@highstate/cert-manager 0.9.18 → 0.9.19
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +3 -52
- package/acme/v1/challenge.ts +2 -4
- package/acme/v1/challengeList.ts +0 -2
- package/acme/v1/challengePatch.ts +2 -4
- package/acme/v1/order.ts +2 -4
- package/acme/v1/orderList.ts +0 -2
- package/acme/v1/orderPatch.ts +2 -4
- package/bin/acme/v1/challenge.d.ts +2 -3
- package/bin/acme/v1/challenge.js.map +1 -1
- package/bin/acme/v1/challengeList.js.map +1 -1
- package/bin/acme/v1/challengePatch.d.ts +2 -3
- package/bin/acme/v1/challengePatch.js.map +1 -1
- package/bin/acme/v1/order.d.ts +2 -3
- package/bin/acme/v1/order.js.map +1 -1
- package/bin/acme/v1/orderList.js.map +1 -1
- package/bin/acme/v1/orderPatch.d.ts +2 -3
- package/bin/acme/v1/orderPatch.js.map +1 -1
- package/bin/cert_manager/v1/certificate.d.ts +2 -3
- package/bin/cert_manager/v1/certificate.js.map +1 -1
- package/bin/cert_manager/v1/certificateList.js.map +1 -1
- package/bin/cert_manager/v1/certificatePatch.d.ts +2 -3
- package/bin/cert_manager/v1/certificatePatch.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequest.d.ts +2 -3
- package/bin/cert_manager/v1/certificateRequest.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequestList.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequestPatch.d.ts +2 -3
- package/bin/cert_manager/v1/certificateRequestPatch.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuer.d.ts +2 -3
- package/bin/cert_manager/v1/clusterIssuer.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuerList.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuerPatch.d.ts +2 -3
- package/bin/cert_manager/v1/clusterIssuerPatch.js.map +1 -1
- package/bin/cert_manager/v1/issuer.d.ts +2 -3
- package/bin/cert_manager/v1/issuer.js.map +1 -1
- package/bin/cert_manager/v1/issuerList.js.map +1 -1
- package/bin/cert_manager/v1/issuerPatch.d.ts +2 -3
- package/bin/cert_manager/v1/issuerPatch.js.map +1 -1
- package/bin/package.json +9 -8
- package/bin/types/input.d.ts +423 -72
- package/bin/types/output.d.ts +424 -73
- package/cert_manager/v1/certificate.ts +2 -4
- package/cert_manager/v1/certificateList.ts +0 -2
- package/cert_manager/v1/certificatePatch.ts +2 -4
- package/cert_manager/v1/certificateRequest.ts +2 -4
- package/cert_manager/v1/certificateRequestList.ts +0 -2
- package/cert_manager/v1/certificateRequestPatch.ts +2 -4
- package/cert_manager/v1/clusterIssuer.ts +2 -4
- package/cert_manager/v1/clusterIssuerList.ts +0 -2
- package/cert_manager/v1/clusterIssuerPatch.ts +2 -4
- package/cert_manager/v1/issuer.ts +2 -4
- package/cert_manager/v1/issuerList.ts +0 -2
- package/cert_manager/v1/issuerPatch.ts +2 -4
- package/package.json +10 -9
- package/tsconfig.json +44 -43
- package/types/input.ts +421 -73
- package/types/output.ts +422 -74
- package/bin/meta/v1.d.ts +0 -3
- package/bin/meta/v1.js +0 -3
- package/bin/meta/v1.js.map +0 -1
package/types/output.ts
CHANGED
|
@@ -5,8 +5,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
5
5
|
import * as inputs from "../types/input";
|
|
6
6
|
import * as outputs from "../types/output";
|
|
7
7
|
|
|
8
|
-
import {ObjectMeta, ObjectMetaPatch} from "../meta/v1";
|
|
9
|
-
|
|
10
8
|
export namespace acme {
|
|
11
9
|
export namespace v1 {
|
|
12
10
|
/**
|
|
@@ -24,7 +22,7 @@ export namespace acme {
|
|
|
24
22
|
/**
|
|
25
23
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
26
24
|
*/
|
|
27
|
-
metadata: ObjectMeta;
|
|
25
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
28
26
|
spec: outputs.acme.v1.ChallengeSpec;
|
|
29
27
|
status: outputs.acme.v1.ChallengeStatus;
|
|
30
28
|
}
|
|
@@ -36,9 +34,9 @@ export namespace acme {
|
|
|
36
34
|
*/
|
|
37
35
|
authorizationURL: string;
|
|
38
36
|
/**
|
|
39
|
-
* dnsName is the identifier that this challenge is for, e.g
|
|
37
|
+
* dnsName is the identifier that this challenge is for, e.g., example.com.
|
|
40
38
|
* If the requested DNSName is a 'wildcard', this field MUST be set to the
|
|
41
|
-
* non-wildcard domain, e.g
|
|
39
|
+
* non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
|
|
42
40
|
*/
|
|
43
41
|
dnsName: string;
|
|
44
42
|
issuerRef: outputs.acme.v1.ChallengeSpecIssuerRef;
|
|
@@ -126,9 +124,9 @@ export namespace acme {
|
|
|
126
124
|
*/
|
|
127
125
|
authorizationURL: string;
|
|
128
126
|
/**
|
|
129
|
-
* dnsName is the identifier that this challenge is for, e.g
|
|
127
|
+
* dnsName is the identifier that this challenge is for, e.g., example.com.
|
|
130
128
|
* If the requested DNSName is a 'wildcard', this field MUST be set to the
|
|
131
|
-
* non-wildcard domain, e.g
|
|
129
|
+
* non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
|
|
132
130
|
*/
|
|
133
131
|
dnsName: string;
|
|
134
132
|
issuerRef: outputs.acme.v1.ChallengeSpecIssuerRefPatch;
|
|
@@ -459,16 +457,16 @@ export namespace acme {
|
|
|
459
457
|
*/
|
|
460
458
|
export interface ChallengeSpecSolverDns01AzureDNSManagedIdentity {
|
|
461
459
|
/**
|
|
462
|
-
* client ID of the managed identity,
|
|
460
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
463
461
|
*/
|
|
464
462
|
clientID: string;
|
|
465
463
|
/**
|
|
466
|
-
* resource ID of the managed identity,
|
|
464
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
467
465
|
* Cannot be used for Azure Managed Service Identity
|
|
468
466
|
*/
|
|
469
467
|
resourceID: string;
|
|
470
468
|
/**
|
|
471
|
-
* tenant ID of the managed identity,
|
|
469
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
472
470
|
*/
|
|
473
471
|
tenantID: string;
|
|
474
472
|
}
|
|
@@ -480,16 +478,16 @@ export namespace acme {
|
|
|
480
478
|
*/
|
|
481
479
|
export interface ChallengeSpecSolverDns01AzureDNSManagedIdentityPatch {
|
|
482
480
|
/**
|
|
483
|
-
* client ID of the managed identity,
|
|
481
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
484
482
|
*/
|
|
485
483
|
clientID: string;
|
|
486
484
|
/**
|
|
487
|
-
* resource ID of the managed identity,
|
|
485
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
488
486
|
* Cannot be used for Azure Managed Service Identity
|
|
489
487
|
*/
|
|
490
488
|
resourceID: string;
|
|
491
489
|
/**
|
|
492
|
-
* tenant ID of the managed identity,
|
|
490
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
493
491
|
*/
|
|
494
492
|
tenantID: string;
|
|
495
493
|
}
|
|
@@ -1115,7 +1113,7 @@ export namespace acme {
|
|
|
1115
1113
|
* when challenges are processed.
|
|
1116
1114
|
* This can contain arbitrary JSON data.
|
|
1117
1115
|
* Secret values should not be specified in this stanza.
|
|
1118
|
-
* If secret values are needed (e.g
|
|
1116
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
1119
1117
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
1120
1118
|
* For details on the schema of this field, consult the webhook provider
|
|
1121
1119
|
* implementation's documentation.
|
|
@@ -1131,7 +1129,7 @@ export namespace acme {
|
|
|
1131
1129
|
/**
|
|
1132
1130
|
* The name of the solver to use, as defined in the webhook provider
|
|
1133
1131
|
* implementation.
|
|
1134
|
-
* This will typically be the name of the provider, e.g
|
|
1132
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
1135
1133
|
*/
|
|
1136
1134
|
solverName: string;
|
|
1137
1135
|
}
|
|
@@ -1146,7 +1144,7 @@ export namespace acme {
|
|
|
1146
1144
|
* when challenges are processed.
|
|
1147
1145
|
* This can contain arbitrary JSON data.
|
|
1148
1146
|
* Secret values should not be specified in this stanza.
|
|
1149
|
-
* If secret values are needed (e.g
|
|
1147
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
1150
1148
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
1151
1149
|
* For details on the schema of this field, consult the webhook provider
|
|
1152
1150
|
* implementation's documentation.
|
|
@@ -1162,7 +1160,7 @@ export namespace acme {
|
|
|
1162
1160
|
/**
|
|
1163
1161
|
* The name of the solver to use, as defined in the webhook provider
|
|
1164
1162
|
* implementation.
|
|
1165
|
-
* This will typically be the name of the provider, e.g
|
|
1163
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
1166
1164
|
*/
|
|
1167
1165
|
solverName: string;
|
|
1168
1166
|
}
|
|
@@ -1171,7 +1169,7 @@ export namespace acme {
|
|
|
1171
1169
|
* Configures cert-manager to attempt to complete authorizations by
|
|
1172
1170
|
* performing the HTTP01 challenge flow.
|
|
1173
1171
|
* It is not possible to obtain certificates for wildcard domain names
|
|
1174
|
-
* (e.g
|
|
1172
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
1175
1173
|
*/
|
|
1176
1174
|
export interface ChallengeSpecSolverHttp01 {
|
|
1177
1175
|
gatewayHTTPRoute: outputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoute;
|
|
@@ -5768,7 +5766,7 @@ export namespace acme {
|
|
|
5768
5766
|
* Configures cert-manager to attempt to complete authorizations by
|
|
5769
5767
|
* performing the HTTP01 challenge flow.
|
|
5770
5768
|
* It is not possible to obtain certificates for wildcard domain names
|
|
5771
|
-
* (e.g
|
|
5769
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
5772
5770
|
*/
|
|
5773
5771
|
export interface ChallengeSpecSolverHttp01Patch {
|
|
5774
5772
|
gatewayHTTPRoute: outputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoutePatch;
|
|
@@ -5936,7 +5934,7 @@ export namespace acme {
|
|
|
5936
5934
|
/**
|
|
5937
5935
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
5938
5936
|
*/
|
|
5939
|
-
metadata: ObjectMeta;
|
|
5937
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
5940
5938
|
spec: outputs.acme.v1.OrderSpec;
|
|
5941
5939
|
status: outputs.acme.v1.OrderStatus;
|
|
5942
5940
|
}
|
|
@@ -5966,6 +5964,11 @@ export namespace acme {
|
|
|
5966
5964
|
*/
|
|
5967
5965
|
ipAddresses: string[];
|
|
5968
5966
|
issuerRef: outputs.acme.v1.OrderSpecIssuerRef;
|
|
5967
|
+
/**
|
|
5968
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
5969
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
5970
|
+
*/
|
|
5971
|
+
profile: string;
|
|
5969
5972
|
/**
|
|
5970
5973
|
* Certificate signing request bytes in DER encoding.
|
|
5971
5974
|
* This will be used when finalizing the order.
|
|
@@ -6043,6 +6046,11 @@ export namespace acme {
|
|
|
6043
6046
|
*/
|
|
6044
6047
|
ipAddresses: string[];
|
|
6045
6048
|
issuerRef: outputs.acme.v1.OrderSpecIssuerRefPatch;
|
|
6049
|
+
/**
|
|
6050
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
6051
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
6052
|
+
*/
|
|
6053
|
+
profile: string;
|
|
6046
6054
|
/**
|
|
6047
6055
|
* Certificate signing request bytes in DER encoding.
|
|
6048
6056
|
* This will be used when finalizing the order.
|
|
@@ -6148,7 +6156,7 @@ export namespace acme {
|
|
|
6148
6156
|
*/
|
|
6149
6157
|
token: string;
|
|
6150
6158
|
/**
|
|
6151
|
-
* Type is the type of challenge being offered, e.g
|
|
6159
|
+
* Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
|
|
6152
6160
|
* 'tls-sni-01', etc.
|
|
6153
6161
|
* This is the raw value retrieved from the ACME server.
|
|
6154
6162
|
* Only 'http-01' and 'dns-01' are supported by cert-manager, other values
|
|
@@ -6174,7 +6182,7 @@ export namespace acme {
|
|
|
6174
6182
|
*/
|
|
6175
6183
|
token: string;
|
|
6176
6184
|
/**
|
|
6177
|
-
* Type is the type of challenge being offered, e.g
|
|
6185
|
+
* Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
|
|
6178
6186
|
* 'tls-sni-01', etc.
|
|
6179
6187
|
* This is the raw value retrieved from the ACME server.
|
|
6180
6188
|
* Only 'http-01' and 'dns-01' are supported by cert-manager, other values
|
|
@@ -6296,7 +6304,7 @@ export namespace cert_manager {
|
|
|
6296
6304
|
/**
|
|
6297
6305
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
6298
6306
|
*/
|
|
6299
|
-
metadata: ObjectMeta;
|
|
6307
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
6300
6308
|
spec: outputs.cert_manager.v1.CertificateSpec;
|
|
6301
6309
|
status: outputs.cert_manager.v1.CertificateStatus;
|
|
6302
6310
|
}
|
|
@@ -6324,7 +6332,7 @@ export namespace cert_manager {
|
|
|
6324
6332
|
/**
|
|
6325
6333
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
6326
6334
|
*/
|
|
6327
|
-
metadata: ObjectMeta;
|
|
6335
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
6328
6336
|
spec: outputs.cert_manager.v1.CertificateRequestSpec;
|
|
6329
6337
|
status: outputs.cert_manager.v1.CertificateRequestStatus;
|
|
6330
6338
|
}
|
|
@@ -6647,10 +6655,6 @@ export namespace cert_manager {
|
|
|
6647
6655
|
/**
|
|
6648
6656
|
* Defines extra output formats of the private key and signed certificate chain
|
|
6649
6657
|
* to be written to this Certificate's target Secret.
|
|
6650
|
-
*
|
|
6651
|
-
* This is a Beta Feature enabled by default. It can be disabled with the
|
|
6652
|
-
* `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
|
|
6653
|
-
* the controller and webhook components.
|
|
6654
6658
|
*/
|
|
6655
6659
|
additionalOutputFormats: outputs.cert_manager.v1.CertificateSpecAdditionalOutputFormats[];
|
|
6656
6660
|
/**
|
|
@@ -6768,8 +6772,7 @@ export namespace cert_manager {
|
|
|
6768
6772
|
* revisions exceeds this number.
|
|
6769
6773
|
*
|
|
6770
6774
|
* If set, revisionHistoryLimit must be a value of `1` or greater.
|
|
6771
|
-
*
|
|
6772
|
-
* Default value is `nil`.
|
|
6775
|
+
* Default value is `1`.
|
|
6773
6776
|
*/
|
|
6774
6777
|
revisionHistoryLimit: number;
|
|
6775
6778
|
/**
|
|
@@ -6780,6 +6783,13 @@ export namespace cert_manager {
|
|
|
6780
6783
|
*/
|
|
6781
6784
|
secretName: string;
|
|
6782
6785
|
secretTemplate: outputs.cert_manager.v1.CertificateSpecSecretTemplate;
|
|
6786
|
+
/**
|
|
6787
|
+
* Signature algorithm to use.
|
|
6788
|
+
* Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
|
|
6789
|
+
* Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
|
|
6790
|
+
* Allowed values for Ed25519 keys: PureEd25519.
|
|
6791
|
+
*/
|
|
6792
|
+
signatureAlgorithm: string;
|
|
6783
6793
|
subject: outputs.cert_manager.v1.CertificateSpecSubject;
|
|
6784
6794
|
/**
|
|
6785
6795
|
* Requested URI subject alternative names.
|
|
@@ -7018,7 +7028,7 @@ export namespace cert_manager {
|
|
|
7018
7028
|
* `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
|
|
7019
7029
|
* `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
|
|
7020
7030
|
* `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
|
|
7021
|
-
* (
|
|
7031
|
+
* (e.g., because of company policy). Please note that the security of the algorithm is not that important
|
|
7022
7032
|
* in reality, because the unencrypted certificate and private key are also stored in the Secret.
|
|
7023
7033
|
*/
|
|
7024
7034
|
profile: string;
|
|
@@ -7096,7 +7106,7 @@ export namespace cert_manager {
|
|
|
7096
7106
|
* `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
|
|
7097
7107
|
* `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
|
|
7098
7108
|
* `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
|
|
7099
|
-
* (
|
|
7109
|
+
* (e.g., because of company policy). Please note that the security of the algorithm is not that important
|
|
7100
7110
|
* in reality, because the unencrypted certificate and private key are also stored in the Secret.
|
|
7101
7111
|
*/
|
|
7102
7112
|
profile: string;
|
|
@@ -7268,10 +7278,6 @@ export namespace cert_manager {
|
|
|
7268
7278
|
/**
|
|
7269
7279
|
* Defines extra output formats of the private key and signed certificate chain
|
|
7270
7280
|
* to be written to this Certificate's target Secret.
|
|
7271
|
-
*
|
|
7272
|
-
* This is a Beta Feature enabled by default. It can be disabled with the
|
|
7273
|
-
* `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
|
|
7274
|
-
* the controller and webhook components.
|
|
7275
7281
|
*/
|
|
7276
7282
|
additionalOutputFormats: outputs.cert_manager.v1.CertificateSpecAdditionalOutputFormatsPatch[];
|
|
7277
7283
|
/**
|
|
@@ -7389,8 +7395,7 @@ export namespace cert_manager {
|
|
|
7389
7395
|
* revisions exceeds this number.
|
|
7390
7396
|
*
|
|
7391
7397
|
* If set, revisionHistoryLimit must be a value of `1` or greater.
|
|
7392
|
-
*
|
|
7393
|
-
* Default value is `nil`.
|
|
7398
|
+
* Default value is `1`.
|
|
7394
7399
|
*/
|
|
7395
7400
|
revisionHistoryLimit: number;
|
|
7396
7401
|
/**
|
|
@@ -7401,6 +7406,13 @@ export namespace cert_manager {
|
|
|
7401
7406
|
*/
|
|
7402
7407
|
secretName: string;
|
|
7403
7408
|
secretTemplate: outputs.cert_manager.v1.CertificateSpecSecretTemplatePatch;
|
|
7409
|
+
/**
|
|
7410
|
+
* Signature algorithm to use.
|
|
7411
|
+
* Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
|
|
7412
|
+
* Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
|
|
7413
|
+
* Allowed values for Ed25519 keys: PureEd25519.
|
|
7414
|
+
*/
|
|
7415
|
+
signatureAlgorithm: string;
|
|
7404
7416
|
subject: outputs.cert_manager.v1.CertificateSpecSubjectPatch;
|
|
7405
7417
|
/**
|
|
7406
7418
|
* Requested URI subject alternative names.
|
|
@@ -7452,7 +7464,11 @@ export namespace cert_manager {
|
|
|
7452
7464
|
* to await user intervention.
|
|
7453
7465
|
* If set to `Always`, a private key matching the specified requirements
|
|
7454
7466
|
* will be generated whenever a re-issuance occurs.
|
|
7455
|
-
* Default is `
|
|
7467
|
+
* Default is `Always`.
|
|
7468
|
+
* The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
|
|
7469
|
+
* The new default can be disabled by setting the
|
|
7470
|
+
* `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
|
|
7471
|
+
* the controller component.
|
|
7456
7472
|
*/
|
|
7457
7473
|
rotationPolicy: string;
|
|
7458
7474
|
/**
|
|
@@ -7503,7 +7519,11 @@ export namespace cert_manager {
|
|
|
7503
7519
|
* to await user intervention.
|
|
7504
7520
|
* If set to `Always`, a private key matching the specified requirements
|
|
7505
7521
|
* will be generated whenever a re-issuance occurs.
|
|
7506
|
-
* Default is `
|
|
7522
|
+
* Default is `Always`.
|
|
7523
|
+
* The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
|
|
7524
|
+
* The new default can be disabled by setting the
|
|
7525
|
+
* `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
|
|
7526
|
+
* the controller component.
|
|
7507
7527
|
*/
|
|
7508
7528
|
rotationPolicy: string;
|
|
7509
7529
|
/**
|
|
@@ -7876,7 +7896,7 @@ export namespace cert_manager {
|
|
|
7876
7896
|
/**
|
|
7877
7897
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
7878
7898
|
*/
|
|
7879
|
-
metadata: ObjectMeta;
|
|
7899
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
7880
7900
|
spec: outputs.cert_manager.v1.ClusterIssuerSpec;
|
|
7881
7901
|
status: outputs.cert_manager.v1.ClusterIssuerStatus;
|
|
7882
7902
|
}
|
|
@@ -7936,7 +7956,7 @@ export namespace cert_manager {
|
|
|
7936
7956
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
7937
7957
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
7938
7958
|
* endpoint.
|
|
7939
|
-
* For example, for Let's Encrypt's DST
|
|
7959
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
7940
7960
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
7941
7961
|
* This value picks the first certificate bundle in the combined set of
|
|
7942
7962
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -7944,6 +7964,11 @@ export namespace cert_manager {
|
|
|
7944
7964
|
*/
|
|
7945
7965
|
preferredChain: string;
|
|
7946
7966
|
privateKeySecretRef: outputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRef;
|
|
7967
|
+
/**
|
|
7968
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
7969
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
7970
|
+
*/
|
|
7971
|
+
profile: string;
|
|
7947
7972
|
/**
|
|
7948
7973
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
7949
7974
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -8103,7 +8128,7 @@ export namespace cert_manager {
|
|
|
8103
8128
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
8104
8129
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
8105
8130
|
* endpoint.
|
|
8106
|
-
* For example, for Let's Encrypt's DST
|
|
8131
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
8107
8132
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
8108
8133
|
* This value picks the first certificate bundle in the combined set of
|
|
8109
8134
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -8111,6 +8136,11 @@ export namespace cert_manager {
|
|
|
8111
8136
|
*/
|
|
8112
8137
|
preferredChain: string;
|
|
8113
8138
|
privateKeySecretRef: outputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRefPatch;
|
|
8139
|
+
/**
|
|
8140
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
8141
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
8142
|
+
*/
|
|
8143
|
+
profile: string;
|
|
8114
8144
|
/**
|
|
8115
8145
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
8116
8146
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -8477,16 +8507,16 @@ export namespace cert_manager {
|
|
|
8477
8507
|
*/
|
|
8478
8508
|
export interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
|
|
8479
8509
|
/**
|
|
8480
|
-
* client ID of the managed identity,
|
|
8510
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
8481
8511
|
*/
|
|
8482
8512
|
clientID: string;
|
|
8483
8513
|
/**
|
|
8484
|
-
* resource ID of the managed identity,
|
|
8514
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
8485
8515
|
* Cannot be used for Azure Managed Service Identity
|
|
8486
8516
|
*/
|
|
8487
8517
|
resourceID: string;
|
|
8488
8518
|
/**
|
|
8489
|
-
* tenant ID of the managed identity,
|
|
8519
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
8490
8520
|
*/
|
|
8491
8521
|
tenantID: string;
|
|
8492
8522
|
}
|
|
@@ -8498,16 +8528,16 @@ export namespace cert_manager {
|
|
|
8498
8528
|
*/
|
|
8499
8529
|
export interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
|
|
8500
8530
|
/**
|
|
8501
|
-
* client ID of the managed identity,
|
|
8531
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
8502
8532
|
*/
|
|
8503
8533
|
clientID: string;
|
|
8504
8534
|
/**
|
|
8505
|
-
* resource ID of the managed identity,
|
|
8535
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
8506
8536
|
* Cannot be used for Azure Managed Service Identity
|
|
8507
8537
|
*/
|
|
8508
8538
|
resourceID: string;
|
|
8509
8539
|
/**
|
|
8510
|
-
* tenant ID of the managed identity,
|
|
8540
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
8511
8541
|
*/
|
|
8512
8542
|
tenantID: string;
|
|
8513
8543
|
}
|
|
@@ -9133,7 +9163,7 @@ export namespace cert_manager {
|
|
|
9133
9163
|
* when challenges are processed.
|
|
9134
9164
|
* This can contain arbitrary JSON data.
|
|
9135
9165
|
* Secret values should not be specified in this stanza.
|
|
9136
|
-
* If secret values are needed (e.g
|
|
9166
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
9137
9167
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
9138
9168
|
* For details on the schema of this field, consult the webhook provider
|
|
9139
9169
|
* implementation's documentation.
|
|
@@ -9149,7 +9179,7 @@ export namespace cert_manager {
|
|
|
9149
9179
|
/**
|
|
9150
9180
|
* The name of the solver to use, as defined in the webhook provider
|
|
9151
9181
|
* implementation.
|
|
9152
|
-
* This will typically be the name of the provider, e.g
|
|
9182
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
9153
9183
|
*/
|
|
9154
9184
|
solverName: string;
|
|
9155
9185
|
}
|
|
@@ -9164,7 +9194,7 @@ export namespace cert_manager {
|
|
|
9164
9194
|
* when challenges are processed.
|
|
9165
9195
|
* This can contain arbitrary JSON data.
|
|
9166
9196
|
* Secret values should not be specified in this stanza.
|
|
9167
|
-
* If secret values are needed (e.g
|
|
9197
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
9168
9198
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
9169
9199
|
* For details on the schema of this field, consult the webhook provider
|
|
9170
9200
|
* implementation's documentation.
|
|
@@ -9180,7 +9210,7 @@ export namespace cert_manager {
|
|
|
9180
9210
|
/**
|
|
9181
9211
|
* The name of the solver to use, as defined in the webhook provider
|
|
9182
9212
|
* implementation.
|
|
9183
|
-
* This will typically be the name of the provider, e.g
|
|
9213
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
9184
9214
|
*/
|
|
9185
9215
|
solverName: string;
|
|
9186
9216
|
}
|
|
@@ -9189,7 +9219,7 @@ export namespace cert_manager {
|
|
|
9189
9219
|
* Configures cert-manager to attempt to complete authorizations by
|
|
9190
9220
|
* performing the HTTP01 challenge flow.
|
|
9191
9221
|
* It is not possible to obtain certificates for wildcard domain names
|
|
9192
|
-
* (e.g
|
|
9222
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
9193
9223
|
*/
|
|
9194
9224
|
export interface ClusterIssuerSpecAcmeSolversHttp01 {
|
|
9195
9225
|
gatewayHTTPRoute: outputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoute;
|
|
@@ -13786,7 +13816,7 @@ export namespace cert_manager {
|
|
|
13786
13816
|
* Configures cert-manager to attempt to complete authorizations by
|
|
13787
13817
|
* performing the HTTP01 challenge flow.
|
|
13788
13818
|
* It is not possible to obtain certificates for wildcard domain names
|
|
13789
|
-
* (e.g
|
|
13819
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
13790
13820
|
*/
|
|
13791
13821
|
export interface ClusterIssuerSpecAcmeSolversHttp01Patch {
|
|
13792
13822
|
gatewayHTTPRoute: outputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch;
|
|
@@ -14013,6 +14043,11 @@ export namespace cert_manager {
|
|
|
14013
14043
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
14014
14044
|
*/
|
|
14015
14045
|
server: string;
|
|
14046
|
+
/**
|
|
14047
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
14048
|
+
* by the Vault server.
|
|
14049
|
+
*/
|
|
14050
|
+
serverName: string;
|
|
14016
14051
|
}
|
|
14017
14052
|
|
|
14018
14053
|
/**
|
|
@@ -14463,6 +14498,11 @@ export namespace cert_manager {
|
|
|
14463
14498
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
14464
14499
|
*/
|
|
14465
14500
|
server: string;
|
|
14501
|
+
/**
|
|
14502
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
14503
|
+
* by the Vault server.
|
|
14504
|
+
*/
|
|
14505
|
+
serverName: string;
|
|
14466
14506
|
}
|
|
14467
14507
|
|
|
14468
14508
|
/**
|
|
@@ -14489,7 +14529,7 @@ export namespace cert_manager {
|
|
|
14489
14529
|
apiTokenSecretRef: outputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRef;
|
|
14490
14530
|
/**
|
|
14491
14531
|
* URL is the base URL for Venafi Cloud.
|
|
14492
|
-
* Defaults to "https://api.venafi.cloud/
|
|
14532
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
14493
14533
|
*/
|
|
14494
14534
|
url: string;
|
|
14495
14535
|
}
|
|
@@ -14536,7 +14576,7 @@ export namespace cert_manager {
|
|
|
14536
14576
|
apiTokenSecretRef: outputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRefPatch;
|
|
14537
14577
|
/**
|
|
14538
14578
|
* URL is the base URL for Venafi Cloud.
|
|
14539
|
-
* Defaults to "https://api.venafi.cloud/
|
|
14579
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
14540
14580
|
*/
|
|
14541
14581
|
url: string;
|
|
14542
14582
|
}
|
|
@@ -14833,7 +14873,7 @@ export namespace cert_manager {
|
|
|
14833
14873
|
/**
|
|
14834
14874
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
14835
14875
|
*/
|
|
14836
|
-
metadata: ObjectMeta;
|
|
14876
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
14837
14877
|
spec: outputs.cert_manager.v1.IssuerSpec;
|
|
14838
14878
|
status: outputs.cert_manager.v1.IssuerStatus;
|
|
14839
14879
|
}
|
|
@@ -14893,7 +14933,7 @@ export namespace cert_manager {
|
|
|
14893
14933
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
14894
14934
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
14895
14935
|
* endpoint.
|
|
14896
|
-
* For example, for Let's Encrypt's DST
|
|
14936
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
14897
14937
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
14898
14938
|
* This value picks the first certificate bundle in the combined set of
|
|
14899
14939
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -14901,6 +14941,11 @@ export namespace cert_manager {
|
|
|
14901
14941
|
*/
|
|
14902
14942
|
preferredChain: string;
|
|
14903
14943
|
privateKeySecretRef: outputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRef;
|
|
14944
|
+
/**
|
|
14945
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
14946
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
14947
|
+
*/
|
|
14948
|
+
profile: string;
|
|
14904
14949
|
/**
|
|
14905
14950
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
14906
14951
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -15060,7 +15105,7 @@ export namespace cert_manager {
|
|
|
15060
15105
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
15061
15106
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
15062
15107
|
* endpoint.
|
|
15063
|
-
* For example, for Let's Encrypt's DST
|
|
15108
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
15064
15109
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
15065
15110
|
* This value picks the first certificate bundle in the combined set of
|
|
15066
15111
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -15068,6 +15113,11 @@ export namespace cert_manager {
|
|
|
15068
15113
|
*/
|
|
15069
15114
|
preferredChain: string;
|
|
15070
15115
|
privateKeySecretRef: outputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRefPatch;
|
|
15116
|
+
/**
|
|
15117
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
15118
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
15119
|
+
*/
|
|
15120
|
+
profile: string;
|
|
15071
15121
|
/**
|
|
15072
15122
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
15073
15123
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -15434,16 +15484,16 @@ export namespace cert_manager {
|
|
|
15434
15484
|
*/
|
|
15435
15485
|
export interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
|
|
15436
15486
|
/**
|
|
15437
|
-
* client ID of the managed identity,
|
|
15487
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
15438
15488
|
*/
|
|
15439
15489
|
clientID: string;
|
|
15440
15490
|
/**
|
|
15441
|
-
* resource ID of the managed identity,
|
|
15491
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
15442
15492
|
* Cannot be used for Azure Managed Service Identity
|
|
15443
15493
|
*/
|
|
15444
15494
|
resourceID: string;
|
|
15445
15495
|
/**
|
|
15446
|
-
* tenant ID of the managed identity,
|
|
15496
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
15447
15497
|
*/
|
|
15448
15498
|
tenantID: string;
|
|
15449
15499
|
}
|
|
@@ -15455,16 +15505,16 @@ export namespace cert_manager {
|
|
|
15455
15505
|
*/
|
|
15456
15506
|
export interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
|
|
15457
15507
|
/**
|
|
15458
|
-
* client ID of the managed identity,
|
|
15508
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
15459
15509
|
*/
|
|
15460
15510
|
clientID: string;
|
|
15461
15511
|
/**
|
|
15462
|
-
* resource ID of the managed identity,
|
|
15512
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
15463
15513
|
* Cannot be used for Azure Managed Service Identity
|
|
15464
15514
|
*/
|
|
15465
15515
|
resourceID: string;
|
|
15466
15516
|
/**
|
|
15467
|
-
* tenant ID of the managed identity,
|
|
15517
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
15468
15518
|
*/
|
|
15469
15519
|
tenantID: string;
|
|
15470
15520
|
}
|
|
@@ -16090,7 +16140,7 @@ export namespace cert_manager {
|
|
|
16090
16140
|
* when challenges are processed.
|
|
16091
16141
|
* This can contain arbitrary JSON data.
|
|
16092
16142
|
* Secret values should not be specified in this stanza.
|
|
16093
|
-
* If secret values are needed (e.g
|
|
16143
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
16094
16144
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
16095
16145
|
* For details on the schema of this field, consult the webhook provider
|
|
16096
16146
|
* implementation's documentation.
|
|
@@ -16106,7 +16156,7 @@ export namespace cert_manager {
|
|
|
16106
16156
|
/**
|
|
16107
16157
|
* The name of the solver to use, as defined in the webhook provider
|
|
16108
16158
|
* implementation.
|
|
16109
|
-
* This will typically be the name of the provider, e.g
|
|
16159
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
16110
16160
|
*/
|
|
16111
16161
|
solverName: string;
|
|
16112
16162
|
}
|
|
@@ -16121,7 +16171,7 @@ export namespace cert_manager {
|
|
|
16121
16171
|
* when challenges are processed.
|
|
16122
16172
|
* This can contain arbitrary JSON data.
|
|
16123
16173
|
* Secret values should not be specified in this stanza.
|
|
16124
|
-
* If secret values are needed (e.g
|
|
16174
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
16125
16175
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
16126
16176
|
* For details on the schema of this field, consult the webhook provider
|
|
16127
16177
|
* implementation's documentation.
|
|
@@ -16137,7 +16187,7 @@ export namespace cert_manager {
|
|
|
16137
16187
|
/**
|
|
16138
16188
|
* The name of the solver to use, as defined in the webhook provider
|
|
16139
16189
|
* implementation.
|
|
16140
|
-
* This will typically be the name of the provider, e.g
|
|
16190
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
16141
16191
|
*/
|
|
16142
16192
|
solverName: string;
|
|
16143
16193
|
}
|
|
@@ -16146,7 +16196,7 @@ export namespace cert_manager {
|
|
|
16146
16196
|
* Configures cert-manager to attempt to complete authorizations by
|
|
16147
16197
|
* performing the HTTP01 challenge flow.
|
|
16148
16198
|
* It is not possible to obtain certificates for wildcard domain names
|
|
16149
|
-
* (e.g
|
|
16199
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
16150
16200
|
*/
|
|
16151
16201
|
export interface IssuerSpecAcmeSolversHttp01 {
|
|
16152
16202
|
gatewayHTTPRoute: outputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoute;
|
|
@@ -20743,7 +20793,7 @@ export namespace cert_manager {
|
|
|
20743
20793
|
* Configures cert-manager to attempt to complete authorizations by
|
|
20744
20794
|
* performing the HTTP01 challenge flow.
|
|
20745
20795
|
* It is not possible to obtain certificates for wildcard domain names
|
|
20746
|
-
* (e.g
|
|
20796
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
20747
20797
|
*/
|
|
20748
20798
|
export interface IssuerSpecAcmeSolversHttp01Patch {
|
|
20749
20799
|
gatewayHTTPRoute: outputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch;
|
|
@@ -20970,6 +21020,11 @@ export namespace cert_manager {
|
|
|
20970
21020
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
20971
21021
|
*/
|
|
20972
21022
|
server: string;
|
|
21023
|
+
/**
|
|
21024
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
21025
|
+
* by the Vault server.
|
|
21026
|
+
*/
|
|
21027
|
+
serverName: string;
|
|
20973
21028
|
}
|
|
20974
21029
|
|
|
20975
21030
|
/**
|
|
@@ -21420,6 +21475,11 @@ export namespace cert_manager {
|
|
|
21420
21475
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
21421
21476
|
*/
|
|
21422
21477
|
server: string;
|
|
21478
|
+
/**
|
|
21479
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
21480
|
+
* by the Vault server.
|
|
21481
|
+
*/
|
|
21482
|
+
serverName: string;
|
|
21423
21483
|
}
|
|
21424
21484
|
|
|
21425
21485
|
/**
|
|
@@ -21446,7 +21506,7 @@ export namespace cert_manager {
|
|
|
21446
21506
|
apiTokenSecretRef: outputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRef;
|
|
21447
21507
|
/**
|
|
21448
21508
|
* URL is the base URL for Venafi Cloud.
|
|
21449
|
-
* Defaults to "https://api.venafi.cloud/
|
|
21509
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
21450
21510
|
*/
|
|
21451
21511
|
url: string;
|
|
21452
21512
|
}
|
|
@@ -21493,7 +21553,7 @@ export namespace cert_manager {
|
|
|
21493
21553
|
apiTokenSecretRef: outputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRefPatch;
|
|
21494
21554
|
/**
|
|
21495
21555
|
* URL is the base URL for Venafi Cloud.
|
|
21496
|
-
* Defaults to "https://api.venafi.cloud/
|
|
21556
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
21497
21557
|
*/
|
|
21498
21558
|
url: string;
|
|
21499
21559
|
}
|
|
@@ -21799,5 +21859,293 @@ export namespace meta {
|
|
|
21799
21859
|
selfLink: string;
|
|
21800
21860
|
}
|
|
21801
21861
|
|
|
21862
|
+
/**
|
|
21863
|
+
* ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
|
|
21864
|
+
*/
|
|
21865
|
+
export interface ManagedFieldsEntry {
|
|
21866
|
+
/**
|
|
21867
|
+
* APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
|
|
21868
|
+
*/
|
|
21869
|
+
apiVersion: string;
|
|
21870
|
+
/**
|
|
21871
|
+
* FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
|
|
21872
|
+
*/
|
|
21873
|
+
fieldsType: string;
|
|
21874
|
+
/**
|
|
21875
|
+
* FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
|
|
21876
|
+
*/
|
|
21877
|
+
fieldsV1: any;
|
|
21878
|
+
/**
|
|
21879
|
+
* Manager is an identifier of the workflow managing these fields.
|
|
21880
|
+
*/
|
|
21881
|
+
manager: string;
|
|
21882
|
+
/**
|
|
21883
|
+
* Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
|
|
21884
|
+
*/
|
|
21885
|
+
operation: string;
|
|
21886
|
+
/**
|
|
21887
|
+
* Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
|
|
21888
|
+
*/
|
|
21889
|
+
subresource: string;
|
|
21890
|
+
/**
|
|
21891
|
+
* Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
|
|
21892
|
+
*/
|
|
21893
|
+
time: string;
|
|
21894
|
+
}
|
|
21895
|
+
|
|
21896
|
+
/**
|
|
21897
|
+
* ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
|
|
21898
|
+
*/
|
|
21899
|
+
export interface ManagedFieldsEntryPatch {
|
|
21900
|
+
/**
|
|
21901
|
+
* APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
|
|
21902
|
+
*/
|
|
21903
|
+
apiVersion: string;
|
|
21904
|
+
/**
|
|
21905
|
+
* FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
|
|
21906
|
+
*/
|
|
21907
|
+
fieldsType: string;
|
|
21908
|
+
/**
|
|
21909
|
+
* FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
|
|
21910
|
+
*/
|
|
21911
|
+
fieldsV1: any;
|
|
21912
|
+
/**
|
|
21913
|
+
* Manager is an identifier of the workflow managing these fields.
|
|
21914
|
+
*/
|
|
21915
|
+
manager: string;
|
|
21916
|
+
/**
|
|
21917
|
+
* Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
|
|
21918
|
+
*/
|
|
21919
|
+
operation: string;
|
|
21920
|
+
/**
|
|
21921
|
+
* Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
|
|
21922
|
+
*/
|
|
21923
|
+
subresource: string;
|
|
21924
|
+
/**
|
|
21925
|
+
* Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
|
|
21926
|
+
*/
|
|
21927
|
+
time: string;
|
|
21928
|
+
}
|
|
21929
|
+
|
|
21930
|
+
/**
|
|
21931
|
+
* ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
|
|
21932
|
+
*/
|
|
21933
|
+
export interface ObjectMeta {
|
|
21934
|
+
/**
|
|
21935
|
+
* Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
|
|
21936
|
+
*/
|
|
21937
|
+
annotations: {[key: string]: string};
|
|
21938
|
+
/**
|
|
21939
|
+
* CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
|
|
21940
|
+
*
|
|
21941
|
+
* Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21942
|
+
*/
|
|
21943
|
+
creationTimestamp: string;
|
|
21944
|
+
/**
|
|
21945
|
+
* Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
|
|
21946
|
+
*/
|
|
21947
|
+
deletionGracePeriodSeconds: number;
|
|
21948
|
+
/**
|
|
21949
|
+
* DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
|
|
21950
|
+
*
|
|
21951
|
+
* Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21952
|
+
*/
|
|
21953
|
+
deletionTimestamp: string;
|
|
21954
|
+
/**
|
|
21955
|
+
* Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
|
|
21956
|
+
*/
|
|
21957
|
+
finalizers: string[];
|
|
21958
|
+
/**
|
|
21959
|
+
* GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
|
|
21960
|
+
*
|
|
21961
|
+
* If this field is specified and the generated name exists, the server will return a 409.
|
|
21962
|
+
*
|
|
21963
|
+
* Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
|
|
21964
|
+
*/
|
|
21965
|
+
generateName: string;
|
|
21966
|
+
/**
|
|
21967
|
+
* A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
|
|
21968
|
+
*/
|
|
21969
|
+
generation: number;
|
|
21970
|
+
/**
|
|
21971
|
+
* Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
|
|
21972
|
+
*/
|
|
21973
|
+
labels: {[key: string]: string};
|
|
21974
|
+
/**
|
|
21975
|
+
* ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
|
|
21976
|
+
*/
|
|
21977
|
+
managedFields: outputs.meta.v1.ManagedFieldsEntry[];
|
|
21978
|
+
/**
|
|
21979
|
+
* Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21980
|
+
*/
|
|
21981
|
+
name: string;
|
|
21982
|
+
/**
|
|
21983
|
+
* Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
|
|
21984
|
+
*
|
|
21985
|
+
* Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
|
|
21986
|
+
*/
|
|
21987
|
+
namespace: string;
|
|
21988
|
+
/**
|
|
21989
|
+
* List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
|
|
21990
|
+
*/
|
|
21991
|
+
ownerReferences: outputs.meta.v1.OwnerReference[];
|
|
21992
|
+
/**
|
|
21993
|
+
* An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
|
|
21994
|
+
*
|
|
21995
|
+
* Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
|
|
21996
|
+
*/
|
|
21997
|
+
resourceVersion: string;
|
|
21998
|
+
/**
|
|
21999
|
+
* Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
|
|
22000
|
+
*/
|
|
22001
|
+
selfLink: string;
|
|
22002
|
+
/**
|
|
22003
|
+
* UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
|
|
22004
|
+
*
|
|
22005
|
+
* Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
22006
|
+
*/
|
|
22007
|
+
uid: string;
|
|
22008
|
+
}
|
|
22009
|
+
|
|
22010
|
+
/**
|
|
22011
|
+
* ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
|
|
22012
|
+
*/
|
|
22013
|
+
export interface ObjectMetaPatch {
|
|
22014
|
+
/**
|
|
22015
|
+
* Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
|
|
22016
|
+
*/
|
|
22017
|
+
annotations: {[key: string]: string};
|
|
22018
|
+
/**
|
|
22019
|
+
* CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
|
|
22020
|
+
*
|
|
22021
|
+
* Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
22022
|
+
*/
|
|
22023
|
+
creationTimestamp: string;
|
|
22024
|
+
/**
|
|
22025
|
+
* Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
|
|
22026
|
+
*/
|
|
22027
|
+
deletionGracePeriodSeconds: number;
|
|
22028
|
+
/**
|
|
22029
|
+
* DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
|
|
22030
|
+
*
|
|
22031
|
+
* Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
22032
|
+
*/
|
|
22033
|
+
deletionTimestamp: string;
|
|
22034
|
+
/**
|
|
22035
|
+
* Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
|
|
22036
|
+
*/
|
|
22037
|
+
finalizers: string[];
|
|
22038
|
+
/**
|
|
22039
|
+
* GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
|
|
22040
|
+
*
|
|
22041
|
+
* If this field is specified and the generated name exists, the server will return a 409.
|
|
22042
|
+
*
|
|
22043
|
+
* Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
|
|
22044
|
+
*/
|
|
22045
|
+
generateName: string;
|
|
22046
|
+
/**
|
|
22047
|
+
* A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
|
|
22048
|
+
*/
|
|
22049
|
+
generation: number;
|
|
22050
|
+
/**
|
|
22051
|
+
* Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
|
|
22052
|
+
*/
|
|
22053
|
+
labels: {[key: string]: string};
|
|
22054
|
+
/**
|
|
22055
|
+
* ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
|
|
22056
|
+
*/
|
|
22057
|
+
managedFields: outputs.meta.v1.ManagedFieldsEntryPatch[];
|
|
22058
|
+
/**
|
|
22059
|
+
* Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
22060
|
+
*/
|
|
22061
|
+
name: string;
|
|
22062
|
+
/**
|
|
22063
|
+
* Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
|
|
22064
|
+
*
|
|
22065
|
+
* Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
|
|
22066
|
+
*/
|
|
22067
|
+
namespace: string;
|
|
22068
|
+
/**
|
|
22069
|
+
* List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
|
|
22070
|
+
*/
|
|
22071
|
+
ownerReferences: outputs.meta.v1.OwnerReferencePatch[];
|
|
22072
|
+
/**
|
|
22073
|
+
* An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
|
|
22074
|
+
*
|
|
22075
|
+
* Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
|
|
22076
|
+
*/
|
|
22077
|
+
resourceVersion: string;
|
|
22078
|
+
/**
|
|
22079
|
+
* Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
|
|
22080
|
+
*/
|
|
22081
|
+
selfLink: string;
|
|
22082
|
+
/**
|
|
22083
|
+
* UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
|
|
22084
|
+
*
|
|
22085
|
+
* Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
22086
|
+
*/
|
|
22087
|
+
uid: string;
|
|
22088
|
+
}
|
|
22089
|
+
|
|
22090
|
+
/**
|
|
22091
|
+
* OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
|
|
22092
|
+
*/
|
|
22093
|
+
export interface OwnerReference {
|
|
22094
|
+
/**
|
|
22095
|
+
* API version of the referent.
|
|
22096
|
+
*/
|
|
22097
|
+
apiVersion: string;
|
|
22098
|
+
/**
|
|
22099
|
+
* If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
|
|
22100
|
+
*/
|
|
22101
|
+
blockOwnerDeletion: boolean;
|
|
22102
|
+
/**
|
|
22103
|
+
* If true, this reference points to the managing controller.
|
|
22104
|
+
*/
|
|
22105
|
+
controller: boolean;
|
|
22106
|
+
/**
|
|
22107
|
+
* Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
22108
|
+
*/
|
|
22109
|
+
kind: string;
|
|
22110
|
+
/**
|
|
22111
|
+
* Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
22112
|
+
*/
|
|
22113
|
+
name: string;
|
|
22114
|
+
/**
|
|
22115
|
+
* UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
22116
|
+
*/
|
|
22117
|
+
uid: string;
|
|
22118
|
+
}
|
|
22119
|
+
|
|
22120
|
+
/**
|
|
22121
|
+
* OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
|
|
22122
|
+
*/
|
|
22123
|
+
export interface OwnerReferencePatch {
|
|
22124
|
+
/**
|
|
22125
|
+
* API version of the referent.
|
|
22126
|
+
*/
|
|
22127
|
+
apiVersion: string;
|
|
22128
|
+
/**
|
|
22129
|
+
* If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
|
|
22130
|
+
*/
|
|
22131
|
+
blockOwnerDeletion: boolean;
|
|
22132
|
+
/**
|
|
22133
|
+
* If true, this reference points to the managing controller.
|
|
22134
|
+
*/
|
|
22135
|
+
controller: boolean;
|
|
22136
|
+
/**
|
|
22137
|
+
* Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
22138
|
+
*/
|
|
22139
|
+
kind: string;
|
|
22140
|
+
/**
|
|
22141
|
+
* Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
22142
|
+
*/
|
|
22143
|
+
name: string;
|
|
22144
|
+
/**
|
|
22145
|
+
* UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
22146
|
+
*/
|
|
22147
|
+
uid: string;
|
|
22148
|
+
}
|
|
22149
|
+
|
|
21802
22150
|
}
|
|
21803
22151
|
}
|