-dev","repository":"https://github.com/chainguard-dev/terraform-provider-cosign","resources":{"cosign:index/attest:Attest":{"description":"This attests the provided image digest with cosign.\n","inputProperties":{"conflict":{"description":"How to handle conflicting predicate values\n","type":"string"},"fulcioUrl":{"description":"Address of sigstore PKI server (default https://fulcio.sigstore.dev).\n","type":"string"},"image":{"description":"The digest of the container image to attest.\n","type":"string"},"predicate":{"deprecationMessage":"Deprecated","description":"The JSON body of the in-toto predicate's claim.\n","type":"string"},"predicateFiles":{"deprecationMessage":"Deprecated","description":"The path and sha256 hex of the predicate to attest.\n","items":{"$ref":"#/types/cosign:index%2FAttestPredicateFile:AttestPredicateFile"},"type":"array"},"predicateType":{"deprecationMessage":"Deprecated","description":"The in-toto predicate type of the claim being attested.\n","type":"string"},"predicates":{"description":"The path and sha256 hex of the predicate to attest.\n","items":{"$ref":"#/types/cosign:index%2FAttestPredicate:AttestPredicate"},"type":"array"},"rekorUrl":{"description":"Address of rekor transparency log server (default https://rekor.sigstore.dev).\n","type":"string"}},"properties":{"attestedRef":{"description":"This always matches the input digest, but is a convenience for composition.\n","type":"string"},"conflict":{"description":"How to handle conflicting predicate values\n","type":"string"},"fulcioUrl":{"description":"Address of sigstore PKI server (default https://fulcio.sigstore.dev).\n","type":"string"},"image":{"description":"The digest of the container image to attest.\n","type":"string"},"predicate":{"deprecationMessage":"Deprecated","description":"The JSON body of the in-toto predicate's claim.\n","type":"string"},"predicateFiles":{"deprecationMessage":"Deprecated","description":"The path and sha256 hex of the predicate to attest.\n","items":{"$ref":"#/types/cosign:index%2FAttestPredicateFile:AttestPredicateFile"},"type":"array"},"predicateType":{"deprecationMessage":"Deprecated","description":"The in-toto predicate type of the claim being attested.\n","type":"string"},"predicates":{"description":"The path and sha256 hex of the predicate to attest.\n","items":{"$ref":"#/types/cosign:index%2FAttestPredicate:AttestPredicate"},"type":"array"},"rekorUrl":{"description":"Address of rekor transparency log server (default https://rekor.sigstore.dev).\n","type":"string"}},"required":["attestedRef","conflict","fulcioUrl","image","rekorUrl"],"requiredInputs":["image"],"stateInputs":{"description":"Input properties used for looking up and filtering Attest resources.\n","properties":{"attestedRef":{"description":"This always matches the input digest, but is a convenience for composition.\n","type":"string"},"conflict":{"description":"How to handle conflicting predicate values\n","type":"string"},"fulcioUrl":{"description":"Address of sigstore PKI server (default https://fulcio.sigstore.dev).\n","type":"string"},"image":{"description":"The digest of the container image to attest.\n","type":"string"},"predicate":{"deprecationMessage":"Deprecated","description":"The JSON body of the in-toto predicate's claim.\n","type":"string"},"predicateFiles":{"deprecationMessage":"Deprecated","description":"The path and sha256 hex of the predicate to attest.\n","items":{"$ref":"#/types/cosign:index%2FAttestPredicateFile:AttestPredicateFile"},"type":"array"},"predicateType":{"deprecationMessage":"Deprecated","description":"The in-toto predicate type of the claim being attested.\n","type":"string"},"predicates":{"description":"The path and sha256 hex of the predicate to attest.\n","items":{"$ref":"#/types/cosign:index%2FAttestPredicate:AttestPredicate"},"type":"array"},"rekorUrl":{"description":"Address of rekor transparency log server (default https://rekor.sigstore.dev).\n","type":"string"}},"type":"object"},"type":"object"},"cosign:index/copy:Copy":{"description":"This copies the provided image digest using cosign copy.\n","inputProperties":{"destination":{"description":"The destination repository.\n","type":"string"},"source":{"description":"The digest of the container image to copy.\n","type":"string"}},"properties":{"copiedRef":{"description":"This always matches the input digest, but is a convenience for composition.\n","type":"string"},"destination":{"description":"The destination repository.\n","type":"string"},"source":{"description":"The digest of the container image to copy.\n","type":"string"}},"required":["copiedRef","destination","source"],"requiredInputs":["destination","source"],"stateInputs":{"description":"Input properties used for looking up and filtering Copy resources.\n","properties":{"copiedRef":{"description":"This always matches the input digest, but is a convenience for composition.\n","type":"string"},"destination":{"description":"The destination repository.\n","type":"string"},"source":{"description":"The digest of the container image to copy.\n","type":"string"}},"type":"object"},"type":"object"},"cosign:index/sign:Sign":{"description":"This signs the provided image digest with cosign.\n","inputProperties":{"conflict":{"description":"How to handle conflicting signature values\n","type":"string"},"fulcioUrl":{"description":"Address of sigstore PKI server (default https://fulcio.sigstore.dev).\n","type":"string"},"image":{"description":"The digest of the container image to sign.\n","type":"string"},"rekorUrl":{"description":"Address of rekor transparency log server (default https://rekor.sigstore.dev).\n","type":"string"}},"properties":{"conflict":{"description":"How to handle conflicting signature values\n","type":"string"},"fulcioUrl":{"description":"Address of sigstore PKI server (default https://fulcio.sigstore.dev).\n","type":"string"},"image":{"description":"The digest of the container image to sign.\n","type":"string"},"rekorUrl":{"description":"Address of rekor transparency log server (default https://rekor.sigstore.dev).\n","type":"string"},"signedRef":{"description":"This always matches the input digest, but is a convenience for composition.\n","type":"string"}},"required":["conflict","fulcioUrl","image","rekorUrl","signedRef"],"requiredInputs":["image"],"stateInputs":{"description":"Input properties used for looking up and filtering Sign resources.\n","properties":{"conflict":{"description":"How to handle conflicting signature values\n","type":"string"},"fulcioUrl":{"description":"Address of sigstore PKI server (default https://fulcio.sigstore.dev).\n","type":"string"},"image":{"description":"The digest of the container image to sign.\n","type":"string"},"rekorUrl":{"description":"Address of rekor transparency log server (default https://rekor.sigstore.dev).\n","type":"string"},"signedRef":{"description":"This always matches the input digest, but is a convenience for composition.\n","type":"string"}},"type":"object"},"type":"object"}},"types":{"cosign:index/AttestPredicate:AttestPredicate":{"properties":{"files":{"description":"The path and sha256 hex of the predicate to attest.\n","items":{"$ref":"#/types/cosign:index%2FAttestPredicateFile:AttestPredicateFile"},"type":"array"},"json":{"description":"The JSON body of the in-toto predicate's claim.\n","type":"string"},"type":{"description":"The in-toto predicate type of the claim being attested.\n","type":"string"}},"required":["type"],"type":"object"},"cosign:index/AttestPredicateFile:AttestPredicateFile":{"properties":{"path":{"description":"The path to a file containing the predicate to attest.\n","type":"string"},"sha256":{"description":"The sha256 hex hash of the predicate body.\n","type":"string"}},"type":"object"}},"version":"0.2.7"}
