kuby-cert-manager 0.1.0 → 0.4.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +13 -0
- data/Gemfile +10 -6
- data/Rakefile +156 -0
- data/kuby-cert-manager.gemspec +2 -3
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge.rb +37 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec.rb +51 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01.rb +54 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_acme_dns.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_acme_dns_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_access_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_client_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_azure_dns.rb +48 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_azure_dns_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_azure_dns_managed_identity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloud_dns.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloud_dns_service_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloudflare.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloudflare_api_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloudflare_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_digitalocean.rb +27 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_digitalocean_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_rfc2136.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_rfc2136_tsig_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_route53.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_route53_secret_access_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_webhook.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_gateway_http_route.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_ingress_template.rb +27 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_ingress_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__08bbe6b4.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__9c48355e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__c50d4e21.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__e1443b2a.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_09f516dd.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_132b4acf.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_e5f58b33.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_ea0358cb.rb +27 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_255a3c17.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_345ef7e7.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_4e2fd6b0.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_7df389bb.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_e4258af7.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_e8e4c3da.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_16e316ed.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_3dbd5d2b.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_4ed65b08.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_adc1158a.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_e61e01f4.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_436d0031.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_6a445552.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_a3971d9c.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_bd8768b6.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_d50853dd.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_fab3bac1.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_555e8c3f.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_5603842a.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_6fdeb5f4.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_7caafa53.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_f5c005c0.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_tolerations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_selector.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_status.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order.rb +37 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_spec.rb +42 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_status.rb +45 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_status_authorizations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_status_authorizations_challenges.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1.rb +81 -0
- data/lib/kuby/cert-manager/dsl/acme.rb +3 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_spec.rb +51 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_status.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_status_conditions.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec.rb +78 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_additional_output_formats.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_jks.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_jks_password_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_pkcs12.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_pkcs12_password_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_private_key.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_secret_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_subject.rb +48 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_status.rb +45 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_status_conditions.rb +42 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme.rb +51 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_external_account_binding.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_external_account_binding_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_private_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01.rb +54 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_acme_dns.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_acme_dns_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai_access_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai_client_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_azure_dns.rb +48 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_azure_dns_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_azure_dns_managed_identity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloud_dns.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloud_dns_service_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloudflare.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloudflare_api_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloudflare_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_digitalocean.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_digitalocean_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_rfc2136.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_rfc2136_tsig_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_route53.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_route53_secret_access_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_webhook.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_gateway_http_route.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_ingress_template.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_ingress_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_1d4adad6.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_230f1f22.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_41d4dca2.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_448d7591.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_7a9b60cf.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_c0dae33e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_ea4b0ee0.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_f0f169e7.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__18340967.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__42bd9fb0.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__72f59931.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__a26c3afd.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__a9e88fe5.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__cdd9db7a.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__d90bdc68.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__ecf165ef.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__ee299448.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__f1a367b3.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__fba7c777.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_0354c0da.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_2440f3a1.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_2b7a74be.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_44e9c7e4.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_4ea76d45.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_5d032357.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_7d8c350e.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_8f397d72.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_989df537.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_9b885ae4.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_cf887e42.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_tolerations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_selector.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_ca.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_self_signed.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_app_role.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_app_role_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_kubernetes.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_kubernetes_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_cloud.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_cloud_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_tpp.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_tpp_credentials_ref.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_status.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_status_acme.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_status_conditions.rb +42 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme.rb +51 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_external_account_binding.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_external_account_binding_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_private_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01.rb +54 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_acme_dns.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_acme_dns_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai_access_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai_client_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_azure_dns.rb +48 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_azure_dns_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_azure_dns_managed_identity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloud_dns.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloud_dns_service_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloudflare.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloudflare_api_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloudflare_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_digitalocean.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_digitalocean_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_rfc2136.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_rfc2136_tsig_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_route53.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_route53_secret_access_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_webhook.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_gateway_http_route.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_ingress_template.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_ingress_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_27927c77.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_3af9a2a8.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_6423e8dc.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_e2ed3f2f.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_6e1d1e4d.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_851be468.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_be58d15e.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_ea5224cc.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_06278373.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_16dc6d9c.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_83e0efaf.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_8d63a78a.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_9708a10a.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_99b54ba0.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_60802327.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_6aa9a4cc.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_aae42eb3.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_b1e089e4.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_df72b88e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_0df97b49.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_34a4ea59.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_4422532d.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_4a8f17c1.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_d524cf91.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_dde2b4a9.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_541fda5f.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_545cafc0.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_60850239.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_87f3d10e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_977a3a26.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_tolerations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_selector.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_ca.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_self_signed.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_app_role.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_app_role_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_kubernetes.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_kubernetes_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_cloud.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_cloud_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_tpp.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_tpp_credentials_ref.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_status.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_status_acme.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_status_conditions.rb +42 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1.rb +205 -0
- data/lib/kuby/cert-manager/dsl/cert_manager.rb +3 -0
- data/lib/kuby/cert-manager/dsl.rb +4 -0
- data/lib/kuby/cert-manager/entrypoint.rb +55 -0
- data/lib/kuby/cert-manager/plugin.rb +28 -10
- data/lib/kuby/cert-manager/version.rb +3 -1
- data/lib/kuby/cert-manager.rb +8 -8
- data/rbi/kuby-cert-manager.rbi +6640 -0
- metadata +296 -28
- data/lib/kuby/cert-manager/acme_strategy.rb +0 -22
- data/lib/kuby/cert-manager/cluster_issuer.rb +0 -23
- data/lib/kuby/cert-manager/cluster_issuer_spec.rb +0 -21
- data/lib/kuby/cert-manager/http01_solver.rb +0 -17
- data/lib/kuby/cert-manager/http01_solver_ingress.rb +0 -17
- data/lib/kuby/cert-manager/private_key_secret_ref.rb +0 -17
- data/lib/kuby/cert-manager/solver.rb +0 -17
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1d974571de438574b816bd970f7f567433ad5c167d8069fb3143115aee657736
|
4
|
+
data.tar.gz: d9a1f92b7dfe9a736334ad65da71c57310423e93c244e6b3e0715ca9bf0679c2
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 6f1c3a6da89760f0c1de9932294bdd3be904f26a9ff7c1882504bc6353f3e9ada5d2d936c04a6df78d25404231fdb54de966ff5205f79cedaea0b69c6a0dbe9d
|
7
|
+
data.tar.gz: bdb83d06b860a4aab731815fadebf341bbc5ac1e93a4f97ca4801c9271373631b3ba52a4fcf861889a0a5d2f6d35ae3ad477573ddd8b58c948521b62d004159d
|
data/CHANGELOG.md
CHANGED
@@ -1,2 +1,15 @@
|
|
1
|
+
## 0.4.0
|
2
|
+
* Upgrade to cert-manager v1.7.2.
|
3
|
+
* Generate DSL files using schema pulled from Kind cluster instead of the hand-rolled ones we had before.
|
4
|
+
* Use tapioca to pull in type annotations for gems.
|
5
|
+
* Use parlour to publish type annotations in the rbi/ directory.
|
6
|
+
|
7
|
+
## 0.3.0
|
8
|
+
* Conform to new plugin architecture.
|
9
|
+
* Accept `environment` instead of `definition` instances.
|
10
|
+
|
11
|
+
## 0.2.0
|
12
|
+
* Get environment name correctly for kuby-core 0.6.0.
|
13
|
+
|
1
14
|
## 0.1.0
|
2
15
|
* Birthday!
|
data/Gemfile
CHANGED
@@ -2,17 +2,21 @@ source 'https://rubygems.org'
|
|
2
2
|
|
3
3
|
gemspec
|
4
4
|
|
5
|
-
# Declare platform-specific gems here so they install correctly.
|
6
|
-
# See: https://github.com/rubygems/rubygems/issues/3646
|
7
|
-
gem 'helm-rb'
|
8
|
-
|
9
5
|
group :development, :test do
|
10
|
-
gem 'kuby', path: '../kuby'
|
11
|
-
gem 'kuby-
|
6
|
+
gem 'kuby-core', path: '../kuby-core'
|
7
|
+
gem 'kuby-crdb'
|
8
|
+
gem 'kube-dsl', '>= 0.7.3', '< 1'
|
9
|
+
gem 'kind-rb'
|
12
10
|
gem 'pry-byebug'
|
13
11
|
gem 'rake'
|
14
12
|
end
|
15
13
|
|
14
|
+
group :development do
|
15
|
+
gem 'sorbet'
|
16
|
+
gem 'tapioca', '~> 0.7'
|
17
|
+
gem 'parlour', '~> 6.0'
|
18
|
+
end
|
19
|
+
|
16
20
|
group :test do
|
17
21
|
gem 'rspec', '~> 3.0'
|
18
22
|
end
|
data/Rakefile
CHANGED
@@ -2,6 +2,7 @@ require 'bundler'
|
|
2
2
|
require 'rspec/core/rake_task'
|
3
3
|
require 'rubygems/package_task'
|
4
4
|
|
5
|
+
require 'sorbet-runtime'
|
5
6
|
require 'kuby/cert-manager'
|
6
7
|
|
7
8
|
Bundler::GemHelper.install_tasks
|
@@ -12,3 +13,158 @@ desc 'Run specs'
|
|
12
13
|
RSpec::Core::RakeTask.new do |t|
|
13
14
|
t.pattern = './spec/**/*_spec.rb'
|
14
15
|
end
|
16
|
+
|
17
|
+
task generate: [:schemagen, :codegen]
|
18
|
+
|
19
|
+
task :schemagen do
|
20
|
+
require 'base64'
|
21
|
+
require 'json'
|
22
|
+
require 'kind-rb'
|
23
|
+
require 'net/http'
|
24
|
+
require 'uri'
|
25
|
+
require 'yaml'
|
26
|
+
|
27
|
+
# delete first just in case
|
28
|
+
system("#{KindRb.executable} delete cluster --name kuby-cert-manager")
|
29
|
+
system("#{KindRb.executable} create cluster --name kuby-cert-manager")
|
30
|
+
|
31
|
+
system("kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v#{Kuby::CertManager::Plugin::CERT_MANAGER_VERSION}/cert-manager.yaml")
|
32
|
+
|
33
|
+
cluster_name = 'kind-kuby-cert-manager'
|
34
|
+
kubeconfig = YAML.load_file(File.join(Dir.home, '.kube', 'config'))
|
35
|
+
cluster = kubeconfig['clusters'].find { |cluster| cluster['name'] == cluster_name }
|
36
|
+
ca_cert_data = Base64.decode64(cluster.dig(*%w(cluster certificate-authority-data)))
|
37
|
+
|
38
|
+
cert_store = OpenSSL::X509::Store.new
|
39
|
+
cert_store.add_cert(OpenSSL::X509::Certificate.new(ca_cert_data))
|
40
|
+
server = URI.parse(cluster.dig(*%w(cluster server)))
|
41
|
+
|
42
|
+
http = Net::HTTP.new(server.host, server.port).tap do |http|
|
43
|
+
http.use_ssl = true
|
44
|
+
http.cert_store = cert_store
|
45
|
+
http.verify_mode = OpenSSL::SSL::VERIFY_PEER
|
46
|
+
end
|
47
|
+
|
48
|
+
token = nil
|
49
|
+
STDOUT.write("Getting API token from cluster...")
|
50
|
+
|
51
|
+
loop do
|
52
|
+
secrets = JSON.parse(`kubectl --context #{cluster_name} get secrets -o json`)
|
53
|
+
secret = secrets['items'].find do |secret|
|
54
|
+
secret.dig(*%w(metadata annotations kubernetes.io/service-account.name)) == 'default'
|
55
|
+
end
|
56
|
+
|
57
|
+
if secret
|
58
|
+
token = Base64.decode64(secret.dig(*%w(data token)))
|
59
|
+
puts ' done'
|
60
|
+
break
|
61
|
+
else
|
62
|
+
STDOUT.write('.')
|
63
|
+
sleep 1
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
get = Net::HTTP::Get.new('/openapi/v2')
|
68
|
+
get['Authorization'] = "Bearer #{token}"
|
69
|
+
|
70
|
+
crds = []
|
71
|
+
schema = nil
|
72
|
+
STDOUT.write("Requesting OpenAPI v2 schema from cluster...")
|
73
|
+
|
74
|
+
loop do
|
75
|
+
response = http.request(get)
|
76
|
+
schema = JSON.parse(response.body)
|
77
|
+
|
78
|
+
crds = schema['definitions'].each_with_object({}) do |(id, data), memo|
|
79
|
+
memo[id] = data if id.start_with?('io.cert-manager')
|
80
|
+
end
|
81
|
+
|
82
|
+
if crds.empty?
|
83
|
+
STDOUT.write('.')
|
84
|
+
sleep 1
|
85
|
+
else
|
86
|
+
puts ' done'
|
87
|
+
break
|
88
|
+
end
|
89
|
+
end
|
90
|
+
|
91
|
+
FileUtils.rm_rf('vendor')
|
92
|
+
FileUtils.mkdir('vendor')
|
93
|
+
|
94
|
+
schema = schema.merge('definitions' => crds)
|
95
|
+
File.write(File.join('vendor', 'open_api.json'), schema.to_json)
|
96
|
+
|
97
|
+
puts 'Pulling openapi2jsonschema Docker image'
|
98
|
+
system('docker pull garethr/openapi2jsonschema')
|
99
|
+
|
100
|
+
puts 'Converting OpenAPI format to JSON schema format'
|
101
|
+
system(<<~END)
|
102
|
+
docker run --rm \
|
103
|
+
-v #{File.expand_path('vendor')}:/usr/local/scratch \
|
104
|
+
garethr/openapi2jsonschema \
|
105
|
+
--kubernetes --output /usr/local/scratch/json_schema /usr/local/scratch/open_api.json
|
106
|
+
END
|
107
|
+
|
108
|
+
puts "Cleaning up"
|
109
|
+
system("#{KindRb.executable} delete cluster --name kuby-cert-manager")
|
110
|
+
end
|
111
|
+
|
112
|
+
task :codegen do
|
113
|
+
require 'pry-byebug'
|
114
|
+
|
115
|
+
require 'dry/inflector'
|
116
|
+
require 'fileutils'
|
117
|
+
|
118
|
+
# delete anything that should be re-generated
|
119
|
+
FileUtils.rm_rf('./lib/kuby/cert-manager/dsl.rb')
|
120
|
+
FileUtils.rm_rf('./lib/kuby/cert-manager/dsl')
|
121
|
+
FileUtils.rm_rf('./lib/kuby/cert-manager/entrypoint.rb')
|
122
|
+
FileUtils.rm_rf('./sorbet/rbi/kuby/cert-manager')
|
123
|
+
FileUtils.mkdir_p('./lib/kuby/cert-manager/dsl')
|
124
|
+
|
125
|
+
local_json_schema_path = 'vendor/json_schema'
|
126
|
+
|
127
|
+
generator = KubeDSL::Generator.new(
|
128
|
+
schema_dir: local_json_schema_path,
|
129
|
+
output_dir: File.join('lib'),
|
130
|
+
autoload_prefix: File.join('kuby', 'cert-manager', 'dsl'),
|
131
|
+
dsl_namespace: ['Kuby', 'CertManager', 'DSL'],
|
132
|
+
entrypoint_namespace: ['Kuby', 'CertManager'],
|
133
|
+
inflector: Dry::Inflector.new do |inflections|
|
134
|
+
inflections.acronym('DSL')
|
135
|
+
end
|
136
|
+
)
|
137
|
+
|
138
|
+
generator.builder.register_resolver('io.k8s') do |ref_str, builder|
|
139
|
+
external_ref = ::KubeDSL::ExternalRef.new(
|
140
|
+
ref_str,
|
141
|
+
['KubeDSL', 'DSL'],
|
142
|
+
builder.inflector,
|
143
|
+
builder.schema_dir,
|
144
|
+
builder.autoload_prefix,
|
145
|
+
builder.serialize_handlers
|
146
|
+
)
|
147
|
+
|
148
|
+
ns = external_ref.ruby_namespace + [external_ref.kind]
|
149
|
+
exists = ns.inject(Object) { |mod, n| mod.const_get(n, false) } rescue false
|
150
|
+
exists ? external_ref : builder.parse_ref(ref_str)
|
151
|
+
end
|
152
|
+
|
153
|
+
generator.builder.register_serialize_handler('cert-manager', 'v1', 'IssuerSpec', 'selfSigned') do |field, inflector|
|
154
|
+
"#{field.send(:ruby_safe_name)}_present? ? ::KubeDSL::AllowBlank.new(#{field.serialize_call(inflector)}) : nil"
|
155
|
+
end
|
156
|
+
|
157
|
+
generator.builder.register_serialize_handler('cert-manager', 'v1', 'ClusterIssuerSpec', 'selfSigned') do |field, inflector|
|
158
|
+
"#{field.send(:ruby_safe_name)}_present? ? ::KubeDSL::AllowBlank.new(#{field.serialize_call(inflector)}) : nil"
|
159
|
+
end
|
160
|
+
|
161
|
+
generator.generate_resource_files
|
162
|
+
generator.generate_autoload_files
|
163
|
+
generator.generate_entrypoint_file do |resource, ns|
|
164
|
+
# only generate entrypoint methods for resources defined at the top-level, i.e.
|
165
|
+
# not resources defined inside other resources
|
166
|
+
!resource.ref.inline?
|
167
|
+
end
|
168
|
+
|
169
|
+
FileUtils.rm_rf(File.join('lib', 'kuby.rb'))
|
170
|
+
end
|
data/kuby-cert-manager.gemspec
CHANGED
@@ -6,15 +6,14 @@ Gem::Specification.new do |s|
|
|
6
6
|
s.version = ::Kuby::CertManager::VERSION
|
7
7
|
s.authors = ['Cameron Dutro']
|
8
8
|
s.email = ['camertron@gmail.com']
|
9
|
-
s.homepage = 'http://github.com/
|
9
|
+
s.homepage = 'http://github.com/getkuby/kuby-cert-manager'
|
10
10
|
|
11
11
|
s.description = s.summary = 'Kuby plugin for automatically generating TLS certificates.'
|
12
12
|
|
13
13
|
s.platform = Gem::Platform::RUBY
|
14
14
|
|
15
|
-
s.add_dependency 'helm-cli', '~> 0.1'
|
16
15
|
s.add_dependency 'kube-dsl', '~> 0.1'
|
17
16
|
|
18
17
|
s.require_path = 'lib'
|
19
|
-
s.files = Dir['{lib,spec}/**/*', 'Gemfile', 'LICENSE', 'CHANGELOG.md', 'README.md', 'Rakefile', 'kuby-cert-manager.gemspec']
|
18
|
+
s.files = Dir['{lib,spec,rbi}/**/*', 'Gemfile', 'LICENSE', 'CHANGELOG.md', 'README.md', 'Rakefile', 'kuby-cert-manager.gemspec']
|
20
19
|
end
|
@@ -0,0 +1,37 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class Challenge < ::KubeDSL::DSLObject
|
9
|
+
object_field(:status) { Kuby::CertManager::DSL::Acme::V1::ChallengeStatus.new }
|
10
|
+
object_field(:spec) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpec.new }
|
11
|
+
value_field :api_version
|
12
|
+
object_field(:metadata) { KubeDSL::DSL::Meta::V1::ObjectMeta.new }
|
13
|
+
|
14
|
+
validates :status, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeStatus }
|
15
|
+
validates :spec, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpec }
|
16
|
+
validates :api_version, field: { format: :string }, presence: false
|
17
|
+
validates :metadata, object: { kind_of: KubeDSL::DSL::Meta::V1::ObjectMeta }
|
18
|
+
|
19
|
+
def serialize
|
20
|
+
{}.tap do |result|
|
21
|
+
result[:status] = status.serialize
|
22
|
+
result[:kind] = "Challenge"
|
23
|
+
result[:spec] = spec.serialize
|
24
|
+
result[:apiVersion] = api_version
|
25
|
+
result[:metadata] = metadata.serialize
|
26
|
+
end
|
27
|
+
end
|
28
|
+
|
29
|
+
def kind_sym
|
30
|
+
:challenge
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
36
|
+
end
|
37
|
+
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeList < ::KubeDSL::DSLObject
|
9
|
+
array_field(:item) { Kuby::CertManager::DSL::Acme::V1::Challenge.new }
|
10
|
+
value_field :api_version
|
11
|
+
object_field(:metadata) { KubeDSL::DSL::Meta::V1::ListMeta.new }
|
12
|
+
|
13
|
+
validates :items, array: { kind_of: Kuby::CertManager::DSL::Acme::V1::Challenge }, presence: false
|
14
|
+
validates :api_version, field: { format: :string }, presence: false
|
15
|
+
validates :metadata, object: { kind_of: KubeDSL::DSL::Meta::V1::ListMeta }
|
16
|
+
|
17
|
+
def serialize
|
18
|
+
{}.tap do |result|
|
19
|
+
result[:items] = items.map(&:serialize)
|
20
|
+
result[:kind] = "ChallengeList"
|
21
|
+
result[:apiVersion] = api_version
|
22
|
+
result[:metadata] = metadata.serialize
|
23
|
+
end
|
24
|
+
end
|
25
|
+
|
26
|
+
def kind_sym
|
27
|
+
:challenge_list
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
@@ -0,0 +1,51 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpec < ::KubeDSL::DSLObject
|
9
|
+
object_field(:issuer_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecIssuerRef.new }
|
10
|
+
object_field(:solver) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolver.new }
|
11
|
+
value_field :url
|
12
|
+
value_field :token
|
13
|
+
value_field :dns_name
|
14
|
+
value_field :key
|
15
|
+
value_field :wildcard
|
16
|
+
value_field :type
|
17
|
+
value_field :authorization_url
|
18
|
+
|
19
|
+
validates :issuer_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecIssuerRef }
|
20
|
+
validates :solver, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolver }
|
21
|
+
validates :url, field: { format: :string }, presence: true
|
22
|
+
validates :token, field: { format: :string }, presence: true
|
23
|
+
validates :dns_name, field: { format: :string }, presence: true
|
24
|
+
validates :key, field: { format: :string }, presence: true
|
25
|
+
validates :wildcard, field: { format: :boolean }, presence: true
|
26
|
+
validates :type, field: { format: :string }, presence: true
|
27
|
+
validates :authorization_url, field: { format: :string }, presence: true
|
28
|
+
|
29
|
+
def serialize
|
30
|
+
{}.tap do |result|
|
31
|
+
result[:issuerRef] = issuer_ref.serialize
|
32
|
+
result[:solver] = solver.serialize
|
33
|
+
result[:url] = url
|
34
|
+
result[:token] = token
|
35
|
+
result[:dnsName] = dns_name
|
36
|
+
result[:key] = key
|
37
|
+
result[:wildcard] = wildcard
|
38
|
+
result[:type] = type
|
39
|
+
result[:authorizationURL] = authorization_url
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
def kind_sym
|
44
|
+
:challenge_spec
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
51
|
+
end
|
@@ -0,0 +1,33 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecIssuerRef < ::KubeDSL::DSLObject
|
9
|
+
value_field :kind
|
10
|
+
value_field :group
|
11
|
+
value_field :name
|
12
|
+
|
13
|
+
validates :kind, field: { format: :string }, presence: false
|
14
|
+
validates :group, field: { format: :string }, presence: false
|
15
|
+
validates :name, field: { format: :string }, presence: true
|
16
|
+
|
17
|
+
def serialize
|
18
|
+
{}.tap do |result|
|
19
|
+
result[:kind] = kind
|
20
|
+
result[:group] = group
|
21
|
+
result[:name] = name
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
def kind_sym
|
26
|
+
:challenge_spec_issuer_ref
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
@@ -0,0 +1,33 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolver < ::KubeDSL::DSLObject
|
9
|
+
object_field(:dns01) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01.new }
|
10
|
+
object_field(:selector) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverSelector.new }
|
11
|
+
object_field(:http01) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverHttp01.new }
|
12
|
+
|
13
|
+
validates :dns01, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01 }
|
14
|
+
validates :selector, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverSelector }
|
15
|
+
validates :http01, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverHttp01 }
|
16
|
+
|
17
|
+
def serialize
|
18
|
+
{}.tap do |result|
|
19
|
+
result[:dns01] = dns01.serialize
|
20
|
+
result[:selector] = selector.serialize
|
21
|
+
result[:http01] = http01.serialize
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
def kind_sym
|
26
|
+
:challenge_spec_solver
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
@@ -0,0 +1,54 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolverDns01 < ::KubeDSL::DSLObject
|
9
|
+
value_field :cname_strategy
|
10
|
+
object_field(:akamai) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Akamai.new }
|
11
|
+
object_field(:cloud_dns) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01CloudDNS.new }
|
12
|
+
object_field(:webhook) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Webhook.new }
|
13
|
+
object_field(:acme_dns) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNS.new }
|
14
|
+
object_field(:digitalocean) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Digitalocean.new }
|
15
|
+
object_field(:rfc2136) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Rfc2136.new }
|
16
|
+
object_field(:cloudflare) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Cloudflare.new }
|
17
|
+
object_field(:route53) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Route53.new }
|
18
|
+
object_field(:azure_dns) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AzureDNS.new }
|
19
|
+
|
20
|
+
validates :cname_strategy, field: { format: :string }, presence: false
|
21
|
+
validates :akamai, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Akamai }
|
22
|
+
validates :cloud_dns, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01CloudDNS }
|
23
|
+
validates :webhook, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Webhook }
|
24
|
+
validates :acme_dns, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNS }
|
25
|
+
validates :digitalocean, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Digitalocean }
|
26
|
+
validates :rfc2136, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Rfc2136 }
|
27
|
+
validates :cloudflare, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Cloudflare }
|
28
|
+
validates :route53, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Route53 }
|
29
|
+
validates :azure_dns, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AzureDNS }
|
30
|
+
|
31
|
+
def serialize
|
32
|
+
{}.tap do |result|
|
33
|
+
result[:cnameStrategy] = cname_strategy
|
34
|
+
result[:akamai] = akamai.serialize
|
35
|
+
result[:cloudDNS] = cloud_dns.serialize
|
36
|
+
result[:webhook] = webhook.serialize
|
37
|
+
result[:acmeDNS] = acme_dns.serialize
|
38
|
+
result[:digitalocean] = digitalocean.serialize
|
39
|
+
result[:rfc2136] = rfc2136.serialize
|
40
|
+
result[:cloudflare] = cloudflare.serialize
|
41
|
+
result[:route53] = route53.serialize
|
42
|
+
result[:azureDNS] = azure_dns.serialize
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
def kind_sym
|
47
|
+
:challenge_spec_solver_dns01
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
54
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolverDns01AcmeDNS < ::KubeDSL::DSLObject
|
9
|
+
object_field(:account_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNSAccountSecretRef.new }
|
10
|
+
value_field :host
|
11
|
+
|
12
|
+
validates :account_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNSAccountSecretRef }
|
13
|
+
validates :host, field: { format: :string }, presence: true
|
14
|
+
|
15
|
+
def serialize
|
16
|
+
{}.tap do |result|
|
17
|
+
result[:accountSecretRef] = account_secret_ref.serialize
|
18
|
+
result[:host] = host
|
19
|
+
end
|
20
|
+
end
|
21
|
+
|
22
|
+
def kind_sym
|
23
|
+
:challenge_spec_solver_dns01_acme_dns
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_acme_dns_account_secret_ref.rb
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolverDns01AcmeDNSAccountSecretRef < ::KubeDSL::DSLObject
|
9
|
+
value_field :name
|
10
|
+
value_field :key
|
11
|
+
|
12
|
+
validates :name, field: { format: :string }, presence: true
|
13
|
+
validates :key, field: { format: :string }, presence: false
|
14
|
+
|
15
|
+
def serialize
|
16
|
+
{}.tap do |result|
|
17
|
+
result[:name] = name
|
18
|
+
result[:key] = key
|
19
|
+
end
|
20
|
+
end
|
21
|
+
|
22
|
+
def kind_sym
|
23
|
+
:challenge_spec_solver_dns01_acme_dns_account_secret_ref
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
@@ -0,0 +1,36 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolverDns01Akamai < ::KubeDSL::DSLObject
|
9
|
+
value_field :service_consumer_domain
|
10
|
+
object_field(:client_token_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientTokenSecretRef.new }
|
11
|
+
object_field(:access_token_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiAccessTokenSecretRef.new }
|
12
|
+
object_field(:client_secret_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientSecretSecretRef.new }
|
13
|
+
|
14
|
+
validates :service_consumer_domain, field: { format: :string }, presence: true
|
15
|
+
validates :client_token_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientTokenSecretRef }
|
16
|
+
validates :access_token_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiAccessTokenSecretRef }
|
17
|
+
validates :client_secret_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientSecretSecretRef }
|
18
|
+
|
19
|
+
def serialize
|
20
|
+
{}.tap do |result|
|
21
|
+
result[:serviceConsumerDomain] = service_consumer_domain
|
22
|
+
result[:clientTokenSecretRef] = client_token_secret_ref.serialize
|
23
|
+
result[:accessTokenSecretRef] = access_token_secret_ref.serialize
|
24
|
+
result[:clientSecretSecretRef] = client_secret_secret_ref.serialize
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
def kind_sym
|
29
|
+
:challenge_spec_solver_dns01_akamai
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
36
|
+
end
|
data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_access_token_secret_ref.rb
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolverDns01AkamaiAccessTokenSecretRef < ::KubeDSL::DSLObject
|
9
|
+
value_field :name
|
10
|
+
value_field :key
|
11
|
+
|
12
|
+
validates :name, field: { format: :string }, presence: true
|
13
|
+
validates :key, field: { format: :string }, presence: false
|
14
|
+
|
15
|
+
def serialize
|
16
|
+
{}.tap do |result|
|
17
|
+
result[:name] = name
|
18
|
+
result[:key] = key
|
19
|
+
end
|
20
|
+
end
|
21
|
+
|
22
|
+
def kind_sym
|
23
|
+
:challenge_spec_solver_dns01_akamai_access_token_secret_ref
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
@@ -0,0 +1,30 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolverDns01AkamaiClientSecretSecretRef < ::KubeDSL::DSLObject
|
9
|
+
value_field :name
|
10
|
+
value_field :key
|
11
|
+
|
12
|
+
validates :name, field: { format: :string }, presence: true
|
13
|
+
validates :key, field: { format: :string }, presence: false
|
14
|
+
|
15
|
+
def serialize
|
16
|
+
{}.tap do |result|
|
17
|
+
result[:name] = name
|
18
|
+
result[:key] = key
|
19
|
+
end
|
20
|
+
end
|
21
|
+
|
22
|
+
def kind_sym
|
23
|
+
:challenge_spec_solver_dns01_akamai_client_secret_secret_ref
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|
data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_client_token_secret_ref.rb
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
# typed: true
|
2
|
+
|
3
|
+
module Kuby
|
4
|
+
module CertManager
|
5
|
+
module DSL
|
6
|
+
module Acme
|
7
|
+
module V1
|
8
|
+
class ChallengeSpecSolverDns01AkamaiClientTokenSecretRef < ::KubeDSL::DSLObject
|
9
|
+
value_field :name
|
10
|
+
value_field :key
|
11
|
+
|
12
|
+
validates :name, field: { format: :string }, presence: true
|
13
|
+
validates :key, field: { format: :string }, presence: false
|
14
|
+
|
15
|
+
def serialize
|
16
|
+
{}.tap do |result|
|
17
|
+
result[:name] = name
|
18
|
+
result[:key] = key
|
19
|
+
end
|
20
|
+
end
|
21
|
+
|
22
|
+
def kind_sym
|
23
|
+
:challenge_spec_solver_dns01_akamai_client_token_secret_ref
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
end
|
28
|
+
end
|
29
|
+
end
|
30
|
+
end
|