@highstate/cert-manager 0.9.16 → 0.9.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (59) hide show
  1. package/CHANGELOG.md +3 -40
  2. package/acme/v1/challenge.ts +2 -4
  3. package/acme/v1/challengeList.ts +0 -2
  4. package/acme/v1/challengePatch.ts +2 -4
  5. package/acme/v1/order.ts +2 -4
  6. package/acme/v1/orderList.ts +0 -2
  7. package/acme/v1/orderPatch.ts +2 -4
  8. package/bin/acme/v1/challenge.d.ts +2 -3
  9. package/bin/acme/v1/challenge.js.map +1 -1
  10. package/bin/acme/v1/challengeList.js.map +1 -1
  11. package/bin/acme/v1/challengePatch.d.ts +2 -3
  12. package/bin/acme/v1/challengePatch.js.map +1 -1
  13. package/bin/acme/v1/order.d.ts +2 -3
  14. package/bin/acme/v1/order.js.map +1 -1
  15. package/bin/acme/v1/orderList.js.map +1 -1
  16. package/bin/acme/v1/orderPatch.d.ts +2 -3
  17. package/bin/acme/v1/orderPatch.js.map +1 -1
  18. package/bin/cert_manager/v1/certificate.d.ts +2 -3
  19. package/bin/cert_manager/v1/certificate.js.map +1 -1
  20. package/bin/cert_manager/v1/certificateList.js.map +1 -1
  21. package/bin/cert_manager/v1/certificatePatch.d.ts +2 -3
  22. package/bin/cert_manager/v1/certificatePatch.js.map +1 -1
  23. package/bin/cert_manager/v1/certificateRequest.d.ts +2 -3
  24. package/bin/cert_manager/v1/certificateRequest.js.map +1 -1
  25. package/bin/cert_manager/v1/certificateRequestList.js.map +1 -1
  26. package/bin/cert_manager/v1/certificateRequestPatch.d.ts +2 -3
  27. package/bin/cert_manager/v1/certificateRequestPatch.js.map +1 -1
  28. package/bin/cert_manager/v1/clusterIssuer.d.ts +2 -3
  29. package/bin/cert_manager/v1/clusterIssuer.js.map +1 -1
  30. package/bin/cert_manager/v1/clusterIssuerList.js.map +1 -1
  31. package/bin/cert_manager/v1/clusterIssuerPatch.d.ts +2 -3
  32. package/bin/cert_manager/v1/clusterIssuerPatch.js.map +1 -1
  33. package/bin/cert_manager/v1/issuer.d.ts +2 -3
  34. package/bin/cert_manager/v1/issuer.js.map +1 -1
  35. package/bin/cert_manager/v1/issuerList.js.map +1 -1
  36. package/bin/cert_manager/v1/issuerPatch.d.ts +2 -3
  37. package/bin/cert_manager/v1/issuerPatch.js.map +1 -1
  38. package/bin/package.json +9 -8
  39. package/bin/types/input.d.ts +423 -72
  40. package/bin/types/output.d.ts +424 -73
  41. package/cert_manager/v1/certificate.ts +2 -4
  42. package/cert_manager/v1/certificateList.ts +0 -2
  43. package/cert_manager/v1/certificatePatch.ts +2 -4
  44. package/cert_manager/v1/certificateRequest.ts +2 -4
  45. package/cert_manager/v1/certificateRequestList.ts +0 -2
  46. package/cert_manager/v1/certificateRequestPatch.ts +2 -4
  47. package/cert_manager/v1/clusterIssuer.ts +2 -4
  48. package/cert_manager/v1/clusterIssuerList.ts +0 -2
  49. package/cert_manager/v1/clusterIssuerPatch.ts +2 -4
  50. package/cert_manager/v1/issuer.ts +2 -4
  51. package/cert_manager/v1/issuerList.ts +0 -2
  52. package/cert_manager/v1/issuerPatch.ts +2 -4
  53. package/package.json +10 -9
  54. package/tsconfig.json +44 -43
  55. package/types/input.ts +421 -73
  56. package/types/output.ts +422 -74
  57. package/bin/meta/v1.d.ts +0 -3
  58. package/bin/meta/v1.js +0 -3
  59. package/bin/meta/v1.js.map +0 -1
@@ -1,5 +1,4 @@
1
1
  import * as outputs from "../types/output";
2
- import { ObjectMeta } from "../meta/v1";
3
2
  export declare namespace acme {
4
3
  namespace v1 {
5
4
  /**
@@ -17,7 +16,7 @@ export declare namespace acme {
17
16
  /**
18
17
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
19
18
  */
20
- metadata: ObjectMeta;
19
+ metadata: outputs.meta.v1.ObjectMeta;
21
20
  spec: outputs.acme.v1.ChallengeSpec;
22
21
  status: outputs.acme.v1.ChallengeStatus;
23
22
  }
@@ -28,9 +27,9 @@ export declare namespace acme {
28
27
  */
29
28
  authorizationURL: string;
30
29
  /**
31
- * dnsName is the identifier that this challenge is for, e.g. example.com.
30
+ * dnsName is the identifier that this challenge is for, e.g., example.com.
32
31
  * If the requested DNSName is a 'wildcard', this field MUST be set to the
33
- * non-wildcard domain, e.g. for `*.example.com`, it must be `example.com`.
32
+ * non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
34
33
  */
35
34
  dnsName: string;
36
35
  issuerRef: outputs.acme.v1.ChallengeSpecIssuerRef;
@@ -115,9 +114,9 @@ export declare namespace acme {
115
114
  */
116
115
  authorizationURL: string;
117
116
  /**
118
- * dnsName is the identifier that this challenge is for, e.g. example.com.
117
+ * dnsName is the identifier that this challenge is for, e.g., example.com.
119
118
  * If the requested DNSName is a 'wildcard', this field MUST be set to the
120
- * non-wildcard domain, e.g. for `*.example.com`, it must be `example.com`.
119
+ * non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
121
120
  */
122
121
  dnsName: string;
123
122
  issuerRef: outputs.acme.v1.ChallengeSpecIssuerRefPatch;
@@ -430,16 +429,16 @@ export declare namespace acme {
430
429
  */
431
430
  interface ChallengeSpecSolverDns01AzureDNSManagedIdentity {
432
431
  /**
433
- * client ID of the managed identity, can not be used at the same time as resourceID
432
+ * client ID of the managed identity, cannot be used at the same time as resourceID
434
433
  */
435
434
  clientID: string;
436
435
  /**
437
- * resource ID of the managed identity, can not be used at the same time as clientID
436
+ * resource ID of the managed identity, cannot be used at the same time as clientID
438
437
  * Cannot be used for Azure Managed Service Identity
439
438
  */
440
439
  resourceID: string;
441
440
  /**
442
- * tenant ID of the managed identity, can not be used at the same time as resourceID
441
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
443
442
  */
444
443
  tenantID: string;
445
444
  }
@@ -450,16 +449,16 @@ export declare namespace acme {
450
449
  */
451
450
  interface ChallengeSpecSolverDns01AzureDNSManagedIdentityPatch {
452
451
  /**
453
- * client ID of the managed identity, can not be used at the same time as resourceID
452
+ * client ID of the managed identity, cannot be used at the same time as resourceID
454
453
  */
455
454
  clientID: string;
456
455
  /**
457
- * resource ID of the managed identity, can not be used at the same time as clientID
456
+ * resource ID of the managed identity, cannot be used at the same time as clientID
458
457
  * Cannot be used for Azure Managed Service Identity
459
458
  */
460
459
  resourceID: string;
461
460
  /**
462
- * tenant ID of the managed identity, can not be used at the same time as resourceID
461
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
463
462
  */
464
463
  tenantID: string;
465
464
  }
@@ -1052,7 +1051,7 @@ export declare namespace acme {
1052
1051
  * when challenges are processed.
1053
1052
  * This can contain arbitrary JSON data.
1054
1053
  * Secret values should not be specified in this stanza.
1055
- * If secret values are needed (e.g. credentials for a DNS service), you
1054
+ * If secret values are needed (e.g., credentials for a DNS service), you
1056
1055
  * should use a SecretKeySelector to reference a Secret resource.
1057
1056
  * For details on the schema of this field, consult the webhook provider
1058
1057
  * implementation's documentation.
@@ -1070,7 +1069,7 @@ export declare namespace acme {
1070
1069
  /**
1071
1070
  * The name of the solver to use, as defined in the webhook provider
1072
1071
  * implementation.
1073
- * This will typically be the name of the provider, e.g. 'cloudflare'.
1072
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
1074
1073
  */
1075
1074
  solverName: string;
1076
1075
  }
@@ -1084,7 +1083,7 @@ export declare namespace acme {
1084
1083
  * when challenges are processed.
1085
1084
  * This can contain arbitrary JSON data.
1086
1085
  * Secret values should not be specified in this stanza.
1087
- * If secret values are needed (e.g. credentials for a DNS service), you
1086
+ * If secret values are needed (e.g., credentials for a DNS service), you
1088
1087
  * should use a SecretKeySelector to reference a Secret resource.
1089
1088
  * For details on the schema of this field, consult the webhook provider
1090
1089
  * implementation's documentation.
@@ -1102,7 +1101,7 @@ export declare namespace acme {
1102
1101
  /**
1103
1102
  * The name of the solver to use, as defined in the webhook provider
1104
1103
  * implementation.
1105
- * This will typically be the name of the provider, e.g. 'cloudflare'.
1104
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
1106
1105
  */
1107
1106
  solverName: string;
1108
1107
  }
@@ -1110,7 +1109,7 @@ export declare namespace acme {
1110
1109
  * Configures cert-manager to attempt to complete authorizations by
1111
1110
  * performing the HTTP01 challenge flow.
1112
1111
  * It is not possible to obtain certificates for wildcard domain names
1113
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
1112
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
1114
1113
  */
1115
1114
  interface ChallengeSpecSolverHttp01 {
1116
1115
  gatewayHTTPRoute: outputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoute;
@@ -5624,7 +5623,7 @@ export declare namespace acme {
5624
5623
  * Configures cert-manager to attempt to complete authorizations by
5625
5624
  * performing the HTTP01 challenge flow.
5626
5625
  * It is not possible to obtain certificates for wildcard domain names
5627
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
5626
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
5628
5627
  */
5629
5628
  interface ChallengeSpecSolverHttp01Patch {
5630
5629
  gatewayHTTPRoute: outputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoutePatch;
@@ -5790,7 +5789,7 @@ export declare namespace acme {
5790
5789
  /**
5791
5790
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
5792
5791
  */
5793
- metadata: ObjectMeta;
5792
+ metadata: outputs.meta.v1.ObjectMeta;
5794
5793
  spec: outputs.acme.v1.OrderSpec;
5795
5794
  status: outputs.acme.v1.OrderStatus;
5796
5795
  }
@@ -5819,6 +5818,11 @@ export declare namespace acme {
5819
5818
  */
5820
5819
  ipAddresses: string[];
5821
5820
  issuerRef: outputs.acme.v1.OrderSpecIssuerRef;
5821
+ /**
5822
+ * Profile allows requesting a certificate profile from the ACME server.
5823
+ * Supported profiles are listed by the server's ACME directory URL.
5824
+ */
5825
+ profile: string;
5822
5826
  /**
5823
5827
  * Certificate signing request bytes in DER encoding.
5824
5828
  * This will be used when finalizing the order.
@@ -5893,6 +5897,11 @@ export declare namespace acme {
5893
5897
  */
5894
5898
  ipAddresses: string[];
5895
5899
  issuerRef: outputs.acme.v1.OrderSpecIssuerRefPatch;
5900
+ /**
5901
+ * Profile allows requesting a certificate profile from the ACME server.
5902
+ * Supported profiles are listed by the server's ACME directory URL.
5903
+ */
5904
+ profile: string;
5896
5905
  /**
5897
5906
  * Certificate signing request bytes in DER encoding.
5898
5907
  * This will be used when finalizing the order.
@@ -5995,7 +6004,7 @@ export declare namespace acme {
5995
6004
  */
5996
6005
  token: string;
5997
6006
  /**
5998
- * Type is the type of challenge being offered, e.g. 'http-01', 'dns-01',
6007
+ * Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
5999
6008
  * 'tls-sni-01', etc.
6000
6009
  * This is the raw value retrieved from the ACME server.
6001
6010
  * Only 'http-01' and 'dns-01' are supported by cert-manager, other values
@@ -6020,7 +6029,7 @@ export declare namespace acme {
6020
6029
  */
6021
6030
  token: string;
6022
6031
  /**
6023
- * Type is the type of challenge being offered, e.g. 'http-01', 'dns-01',
6032
+ * Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
6024
6033
  * 'tls-sni-01', etc.
6025
6034
  * This is the raw value retrieved from the ACME server.
6026
6035
  * Only 'http-01' and 'dns-01' are supported by cert-manager, other values
@@ -6138,7 +6147,7 @@ export declare namespace cert_manager {
6138
6147
  /**
6139
6148
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
6140
6149
  */
6141
- metadata: ObjectMeta;
6150
+ metadata: outputs.meta.v1.ObjectMeta;
6142
6151
  spec: outputs.cert_manager.v1.CertificateSpec;
6143
6152
  status: outputs.cert_manager.v1.CertificateStatus;
6144
6153
  }
@@ -6165,7 +6174,7 @@ export declare namespace cert_manager {
6165
6174
  /**
6166
6175
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
6167
6176
  */
6168
- metadata: ObjectMeta;
6177
+ metadata: outputs.meta.v1.ObjectMeta;
6169
6178
  spec: outputs.cert_manager.v1.CertificateRequestSpec;
6170
6179
  status: outputs.cert_manager.v1.CertificateRequestStatus;
6171
6180
  }
@@ -6483,10 +6492,6 @@ export declare namespace cert_manager {
6483
6492
  /**
6484
6493
  * Defines extra output formats of the private key and signed certificate chain
6485
6494
  * to be written to this Certificate's target Secret.
6486
- *
6487
- * This is a Beta Feature enabled by default. It can be disabled with the
6488
- * `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
6489
- * the controller and webhook components.
6490
6495
  */
6491
6496
  additionalOutputFormats: outputs.cert_manager.v1.CertificateSpecAdditionalOutputFormats[];
6492
6497
  /**
@@ -6604,8 +6609,7 @@ export declare namespace cert_manager {
6604
6609
  * revisions exceeds this number.
6605
6610
  *
6606
6611
  * If set, revisionHistoryLimit must be a value of `1` or greater.
6607
- * If unset (`nil`), revisions will not be garbage collected.
6608
- * Default value is `nil`.
6612
+ * Default value is `1`.
6609
6613
  */
6610
6614
  revisionHistoryLimit: number;
6611
6615
  /**
@@ -6616,6 +6620,13 @@ export declare namespace cert_manager {
6616
6620
  */
6617
6621
  secretName: string;
6618
6622
  secretTemplate: outputs.cert_manager.v1.CertificateSpecSecretTemplate;
6623
+ /**
6624
+ * Signature algorithm to use.
6625
+ * Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
6626
+ * Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
6627
+ * Allowed values for Ed25519 keys: PureEd25519.
6628
+ */
6629
+ signatureAlgorithm: string;
6619
6630
  subject: outputs.cert_manager.v1.CertificateSpecSubject;
6620
6631
  /**
6621
6632
  * Requested URI subject alternative names.
@@ -6843,7 +6854,7 @@ export declare namespace cert_manager {
6843
6854
  * `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
6844
6855
  * `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
6845
6856
  * `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
6846
- * (eg. because of company policy). Please note that the security of the algorithm is not that important
6857
+ * (e.g., because of company policy). Please note that the security of the algorithm is not that important
6847
6858
  * in reality, because the unencrypted certificate and private key are also stored in the Secret.
6848
6859
  */
6849
6860
  profile: string;
@@ -6918,7 +6929,7 @@ export declare namespace cert_manager {
6918
6929
  * `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
6919
6930
  * `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
6920
6931
  * `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
6921
- * (eg. because of company policy). Please note that the security of the algorithm is not that important
6932
+ * (e.g., because of company policy). Please note that the security of the algorithm is not that important
6922
6933
  * in reality, because the unencrypted certificate and private key are also stored in the Secret.
6923
6934
  */
6924
6935
  profile: string;
@@ -7081,10 +7092,6 @@ export declare namespace cert_manager {
7081
7092
  /**
7082
7093
  * Defines extra output formats of the private key and signed certificate chain
7083
7094
  * to be written to this Certificate's target Secret.
7084
- *
7085
- * This is a Beta Feature enabled by default. It can be disabled with the
7086
- * `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
7087
- * the controller and webhook components.
7088
7095
  */
7089
7096
  additionalOutputFormats: outputs.cert_manager.v1.CertificateSpecAdditionalOutputFormatsPatch[];
7090
7097
  /**
@@ -7202,8 +7209,7 @@ export declare namespace cert_manager {
7202
7209
  * revisions exceeds this number.
7203
7210
  *
7204
7211
  * If set, revisionHistoryLimit must be a value of `1` or greater.
7205
- * If unset (`nil`), revisions will not be garbage collected.
7206
- * Default value is `nil`.
7212
+ * Default value is `1`.
7207
7213
  */
7208
7214
  revisionHistoryLimit: number;
7209
7215
  /**
@@ -7214,6 +7220,13 @@ export declare namespace cert_manager {
7214
7220
  */
7215
7221
  secretName: string;
7216
7222
  secretTemplate: outputs.cert_manager.v1.CertificateSpecSecretTemplatePatch;
7223
+ /**
7224
+ * Signature algorithm to use.
7225
+ * Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
7226
+ * Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
7227
+ * Allowed values for Ed25519 keys: PureEd25519.
7228
+ */
7229
+ signatureAlgorithm: string;
7217
7230
  subject: outputs.cert_manager.v1.CertificateSpecSubjectPatch;
7218
7231
  /**
7219
7232
  * Requested URI subject alternative names.
@@ -7264,7 +7277,11 @@ export declare namespace cert_manager {
7264
7277
  * to await user intervention.
7265
7278
  * If set to `Always`, a private key matching the specified requirements
7266
7279
  * will be generated whenever a re-issuance occurs.
7267
- * Default is `Never` for backward compatibility.
7280
+ * Default is `Always`.
7281
+ * The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
7282
+ * The new default can be disabled by setting the
7283
+ * `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
7284
+ * the controller component.
7268
7285
  */
7269
7286
  rotationPolicy: string;
7270
7287
  /**
@@ -7314,7 +7331,11 @@ export declare namespace cert_manager {
7314
7331
  * to await user intervention.
7315
7332
  * If set to `Always`, a private key matching the specified requirements
7316
7333
  * will be generated whenever a re-issuance occurs.
7317
- * Default is `Never` for backward compatibility.
7334
+ * Default is `Always`.
7335
+ * The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
7336
+ * The new default can be disabled by setting the
7337
+ * `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
7338
+ * the controller component.
7318
7339
  */
7319
7340
  rotationPolicy: string;
7320
7341
  /**
@@ -7686,7 +7707,7 @@ export declare namespace cert_manager {
7686
7707
  /**
7687
7708
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
7688
7709
  */
7689
- metadata: ObjectMeta;
7710
+ metadata: outputs.meta.v1.ObjectMeta;
7690
7711
  spec: outputs.cert_manager.v1.ClusterIssuerSpec;
7691
7712
  status: outputs.cert_manager.v1.ClusterIssuerStatus;
7692
7713
  }
@@ -7744,7 +7765,7 @@ export declare namespace cert_manager {
7744
7765
  * PreferredChain is the chain to use if the ACME server outputs multiple.
7745
7766
  * PreferredChain is no guarantee that this one gets delivered by the ACME
7746
7767
  * endpoint.
7747
- * For example, for Let's Encrypt's DST crosssign you would use:
7768
+ * For example, for Let's Encrypt's DST cross-sign you would use:
7748
7769
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
7749
7770
  * This value picks the first certificate bundle in the combined set of
7750
7771
  * ACME default and alternative chains that has a root-most certificate with
@@ -7752,6 +7773,11 @@ export declare namespace cert_manager {
7752
7773
  */
7753
7774
  preferredChain: string;
7754
7775
  privateKeySecretRef: outputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRef;
7776
+ /**
7777
+ * Profile allows requesting a certificate profile from the ACME server.
7778
+ * Supported profiles are listed by the server's ACME directory URL.
7779
+ */
7780
+ profile: string;
7755
7781
  /**
7756
7782
  * Server is the URL used to access the ACME server's 'directory' endpoint.
7757
7783
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -7906,7 +7932,7 @@ export declare namespace cert_manager {
7906
7932
  * PreferredChain is the chain to use if the ACME server outputs multiple.
7907
7933
  * PreferredChain is no guarantee that this one gets delivered by the ACME
7908
7934
  * endpoint.
7909
- * For example, for Let's Encrypt's DST crosssign you would use:
7935
+ * For example, for Let's Encrypt's DST cross-sign you would use:
7910
7936
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
7911
7937
  * This value picks the first certificate bundle in the combined set of
7912
7938
  * ACME default and alternative chains that has a root-most certificate with
@@ -7914,6 +7940,11 @@ export declare namespace cert_manager {
7914
7940
  */
7915
7941
  preferredChain: string;
7916
7942
  privateKeySecretRef: outputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRefPatch;
7943
+ /**
7944
+ * Profile allows requesting a certificate profile from the ACME server.
7945
+ * Supported profiles are listed by the server's ACME directory URL.
7946
+ */
7947
+ profile: string;
7917
7948
  /**
7918
7949
  * Server is the URL used to access the ACME server's 'directory' endpoint.
7919
7950
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -8260,16 +8291,16 @@ export declare namespace cert_manager {
8260
8291
  */
8261
8292
  interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
8262
8293
  /**
8263
- * client ID of the managed identity, can not be used at the same time as resourceID
8294
+ * client ID of the managed identity, cannot be used at the same time as resourceID
8264
8295
  */
8265
8296
  clientID: string;
8266
8297
  /**
8267
- * resource ID of the managed identity, can not be used at the same time as clientID
8298
+ * resource ID of the managed identity, cannot be used at the same time as clientID
8268
8299
  * Cannot be used for Azure Managed Service Identity
8269
8300
  */
8270
8301
  resourceID: string;
8271
8302
  /**
8272
- * tenant ID of the managed identity, can not be used at the same time as resourceID
8303
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
8273
8304
  */
8274
8305
  tenantID: string;
8275
8306
  }
@@ -8280,16 +8311,16 @@ export declare namespace cert_manager {
8280
8311
  */
8281
8312
  interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
8282
8313
  /**
8283
- * client ID of the managed identity, can not be used at the same time as resourceID
8314
+ * client ID of the managed identity, cannot be used at the same time as resourceID
8284
8315
  */
8285
8316
  clientID: string;
8286
8317
  /**
8287
- * resource ID of the managed identity, can not be used at the same time as clientID
8318
+ * resource ID of the managed identity, cannot be used at the same time as clientID
8288
8319
  * Cannot be used for Azure Managed Service Identity
8289
8320
  */
8290
8321
  resourceID: string;
8291
8322
  /**
8292
- * tenant ID of the managed identity, can not be used at the same time as resourceID
8323
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
8293
8324
  */
8294
8325
  tenantID: string;
8295
8326
  }
@@ -8882,7 +8913,7 @@ export declare namespace cert_manager {
8882
8913
  * when challenges are processed.
8883
8914
  * This can contain arbitrary JSON data.
8884
8915
  * Secret values should not be specified in this stanza.
8885
- * If secret values are needed (e.g. credentials for a DNS service), you
8916
+ * If secret values are needed (e.g., credentials for a DNS service), you
8886
8917
  * should use a SecretKeySelector to reference a Secret resource.
8887
8918
  * For details on the schema of this field, consult the webhook provider
8888
8919
  * implementation's documentation.
@@ -8900,7 +8931,7 @@ export declare namespace cert_manager {
8900
8931
  /**
8901
8932
  * The name of the solver to use, as defined in the webhook provider
8902
8933
  * implementation.
8903
- * This will typically be the name of the provider, e.g. 'cloudflare'.
8934
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
8904
8935
  */
8905
8936
  solverName: string;
8906
8937
  }
@@ -8914,7 +8945,7 @@ export declare namespace cert_manager {
8914
8945
  * when challenges are processed.
8915
8946
  * This can contain arbitrary JSON data.
8916
8947
  * Secret values should not be specified in this stanza.
8917
- * If secret values are needed (e.g. credentials for a DNS service), you
8948
+ * If secret values are needed (e.g., credentials for a DNS service), you
8918
8949
  * should use a SecretKeySelector to reference a Secret resource.
8919
8950
  * For details on the schema of this field, consult the webhook provider
8920
8951
  * implementation's documentation.
@@ -8932,7 +8963,7 @@ export declare namespace cert_manager {
8932
8963
  /**
8933
8964
  * The name of the solver to use, as defined in the webhook provider
8934
8965
  * implementation.
8935
- * This will typically be the name of the provider, e.g. 'cloudflare'.
8966
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
8936
8967
  */
8937
8968
  solverName: string;
8938
8969
  }
@@ -8940,7 +8971,7 @@ export declare namespace cert_manager {
8940
8971
  * Configures cert-manager to attempt to complete authorizations by
8941
8972
  * performing the HTTP01 challenge flow.
8942
8973
  * It is not possible to obtain certificates for wildcard domain names
8943
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
8974
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
8944
8975
  */
8945
8976
  interface ClusterIssuerSpecAcmeSolversHttp01 {
8946
8977
  gatewayHTTPRoute: outputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoute;
@@ -13454,7 +13485,7 @@ export declare namespace cert_manager {
13454
13485
  * Configures cert-manager to attempt to complete authorizations by
13455
13486
  * performing the HTTP01 challenge flow.
13456
13487
  * It is not possible to obtain certificates for wildcard domain names
13457
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
13488
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
13458
13489
  */
13459
13490
  interface ClusterIssuerSpecAcmeSolversHttp01Patch {
13460
13491
  gatewayHTTPRoute: outputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch;
@@ -13676,6 +13707,11 @@ export declare namespace cert_manager {
13676
13707
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
13677
13708
  */
13678
13709
  server: string;
13710
+ /**
13711
+ * ServerName is used to verify the hostname on the returned certificates
13712
+ * by the Vault server.
13713
+ */
13714
+ serverName: string;
13679
13715
  }
13680
13716
  /**
13681
13717
  * Auth configures how cert-manager authenticates with the Vault server.
@@ -14103,6 +14139,11 @@ export declare namespace cert_manager {
14103
14139
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
14104
14140
  */
14105
14141
  server: string;
14142
+ /**
14143
+ * ServerName is used to verify the hostname on the returned certificates
14144
+ * by the Vault server.
14145
+ */
14146
+ serverName: string;
14106
14147
  }
14107
14148
  /**
14108
14149
  * Venafi configures this issuer to sign certificates using a Venafi TPP
@@ -14127,7 +14168,7 @@ export declare namespace cert_manager {
14127
14168
  apiTokenSecretRef: outputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRef;
14128
14169
  /**
14129
14170
  * URL is the base URL for Venafi Cloud.
14130
- * Defaults to "https://api.venafi.cloud/v1".
14171
+ * Defaults to "https://api.venafi.cloud/".
14131
14172
  */
14132
14173
  url: string;
14133
14174
  }
@@ -14171,7 +14212,7 @@ export declare namespace cert_manager {
14171
14212
  apiTokenSecretRef: outputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRefPatch;
14172
14213
  /**
14173
14214
  * URL is the base URL for Venafi Cloud.
14174
- * Defaults to "https://api.venafi.cloud/v1".
14215
+ * Defaults to "https://api.venafi.cloud/".
14175
14216
  */
14176
14217
  url: string;
14177
14218
  }
@@ -14454,7 +14495,7 @@ export declare namespace cert_manager {
14454
14495
  /**
14455
14496
  * Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
14456
14497
  */
14457
- metadata: ObjectMeta;
14498
+ metadata: outputs.meta.v1.ObjectMeta;
14458
14499
  spec: outputs.cert_manager.v1.IssuerSpec;
14459
14500
  status: outputs.cert_manager.v1.IssuerStatus;
14460
14501
  }
@@ -14512,7 +14553,7 @@ export declare namespace cert_manager {
14512
14553
  * PreferredChain is the chain to use if the ACME server outputs multiple.
14513
14554
  * PreferredChain is no guarantee that this one gets delivered by the ACME
14514
14555
  * endpoint.
14515
- * For example, for Let's Encrypt's DST crosssign you would use:
14556
+ * For example, for Let's Encrypt's DST cross-sign you would use:
14516
14557
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
14517
14558
  * This value picks the first certificate bundle in the combined set of
14518
14559
  * ACME default and alternative chains that has a root-most certificate with
@@ -14520,6 +14561,11 @@ export declare namespace cert_manager {
14520
14561
  */
14521
14562
  preferredChain: string;
14522
14563
  privateKeySecretRef: outputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRef;
14564
+ /**
14565
+ * Profile allows requesting a certificate profile from the ACME server.
14566
+ * Supported profiles are listed by the server's ACME directory URL.
14567
+ */
14568
+ profile: string;
14523
14569
  /**
14524
14570
  * Server is the URL used to access the ACME server's 'directory' endpoint.
14525
14571
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -14674,7 +14720,7 @@ export declare namespace cert_manager {
14674
14720
  * PreferredChain is the chain to use if the ACME server outputs multiple.
14675
14721
  * PreferredChain is no guarantee that this one gets delivered by the ACME
14676
14722
  * endpoint.
14677
- * For example, for Let's Encrypt's DST crosssign you would use:
14723
+ * For example, for Let's Encrypt's DST cross-sign you would use:
14678
14724
  * "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
14679
14725
  * This value picks the first certificate bundle in the combined set of
14680
14726
  * ACME default and alternative chains that has a root-most certificate with
@@ -14682,6 +14728,11 @@ export declare namespace cert_manager {
14682
14728
  */
14683
14729
  preferredChain: string;
14684
14730
  privateKeySecretRef: outputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRefPatch;
14731
+ /**
14732
+ * Profile allows requesting a certificate profile from the ACME server.
14733
+ * Supported profiles are listed by the server's ACME directory URL.
14734
+ */
14735
+ profile: string;
14685
14736
  /**
14686
14737
  * Server is the URL used to access the ACME server's 'directory' endpoint.
14687
14738
  * For example, for Let's Encrypt's staging endpoint, you would use:
@@ -15028,16 +15079,16 @@ export declare namespace cert_manager {
15028
15079
  */
15029
15080
  interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
15030
15081
  /**
15031
- * client ID of the managed identity, can not be used at the same time as resourceID
15082
+ * client ID of the managed identity, cannot be used at the same time as resourceID
15032
15083
  */
15033
15084
  clientID: string;
15034
15085
  /**
15035
- * resource ID of the managed identity, can not be used at the same time as clientID
15086
+ * resource ID of the managed identity, cannot be used at the same time as clientID
15036
15087
  * Cannot be used for Azure Managed Service Identity
15037
15088
  */
15038
15089
  resourceID: string;
15039
15090
  /**
15040
- * tenant ID of the managed identity, can not be used at the same time as resourceID
15091
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
15041
15092
  */
15042
15093
  tenantID: string;
15043
15094
  }
@@ -15048,16 +15099,16 @@ export declare namespace cert_manager {
15048
15099
  */
15049
15100
  interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
15050
15101
  /**
15051
- * client ID of the managed identity, can not be used at the same time as resourceID
15102
+ * client ID of the managed identity, cannot be used at the same time as resourceID
15052
15103
  */
15053
15104
  clientID: string;
15054
15105
  /**
15055
- * resource ID of the managed identity, can not be used at the same time as clientID
15106
+ * resource ID of the managed identity, cannot be used at the same time as clientID
15056
15107
  * Cannot be used for Azure Managed Service Identity
15057
15108
  */
15058
15109
  resourceID: string;
15059
15110
  /**
15060
- * tenant ID of the managed identity, can not be used at the same time as resourceID
15111
+ * tenant ID of the managed identity, cannot be used at the same time as resourceID
15061
15112
  */
15062
15113
  tenantID: string;
15063
15114
  }
@@ -15650,7 +15701,7 @@ export declare namespace cert_manager {
15650
15701
  * when challenges are processed.
15651
15702
  * This can contain arbitrary JSON data.
15652
15703
  * Secret values should not be specified in this stanza.
15653
- * If secret values are needed (e.g. credentials for a DNS service), you
15704
+ * If secret values are needed (e.g., credentials for a DNS service), you
15654
15705
  * should use a SecretKeySelector to reference a Secret resource.
15655
15706
  * For details on the schema of this field, consult the webhook provider
15656
15707
  * implementation's documentation.
@@ -15668,7 +15719,7 @@ export declare namespace cert_manager {
15668
15719
  /**
15669
15720
  * The name of the solver to use, as defined in the webhook provider
15670
15721
  * implementation.
15671
- * This will typically be the name of the provider, e.g. 'cloudflare'.
15722
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
15672
15723
  */
15673
15724
  solverName: string;
15674
15725
  }
@@ -15682,7 +15733,7 @@ export declare namespace cert_manager {
15682
15733
  * when challenges are processed.
15683
15734
  * This can contain arbitrary JSON data.
15684
15735
  * Secret values should not be specified in this stanza.
15685
- * If secret values are needed (e.g. credentials for a DNS service), you
15736
+ * If secret values are needed (e.g., credentials for a DNS service), you
15686
15737
  * should use a SecretKeySelector to reference a Secret resource.
15687
15738
  * For details on the schema of this field, consult the webhook provider
15688
15739
  * implementation's documentation.
@@ -15700,7 +15751,7 @@ export declare namespace cert_manager {
15700
15751
  /**
15701
15752
  * The name of the solver to use, as defined in the webhook provider
15702
15753
  * implementation.
15703
- * This will typically be the name of the provider, e.g. 'cloudflare'.
15754
+ * This will typically be the name of the provider, e.g., 'cloudflare'.
15704
15755
  */
15705
15756
  solverName: string;
15706
15757
  }
@@ -15708,7 +15759,7 @@ export declare namespace cert_manager {
15708
15759
  * Configures cert-manager to attempt to complete authorizations by
15709
15760
  * performing the HTTP01 challenge flow.
15710
15761
  * It is not possible to obtain certificates for wildcard domain names
15711
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
15762
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
15712
15763
  */
15713
15764
  interface IssuerSpecAcmeSolversHttp01 {
15714
15765
  gatewayHTTPRoute: outputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoute;
@@ -20222,7 +20273,7 @@ export declare namespace cert_manager {
20222
20273
  * Configures cert-manager to attempt to complete authorizations by
20223
20274
  * performing the HTTP01 challenge flow.
20224
20275
  * It is not possible to obtain certificates for wildcard domain names
20225
- * (e.g. `*.example.com`) using the HTTP01 challenge mechanism.
20276
+ * (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
20226
20277
  */
20227
20278
  interface IssuerSpecAcmeSolversHttp01Patch {
20228
20279
  gatewayHTTPRoute: outputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch;
@@ -20444,6 +20495,11 @@ export declare namespace cert_manager {
20444
20495
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
20445
20496
  */
20446
20497
  server: string;
20498
+ /**
20499
+ * ServerName is used to verify the hostname on the returned certificates
20500
+ * by the Vault server.
20501
+ */
20502
+ serverName: string;
20447
20503
  }
20448
20504
  /**
20449
20505
  * Auth configures how cert-manager authenticates with the Vault server.
@@ -20871,6 +20927,11 @@ export declare namespace cert_manager {
20871
20927
  * Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
20872
20928
  */
20873
20929
  server: string;
20930
+ /**
20931
+ * ServerName is used to verify the hostname on the returned certificates
20932
+ * by the Vault server.
20933
+ */
20934
+ serverName: string;
20874
20935
  }
20875
20936
  /**
20876
20937
  * Venafi configures this issuer to sign certificates using a Venafi TPP
@@ -20895,7 +20956,7 @@ export declare namespace cert_manager {
20895
20956
  apiTokenSecretRef: outputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRef;
20896
20957
  /**
20897
20958
  * URL is the base URL for Venafi Cloud.
20898
- * Defaults to "https://api.venafi.cloud/v1".
20959
+ * Defaults to "https://api.venafi.cloud/".
20899
20960
  */
20900
20961
  url: string;
20901
20962
  }
@@ -20939,7 +21000,7 @@ export declare namespace cert_manager {
20939
21000
  apiTokenSecretRef: outputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRefPatch;
20940
21001
  /**
20941
21002
  * URL is the base URL for Venafi Cloud.
20942
- * Defaults to "https://api.venafi.cloud/v1".
21003
+ * Defaults to "https://api.venafi.cloud/".
20943
21004
  */
20944
21005
  url: string;
20945
21006
  }
@@ -21229,5 +21290,295 @@ export declare namespace meta {
21229
21290
  */
21230
21291
  selfLink: string;
21231
21292
  }
21293
+ /**
21294
+ * ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
21295
+ */
21296
+ interface ManagedFieldsEntry {
21297
+ /**
21298
+ * APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
21299
+ */
21300
+ apiVersion: string;
21301
+ /**
21302
+ * FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
21303
+ */
21304
+ fieldsType: string;
21305
+ /**
21306
+ * FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
21307
+ */
21308
+ fieldsV1: any;
21309
+ /**
21310
+ * Manager is an identifier of the workflow managing these fields.
21311
+ */
21312
+ manager: string;
21313
+ /**
21314
+ * Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
21315
+ */
21316
+ operation: string;
21317
+ /**
21318
+ * Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
21319
+ */
21320
+ subresource: string;
21321
+ /**
21322
+ * Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
21323
+ */
21324
+ time: string;
21325
+ }
21326
+ /**
21327
+ * ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
21328
+ */
21329
+ interface ManagedFieldsEntryPatch {
21330
+ /**
21331
+ * APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
21332
+ */
21333
+ apiVersion: string;
21334
+ /**
21335
+ * FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
21336
+ */
21337
+ fieldsType: string;
21338
+ /**
21339
+ * FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
21340
+ */
21341
+ fieldsV1: any;
21342
+ /**
21343
+ * Manager is an identifier of the workflow managing these fields.
21344
+ */
21345
+ manager: string;
21346
+ /**
21347
+ * Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
21348
+ */
21349
+ operation: string;
21350
+ /**
21351
+ * Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
21352
+ */
21353
+ subresource: string;
21354
+ /**
21355
+ * Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
21356
+ */
21357
+ time: string;
21358
+ }
21359
+ /**
21360
+ * ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
21361
+ */
21362
+ interface ObjectMeta {
21363
+ /**
21364
+ * Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
21365
+ */
21366
+ annotations: {
21367
+ [key: string]: string;
21368
+ };
21369
+ /**
21370
+ * CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
21371
+ *
21372
+ * Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
21373
+ */
21374
+ creationTimestamp: string;
21375
+ /**
21376
+ * Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
21377
+ */
21378
+ deletionGracePeriodSeconds: number;
21379
+ /**
21380
+ * DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
21381
+ *
21382
+ * Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
21383
+ */
21384
+ deletionTimestamp: string;
21385
+ /**
21386
+ * Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
21387
+ */
21388
+ finalizers: string[];
21389
+ /**
21390
+ * GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
21391
+ *
21392
+ * If this field is specified and the generated name exists, the server will return a 409.
21393
+ *
21394
+ * Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
21395
+ */
21396
+ generateName: string;
21397
+ /**
21398
+ * A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
21399
+ */
21400
+ generation: number;
21401
+ /**
21402
+ * Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
21403
+ */
21404
+ labels: {
21405
+ [key: string]: string;
21406
+ };
21407
+ /**
21408
+ * ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
21409
+ */
21410
+ managedFields: outputs.meta.v1.ManagedFieldsEntry[];
21411
+ /**
21412
+ * Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
21413
+ */
21414
+ name: string;
21415
+ /**
21416
+ * Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
21417
+ *
21418
+ * Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
21419
+ */
21420
+ namespace: string;
21421
+ /**
21422
+ * List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
21423
+ */
21424
+ ownerReferences: outputs.meta.v1.OwnerReference[];
21425
+ /**
21426
+ * An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
21427
+ *
21428
+ * Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
21429
+ */
21430
+ resourceVersion: string;
21431
+ /**
21432
+ * Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
21433
+ */
21434
+ selfLink: string;
21435
+ /**
21436
+ * UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
21437
+ *
21438
+ * Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
21439
+ */
21440
+ uid: string;
21441
+ }
21442
+ /**
21443
+ * ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
21444
+ */
21445
+ interface ObjectMetaPatch {
21446
+ /**
21447
+ * Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
21448
+ */
21449
+ annotations: {
21450
+ [key: string]: string;
21451
+ };
21452
+ /**
21453
+ * CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
21454
+ *
21455
+ * Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
21456
+ */
21457
+ creationTimestamp: string;
21458
+ /**
21459
+ * Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
21460
+ */
21461
+ deletionGracePeriodSeconds: number;
21462
+ /**
21463
+ * DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
21464
+ *
21465
+ * Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
21466
+ */
21467
+ deletionTimestamp: string;
21468
+ /**
21469
+ * Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
21470
+ */
21471
+ finalizers: string[];
21472
+ /**
21473
+ * GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
21474
+ *
21475
+ * If this field is specified and the generated name exists, the server will return a 409.
21476
+ *
21477
+ * Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
21478
+ */
21479
+ generateName: string;
21480
+ /**
21481
+ * A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
21482
+ */
21483
+ generation: number;
21484
+ /**
21485
+ * Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
21486
+ */
21487
+ labels: {
21488
+ [key: string]: string;
21489
+ };
21490
+ /**
21491
+ * ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
21492
+ */
21493
+ managedFields: outputs.meta.v1.ManagedFieldsEntryPatch[];
21494
+ /**
21495
+ * Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
21496
+ */
21497
+ name: string;
21498
+ /**
21499
+ * Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
21500
+ *
21501
+ * Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
21502
+ */
21503
+ namespace: string;
21504
+ /**
21505
+ * List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
21506
+ */
21507
+ ownerReferences: outputs.meta.v1.OwnerReferencePatch[];
21508
+ /**
21509
+ * An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
21510
+ *
21511
+ * Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
21512
+ */
21513
+ resourceVersion: string;
21514
+ /**
21515
+ * Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
21516
+ */
21517
+ selfLink: string;
21518
+ /**
21519
+ * UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
21520
+ *
21521
+ * Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
21522
+ */
21523
+ uid: string;
21524
+ }
21525
+ /**
21526
+ * OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
21527
+ */
21528
+ interface OwnerReference {
21529
+ /**
21530
+ * API version of the referent.
21531
+ */
21532
+ apiVersion: string;
21533
+ /**
21534
+ * If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
21535
+ */
21536
+ blockOwnerDeletion: boolean;
21537
+ /**
21538
+ * If true, this reference points to the managing controller.
21539
+ */
21540
+ controller: boolean;
21541
+ /**
21542
+ * Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
21543
+ */
21544
+ kind: string;
21545
+ /**
21546
+ * Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
21547
+ */
21548
+ name: string;
21549
+ /**
21550
+ * UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
21551
+ */
21552
+ uid: string;
21553
+ }
21554
+ /**
21555
+ * OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
21556
+ */
21557
+ interface OwnerReferencePatch {
21558
+ /**
21559
+ * API version of the referent.
21560
+ */
21561
+ apiVersion: string;
21562
+ /**
21563
+ * If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
21564
+ */
21565
+ blockOwnerDeletion: boolean;
21566
+ /**
21567
+ * If true, this reference points to the managing controller.
21568
+ */
21569
+ controller: boolean;
21570
+ /**
21571
+ * Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
21572
+ */
21573
+ kind: string;
21574
+ /**
21575
+ * Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
21576
+ */
21577
+ name: string;
21578
+ /**
21579
+ * UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
21580
+ */
21581
+ uid: string;
21582
+ }
21232
21583
  }
21233
21584
  }