kuby-cert-manager 0.3.0 → 0.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +6 -0
- data/Gemfile +9 -5
- data/Rakefile +156 -0
- data/kuby-cert-manager.gemspec +1 -2
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge.rb +37 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec.rb +51 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01.rb +54 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_acme_dns.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_acme_dns_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_access_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_client_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_azure_dns.rb +48 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_azure_dns_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_azure_dns_managed_identity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloud_dns.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloud_dns_service_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloudflare.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloudflare_api_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_cloudflare_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_digitalocean.rb +27 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_digitalocean_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_rfc2136.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_rfc2136_tsig_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_route53.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_route53_secret_access_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_webhook.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_gateway_http_route.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_ingress_template.rb +27 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_ingress_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__08bbe6b4.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__9c48355e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__c50d4e21.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_preferred__e1443b2a.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_09f516dd.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_132b4acf.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_e5f58b33.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_node_affinity_required_d_ea0358cb.rb +27 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_255a3c17.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_345ef7e7.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_4e2fd6b0.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_7df389bb.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_e4258af7.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_preferred_d_e8e4c3da.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_16e316ed.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_3dbd5d2b.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_4ed65b08.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_adc1158a.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_affinity_required_du_e61e01f4.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_436d0031.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_6a445552.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_a3971d9c.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_bd8768b6.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_d50853dd.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_prefer_fab3bac1.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_555e8c3f.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_5603842a.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_6fdeb5f4.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_7caafa53.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_requir_f5c005c0.rb +30 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_http01_ingress_pod_template_spec_tolerations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_selector.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/challenge_status.rb +36 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order.rb +37 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_spec.rb +42 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_status.rb +45 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_status_authorizations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/acme/v1/order_status_authorizations_challenges.rb +33 -0
- data/lib/kuby/cert-manager/dsl/acme/v1.rb +81 -0
- data/lib/kuby/cert-manager/dsl/acme.rb +3 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_spec.rb +51 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_status.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_request_status_conditions.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec.rb +78 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_additional_output_formats.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_issuer_ref.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_jks.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_jks_password_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_pkcs12.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_keystores_pkcs12_password_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_private_key.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_secret_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_spec_subject.rb +48 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_status.rb +45 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/certificate_status_conditions.rb +42 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme.rb +51 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_external_account_binding.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_external_account_binding_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_private_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01.rb +54 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_acme_dns.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_acme_dns_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai_access_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_akamai_client_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_azure_dns.rb +48 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_azure_dns_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_azure_dns_managed_identity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloud_dns.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloud_dns_service_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloudflare.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloudflare_api_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_cloudflare_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_digitalocean.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_digitalocean_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_rfc2136.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_rfc2136_tsig_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_route53.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_route53_secret_access_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_dns01_webhook.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_gateway_http_route.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_ingress_template.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_ingress_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_1d4adad6.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_230f1f22.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_41d4dca2.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_448d7591.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_7a9b60cf.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_c0dae33e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_ea4b0ee0.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_f0f169e7.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__18340967.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__42bd9fb0.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__72f59931.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__a26c3afd.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__a9e88fe5.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__cdd9db7a.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__d90bdc68.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__ecf165ef.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__ee299448.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__f1a367b3.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity__fba7c777.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_0354c0da.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_2440f3a1.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_2b7a74be.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_44e9c7e4.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_4ea76d45.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_5d032357.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_7d8c350e.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_8f397d72.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_989df537.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_9b885ae4.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affi_cf887e42.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_http01_ingress_pod_template_spec_tolerations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_acme_solvers_selector.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_ca.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_self_signed.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_app_role.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_app_role_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_kubernetes.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_kubernetes_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_vault_auth_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_cloud.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_cloud_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_tpp.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_spec_venafi_tpp_credentials_ref.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_status.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_status_acme.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/cluster_issuer_status_conditions.rb +42 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer.rb +37 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_list.rb +34 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme.rb +51 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_external_account_binding.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_external_account_binding_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_private_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01.rb +54 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_acme_dns.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_acme_dns_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai_access_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_akamai_client_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_azure_dns.rb +48 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_azure_dns_client_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_azure_dns_managed_identity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloud_dns.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloud_dns_service_account_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloudflare.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloudflare_api_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_cloudflare_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_digitalocean.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_digitalocean_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_rfc2136.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_rfc2136_tsig_secret_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_route53.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_route53_secret_access_key_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_dns01_webhook.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_gateway_http_route.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_ingress_template.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_ingress_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_metadata.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_27927c77.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_3af9a2a8.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_6423e8dc.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_preferr_e2ed3f2f.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_6e1d1e4d.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_851be468.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_be58d15e.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_node_affinity_require_ea5224cc.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_06278373.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_16dc6d9c.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_83e0efaf.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_8d63a78a.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_9708a10a.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_preferre_99b54ba0.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_60802327.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_6aa9a4cc.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_aae42eb3.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_b1e089e4.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_affinity_required_df72b88e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_0df97b49.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_34a4ea59.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_4422532d.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_4a8f17c1.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_d524cf91.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_pre_dde2b4a9.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_541fda5f.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_545cafc0.rb +36 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_60850239.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_87f3d10e.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_affinity_pod_anti_affinity_req_977a3a26.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_http01_ingress_pod_template_spec_tolerations.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_acme_solvers_selector.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_ca.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_self_signed.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault.rb +39 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_app_role.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_app_role_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_kubernetes.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_kubernetes_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_vault_auth_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_cloud.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_cloud_api_token_secret_ref.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_tpp.rb +33 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_spec_venafi_tpp_credentials_ref.rb +27 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_status.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_status_acme.rb +30 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1/issuer_status_conditions.rb +42 -0
- data/lib/kuby/cert-manager/dsl/cert_manager/v1.rb +205 -0
- data/lib/kuby/cert-manager/dsl/cert_manager.rb +3 -0
- data/lib/kuby/cert-manager/dsl.rb +4 -0
- data/lib/kuby/cert-manager/entrypoint.rb +55 -0
- data/lib/kuby/cert-manager/plugin.rb +25 -7
- data/lib/kuby/cert-manager/version.rb +3 -1
- data/lib/kuby/cert-manager.rb +8 -8
- data/rbi/kuby-cert-manager.rbi +6640 -0
- metadata +292 -24
- data/lib/kuby/cert-manager/acme_strategy.rb +0 -22
- data/lib/kuby/cert-manager/cluster_issuer.rb +0 -23
- data/lib/kuby/cert-manager/cluster_issuer_spec.rb +0 -21
- data/lib/kuby/cert-manager/http01_solver.rb +0 -17
- data/lib/kuby/cert-manager/http01_solver_ingress.rb +0 -17
- data/lib/kuby/cert-manager/private_key_secret_ref.rb +0 -17
- data/lib/kuby/cert-manager/solver.rb +0 -17
    
        checksums.yaml
    CHANGED
    
    | @@ -1,7 +1,7 @@ | |
| 1 1 | 
             
            ---
         | 
| 2 2 | 
             
            SHA256:
         | 
| 3 | 
            -
              metadata.gz:  | 
| 4 | 
            -
              data.tar.gz:  | 
| 3 | 
            +
              metadata.gz: 1d974571de438574b816bd970f7f567433ad5c167d8069fb3143115aee657736
         | 
| 4 | 
            +
              data.tar.gz: d9a1f92b7dfe9a736334ad65da71c57310423e93c244e6b3e0715ca9bf0679c2
         | 
| 5 5 | 
             
            SHA512:
         | 
| 6 | 
            -
              metadata.gz:  | 
| 7 | 
            -
              data.tar.gz:  | 
| 6 | 
            +
              metadata.gz: 6f1c3a6da89760f0c1de9932294bdd3be904f26a9ff7c1882504bc6353f3e9ada5d2d936c04a6df78d25404231fdb54de966ff5205f79cedaea0b69c6a0dbe9d
         | 
| 7 | 
            +
              data.tar.gz: bdb83d06b860a4aab731815fadebf341bbc5ac1e93a4f97ca4801c9271373631b3ba52a4fcf861889a0a5d2f6d35ae3ad477573ddd8b58c948521b62d004159d
         | 
    
        data/CHANGELOG.md
    CHANGED
    
    | @@ -1,3 +1,9 @@ | |
| 1 | 
            +
            ## 0.4.0
         | 
| 2 | 
            +
            * Upgrade to cert-manager v1.7.2.
         | 
| 3 | 
            +
            * Generate DSL files using schema pulled from Kind cluster instead of the hand-rolled ones we had before.
         | 
| 4 | 
            +
            * Use tapioca to pull in type annotations for gems.
         | 
| 5 | 
            +
            * Use parlour to publish type annotations in the rbi/ directory.
         | 
| 6 | 
            +
             | 
| 1 7 | 
             
            ## 0.3.0
         | 
| 2 8 | 
             
            * Conform to new plugin architecture.
         | 
| 3 9 | 
             
            * Accept `environment` instead of `definition` instances.
         | 
    
        data/Gemfile
    CHANGED
    
    | @@ -2,17 +2,21 @@ source 'https://rubygems.org' | |
| 2 2 |  | 
| 3 3 | 
             
            gemspec
         | 
| 4 4 |  | 
| 5 | 
            -
            # Declare platform-specific gems here so they install correctly.
         | 
| 6 | 
            -
            # See: https://github.com/rubygems/rubygems/issues/3646
         | 
| 7 | 
            -
            gem 'helm-rb'
         | 
| 8 | 
            -
             | 
| 9 5 | 
             
            group :development, :test do
         | 
| 10 6 | 
             
              gem 'kuby-core', path: '../kuby-core'
         | 
| 11 | 
            -
              gem 'kuby- | 
| 7 | 
            +
              gem 'kuby-crdb'
         | 
| 8 | 
            +
              gem 'kube-dsl', '>= 0.7.3', '< 1'
         | 
| 9 | 
            +
              gem 'kind-rb'
         | 
| 12 10 | 
             
              gem 'pry-byebug'
         | 
| 13 11 | 
             
              gem 'rake'
         | 
| 14 12 | 
             
            end
         | 
| 15 13 |  | 
| 14 | 
            +
            group :development do
         | 
| 15 | 
            +
              gem 'sorbet'
         | 
| 16 | 
            +
              gem 'tapioca', '~> 0.7'
         | 
| 17 | 
            +
              gem 'parlour', '~> 6.0'
         | 
| 18 | 
            +
            end
         | 
| 19 | 
            +
             | 
| 16 20 | 
             
            group :test do
         | 
| 17 21 | 
             
              gem 'rspec', '~> 3.0'
         | 
| 18 22 | 
             
            end
         | 
    
        data/Rakefile
    CHANGED
    
    | @@ -2,6 +2,7 @@ require 'bundler' | |
| 2 2 | 
             
            require 'rspec/core/rake_task'
         | 
| 3 3 | 
             
            require 'rubygems/package_task'
         | 
| 4 4 |  | 
| 5 | 
            +
            require 'sorbet-runtime'
         | 
| 5 6 | 
             
            require 'kuby/cert-manager'
         | 
| 6 7 |  | 
| 7 8 | 
             
            Bundler::GemHelper.install_tasks
         | 
| @@ -12,3 +13,158 @@ desc 'Run specs' | |
| 12 13 | 
             
            RSpec::Core::RakeTask.new do |t|
         | 
| 13 14 | 
             
              t.pattern = './spec/**/*_spec.rb'
         | 
| 14 15 | 
             
            end
         | 
| 16 | 
            +
             | 
| 17 | 
            +
            task generate: [:schemagen, :codegen]
         | 
| 18 | 
            +
             | 
| 19 | 
            +
            task :schemagen do
         | 
| 20 | 
            +
              require 'base64'
         | 
| 21 | 
            +
              require 'json'
         | 
| 22 | 
            +
              require 'kind-rb'
         | 
| 23 | 
            +
              require 'net/http'
         | 
| 24 | 
            +
              require 'uri'
         | 
| 25 | 
            +
              require 'yaml'
         | 
| 26 | 
            +
             | 
| 27 | 
            +
              # delete first just in case
         | 
| 28 | 
            +
              system("#{KindRb.executable} delete cluster --name kuby-cert-manager")
         | 
| 29 | 
            +
              system("#{KindRb.executable} create cluster --name kuby-cert-manager")
         | 
| 30 | 
            +
             | 
| 31 | 
            +
              system("kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v#{Kuby::CertManager::Plugin::CERT_MANAGER_VERSION}/cert-manager.yaml")
         | 
| 32 | 
            +
             | 
| 33 | 
            +
              cluster_name = 'kind-kuby-cert-manager'
         | 
| 34 | 
            +
              kubeconfig = YAML.load_file(File.join(Dir.home, '.kube', 'config'))
         | 
| 35 | 
            +
              cluster = kubeconfig['clusters'].find { |cluster| cluster['name'] == cluster_name }
         | 
| 36 | 
            +
              ca_cert_data = Base64.decode64(cluster.dig(*%w(cluster certificate-authority-data)))
         | 
| 37 | 
            +
             | 
| 38 | 
            +
              cert_store = OpenSSL::X509::Store.new
         | 
| 39 | 
            +
              cert_store.add_cert(OpenSSL::X509::Certificate.new(ca_cert_data))
         | 
| 40 | 
            +
              server = URI.parse(cluster.dig(*%w(cluster server)))
         | 
| 41 | 
            +
             | 
| 42 | 
            +
              http = Net::HTTP.new(server.host, server.port).tap do |http|
         | 
| 43 | 
            +
                http.use_ssl = true
         | 
| 44 | 
            +
                http.cert_store = cert_store
         | 
| 45 | 
            +
                http.verify_mode = OpenSSL::SSL::VERIFY_PEER
         | 
| 46 | 
            +
              end
         | 
| 47 | 
            +
             | 
| 48 | 
            +
              token = nil
         | 
| 49 | 
            +
              STDOUT.write("Getting API token from cluster...")
         | 
| 50 | 
            +
             | 
| 51 | 
            +
              loop do
         | 
| 52 | 
            +
                secrets = JSON.parse(`kubectl --context #{cluster_name} get secrets -o json`)
         | 
| 53 | 
            +
                secret = secrets['items'].find do |secret|
         | 
| 54 | 
            +
                  secret.dig(*%w(metadata annotations kubernetes.io/service-account.name)) == 'default'
         | 
| 55 | 
            +
                end
         | 
| 56 | 
            +
             | 
| 57 | 
            +
                if secret
         | 
| 58 | 
            +
                  token = Base64.decode64(secret.dig(*%w(data token)))
         | 
| 59 | 
            +
                  puts ' done'
         | 
| 60 | 
            +
                  break
         | 
| 61 | 
            +
                else
         | 
| 62 | 
            +
                  STDOUT.write('.')
         | 
| 63 | 
            +
                  sleep 1
         | 
| 64 | 
            +
                end
         | 
| 65 | 
            +
              end
         | 
| 66 | 
            +
             | 
| 67 | 
            +
              get = Net::HTTP::Get.new('/openapi/v2')
         | 
| 68 | 
            +
              get['Authorization'] = "Bearer #{token}"
         | 
| 69 | 
            +
             | 
| 70 | 
            +
              crds = []
         | 
| 71 | 
            +
              schema = nil
         | 
| 72 | 
            +
              STDOUT.write("Requesting OpenAPI v2 schema from cluster...")
         | 
| 73 | 
            +
             | 
| 74 | 
            +
              loop do
         | 
| 75 | 
            +
                response = http.request(get)
         | 
| 76 | 
            +
                schema = JSON.parse(response.body)
         | 
| 77 | 
            +
             | 
| 78 | 
            +
                crds = schema['definitions'].each_with_object({}) do |(id, data), memo|
         | 
| 79 | 
            +
                  memo[id] = data if id.start_with?('io.cert-manager')
         | 
| 80 | 
            +
                end
         | 
| 81 | 
            +
             | 
| 82 | 
            +
                if crds.empty?
         | 
| 83 | 
            +
                  STDOUT.write('.')
         | 
| 84 | 
            +
                  sleep 1
         | 
| 85 | 
            +
                else
         | 
| 86 | 
            +
                  puts ' done'
         | 
| 87 | 
            +
                  break
         | 
| 88 | 
            +
                end
         | 
| 89 | 
            +
              end
         | 
| 90 | 
            +
             | 
| 91 | 
            +
              FileUtils.rm_rf('vendor')
         | 
| 92 | 
            +
              FileUtils.mkdir('vendor')
         | 
| 93 | 
            +
             | 
| 94 | 
            +
              schema = schema.merge('definitions' => crds)
         | 
| 95 | 
            +
              File.write(File.join('vendor', 'open_api.json'), schema.to_json)
         | 
| 96 | 
            +
             | 
| 97 | 
            +
              puts 'Pulling openapi2jsonschema Docker image'
         | 
| 98 | 
            +
              system('docker pull garethr/openapi2jsonschema')
         | 
| 99 | 
            +
             | 
| 100 | 
            +
              puts 'Converting OpenAPI format to JSON schema format'
         | 
| 101 | 
            +
              system(<<~END)
         | 
| 102 | 
            +
                docker run --rm \
         | 
| 103 | 
            +
                  -v #{File.expand_path('vendor')}:/usr/local/scratch \
         | 
| 104 | 
            +
                  garethr/openapi2jsonschema \
         | 
| 105 | 
            +
                  --kubernetes --output /usr/local/scratch/json_schema /usr/local/scratch/open_api.json
         | 
| 106 | 
            +
              END
         | 
| 107 | 
            +
             | 
| 108 | 
            +
              puts "Cleaning up"
         | 
| 109 | 
            +
              system("#{KindRb.executable} delete cluster --name kuby-cert-manager")
         | 
| 110 | 
            +
            end
         | 
| 111 | 
            +
             | 
| 112 | 
            +
            task :codegen do
         | 
| 113 | 
            +
              require 'pry-byebug'
         | 
| 114 | 
            +
             | 
| 115 | 
            +
              require 'dry/inflector'
         | 
| 116 | 
            +
              require 'fileutils'
         | 
| 117 | 
            +
             | 
| 118 | 
            +
              # delete anything that should be re-generated
         | 
| 119 | 
            +
              FileUtils.rm_rf('./lib/kuby/cert-manager/dsl.rb')
         | 
| 120 | 
            +
              FileUtils.rm_rf('./lib/kuby/cert-manager/dsl')
         | 
| 121 | 
            +
              FileUtils.rm_rf('./lib/kuby/cert-manager/entrypoint.rb')
         | 
| 122 | 
            +
              FileUtils.rm_rf('./sorbet/rbi/kuby/cert-manager')
         | 
| 123 | 
            +
              FileUtils.mkdir_p('./lib/kuby/cert-manager/dsl')
         | 
| 124 | 
            +
             | 
| 125 | 
            +
              local_json_schema_path = 'vendor/json_schema'
         | 
| 126 | 
            +
             | 
| 127 | 
            +
              generator = KubeDSL::Generator.new(
         | 
| 128 | 
            +
                schema_dir: local_json_schema_path,
         | 
| 129 | 
            +
                output_dir: File.join('lib'),
         | 
| 130 | 
            +
                autoload_prefix: File.join('kuby', 'cert-manager', 'dsl'),
         | 
| 131 | 
            +
                dsl_namespace: ['Kuby', 'CertManager', 'DSL'],
         | 
| 132 | 
            +
                entrypoint_namespace: ['Kuby', 'CertManager'],
         | 
| 133 | 
            +
                inflector: Dry::Inflector.new do |inflections|
         | 
| 134 | 
            +
                  inflections.acronym('DSL')
         | 
| 135 | 
            +
                end
         | 
| 136 | 
            +
              )
         | 
| 137 | 
            +
             | 
| 138 | 
            +
              generator.builder.register_resolver('io.k8s') do |ref_str, builder|
         | 
| 139 | 
            +
                external_ref = ::KubeDSL::ExternalRef.new(
         | 
| 140 | 
            +
                  ref_str,
         | 
| 141 | 
            +
                  ['KubeDSL', 'DSL'],
         | 
| 142 | 
            +
                  builder.inflector,
         | 
| 143 | 
            +
                  builder.schema_dir,
         | 
| 144 | 
            +
                  builder.autoload_prefix,
         | 
| 145 | 
            +
                  builder.serialize_handlers
         | 
| 146 | 
            +
                )
         | 
| 147 | 
            +
             | 
| 148 | 
            +
                ns = external_ref.ruby_namespace + [external_ref.kind]
         | 
| 149 | 
            +
                exists = ns.inject(Object) { |mod, n| mod.const_get(n, false) } rescue false
         | 
| 150 | 
            +
                exists ? external_ref : builder.parse_ref(ref_str)
         | 
| 151 | 
            +
              end
         | 
| 152 | 
            +
             | 
| 153 | 
            +
              generator.builder.register_serialize_handler('cert-manager', 'v1', 'IssuerSpec', 'selfSigned') do |field, inflector|
         | 
| 154 | 
            +
                "#{field.send(:ruby_safe_name)}_present? ? ::KubeDSL::AllowBlank.new(#{field.serialize_call(inflector)}) : nil"
         | 
| 155 | 
            +
              end
         | 
| 156 | 
            +
             | 
| 157 | 
            +
              generator.builder.register_serialize_handler('cert-manager', 'v1', 'ClusterIssuerSpec', 'selfSigned') do |field, inflector|
         | 
| 158 | 
            +
                "#{field.send(:ruby_safe_name)}_present? ? ::KubeDSL::AllowBlank.new(#{field.serialize_call(inflector)}) : nil"
         | 
| 159 | 
            +
              end
         | 
| 160 | 
            +
             | 
| 161 | 
            +
              generator.generate_resource_files
         | 
| 162 | 
            +
              generator.generate_autoload_files
         | 
| 163 | 
            +
              generator.generate_entrypoint_file do |resource, ns|
         | 
| 164 | 
            +
                # only generate entrypoint methods for resources defined at the top-level, i.e.
         | 
| 165 | 
            +
                # not resources defined inside other resources
         | 
| 166 | 
            +
                !resource.ref.inline?
         | 
| 167 | 
            +
              end
         | 
| 168 | 
            +
             | 
| 169 | 
            +
              FileUtils.rm_rf(File.join('lib', 'kuby.rb'))
         | 
| 170 | 
            +
            end
         | 
    
        data/kuby-cert-manager.gemspec
    CHANGED
    
    | @@ -12,9 +12,8 @@ Gem::Specification.new do |s| | |
| 12 12 |  | 
| 13 13 | 
             
              s.platform = Gem::Platform::RUBY
         | 
| 14 14 |  | 
| 15 | 
            -
              s.add_dependency 'helm-cli', '~> 0.1'
         | 
| 16 15 | 
             
              s.add_dependency 'kube-dsl', '~> 0.1'
         | 
| 17 16 |  | 
| 18 17 | 
             
              s.require_path = 'lib'
         | 
| 19 | 
            -
              s.files = Dir['{lib,spec}/**/*', 'Gemfile', 'LICENSE', 'CHANGELOG.md', 'README.md', 'Rakefile', 'kuby-cert-manager.gemspec']
         | 
| 18 | 
            +
              s.files = Dir['{lib,spec,rbi}/**/*', 'Gemfile', 'LICENSE', 'CHANGELOG.md', 'README.md', 'Rakefile', 'kuby-cert-manager.gemspec']
         | 
| 20 19 | 
             
            end
         | 
| @@ -0,0 +1,37 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class Challenge < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        object_field(:status) { Kuby::CertManager::DSL::Acme::V1::ChallengeStatus.new }
         | 
| 10 | 
            +
                        object_field(:spec) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpec.new }
         | 
| 11 | 
            +
                        value_field :api_version
         | 
| 12 | 
            +
                        object_field(:metadata) { KubeDSL::DSL::Meta::V1::ObjectMeta.new }
         | 
| 13 | 
            +
             | 
| 14 | 
            +
                        validates :status, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeStatus }
         | 
| 15 | 
            +
                        validates :spec, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpec }
         | 
| 16 | 
            +
                        validates :api_version, field: { format: :string }, presence: false
         | 
| 17 | 
            +
                        validates :metadata, object: { kind_of: KubeDSL::DSL::Meta::V1::ObjectMeta }
         | 
| 18 | 
            +
             | 
| 19 | 
            +
                        def serialize
         | 
| 20 | 
            +
                          {}.tap do |result|
         | 
| 21 | 
            +
                            result[:status] = status.serialize
         | 
| 22 | 
            +
                            result[:kind] = "Challenge"
         | 
| 23 | 
            +
                            result[:spec] = spec.serialize
         | 
| 24 | 
            +
                            result[:apiVersion] = api_version
         | 
| 25 | 
            +
                            result[:metadata] = metadata.serialize
         | 
| 26 | 
            +
                          end
         | 
| 27 | 
            +
                        end
         | 
| 28 | 
            +
             | 
| 29 | 
            +
                        def kind_sym
         | 
| 30 | 
            +
                          :challenge
         | 
| 31 | 
            +
                        end
         | 
| 32 | 
            +
                      end
         | 
| 33 | 
            +
                    end
         | 
| 34 | 
            +
                  end
         | 
| 35 | 
            +
                end
         | 
| 36 | 
            +
              end
         | 
| 37 | 
            +
            end
         | 
| @@ -0,0 +1,34 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeList < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        array_field(:item) { Kuby::CertManager::DSL::Acme::V1::Challenge.new }
         | 
| 10 | 
            +
                        value_field :api_version
         | 
| 11 | 
            +
                        object_field(:metadata) { KubeDSL::DSL::Meta::V1::ListMeta.new }
         | 
| 12 | 
            +
             | 
| 13 | 
            +
                        validates :items, array: { kind_of: Kuby::CertManager::DSL::Acme::V1::Challenge }, presence: false
         | 
| 14 | 
            +
                        validates :api_version, field: { format: :string }, presence: false
         | 
| 15 | 
            +
                        validates :metadata, object: { kind_of: KubeDSL::DSL::Meta::V1::ListMeta }
         | 
| 16 | 
            +
             | 
| 17 | 
            +
                        def serialize
         | 
| 18 | 
            +
                          {}.tap do |result|
         | 
| 19 | 
            +
                            result[:items] = items.map(&:serialize)
         | 
| 20 | 
            +
                            result[:kind] = "ChallengeList"
         | 
| 21 | 
            +
                            result[:apiVersion] = api_version
         | 
| 22 | 
            +
                            result[:metadata] = metadata.serialize
         | 
| 23 | 
            +
                          end
         | 
| 24 | 
            +
                        end
         | 
| 25 | 
            +
             | 
| 26 | 
            +
                        def kind_sym
         | 
| 27 | 
            +
                          :challenge_list
         | 
| 28 | 
            +
                        end
         | 
| 29 | 
            +
                      end
         | 
| 30 | 
            +
                    end
         | 
| 31 | 
            +
                  end
         | 
| 32 | 
            +
                end
         | 
| 33 | 
            +
              end
         | 
| 34 | 
            +
            end
         | 
| @@ -0,0 +1,51 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpec < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        object_field(:issuer_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecIssuerRef.new }
         | 
| 10 | 
            +
                        object_field(:solver) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolver.new }
         | 
| 11 | 
            +
                        value_field :url
         | 
| 12 | 
            +
                        value_field :token
         | 
| 13 | 
            +
                        value_field :dns_name
         | 
| 14 | 
            +
                        value_field :key
         | 
| 15 | 
            +
                        value_field :wildcard
         | 
| 16 | 
            +
                        value_field :type
         | 
| 17 | 
            +
                        value_field :authorization_url
         | 
| 18 | 
            +
             | 
| 19 | 
            +
                        validates :issuer_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecIssuerRef }
         | 
| 20 | 
            +
                        validates :solver, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolver }
         | 
| 21 | 
            +
                        validates :url, field: { format: :string }, presence: true
         | 
| 22 | 
            +
                        validates :token, field: { format: :string }, presence: true
         | 
| 23 | 
            +
                        validates :dns_name, field: { format: :string }, presence: true
         | 
| 24 | 
            +
                        validates :key, field: { format: :string }, presence: true
         | 
| 25 | 
            +
                        validates :wildcard, field: { format: :boolean }, presence: true
         | 
| 26 | 
            +
                        validates :type, field: { format: :string }, presence: true
         | 
| 27 | 
            +
                        validates :authorization_url, field: { format: :string }, presence: true
         | 
| 28 | 
            +
             | 
| 29 | 
            +
                        def serialize
         | 
| 30 | 
            +
                          {}.tap do |result|
         | 
| 31 | 
            +
                            result[:issuerRef] = issuer_ref.serialize
         | 
| 32 | 
            +
                            result[:solver] = solver.serialize
         | 
| 33 | 
            +
                            result[:url] = url
         | 
| 34 | 
            +
                            result[:token] = token
         | 
| 35 | 
            +
                            result[:dnsName] = dns_name
         | 
| 36 | 
            +
                            result[:key] = key
         | 
| 37 | 
            +
                            result[:wildcard] = wildcard
         | 
| 38 | 
            +
                            result[:type] = type
         | 
| 39 | 
            +
                            result[:authorizationURL] = authorization_url
         | 
| 40 | 
            +
                          end
         | 
| 41 | 
            +
                        end
         | 
| 42 | 
            +
             | 
| 43 | 
            +
                        def kind_sym
         | 
| 44 | 
            +
                          :challenge_spec
         | 
| 45 | 
            +
                        end
         | 
| 46 | 
            +
                      end
         | 
| 47 | 
            +
                    end
         | 
| 48 | 
            +
                  end
         | 
| 49 | 
            +
                end
         | 
| 50 | 
            +
              end
         | 
| 51 | 
            +
            end
         | 
| @@ -0,0 +1,33 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecIssuerRef < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        value_field :kind
         | 
| 10 | 
            +
                        value_field :group
         | 
| 11 | 
            +
                        value_field :name
         | 
| 12 | 
            +
             | 
| 13 | 
            +
                        validates :kind, field: { format: :string }, presence: false
         | 
| 14 | 
            +
                        validates :group, field: { format: :string }, presence: false
         | 
| 15 | 
            +
                        validates :name, field: { format: :string }, presence: true
         | 
| 16 | 
            +
             | 
| 17 | 
            +
                        def serialize
         | 
| 18 | 
            +
                          {}.tap do |result|
         | 
| 19 | 
            +
                            result[:kind] = kind
         | 
| 20 | 
            +
                            result[:group] = group
         | 
| 21 | 
            +
                            result[:name] = name
         | 
| 22 | 
            +
                          end
         | 
| 23 | 
            +
                        end
         | 
| 24 | 
            +
             | 
| 25 | 
            +
                        def kind_sym
         | 
| 26 | 
            +
                          :challenge_spec_issuer_ref
         | 
| 27 | 
            +
                        end
         | 
| 28 | 
            +
                      end
         | 
| 29 | 
            +
                    end
         | 
| 30 | 
            +
                  end
         | 
| 31 | 
            +
                end
         | 
| 32 | 
            +
              end
         | 
| 33 | 
            +
            end
         | 
| @@ -0,0 +1,33 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolver < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        object_field(:dns01) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01.new }
         | 
| 10 | 
            +
                        object_field(:selector) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverSelector.new }
         | 
| 11 | 
            +
                        object_field(:http01) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverHttp01.new }
         | 
| 12 | 
            +
             | 
| 13 | 
            +
                        validates :dns01, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01 }
         | 
| 14 | 
            +
                        validates :selector, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverSelector }
         | 
| 15 | 
            +
                        validates :http01, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverHttp01 }
         | 
| 16 | 
            +
             | 
| 17 | 
            +
                        def serialize
         | 
| 18 | 
            +
                          {}.tap do |result|
         | 
| 19 | 
            +
                            result[:dns01] = dns01.serialize
         | 
| 20 | 
            +
                            result[:selector] = selector.serialize
         | 
| 21 | 
            +
                            result[:http01] = http01.serialize
         | 
| 22 | 
            +
                          end
         | 
| 23 | 
            +
                        end
         | 
| 24 | 
            +
             | 
| 25 | 
            +
                        def kind_sym
         | 
| 26 | 
            +
                          :challenge_spec_solver
         | 
| 27 | 
            +
                        end
         | 
| 28 | 
            +
                      end
         | 
| 29 | 
            +
                    end
         | 
| 30 | 
            +
                  end
         | 
| 31 | 
            +
                end
         | 
| 32 | 
            +
              end
         | 
| 33 | 
            +
            end
         | 
| @@ -0,0 +1,54 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolverDns01 < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        value_field :cname_strategy
         | 
| 10 | 
            +
                        object_field(:akamai) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Akamai.new }
         | 
| 11 | 
            +
                        object_field(:cloud_dns) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01CloudDNS.new }
         | 
| 12 | 
            +
                        object_field(:webhook) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Webhook.new }
         | 
| 13 | 
            +
                        object_field(:acme_dns) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNS.new }
         | 
| 14 | 
            +
                        object_field(:digitalocean) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Digitalocean.new }
         | 
| 15 | 
            +
                        object_field(:rfc2136) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Rfc2136.new }
         | 
| 16 | 
            +
                        object_field(:cloudflare) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Cloudflare.new }
         | 
| 17 | 
            +
                        object_field(:route53) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Route53.new }
         | 
| 18 | 
            +
                        object_field(:azure_dns) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AzureDNS.new }
         | 
| 19 | 
            +
             | 
| 20 | 
            +
                        validates :cname_strategy, field: { format: :string }, presence: false
         | 
| 21 | 
            +
                        validates :akamai, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Akamai }
         | 
| 22 | 
            +
                        validates :cloud_dns, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01CloudDNS }
         | 
| 23 | 
            +
                        validates :webhook, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Webhook }
         | 
| 24 | 
            +
                        validates :acme_dns, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNS }
         | 
| 25 | 
            +
                        validates :digitalocean, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Digitalocean }
         | 
| 26 | 
            +
                        validates :rfc2136, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Rfc2136 }
         | 
| 27 | 
            +
                        validates :cloudflare, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Cloudflare }
         | 
| 28 | 
            +
                        validates :route53, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01Route53 }
         | 
| 29 | 
            +
                        validates :azure_dns, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AzureDNS }
         | 
| 30 | 
            +
             | 
| 31 | 
            +
                        def serialize
         | 
| 32 | 
            +
                          {}.tap do |result|
         | 
| 33 | 
            +
                            result[:cnameStrategy] = cname_strategy
         | 
| 34 | 
            +
                            result[:akamai] = akamai.serialize
         | 
| 35 | 
            +
                            result[:cloudDNS] = cloud_dns.serialize
         | 
| 36 | 
            +
                            result[:webhook] = webhook.serialize
         | 
| 37 | 
            +
                            result[:acmeDNS] = acme_dns.serialize
         | 
| 38 | 
            +
                            result[:digitalocean] = digitalocean.serialize
         | 
| 39 | 
            +
                            result[:rfc2136] = rfc2136.serialize
         | 
| 40 | 
            +
                            result[:cloudflare] = cloudflare.serialize
         | 
| 41 | 
            +
                            result[:route53] = route53.serialize
         | 
| 42 | 
            +
                            result[:azureDNS] = azure_dns.serialize
         | 
| 43 | 
            +
                          end
         | 
| 44 | 
            +
                        end
         | 
| 45 | 
            +
             | 
| 46 | 
            +
                        def kind_sym
         | 
| 47 | 
            +
                          :challenge_spec_solver_dns01
         | 
| 48 | 
            +
                        end
         | 
| 49 | 
            +
                      end
         | 
| 50 | 
            +
                    end
         | 
| 51 | 
            +
                  end
         | 
| 52 | 
            +
                end
         | 
| 53 | 
            +
              end
         | 
| 54 | 
            +
            end
         | 
| @@ -0,0 +1,30 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolverDns01AcmeDNS < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        object_field(:account_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNSAccountSecretRef.new }
         | 
| 10 | 
            +
                        value_field :host
         | 
| 11 | 
            +
             | 
| 12 | 
            +
                        validates :account_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AcmeDNSAccountSecretRef }
         | 
| 13 | 
            +
                        validates :host, field: { format: :string }, presence: true
         | 
| 14 | 
            +
             | 
| 15 | 
            +
                        def serialize
         | 
| 16 | 
            +
                          {}.tap do |result|
         | 
| 17 | 
            +
                            result[:accountSecretRef] = account_secret_ref.serialize
         | 
| 18 | 
            +
                            result[:host] = host
         | 
| 19 | 
            +
                          end
         | 
| 20 | 
            +
                        end
         | 
| 21 | 
            +
             | 
| 22 | 
            +
                        def kind_sym
         | 
| 23 | 
            +
                          :challenge_spec_solver_dns01_acme_dns
         | 
| 24 | 
            +
                        end
         | 
| 25 | 
            +
                      end
         | 
| 26 | 
            +
                    end
         | 
| 27 | 
            +
                  end
         | 
| 28 | 
            +
                end
         | 
| 29 | 
            +
              end
         | 
| 30 | 
            +
            end
         | 
    
        data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_acme_dns_account_secret_ref.rb
    ADDED
    
    | @@ -0,0 +1,30 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolverDns01AcmeDNSAccountSecretRef < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        value_field :name
         | 
| 10 | 
            +
                        value_field :key
         | 
| 11 | 
            +
             | 
| 12 | 
            +
                        validates :name, field: { format: :string }, presence: true
         | 
| 13 | 
            +
                        validates :key, field: { format: :string }, presence: false
         | 
| 14 | 
            +
             | 
| 15 | 
            +
                        def serialize
         | 
| 16 | 
            +
                          {}.tap do |result|
         | 
| 17 | 
            +
                            result[:name] = name
         | 
| 18 | 
            +
                            result[:key] = key
         | 
| 19 | 
            +
                          end
         | 
| 20 | 
            +
                        end
         | 
| 21 | 
            +
             | 
| 22 | 
            +
                        def kind_sym
         | 
| 23 | 
            +
                          :challenge_spec_solver_dns01_acme_dns_account_secret_ref
         | 
| 24 | 
            +
                        end
         | 
| 25 | 
            +
                      end
         | 
| 26 | 
            +
                    end
         | 
| 27 | 
            +
                  end
         | 
| 28 | 
            +
                end
         | 
| 29 | 
            +
              end
         | 
| 30 | 
            +
            end
         | 
| @@ -0,0 +1,36 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolverDns01Akamai < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        value_field :service_consumer_domain
         | 
| 10 | 
            +
                        object_field(:client_token_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientTokenSecretRef.new }
         | 
| 11 | 
            +
                        object_field(:access_token_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiAccessTokenSecretRef.new }
         | 
| 12 | 
            +
                        object_field(:client_secret_secret_ref) { Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientSecretSecretRef.new }
         | 
| 13 | 
            +
             | 
| 14 | 
            +
                        validates :service_consumer_domain, field: { format: :string }, presence: true
         | 
| 15 | 
            +
                        validates :client_token_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientTokenSecretRef }
         | 
| 16 | 
            +
                        validates :access_token_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiAccessTokenSecretRef }
         | 
| 17 | 
            +
                        validates :client_secret_secret_ref, object: { kind_of: Kuby::CertManager::DSL::Acme::V1::ChallengeSpecSolverDns01AkamaiClientSecretSecretRef }
         | 
| 18 | 
            +
             | 
| 19 | 
            +
                        def serialize
         | 
| 20 | 
            +
                          {}.tap do |result|
         | 
| 21 | 
            +
                            result[:serviceConsumerDomain] = service_consumer_domain
         | 
| 22 | 
            +
                            result[:clientTokenSecretRef] = client_token_secret_ref.serialize
         | 
| 23 | 
            +
                            result[:accessTokenSecretRef] = access_token_secret_ref.serialize
         | 
| 24 | 
            +
                            result[:clientSecretSecretRef] = client_secret_secret_ref.serialize
         | 
| 25 | 
            +
                          end
         | 
| 26 | 
            +
                        end
         | 
| 27 | 
            +
             | 
| 28 | 
            +
                        def kind_sym
         | 
| 29 | 
            +
                          :challenge_spec_solver_dns01_akamai
         | 
| 30 | 
            +
                        end
         | 
| 31 | 
            +
                      end
         | 
| 32 | 
            +
                    end
         | 
| 33 | 
            +
                  end
         | 
| 34 | 
            +
                end
         | 
| 35 | 
            +
              end
         | 
| 36 | 
            +
            end
         | 
    
        data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_access_token_secret_ref.rb
    ADDED
    
    | @@ -0,0 +1,30 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolverDns01AkamaiAccessTokenSecretRef < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        value_field :name
         | 
| 10 | 
            +
                        value_field :key
         | 
| 11 | 
            +
             | 
| 12 | 
            +
                        validates :name, field: { format: :string }, presence: true
         | 
| 13 | 
            +
                        validates :key, field: { format: :string }, presence: false
         | 
| 14 | 
            +
             | 
| 15 | 
            +
                        def serialize
         | 
| 16 | 
            +
                          {}.tap do |result|
         | 
| 17 | 
            +
                            result[:name] = name
         | 
| 18 | 
            +
                            result[:key] = key
         | 
| 19 | 
            +
                          end
         | 
| 20 | 
            +
                        end
         | 
| 21 | 
            +
             | 
| 22 | 
            +
                        def kind_sym
         | 
| 23 | 
            +
                          :challenge_spec_solver_dns01_akamai_access_token_secret_ref
         | 
| 24 | 
            +
                        end
         | 
| 25 | 
            +
                      end
         | 
| 26 | 
            +
                    end
         | 
| 27 | 
            +
                  end
         | 
| 28 | 
            +
                end
         | 
| 29 | 
            +
              end
         | 
| 30 | 
            +
            end
         | 
| @@ -0,0 +1,30 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolverDns01AkamaiClientSecretSecretRef < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        value_field :name
         | 
| 10 | 
            +
                        value_field :key
         | 
| 11 | 
            +
             | 
| 12 | 
            +
                        validates :name, field: { format: :string }, presence: true
         | 
| 13 | 
            +
                        validates :key, field: { format: :string }, presence: false
         | 
| 14 | 
            +
             | 
| 15 | 
            +
                        def serialize
         | 
| 16 | 
            +
                          {}.tap do |result|
         | 
| 17 | 
            +
                            result[:name] = name
         | 
| 18 | 
            +
                            result[:key] = key
         | 
| 19 | 
            +
                          end
         | 
| 20 | 
            +
                        end
         | 
| 21 | 
            +
             | 
| 22 | 
            +
                        def kind_sym
         | 
| 23 | 
            +
                          :challenge_spec_solver_dns01_akamai_client_secret_secret_ref
         | 
| 24 | 
            +
                        end
         | 
| 25 | 
            +
                      end
         | 
| 26 | 
            +
                    end
         | 
| 27 | 
            +
                  end
         | 
| 28 | 
            +
                end
         | 
| 29 | 
            +
              end
         | 
| 30 | 
            +
            end
         | 
    
        data/lib/kuby/cert-manager/dsl/acme/v1/challenge_spec_solver_dns01_akamai_client_token_secret_ref.rb
    ADDED
    
    | @@ -0,0 +1,30 @@ | |
| 1 | 
            +
            # typed: true
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            module Kuby
         | 
| 4 | 
            +
              module CertManager
         | 
| 5 | 
            +
                module DSL
         | 
| 6 | 
            +
                  module Acme
         | 
| 7 | 
            +
                    module V1
         | 
| 8 | 
            +
                      class ChallengeSpecSolverDns01AkamaiClientTokenSecretRef < ::KubeDSL::DSLObject
         | 
| 9 | 
            +
                        value_field :name
         | 
| 10 | 
            +
                        value_field :key
         | 
| 11 | 
            +
             | 
| 12 | 
            +
                        validates :name, field: { format: :string }, presence: true
         | 
| 13 | 
            +
                        validates :key, field: { format: :string }, presence: false
         | 
| 14 | 
            +
             | 
| 15 | 
            +
                        def serialize
         | 
| 16 | 
            +
                          {}.tap do |result|
         | 
| 17 | 
            +
                            result[:name] = name
         | 
| 18 | 
            +
                            result[:key] = key
         | 
| 19 | 
            +
                          end
         | 
| 20 | 
            +
                        end
         | 
| 21 | 
            +
             | 
| 22 | 
            +
                        def kind_sym
         | 
| 23 | 
            +
                          :challenge_spec_solver_dns01_akamai_client_token_secret_ref
         | 
| 24 | 
            +
                        end
         | 
| 25 | 
            +
                      end
         | 
| 26 | 
            +
                    end
         | 
| 27 | 
            +
                  end
         | 
| 28 | 
            +
                end
         | 
| 29 | 
            +
              end
         | 
| 30 | 
            +
            end
         |