@highstate/cert-manager 0.9.16 → 0.9.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/CHANGELOG.md +3 -40
  2. package/acme/v1/challenge.ts +2 -4
  3. package/acme/v1/challengeList.ts +0 -2
  4. package/acme/v1/challengePatch.ts +2 -4
  5. package/acme/v1/order.ts +2 -4
  6. package/acme/v1/orderList.ts +0 -2
  7. package/acme/v1/orderPatch.ts +2 -4
  8. package/bin/acme/v1/challenge.d.ts +2 -3
  9. package/bin/acme/v1/challenge.js.map +1 -1
  10. package/bin/acme/v1/challengeList.js.map +1 -1
  11. package/bin/acme/v1/challengePatch.d.ts +2 -3
  12. package/bin/acme/v1/challengePatch.js.map +1 -1
  13. package/bin/acme/v1/order.d.ts +2 -3
  14. package/bin/acme/v1/order.js.map +1 -1
  15. package/bin/acme/v1/orderList.js.map +1 -1
  16. package/bin/acme/v1/orderPatch.d.ts +2 -3
  17. package/bin/acme/v1/orderPatch.js.map +1 -1
  18. package/bin/cert_manager/v1/certificate.d.ts +2 -3
  19. package/bin/cert_manager/v1/certificate.js.map +1 -1
  20. package/bin/cert_manager/v1/certificateList.js.map +1 -1
  21. package/bin/cert_manager/v1/certificatePatch.d.ts +2 -3
  22. package/bin/cert_manager/v1/certificatePatch.js.map +1 -1
  23. package/bin/cert_manager/v1/certificateRequest.d.ts +2 -3
  24. package/bin/cert_manager/v1/certificateRequest.js.map +1 -1
  25. package/bin/cert_manager/v1/certificateRequestList.js.map +1 -1
  26. package/bin/cert_manager/v1/certificateRequestPatch.d.ts +2 -3
  27. package/bin/cert_manager/v1/certificateRequestPatch.js.map +1 -1
  28. package/bin/cert_manager/v1/clusterIssuer.d.ts +2 -3
  29. package/bin/cert_manager/v1/clusterIssuer.js.map +1 -1
  30. package/bin/cert_manager/v1/clusterIssuerList.js.map +1 -1
  31. package/bin/cert_manager/v1/clusterIssuerPatch.d.ts +2 -3
  32. package/bin/cert_manager/v1/clusterIssuerPatch.js.map +1 -1
  33. package/bin/cert_manager/v1/issuer.d.ts +2 -3
  34. package/bin/cert_manager/v1/issuer.js.map +1 -1
  35. package/bin/cert_manager/v1/issuerList.js.map +1 -1
  36. package/bin/cert_manager/v1/issuerPatch.d.ts +2 -3
  37. package/bin/cert_manager/v1/issuerPatch.js.map +1 -1
  38. package/bin/package.json +9 -8
  39. package/bin/types/input.d.ts +423 -72
  40. package/bin/types/output.d.ts +424 -73
  41. package/cert_manager/v1/certificate.ts +2 -4
  42. package/cert_manager/v1/certificateList.ts +0 -2
  43. package/cert_manager/v1/certificatePatch.ts +2 -4
  44. package/cert_manager/v1/certificateRequest.ts +2 -4
  45. package/cert_manager/v1/certificateRequestList.ts +0 -2
  46. package/cert_manager/v1/certificateRequestPatch.ts +2 -4
  47. package/cert_manager/v1/clusterIssuer.ts +2 -4
  48. package/cert_manager/v1/clusterIssuerList.ts +0 -2
  49. package/cert_manager/v1/clusterIssuerPatch.ts +2 -4
  50. package/cert_manager/v1/issuer.ts +2 -4
  51. package/cert_manager/v1/issuerList.ts +0 -2
  52. package/cert_manager/v1/issuerPatch.ts +2 -4
  53. package/package.json +10 -9
  54. package/tsconfig.json +44 -43
  55. package/types/input.ts +421 -73
  56. package/types/output.ts +422 -74
  57. package/bin/meta/v1.d.ts +0 -3
  58. package/bin/meta/v1.js +0 -3
  59. package/bin/meta/v1.js.map +0 -1
@@ -1,6 +1,5 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "../types/input";
3
- import { ObjectMeta } from "../meta/v1";
4
3
  export declare namespace acme {
5
4
  namespace v1 {
6
5
  /**
@@ -18,7 +17,7 @@ export declare namespace acme {
18
17
  /**
19
18
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
20
19
  */
21
- metadata?: pulumi.Input<ObjectMeta>;
20
+ metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
22
21
  spec?: pulumi.Input<inputs.acme.v1.ChallengeSpec>;
23
22
  status?: pulumi.Input<inputs.acme.v1.ChallengeStatus>;
24
23
  }
@@ -29,9 +28,9 @@ export declare namespace acme {
29
28
  */
30
29
  authorizationURL?: pulumi.Input<string>;
31
30
  /**
32
- * dnsName is the identifier that this challenge is for, e.g. example.com.
31
+ * dnsName is the identifier that this challenge is for, e.g., example.com.
33
32
  * If the requested DNSName is a 'wildcard', this field MUST be set to the
34
- * non-wildcard domain, e.g. for `*.example.com`, it must be `example.com`.
33
+ * non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
35
34
  */
36
35
  dnsName?: pulumi.Input<string>;
37
36
  issuerRef?: pulumi.Input<inputs.acme.v1.ChallengeSpecIssuerRef>;
@@ -116,9 +115,9 @@ export declare namespace acme {
116
115
  */
117
116
  authorizationURL?: pulumi.Input<string>;
118
117
  /**
119
- * dnsName is the identifier that this challenge is for, e.g. example.com.
118
+ * dnsName is the identifier that this challenge is for, e.g., example.com.
120
119
  * If the requested DNSName is a 'wildcard', this field MUST be set to the
121
- * non-wildcard domain, e.g. for `*.example.com`, it must be `example.com`.
120
+ * non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
122
121
  */
123
122
  dnsName?: pulumi.Input<string>;
124
123
  issuerRef?: pulumi.Input<inputs.acme.v1.ChallengeSpecIssuerRefPatch>;
@@ -431,16 +430,16 @@ export declare namespace acme {
431
430
  */
432
431
  interface ChallengeSpecSolverDns01AzureDNSManagedIdentity {
433
432
  /**
434
- * client ID of the managed identity, can not be used at the same time as resourceID
433
+ * client ID of the managed identity, cannot be used at the same time as resourceID
435
434
  */
436
435
  clientID?: pulumi.Input<string>;
437
436
  /**
438
- * resource ID of the managed identity, can not be used at the same time as clientID
437
+ * resource ID of the managed identity, cannot be used at the same time as clientID
439
438
  * Cannot be used for Azure Managed Service Identity
440
439
  */
441
440
  resourceID?: pulumi.Input<string>;
442
441
  /**
443
- * tenant ID of the managed identity, can not be used at the same time as resourceID
442
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
444
443
  */
445
444
  tenantID?: pulumi.Input<string>;
446
445
  }
@@ -451,16 +450,16 @@ export declare namespace acme {
451
450
  */
452
451
  interface ChallengeSpecSolverDns01AzureDNSManagedIdentityPatch {
453
452
  /**
454
- * client ID of the managed identity, can not be used at the same time as resourceID
453
+ * client ID of the managed identity, cannot be used at the same time as resourceID
455
454
  */
456
455
  clientID?: pulumi.Input<string>;
457
456
  /**
458
- * resource ID of the managed identity, can not be used at the same time as clientID
457
+ * resource ID of the managed identity, cannot be used at the same time as clientID
459
458
  * Cannot be used for Azure Managed Service Identity
460
459
  */
461
460
  resourceID?: pulumi.Input<string>;
462
461
  /**
463
- * tenant ID of the managed identity, can not be used at the same time as resourceID
462
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
464
463
  */
465
464
  tenantID?: pulumi.Input<string>;
466
465
  }
@@ -1053,7 +1052,7 @@ export declare namespace acme {
1053
1052
  * when challenges are processed.
1054
1053
  * This can contain arbitrary JSON data.
1055
1054
  * Secret values should not be specified in this stanza.
1056
- * If secret values are needed (e.g. credentials for a DNS service), you
1055
+ * If secret values are needed (e.g., credentials for a DNS service), you
1057
1056
  * should use a SecretKeySelector to reference a Secret resource.
1058
1057
  * For details on the schema of this field, consult the webhook provider
1059
1058
  * implementation's documentation.
@@ -1071,7 +1070,7 @@ export declare namespace acme {
1071
1070
  /**
1072
1071
  * The name of the solver to use, as defined in the webhook provider
1073
1072
  * implementation.
1074
- * This will typically be the name of the provider, e.g. 'cloudflare'.
1073
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
1075
1074
  */
1076
1075
  solverName?: pulumi.Input<string>;
1077
1076
  }
@@ -1085,7 +1084,7 @@ export declare namespace acme {
1085
1084
  * when challenges are processed.
1086
1085
  * This can contain arbitrary JSON data.
1087
1086
  * Secret values should not be specified in this stanza.
1088
- * If secret values are needed (e.g. credentials for a DNS service), you
1087
+ * If secret values are needed (e.g., credentials for a DNS service), you
1089
1088
  * should use a SecretKeySelector to reference a Secret resource.
1090
1089
  * For details on the schema of this field, consult the webhook provider
1091
1090
  * implementation's documentation.
@@ -1103,7 +1102,7 @@ export declare namespace acme {
1103
1102
  /**
1104
1103
  * The name of the solver to use, as defined in the webhook provider
1105
1104
  * implementation.
1106
- * This will typically be the name of the provider, e.g. 'cloudflare'.
1105
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
1107
1106
  */
1108
1107
  solverName?: pulumi.Input<string>;
1109
1108
  }
@@ -1111,7 +1110,7 @@ export declare namespace acme {
1111
1110
  * Configures cert-manager to attempt to complete authorizations by
1112
1111
  * performing the HTTP01 challenge flow.
1113
1112
  * It is not possible to obtain certificates for wildcard domain names
1114
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
1113
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
1115
1114
  */
1116
1115
  interface ChallengeSpecSolverHttp01 {
1117
1116
  gatewayHTTPRoute?: pulumi.Input<inputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoute>;
@@ -5625,7 +5624,7 @@ export declare namespace acme {
5625
5624
  * Configures cert-manager to attempt to complete authorizations by
5626
5625
  * performing the HTTP01 challenge flow.
5627
5626
  * It is not possible to obtain certificates for wildcard domain names
5628
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
5627
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
5629
5628
  */
5630
5629
  interface ChallengeSpecSolverHttp01Patch {
5631
5630
  gatewayHTTPRoute?: pulumi.Input<inputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoutePatch>;
@@ -5761,7 +5760,7 @@ export declare namespace acme {
5761
5760
  /**
5762
5761
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
5763
5762
  */
5764
- metadata?: pulumi.Input<ObjectMeta>;
5763
+ metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
5765
5764
  spec?: pulumi.Input<inputs.acme.v1.OrderSpec>;
5766
5765
  status?: pulumi.Input<inputs.acme.v1.OrderStatus>;
5767
5766
  }
@@ -5790,6 +5789,11 @@ export declare namespace acme {
5790
5789
  */
5791
5790
  ipAddresses?: pulumi.Input<pulumi.Input<string>[]>;
5792
5791
  issuerRef?: pulumi.Input<inputs.acme.v1.OrderSpecIssuerRef>;
5792
+ /**
5793
+ * Profile allows requesting a certificate profile from the ACME server.
5794
+ * Supported profiles are listed by the server's ACME directory URL.
5795
+ */
5796
+ profile?: pulumi.Input<string>;
5793
5797
  /**
5794
5798
  * Certificate signing request bytes in DER encoding.
5795
5799
  * This will be used when finalizing the order.
@@ -5864,6 +5868,11 @@ export declare namespace acme {
5864
5868
  */
5865
5869
  ipAddresses?: pulumi.Input<pulumi.Input<string>[]>;
5866
5870
  issuerRef?: pulumi.Input<inputs.acme.v1.OrderSpecIssuerRefPatch>;
5871
+ /**
5872
+ * Profile allows requesting a certificate profile from the ACME server.
5873
+ * Supported profiles are listed by the server's ACME directory URL.
5874
+ */
5875
+ profile?: pulumi.Input<string>;
5867
5876
  /**
5868
5877
  * Certificate signing request bytes in DER encoding.
5869
5878
  * This will be used when finalizing the order.
@@ -5966,7 +5975,7 @@ export declare namespace acme {
5966
5975
  */
5967
5976
  token?: pulumi.Input<string>;
5968
5977
  /**
5969
- * Type is the type of challenge being offered, e.g. 'http-01', 'dns-01',
5978
+ * Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
5970
5979
  * 'tls-sni-01', etc.
5971
5980
  * This is the raw value retrieved from the ACME server.
5972
5981
  * Only 'http-01' and 'dns-01' are supported by cert-manager, other values
@@ -6001,7 +6010,7 @@ export declare namespace cert_manager {
6001
6010
  /**
6002
6011
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
6003
6012
  */
6004
- metadata?: pulumi.Input<ObjectMeta>;
6013
+ metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
6005
6014
  spec?: pulumi.Input<inputs.cert_manager.v1.CertificateSpec>;
6006
6015
  status?: pulumi.Input<inputs.cert_manager.v1.CertificateStatus>;
6007
6016
  }
@@ -6028,7 +6037,7 @@ export declare namespace cert_manager {
6028
6037
  /**
6029
6038
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
6030
6039
  */
6031
- metadata?: pulumi.Input<ObjectMeta>;
6040
+ metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
6032
6041
  spec?: pulumi.Input<inputs.cert_manager.v1.CertificateRequestSpec>;
6033
6042
  status?: pulumi.Input<inputs.cert_manager.v1.CertificateRequestStatus>;
6034
6043
  }
@@ -6284,10 +6293,6 @@ export declare namespace cert_manager {
6284
6293
  /**
6285
6294
  * Defines extra output formats of the private key and signed certificate chain
6286
6295
  * to be written to this Certificate's target Secret.
6287
- *
6288
- * This is a Beta Feature enabled by default. It can be disabled with the
6289
- * `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
6290
- * the controller and webhook components.
6291
6296
  */
6292
6297
  additionalOutputFormats?: pulumi.Input<pulumi.Input<inputs.cert_manager.v1.CertificateSpecAdditionalOutputFormats>[]>;
6293
6298
  /**
@@ -6405,8 +6410,7 @@ export declare namespace cert_manager {
6405
6410
  * revisions exceeds this number.
6406
6411
  *
6407
6412
  * If set, revisionHistoryLimit must be a value of `1` or greater.
6408
- * If unset (`nil`), revisions will not be garbage collected.
6409
- * Default value is `nil`.
6413
+ * Default value is `1`.
6410
6414
  */
6411
6415
  revisionHistoryLimit?: pulumi.Input<number>;
6412
6416
  /**
@@ -6417,6 +6421,13 @@ export declare namespace cert_manager {
6417
6421
  */
6418
6422
  secretName?: pulumi.Input<string>;
6419
6423
  secretTemplate?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSecretTemplate>;
6424
+ /**
6425
+ * Signature algorithm to use.
6426
+ * Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
6427
+ * Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
6428
+ * Allowed values for Ed25519 keys: PureEd25519.
6429
+ */
6430
+ signatureAlgorithm?: pulumi.Input<string>;
6420
6431
  subject?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSubject>;
6421
6432
  /**
6422
6433
  * Requested URI subject alternative names.
@@ -6644,7 +6655,7 @@ export declare namespace cert_manager {
6644
6655
  * `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
6645
6656
  * `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
6646
6657
  * `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
6647
- * (eg. because of company policy). Please note that the security of the algorithm is not that important
6658
+ * (e.g., because of company policy). Please note that the security of the algorithm is not that important
6648
6659
  * in reality, because the unencrypted certificate and private key are also stored in the Secret.
6649
6660
  */
6650
6661
  profile?: pulumi.Input<string>;
@@ -6719,7 +6730,7 @@ export declare namespace cert_manager {
6719
6730
  * `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
6720
6731
  * `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
6721
6732
  * `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
6722
- * (eg. because of company policy). Please note that the security of the algorithm is not that important
6733
+ * (e.g., because of company policy). Please note that the security of the algorithm is not that important
6723
6734
  * in reality, because the unencrypted certificate and private key are also stored in the Secret.
6724
6735
  */
6725
6736
  profile?: pulumi.Input<string>;
@@ -6882,10 +6893,6 @@ export declare namespace cert_manager {
6882
6893
  /**
6883
6894
  * Defines extra output formats of the private key and signed certificate chain
6884
6895
  * to be written to this Certificate's target Secret.
6885
- *
6886
- * This is a Beta Feature enabled by default. It can be disabled with the
6887
- * `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
6888
- * the controller and webhook components.
6889
6896
  */
6890
6897
  additionalOutputFormats?: pulumi.Input<pulumi.Input<inputs.cert_manager.v1.CertificateSpecAdditionalOutputFormatsPatch>[]>;
6891
6898
  /**
@@ -7003,8 +7010,7 @@ export declare namespace cert_manager {
7003
7010
  * revisions exceeds this number.
7004
7011
  *
7005
7012
  * If set, revisionHistoryLimit must be a value of `1` or greater.
7006
- * If unset (`nil`), revisions will not be garbage collected.
7007
- * Default value is `nil`.
7013
+ * Default value is `1`.
7008
7014
  */
7009
7015
  revisionHistoryLimit?: pulumi.Input<number>;
7010
7016
  /**
@@ -7015,6 +7021,13 @@ export declare namespace cert_manager {
7015
7021
  */
7016
7022
  secretName?: pulumi.Input<string>;
7017
7023
  secretTemplate?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSecretTemplatePatch>;
7024
+ /**
7025
+ * Signature algorithm to use.
7026
+ * Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
7027
+ * Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
7028
+ * Allowed values for Ed25519 keys: PureEd25519.
7029
+ */
7030
+ signatureAlgorithm?: pulumi.Input<string>;
7018
7031
  subject?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSubjectPatch>;
7019
7032
  /**
7020
7033
  * Requested URI subject alternative names.
@@ -7065,7 +7078,11 @@ export declare namespace cert_manager {
7065
7078
  * to await user intervention.
7066
7079
  * If set to `Always`, a private key matching the specified requirements
7067
7080
  * will be generated whenever a re-issuance occurs.
7068
- * Default is `Never` for backward compatibility.
7081
+ * Default is `Always`.
7082
+ * The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
7083
+ * The new default can be disabled by setting the
7084
+ * `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
7085
+ * the controller component.
7069
7086
  */
7070
7087
  rotationPolicy?: pulumi.Input<string>;
7071
7088
  /**
@@ -7115,7 +7132,11 @@ export declare namespace cert_manager {
7115
7132
  * to await user intervention.
7116
7133
  * If set to `Always`, a private key matching the specified requirements
7117
7134
  * will be generated whenever a re-issuance occurs.
7118
- * Default is `Never` for backward compatibility.
7135
+ * Default is `Always`.
7136
+ * The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
7137
+ * The new default can be disabled by setting the
7138
+ * `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
7139
+ * the controller component.
7119
7140
  */
7120
7141
  rotationPolicy?: pulumi.Input<string>;
7121
7142
  /**
@@ -7380,7 +7401,7 @@ export declare namespace cert_manager {
7380
7401
  /**
7381
7402
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
7382
7403
  */
7383
- metadata?: pulumi.Input<ObjectMeta>;
7404
+ metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
7384
7405
  spec?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpec>;
7385
7406
  status?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerStatus>;
7386
7407
  }
@@ -7438,7 +7459,7 @@ export declare namespace cert_manager {
7438
7459
  * PreferredChain is the chain to use if the ACME server outputs multiple.
7439
7460
  * PreferredChain is no guarantee that this one gets delivered by the ACME
7440
7461
  * endpoint.
7441
- * For example, for Let's Encrypt's DST crosssign you would use:
7462
+ * For example, for Let's Encrypt's DST cross-sign you would use:
7442
7463
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
7443
7464
  * This value picks the first certificate bundle in the combined set of
7444
7465
  * ACME default and alternative chains that has a root-most certificate with
@@ -7446,6 +7467,11 @@ export declare namespace cert_manager {
7446
7467
  */
7447
7468
  preferredChain?: pulumi.Input<string>;
7448
7469
  privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRef>;
7470
+ /**
7471
+ * Profile allows requesting a certificate profile from the ACME server.
7472
+ * Supported profiles are listed by the server's ACME directory URL.
7473
+ */
7474
+ profile?: pulumi.Input<string>;
7449
7475
  /**
7450
7476
  * Server is the URL used to access the ACME server's 'directory' endpoint.
7451
7477
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -7600,7 +7626,7 @@ export declare namespace cert_manager {
7600
7626
  * PreferredChain is the chain to use if the ACME server outputs multiple.
7601
7627
  * PreferredChain is no guarantee that this one gets delivered by the ACME
7602
7628
  * endpoint.
7603
- * For example, for Let's Encrypt's DST crosssign you would use:
7629
+ * For example, for Let's Encrypt's DST cross-sign you would use:
7604
7630
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
7605
7631
  * This value picks the first certificate bundle in the combined set of
7606
7632
  * ACME default and alternative chains that has a root-most certificate with
@@ -7608,6 +7634,11 @@ export declare namespace cert_manager {
7608
7634
  */
7609
7635
  preferredChain?: pulumi.Input<string>;
7610
7636
  privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRefPatch>;
7637
+ /**
7638
+ * Profile allows requesting a certificate profile from the ACME server.
7639
+ * Supported profiles are listed by the server's ACME directory URL.
7640
+ */
7641
+ profile?: pulumi.Input<string>;
7611
7642
  /**
7612
7643
  * Server is the URL used to access the ACME server's 'directory' endpoint.
7613
7644
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -7954,16 +7985,16 @@ export declare namespace cert_manager {
7954
7985
  */
7955
7986
  interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
7956
7987
  /**
7957
- * client ID of the managed identity, can not be used at the same time as resourceID
7988
+ * client ID of the managed identity, cannot be used at the same time as resourceID
7958
7989
  */
7959
7990
  clientID?: pulumi.Input<string>;
7960
7991
  /**
7961
- * resource ID of the managed identity, can not be used at the same time as clientID
7992
+ * resource ID of the managed identity, cannot be used at the same time as clientID
7962
7993
  * Cannot be used for Azure Managed Service Identity
7963
7994
  */
7964
7995
  resourceID?: pulumi.Input<string>;
7965
7996
  /**
7966
- * tenant ID of the managed identity, can not be used at the same time as resourceID
7997
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
7967
7998
  */
7968
7999
  tenantID?: pulumi.Input<string>;
7969
8000
  }
@@ -7974,16 +8005,16 @@ export declare namespace cert_manager {
7974
8005
  */
7975
8006
  interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
7976
8007
  /**
7977
- * client ID of the managed identity, can not be used at the same time as resourceID
8008
+ * client ID of the managed identity, cannot be used at the same time as resourceID
7978
8009
  */
7979
8010
  clientID?: pulumi.Input<string>;
7980
8011
  /**
7981
- * resource ID of the managed identity, can not be used at the same time as clientID
8012
+ * resource ID of the managed identity, cannot be used at the same time as clientID
7982
8013
  * Cannot be used for Azure Managed Service Identity
7983
8014
  */
7984
8015
  resourceID?: pulumi.Input<string>;
7985
8016
  /**
7986
- * tenant ID of the managed identity, can not be used at the same time as resourceID
8017
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
7987
8018
  */
7988
8019
  tenantID?: pulumi.Input<string>;
7989
8020
  }
@@ -8576,7 +8607,7 @@ export declare namespace cert_manager {
8576
8607
  * when challenges are processed.
8577
8608
  * This can contain arbitrary JSON data.
8578
8609
  * Secret values should not be specified in this stanza.
8579
- * If secret values are needed (e.g. credentials for a DNS service), you
8610
+ * If secret values are needed (e.g., credentials for a DNS service), you
8580
8611
  * should use a SecretKeySelector to reference a Secret resource.
8581
8612
  * For details on the schema of this field, consult the webhook provider
8582
8613
  * implementation's documentation.
@@ -8594,7 +8625,7 @@ export declare namespace cert_manager {
8594
8625
  /**
8595
8626
  * The name of the solver to use, as defined in the webhook provider
8596
8627
  * implementation.
8597
- * This will typically be the name of the provider, e.g. 'cloudflare'.
8628
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
8598
8629
  */
8599
8630
  solverName?: pulumi.Input<string>;
8600
8631
  }
@@ -8608,7 +8639,7 @@ export declare namespace cert_manager {
8608
8639
  * when challenges are processed.
8609
8640
  * This can contain arbitrary JSON data.
8610
8641
  * Secret values should not be specified in this stanza.
8611
- * If secret values are needed (e.g. credentials for a DNS service), you
8642
+ * If secret values are needed (e.g., credentials for a DNS service), you
8612
8643
  * should use a SecretKeySelector to reference a Secret resource.
8613
8644
  * For details on the schema of this field, consult the webhook provider
8614
8645
  * implementation's documentation.
@@ -8626,7 +8657,7 @@ export declare namespace cert_manager {
8626
8657
  /**
8627
8658
  * The name of the solver to use, as defined in the webhook provider
8628
8659
  * implementation.
8629
- * This will typically be the name of the provider, e.g. 'cloudflare'.
8660
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
8630
8661
  */
8631
8662
  solverName?: pulumi.Input<string>;
8632
8663
  }
@@ -8634,7 +8665,7 @@ export declare namespace cert_manager {
8634
8665
  * Configures cert-manager to attempt to complete authorizations by
8635
8666
  * performing the HTTP01 challenge flow.
8636
8667
  * It is not possible to obtain certificates for wildcard domain names
8637
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
8668
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
8638
8669
  */
8639
8670
  interface ClusterIssuerSpecAcmeSolversHttp01 {
8640
8671
  gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoute>;
@@ -13148,7 +13179,7 @@ export declare namespace cert_manager {
13148
13179
  * Configures cert-manager to attempt to complete authorizations by
13149
13180
  * performing the HTTP01 challenge flow.
13150
13181
  * It is not possible to obtain certificates for wildcard domain names
13151
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
13182
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
13152
13183
  */
13153
13184
  interface ClusterIssuerSpecAcmeSolversHttp01Patch {
13154
13185
  gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch>;
@@ -13370,6 +13401,11 @@ export declare namespace cert_manager {
13370
13401
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
13371
13402
  */
13372
13403
  server?: pulumi.Input<string>;
13404
+ /**
13405
+ * ServerName is used to verify the hostname on the returned certificates
13406
+ * by the Vault server.
13407
+ */
13408
+ serverName?: pulumi.Input<string>;
13373
13409
  }
13374
13410
  /**
13375
13411
  * Auth configures how cert-manager authenticates with the Vault server.
@@ -13797,6 +13833,11 @@ export declare namespace cert_manager {
13797
13833
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
13798
13834
  */
13799
13835
  server?: pulumi.Input<string>;
13836
+ /**
13837
+ * ServerName is used to verify the hostname on the returned certificates
13838
+ * by the Vault server.
13839
+ */
13840
+ serverName?: pulumi.Input<string>;
13800
13841
  }
13801
13842
  /**
13802
13843
  * Venafi configures this issuer to sign certificates using a Venafi TPP
@@ -13821,7 +13862,7 @@ export declare namespace cert_manager {
13821
13862
  apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRef>;
13822
13863
  /**
13823
13864
  * URL is the base URL for Venafi Cloud.
13824
- * Defaults to "https://api.venafi.cloud/v1".
13865
+ * Defaults to "https://api.venafi.cloud/".
13825
13866
  */
13826
13867
  url?: pulumi.Input<string>;
13827
13868
  }
@@ -13865,7 +13906,7 @@ export declare namespace cert_manager {
13865
13906
  apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRefPatch>;
13866
13907
  /**
13867
13908
  * URL is the base URL for Venafi Cloud.
13868
- * Defaults to "https://api.venafi.cloud/v1".
13909
+ * Defaults to "https://api.venafi.cloud/".
13869
13910
  */
13870
13911
  url?: pulumi.Input<string>;
13871
13912
  }
@@ -14077,7 +14118,7 @@ export declare namespace cert_manager {
14077
14118
  /**
14078
14119
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
14079
14120
  */
14080
- metadata?: pulumi.Input<ObjectMeta>;
14121
+ metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
14081
14122
  spec?: pulumi.Input<inputs.cert_manager.v1.IssuerSpec>;
14082
14123
  status?: pulumi.Input<inputs.cert_manager.v1.IssuerStatus>;
14083
14124
  }
@@ -14135,7 +14176,7 @@ export declare namespace cert_manager {
14135
14176
  * PreferredChain is the chain to use if the ACME server outputs multiple.
14136
14177
  * PreferredChain is no guarantee that this one gets delivered by the ACME
14137
14178
  * endpoint.
14138
- * For example, for Let's Encrypt's DST crosssign you would use:
14179
+ * For example, for Let's Encrypt's DST cross-sign you would use:
14139
14180
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
14140
14181
  * This value picks the first certificate bundle in the combined set of
14141
14182
  * ACME default and alternative chains that has a root-most certificate with
@@ -14143,6 +14184,11 @@ export declare namespace cert_manager {
14143
14184
  */
14144
14185
  preferredChain?: pulumi.Input<string>;
14145
14186
  privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRef>;
14187
+ /**
14188
+ * Profile allows requesting a certificate profile from the ACME server.
14189
+ * Supported profiles are listed by the server's ACME directory URL.
14190
+ */
14191
+ profile?: pulumi.Input<string>;
14146
14192
  /**
14147
14193
  * Server is the URL used to access the ACME server's 'directory' endpoint.
14148
14194
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -14297,7 +14343,7 @@ export declare namespace cert_manager {
14297
14343
  * PreferredChain is the chain to use if the ACME server outputs multiple.
14298
14344
  * PreferredChain is no guarantee that this one gets delivered by the ACME
14299
14345
  * endpoint.
14300
- * For example, for Let's Encrypt's DST crosssign you would use:
14346
+ * For example, for Let's Encrypt's DST cross-sign you would use:
14301
14347
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
14302
14348
  * This value picks the first certificate bundle in the combined set of
14303
14349
  * ACME default and alternative chains that has a root-most certificate with
@@ -14305,6 +14351,11 @@ export declare namespace cert_manager {
14305
14351
  */
14306
14352
  preferredChain?: pulumi.Input<string>;
14307
14353
  privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRefPatch>;
14354
+ /**
14355
+ * Profile allows requesting a certificate profile from the ACME server.
14356
+ * Supported profiles are listed by the server's ACME directory URL.
14357
+ */
14358
+ profile?: pulumi.Input<string>;
14308
14359
  /**
14309
14360
  * Server is the URL used to access the ACME server's 'directory' endpoint.
14310
14361
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -14651,16 +14702,16 @@ export declare namespace cert_manager {
14651
14702
  */
14652
14703
  interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
14653
14704
  /**
14654
- * client ID of the managed identity, can not be used at the same time as resourceID
14705
+ * client ID of the managed identity, cannot be used at the same time as resourceID
14655
14706
  */
14656
14707
  clientID?: pulumi.Input<string>;
14657
14708
  /**
14658
- * resource ID of the managed identity, can not be used at the same time as clientID
14709
+ * resource ID of the managed identity, cannot be used at the same time as clientID
14659
14710
  * Cannot be used for Azure Managed Service Identity
14660
14711
  */
14661
14712
  resourceID?: pulumi.Input<string>;
14662
14713
  /**
14663
- * tenant ID of the managed identity, can not be used at the same time as resourceID
14714
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
14664
14715
  */
14665
14716
  tenantID?: pulumi.Input<string>;
14666
14717
  }
@@ -14671,16 +14722,16 @@ export declare namespace cert_manager {
14671
14722
  */
14672
14723
  interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
14673
14724
  /**
14674
- * client ID of the managed identity, can not be used at the same time as resourceID
14725
+ * client ID of the managed identity, cannot be used at the same time as resourceID
14675
14726
  */
14676
14727
  clientID?: pulumi.Input<string>;
14677
14728
  /**
14678
- * resource ID of the managed identity, can not be used at the same time as clientID
14729
+ * resource ID of the managed identity, cannot be used at the same time as clientID
14679
14730
  * Cannot be used for Azure Managed Service Identity
14680
14731
  */
14681
14732
  resourceID?: pulumi.Input<string>;
14682
14733
  /**
14683
- * tenant ID of the managed identity, can not be used at the same time as resourceID
14734
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
14684
14735
  */
14685
14736
  tenantID?: pulumi.Input<string>;
14686
14737
  }
@@ -15273,7 +15324,7 @@ export declare namespace cert_manager {
15273
15324
  * when challenges are processed.
15274
15325
  * This can contain arbitrary JSON data.
15275
15326
  * Secret values should not be specified in this stanza.
15276
- * If secret values are needed (e.g. credentials for a DNS service), you
15327
+ * If secret values are needed (e.g., credentials for a DNS service), you
15277
15328
  * should use a SecretKeySelector to reference a Secret resource.
15278
15329
  * For details on the schema of this field, consult the webhook provider
15279
15330
  * implementation's documentation.
@@ -15291,7 +15342,7 @@ export declare namespace cert_manager {
15291
15342
  /**
15292
15343
  * The name of the solver to use, as defined in the webhook provider
15293
15344
  * implementation.
15294
- * This will typically be the name of the provider, e.g. 'cloudflare'.
15345
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
15295
15346
  */
15296
15347
  solverName?: pulumi.Input<string>;
15297
15348
  }
@@ -15305,7 +15356,7 @@ export declare namespace cert_manager {
15305
15356
  * when challenges are processed.
15306
15357
  * This can contain arbitrary JSON data.
15307
15358
  * Secret values should not be specified in this stanza.
15308
- * If secret values are needed (e.g. credentials for a DNS service), you
15359
+ * If secret values are needed (e.g., credentials for a DNS service), you
15309
15360
  * should use a SecretKeySelector to reference a Secret resource.
15310
15361
  * For details on the schema of this field, consult the webhook provider
15311
15362
  * implementation's documentation.
@@ -15323,7 +15374,7 @@ export declare namespace cert_manager {
15323
15374
  /**
15324
15375
  * The name of the solver to use, as defined in the webhook provider
15325
15376
  * implementation.
15326
- * This will typically be the name of the provider, e.g. 'cloudflare'.
15377
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
15327
15378
  */
15328
15379
  solverName?: pulumi.Input<string>;
15329
15380
  }
@@ -15331,7 +15382,7 @@ export declare namespace cert_manager {
15331
15382
  * Configures cert-manager to attempt to complete authorizations by
15332
15383
  * performing the HTTP01 challenge flow.
15333
15384
  * It is not possible to obtain certificates for wildcard domain names
15334
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
15385
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
15335
15386
  */
15336
15387
  interface IssuerSpecAcmeSolversHttp01 {
15337
15388
  gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoute>;
@@ -19845,7 +19896,7 @@ export declare namespace cert_manager {
19845
19896
  * Configures cert-manager to attempt to complete authorizations by
19846
19897
  * performing the HTTP01 challenge flow.
19847
19898
  * It is not possible to obtain certificates for wildcard domain names
19848
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
19899
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
19849
19900
  */
19850
19901
  interface IssuerSpecAcmeSolversHttp01Patch {
19851
19902
  gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch>;
@@ -20067,6 +20118,11 @@ export declare namespace cert_manager {
20067
20118
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
20068
20119
  */
20069
20120
  server?: pulumi.Input<string>;
20121
+ /**
20122
+ * ServerName is used to verify the hostname on the returned certificates
20123
+ * by the Vault server.
20124
+ */
20125
+ serverName?: pulumi.Input<string>;
20070
20126
  }
20071
20127
  /**
20072
20128
  * Auth configures how cert-manager authenticates with the Vault server.
@@ -20494,6 +20550,11 @@ export declare namespace cert_manager {
20494
20550
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
20495
20551
  */
20496
20552
  server?: pulumi.Input<string>;
20553
+ /**
20554
+ * ServerName is used to verify the hostname on the returned certificates
20555
+ * by the Vault server.
20556
+ */
20557
+ serverName?: pulumi.Input<string>;
20497
20558
  }
20498
20559
  /**
20499
20560
  * Venafi configures this issuer to sign certificates using a Venafi TPP
@@ -20518,7 +20579,7 @@ export declare namespace cert_manager {
20518
20579
  apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRef>;
20519
20580
  /**
20520
20581
  * URL is the base URL for Venafi Cloud.
20521
- * Defaults to "https://api.venafi.cloud/v1".
20582
+ * Defaults to "https://api.venafi.cloud/".
20522
20583
  */
20523
20584
  url?: pulumi.Input<string>;
20524
20585
  }
@@ -20562,7 +20623,7 @@ export declare namespace cert_manager {
20562
20623
  apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRefPatch>;
20563
20624
  /**
20564
20625
  * URL is the base URL for Venafi Cloud.
20565
- * Defaults to "https://api.venafi.cloud/v1".
20626
+ * Defaults to "https://api.venafi.cloud/".
20566
20627
  */
20567
20628
  url?: pulumi.Input<string>;
20568
20629
  }
@@ -20781,5 +20842,295 @@ export declare namespace meta {
20781
20842
  */
20782
20843
  selfLink?: pulumi.Input<string>;
20783
20844
  }
20845
+ /**
20846
+ * ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
20847
+ */
20848
+ interface ManagedFieldsEntry {
20849
+ /**
20850
+ * APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
20851
+ */
20852
+ apiVersion?: pulumi.Input<string>;
20853
+ /**
20854
+ * FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
20855
+ */
20856
+ fieldsType?: pulumi.Input<string>;
20857
+ /**
20858
+ * FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
20859
+ */
20860
+ fieldsV1?: any;
20861
+ /**
20862
+ * Manager is an identifier of the workflow managing these fields.
20863
+ */
20864
+ manager?: pulumi.Input<string>;
20865
+ /**
20866
+ * Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
20867
+ */
20868
+ operation?: pulumi.Input<string>;
20869
+ /**
20870
+ * Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
20871
+ */
20872
+ subresource?: pulumi.Input<string>;
20873
+ /**
20874
+ * Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
20875
+ */
20876
+ time?: pulumi.Input<string>;
20877
+ }
20878
+ /**
20879
+ * ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
20880
+ */
20881
+ interface ManagedFieldsEntryPatch {
20882
+ /**
20883
+ * APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
20884
+ */
20885
+ apiVersion?: pulumi.Input<string>;
20886
+ /**
20887
+ * FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
20888
+ */
20889
+ fieldsType?: pulumi.Input<string>;
20890
+ /**
20891
+ * FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
20892
+ */
20893
+ fieldsV1?: any;
20894
+ /**
20895
+ * Manager is an identifier of the workflow managing these fields.
20896
+ */
20897
+ manager?: pulumi.Input<string>;
20898
+ /**
20899
+ * Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
20900
+ */
20901
+ operation?: pulumi.Input<string>;
20902
+ /**
20903
+ * Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
20904
+ */
20905
+ subresource?: pulumi.Input<string>;
20906
+ /**
20907
+ * Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
20908
+ */
20909
+ time?: pulumi.Input<string>;
20910
+ }
20911
+ /**
20912
+ * ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
20913
+ */
20914
+ interface ObjectMeta {
20915
+ /**
20916
+ * Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
20917
+ */
20918
+ annotations?: pulumi.Input<{
20919
+ [key: string]: pulumi.Input<string>;
20920
+ }>;
20921
+ /**
20922
+ * CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
20923
+ *
20924
+ * Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
20925
+ */
20926
+ creationTimestamp?: pulumi.Input<string>;
20927
+ /**
20928
+ * Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
20929
+ */
20930
+ deletionGracePeriodSeconds?: pulumi.Input<number>;
20931
+ /**
20932
+ * DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
20933
+ *
20934
+ * Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
20935
+ */
20936
+ deletionTimestamp?: pulumi.Input<string>;
20937
+ /**
20938
+ * Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
20939
+ */
20940
+ finalizers?: pulumi.Input<pulumi.Input<string>[]>;
20941
+ /**
20942
+ * GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
20943
+ *
20944
+ * If this field is specified and the generated name exists, the server will return a 409.
20945
+ *
20946
+ * Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
20947
+ */
20948
+ generateName?: pulumi.Input<string>;
20949
+ /**
20950
+ * A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
20951
+ */
20952
+ generation?: pulumi.Input<number>;
20953
+ /**
20954
+ * Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
20955
+ */
20956
+ labels?: pulumi.Input<{
20957
+ [key: string]: pulumi.Input<string>;
20958
+ }>;
20959
+ /**
20960
+ * ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
20961
+ */
20962
+ managedFields?: pulumi.Input<pulumi.Input<inputs.meta.v1.ManagedFieldsEntry>[]>;
20963
+ /**
20964
+ * Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
20965
+ */
20966
+ name?: pulumi.Input<string>;
20967
+ /**
20968
+ * Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
20969
+ *
20970
+ * Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
20971
+ */
20972
+ namespace?: pulumi.Input<string>;
20973
+ /**
20974
+ * List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
20975
+ */
20976
+ ownerReferences?: pulumi.Input<pulumi.Input<inputs.meta.v1.OwnerReference>[]>;
20977
+ /**
20978
+ * An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
20979
+ *
20980
+ * Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
20981
+ */
20982
+ resourceVersion?: pulumi.Input<string>;
20983
+ /**
20984
+ * Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
20985
+ */
20986
+ selfLink?: pulumi.Input<string>;
20987
+ /**
20988
+ * UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
20989
+ *
20990
+ * Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
20991
+ */
20992
+ uid?: pulumi.Input<string>;
20993
+ }
20994
+ /**
20995
+ * ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
20996
+ */
20997
+ interface ObjectMetaPatch {
20998
+ /**
20999
+ * Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
21000
+ */
21001
+ annotations?: pulumi.Input<{
21002
+ [key: string]: pulumi.Input<string>;
21003
+ }>;
21004
+ /**
21005
+ * CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
21006
+ *
21007
+ * Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
21008
+ */
21009
+ creationTimestamp?: pulumi.Input<string>;
21010
+ /**
21011
+ * Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
21012
+ */
21013
+ deletionGracePeriodSeconds?: pulumi.Input<number>;
21014
+ /**
21015
+ * DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
21016
+ *
21017
+ * Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
21018
+ */
21019
+ deletionTimestamp?: pulumi.Input<string>;
21020
+ /**
21021
+ * Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
21022
+ */
21023
+ finalizers?: pulumi.Input<pulumi.Input<string>[]>;
21024
+ /**
21025
+ * GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
21026
+ *
21027
+ * If this field is specified and the generated name exists, the server will return a 409.
21028
+ *
21029
+ * Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
21030
+ */
21031
+ generateName?: pulumi.Input<string>;
21032
+ /**
21033
+ * A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
21034
+ */
21035
+ generation?: pulumi.Input<number>;
21036
+ /**
21037
+ * Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
21038
+ */
21039
+ labels?: pulumi.Input<{
21040
+ [key: string]: pulumi.Input<string>;
21041
+ }>;
21042
+ /**
21043
+ * ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
21044
+ */
21045
+ managedFields?: pulumi.Input<pulumi.Input<inputs.meta.v1.ManagedFieldsEntryPatch>[]>;
21046
+ /**
21047
+ * Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
21048
+ */
21049
+ name?: pulumi.Input<string>;
21050
+ /**
21051
+ * Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
21052
+ *
21053
+ * Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
21054
+ */
21055
+ namespace?: pulumi.Input<string>;
21056
+ /**
21057
+ * List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
21058
+ */
21059
+ ownerReferences?: pulumi.Input<pulumi.Input<inputs.meta.v1.OwnerReferencePatch>[]>;
21060
+ /**
21061
+ * An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
21062
+ *
21063
+ * Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
21064
+ */
21065
+ resourceVersion?: pulumi.Input<string>;
21066
+ /**
21067
+ * Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
21068
+ */
21069
+ selfLink?: pulumi.Input<string>;
21070
+ /**
21071
+ * UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
21072
+ *
21073
+ * Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
21074
+ */
21075
+ uid?: pulumi.Input<string>;
21076
+ }
21077
+ /**
21078
+ * OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
21079
+ */
21080
+ interface OwnerReference {
21081
+ /**
21082
+ * API version of the referent.
21083
+ */
21084
+ apiVersion: pulumi.Input<string>;
21085
+ /**
21086
+ * If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
21087
+ */
21088
+ blockOwnerDeletion?: pulumi.Input<boolean>;
21089
+ /**
21090
+ * If true, this reference points to the managing controller.
21091
+ */
21092
+ controller?: pulumi.Input<boolean>;
21093
+ /**
21094
+ * Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
21095
+ */
21096
+ kind: pulumi.Input<string>;
21097
+ /**
21098
+ * Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
21099
+ */
21100
+ name: pulumi.Input<string>;
21101
+ /**
21102
+ * UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
21103
+ */
21104
+ uid: pulumi.Input<string>;
21105
+ }
21106
+ /**
21107
+ * OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
21108
+ */
21109
+ interface OwnerReferencePatch {
21110
+ /**
21111
+ * API version of the referent.
21112
+ */
21113
+ apiVersion?: pulumi.Input<string>;
21114
+ /**
21115
+ * If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
21116
+ */
21117
+ blockOwnerDeletion?: pulumi.Input<boolean>;
21118
+ /**
21119
+ * If true, this reference points to the managing controller.
21120
+ */
21121
+ controller?: pulumi.Input<boolean>;
21122
+ /**
21123
+ * Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
21124
+ */
21125
+ kind?: pulumi.Input<string>;
21126
+ /**
21127
+ * Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
21128
+ */
21129
+ name?: pulumi.Input<string>;
21130
+ /**
21131
+ * UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
21132
+ */
21133
+ uid?: pulumi.Input<string>;
21134
+ }
20784
21135
  }
20785
21136
  }