@highstate/cert-manager 0.9.18 → 0.9.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +3 -52
- package/acme/v1/challenge.ts +2 -4
- package/acme/v1/challengeList.ts +0 -2
- package/acme/v1/challengePatch.ts +2 -4
- package/acme/v1/order.ts +2 -4
- package/acme/v1/orderList.ts +0 -2
- package/acme/v1/orderPatch.ts +2 -4
- package/bin/acme/v1/challenge.d.ts +2 -3
- package/bin/acme/v1/challenge.js.map +1 -1
- package/bin/acme/v1/challengeList.js.map +1 -1
- package/bin/acme/v1/challengePatch.d.ts +2 -3
- package/bin/acme/v1/challengePatch.js.map +1 -1
- package/bin/acme/v1/order.d.ts +2 -3
- package/bin/acme/v1/order.js.map +1 -1
- package/bin/acme/v1/orderList.js.map +1 -1
- package/bin/acme/v1/orderPatch.d.ts +2 -3
- package/bin/acme/v1/orderPatch.js.map +1 -1
- package/bin/cert_manager/v1/certificate.d.ts +2 -3
- package/bin/cert_manager/v1/certificate.js.map +1 -1
- package/bin/cert_manager/v1/certificateList.js.map +1 -1
- package/bin/cert_manager/v1/certificatePatch.d.ts +2 -3
- package/bin/cert_manager/v1/certificatePatch.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequest.d.ts +2 -3
- package/bin/cert_manager/v1/certificateRequest.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequestList.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequestPatch.d.ts +2 -3
- package/bin/cert_manager/v1/certificateRequestPatch.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuer.d.ts +2 -3
- package/bin/cert_manager/v1/clusterIssuer.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuerList.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuerPatch.d.ts +2 -3
- package/bin/cert_manager/v1/clusterIssuerPatch.js.map +1 -1
- package/bin/cert_manager/v1/issuer.d.ts +2 -3
- package/bin/cert_manager/v1/issuer.js.map +1 -1
- package/bin/cert_manager/v1/issuerList.js.map +1 -1
- package/bin/cert_manager/v1/issuerPatch.d.ts +2 -3
- package/bin/cert_manager/v1/issuerPatch.js.map +1 -1
- package/bin/package.json +9 -8
- package/bin/types/input.d.ts +423 -72
- package/bin/types/output.d.ts +424 -73
- package/cert_manager/v1/certificate.ts +2 -4
- package/cert_manager/v1/certificateList.ts +0 -2
- package/cert_manager/v1/certificatePatch.ts +2 -4
- package/cert_manager/v1/certificateRequest.ts +2 -4
- package/cert_manager/v1/certificateRequestList.ts +0 -2
- package/cert_manager/v1/certificateRequestPatch.ts +2 -4
- package/cert_manager/v1/clusterIssuer.ts +2 -4
- package/cert_manager/v1/clusterIssuerList.ts +0 -2
- package/cert_manager/v1/clusterIssuerPatch.ts +2 -4
- package/cert_manager/v1/issuer.ts +2 -4
- package/cert_manager/v1/issuerList.ts +0 -2
- package/cert_manager/v1/issuerPatch.ts +2 -4
- package/package.json +10 -9
- package/tsconfig.json +44 -43
- package/types/input.ts +421 -73
- package/types/output.ts +422 -74
- package/bin/meta/v1.d.ts +0 -3
- package/bin/meta/v1.js +0 -3
- package/bin/meta/v1.js.map +0 -1
package/bin/types/output.d.ts
CHANGED
|
@@ -1,5 +1,4 @@
|
|
|
1
1
|
import * as outputs from "../types/output";
|
|
2
|
-
import { ObjectMeta } from "../meta/v1";
|
|
3
2
|
export declare namespace acme {
|
|
4
3
|
namespace v1 {
|
|
5
4
|
/**
|
|
@@ -17,7 +16,7 @@ export declare namespace acme {
|
|
|
17
16
|
/**
|
|
18
17
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
19
18
|
*/
|
|
20
|
-
metadata: ObjectMeta;
|
|
19
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
21
20
|
spec: outputs.acme.v1.ChallengeSpec;
|
|
22
21
|
status: outputs.acme.v1.ChallengeStatus;
|
|
23
22
|
}
|
|
@@ -28,9 +27,9 @@ export declare namespace acme {
|
|
|
28
27
|
*/
|
|
29
28
|
authorizationURL: string;
|
|
30
29
|
/**
|
|
31
|
-
* dnsName is the identifier that this challenge is for, e.g
|
|
30
|
+
* dnsName is the identifier that this challenge is for, e.g., example.com.
|
|
32
31
|
* If the requested DNSName is a 'wildcard', this field MUST be set to the
|
|
33
|
-
* non-wildcard domain, e.g
|
|
32
|
+
* non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
|
|
34
33
|
*/
|
|
35
34
|
dnsName: string;
|
|
36
35
|
issuerRef: outputs.acme.v1.ChallengeSpecIssuerRef;
|
|
@@ -115,9 +114,9 @@ export declare namespace acme {
|
|
|
115
114
|
*/
|
|
116
115
|
authorizationURL: string;
|
|
117
116
|
/**
|
|
118
|
-
* dnsName is the identifier that this challenge is for, e.g
|
|
117
|
+
* dnsName is the identifier that this challenge is for, e.g., example.com.
|
|
119
118
|
* If the requested DNSName is a 'wildcard', this field MUST be set to the
|
|
120
|
-
* non-wildcard domain, e.g
|
|
119
|
+
* non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
|
|
121
120
|
*/
|
|
122
121
|
dnsName: string;
|
|
123
122
|
issuerRef: outputs.acme.v1.ChallengeSpecIssuerRefPatch;
|
|
@@ -430,16 +429,16 @@ export declare namespace acme {
|
|
|
430
429
|
*/
|
|
431
430
|
interface ChallengeSpecSolverDns01AzureDNSManagedIdentity {
|
|
432
431
|
/**
|
|
433
|
-
* client ID of the managed identity,
|
|
432
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
434
433
|
*/
|
|
435
434
|
clientID: string;
|
|
436
435
|
/**
|
|
437
|
-
* resource ID of the managed identity,
|
|
436
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
438
437
|
* Cannot be used for Azure Managed Service Identity
|
|
439
438
|
*/
|
|
440
439
|
resourceID: string;
|
|
441
440
|
/**
|
|
442
|
-
* tenant ID of the managed identity,
|
|
441
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
443
442
|
*/
|
|
444
443
|
tenantID: string;
|
|
445
444
|
}
|
|
@@ -450,16 +449,16 @@ export declare namespace acme {
|
|
|
450
449
|
*/
|
|
451
450
|
interface ChallengeSpecSolverDns01AzureDNSManagedIdentityPatch {
|
|
452
451
|
/**
|
|
453
|
-
* client ID of the managed identity,
|
|
452
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
454
453
|
*/
|
|
455
454
|
clientID: string;
|
|
456
455
|
/**
|
|
457
|
-
* resource ID of the managed identity,
|
|
456
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
458
457
|
* Cannot be used for Azure Managed Service Identity
|
|
459
458
|
*/
|
|
460
459
|
resourceID: string;
|
|
461
460
|
/**
|
|
462
|
-
* tenant ID of the managed identity,
|
|
461
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
463
462
|
*/
|
|
464
463
|
tenantID: string;
|
|
465
464
|
}
|
|
@@ -1052,7 +1051,7 @@ export declare namespace acme {
|
|
|
1052
1051
|
* when challenges are processed.
|
|
1053
1052
|
* This can contain arbitrary JSON data.
|
|
1054
1053
|
* Secret values should not be specified in this stanza.
|
|
1055
|
-
* If secret values are needed (e.g
|
|
1054
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
1056
1055
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
1057
1056
|
* For details on the schema of this field, consult the webhook provider
|
|
1058
1057
|
* implementation's documentation.
|
|
@@ -1070,7 +1069,7 @@ export declare namespace acme {
|
|
|
1070
1069
|
/**
|
|
1071
1070
|
* The name of the solver to use, as defined in the webhook provider
|
|
1072
1071
|
* implementation.
|
|
1073
|
-
* This will typically be the name of the provider, e.g
|
|
1072
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
1074
1073
|
*/
|
|
1075
1074
|
solverName: string;
|
|
1076
1075
|
}
|
|
@@ -1084,7 +1083,7 @@ export declare namespace acme {
|
|
|
1084
1083
|
* when challenges are processed.
|
|
1085
1084
|
* This can contain arbitrary JSON data.
|
|
1086
1085
|
* Secret values should not be specified in this stanza.
|
|
1087
|
-
* If secret values are needed (e.g
|
|
1086
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
1088
1087
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
1089
1088
|
* For details on the schema of this field, consult the webhook provider
|
|
1090
1089
|
* implementation's documentation.
|
|
@@ -1102,7 +1101,7 @@ export declare namespace acme {
|
|
|
1102
1101
|
/**
|
|
1103
1102
|
* The name of the solver to use, as defined in the webhook provider
|
|
1104
1103
|
* implementation.
|
|
1105
|
-
* This will typically be the name of the provider, e.g
|
|
1104
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
1106
1105
|
*/
|
|
1107
1106
|
solverName: string;
|
|
1108
1107
|
}
|
|
@@ -1110,7 +1109,7 @@ export declare namespace acme {
|
|
|
1110
1109
|
* Configures cert-manager to attempt to complete authorizations by
|
|
1111
1110
|
* performing the HTTP01 challenge flow.
|
|
1112
1111
|
* It is not possible to obtain certificates for wildcard domain names
|
|
1113
|
-
* (e.g
|
|
1112
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
1114
1113
|
*/
|
|
1115
1114
|
interface ChallengeSpecSolverHttp01 {
|
|
1116
1115
|
gatewayHTTPRoute: outputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoute;
|
|
@@ -5624,7 +5623,7 @@ export declare namespace acme {
|
|
|
5624
5623
|
* Configures cert-manager to attempt to complete authorizations by
|
|
5625
5624
|
* performing the HTTP01 challenge flow.
|
|
5626
5625
|
* It is not possible to obtain certificates for wildcard domain names
|
|
5627
|
-
* (e.g
|
|
5626
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
5628
5627
|
*/
|
|
5629
5628
|
interface ChallengeSpecSolverHttp01Patch {
|
|
5630
5629
|
gatewayHTTPRoute: outputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoutePatch;
|
|
@@ -5790,7 +5789,7 @@ export declare namespace acme {
|
|
|
5790
5789
|
/**
|
|
5791
5790
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
5792
5791
|
*/
|
|
5793
|
-
metadata: ObjectMeta;
|
|
5792
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
5794
5793
|
spec: outputs.acme.v1.OrderSpec;
|
|
5795
5794
|
status: outputs.acme.v1.OrderStatus;
|
|
5796
5795
|
}
|
|
@@ -5819,6 +5818,11 @@ export declare namespace acme {
|
|
|
5819
5818
|
*/
|
|
5820
5819
|
ipAddresses: string[];
|
|
5821
5820
|
issuerRef: outputs.acme.v1.OrderSpecIssuerRef;
|
|
5821
|
+
/**
|
|
5822
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
5823
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
5824
|
+
*/
|
|
5825
|
+
profile: string;
|
|
5822
5826
|
/**
|
|
5823
5827
|
* Certificate signing request bytes in DER encoding.
|
|
5824
5828
|
* This will be used when finalizing the order.
|
|
@@ -5893,6 +5897,11 @@ export declare namespace acme {
|
|
|
5893
5897
|
*/
|
|
5894
5898
|
ipAddresses: string[];
|
|
5895
5899
|
issuerRef: outputs.acme.v1.OrderSpecIssuerRefPatch;
|
|
5900
|
+
/**
|
|
5901
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
5902
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
5903
|
+
*/
|
|
5904
|
+
profile: string;
|
|
5896
5905
|
/**
|
|
5897
5906
|
* Certificate signing request bytes in DER encoding.
|
|
5898
5907
|
* This will be used when finalizing the order.
|
|
@@ -5995,7 +6004,7 @@ export declare namespace acme {
|
|
|
5995
6004
|
*/
|
|
5996
6005
|
token: string;
|
|
5997
6006
|
/**
|
|
5998
|
-
* Type is the type of challenge being offered, e.g
|
|
6007
|
+
* Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
|
|
5999
6008
|
* 'tls-sni-01', etc.
|
|
6000
6009
|
* This is the raw value retrieved from the ACME server.
|
|
6001
6010
|
* Only 'http-01' and 'dns-01' are supported by cert-manager, other values
|
|
@@ -6020,7 +6029,7 @@ export declare namespace acme {
|
|
|
6020
6029
|
*/
|
|
6021
6030
|
token: string;
|
|
6022
6031
|
/**
|
|
6023
|
-
* Type is the type of challenge being offered, e.g
|
|
6032
|
+
* Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
|
|
6024
6033
|
* 'tls-sni-01', etc.
|
|
6025
6034
|
* This is the raw value retrieved from the ACME server.
|
|
6026
6035
|
* Only 'http-01' and 'dns-01' are supported by cert-manager, other values
|
|
@@ -6138,7 +6147,7 @@ export declare namespace cert_manager {
|
|
|
6138
6147
|
/**
|
|
6139
6148
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
6140
6149
|
*/
|
|
6141
|
-
metadata: ObjectMeta;
|
|
6150
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
6142
6151
|
spec: outputs.cert_manager.v1.CertificateSpec;
|
|
6143
6152
|
status: outputs.cert_manager.v1.CertificateStatus;
|
|
6144
6153
|
}
|
|
@@ -6165,7 +6174,7 @@ export declare namespace cert_manager {
|
|
|
6165
6174
|
/**
|
|
6166
6175
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
6167
6176
|
*/
|
|
6168
|
-
metadata: ObjectMeta;
|
|
6177
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
6169
6178
|
spec: outputs.cert_manager.v1.CertificateRequestSpec;
|
|
6170
6179
|
status: outputs.cert_manager.v1.CertificateRequestStatus;
|
|
6171
6180
|
}
|
|
@@ -6483,10 +6492,6 @@ export declare namespace cert_manager {
|
|
|
6483
6492
|
/**
|
|
6484
6493
|
* Defines extra output formats of the private key and signed certificate chain
|
|
6485
6494
|
* to be written to this Certificate's target Secret.
|
|
6486
|
-
*
|
|
6487
|
-
* This is a Beta Feature enabled by default. It can be disabled with the
|
|
6488
|
-
* `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
|
|
6489
|
-
* the controller and webhook components.
|
|
6490
6495
|
*/
|
|
6491
6496
|
additionalOutputFormats: outputs.cert_manager.v1.CertificateSpecAdditionalOutputFormats[];
|
|
6492
6497
|
/**
|
|
@@ -6604,8 +6609,7 @@ export declare namespace cert_manager {
|
|
|
6604
6609
|
* revisions exceeds this number.
|
|
6605
6610
|
*
|
|
6606
6611
|
* If set, revisionHistoryLimit must be a value of `1` or greater.
|
|
6607
|
-
*
|
|
6608
|
-
* Default value is `nil`.
|
|
6612
|
+
* Default value is `1`.
|
|
6609
6613
|
*/
|
|
6610
6614
|
revisionHistoryLimit: number;
|
|
6611
6615
|
/**
|
|
@@ -6616,6 +6620,13 @@ export declare namespace cert_manager {
|
|
|
6616
6620
|
*/
|
|
6617
6621
|
secretName: string;
|
|
6618
6622
|
secretTemplate: outputs.cert_manager.v1.CertificateSpecSecretTemplate;
|
|
6623
|
+
/**
|
|
6624
|
+
* Signature algorithm to use.
|
|
6625
|
+
* Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
|
|
6626
|
+
* Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
|
|
6627
|
+
* Allowed values for Ed25519 keys: PureEd25519.
|
|
6628
|
+
*/
|
|
6629
|
+
signatureAlgorithm: string;
|
|
6619
6630
|
subject: outputs.cert_manager.v1.CertificateSpecSubject;
|
|
6620
6631
|
/**
|
|
6621
6632
|
* Requested URI subject alternative names.
|
|
@@ -6843,7 +6854,7 @@ export declare namespace cert_manager {
|
|
|
6843
6854
|
* `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
|
|
6844
6855
|
* `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
|
|
6845
6856
|
* `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
|
|
6846
|
-
* (
|
|
6857
|
+
* (e.g., because of company policy). Please note that the security of the algorithm is not that important
|
|
6847
6858
|
* in reality, because the unencrypted certificate and private key are also stored in the Secret.
|
|
6848
6859
|
*/
|
|
6849
6860
|
profile: string;
|
|
@@ -6918,7 +6929,7 @@ export declare namespace cert_manager {
|
|
|
6918
6929
|
* `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
|
|
6919
6930
|
* `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
|
|
6920
6931
|
* `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
|
|
6921
|
-
* (
|
|
6932
|
+
* (e.g., because of company policy). Please note that the security of the algorithm is not that important
|
|
6922
6933
|
* in reality, because the unencrypted certificate and private key are also stored in the Secret.
|
|
6923
6934
|
*/
|
|
6924
6935
|
profile: string;
|
|
@@ -7081,10 +7092,6 @@ export declare namespace cert_manager {
|
|
|
7081
7092
|
/**
|
|
7082
7093
|
* Defines extra output formats of the private key and signed certificate chain
|
|
7083
7094
|
* to be written to this Certificate's target Secret.
|
|
7084
|
-
*
|
|
7085
|
-
* This is a Beta Feature enabled by default. It can be disabled with the
|
|
7086
|
-
* `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
|
|
7087
|
-
* the controller and webhook components.
|
|
7088
7095
|
*/
|
|
7089
7096
|
additionalOutputFormats: outputs.cert_manager.v1.CertificateSpecAdditionalOutputFormatsPatch[];
|
|
7090
7097
|
/**
|
|
@@ -7202,8 +7209,7 @@ export declare namespace cert_manager {
|
|
|
7202
7209
|
* revisions exceeds this number.
|
|
7203
7210
|
*
|
|
7204
7211
|
* If set, revisionHistoryLimit must be a value of `1` or greater.
|
|
7205
|
-
*
|
|
7206
|
-
* Default value is `nil`.
|
|
7212
|
+
* Default value is `1`.
|
|
7207
7213
|
*/
|
|
7208
7214
|
revisionHistoryLimit: number;
|
|
7209
7215
|
/**
|
|
@@ -7214,6 +7220,13 @@ export declare namespace cert_manager {
|
|
|
7214
7220
|
*/
|
|
7215
7221
|
secretName: string;
|
|
7216
7222
|
secretTemplate: outputs.cert_manager.v1.CertificateSpecSecretTemplatePatch;
|
|
7223
|
+
/**
|
|
7224
|
+
* Signature algorithm to use.
|
|
7225
|
+
* Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
|
|
7226
|
+
* Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
|
|
7227
|
+
* Allowed values for Ed25519 keys: PureEd25519.
|
|
7228
|
+
*/
|
|
7229
|
+
signatureAlgorithm: string;
|
|
7217
7230
|
subject: outputs.cert_manager.v1.CertificateSpecSubjectPatch;
|
|
7218
7231
|
/**
|
|
7219
7232
|
* Requested URI subject alternative names.
|
|
@@ -7264,7 +7277,11 @@ export declare namespace cert_manager {
|
|
|
7264
7277
|
* to await user intervention.
|
|
7265
7278
|
* If set to `Always`, a private key matching the specified requirements
|
|
7266
7279
|
* will be generated whenever a re-issuance occurs.
|
|
7267
|
-
* Default is `
|
|
7280
|
+
* Default is `Always`.
|
|
7281
|
+
* The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
|
|
7282
|
+
* The new default can be disabled by setting the
|
|
7283
|
+
* `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
|
|
7284
|
+
* the controller component.
|
|
7268
7285
|
*/
|
|
7269
7286
|
rotationPolicy: string;
|
|
7270
7287
|
/**
|
|
@@ -7314,7 +7331,11 @@ export declare namespace cert_manager {
|
|
|
7314
7331
|
* to await user intervention.
|
|
7315
7332
|
* If set to `Always`, a private key matching the specified requirements
|
|
7316
7333
|
* will be generated whenever a re-issuance occurs.
|
|
7317
|
-
* Default is `
|
|
7334
|
+
* Default is `Always`.
|
|
7335
|
+
* The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
|
|
7336
|
+
* The new default can be disabled by setting the
|
|
7337
|
+
* `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
|
|
7338
|
+
* the controller component.
|
|
7318
7339
|
*/
|
|
7319
7340
|
rotationPolicy: string;
|
|
7320
7341
|
/**
|
|
@@ -7686,7 +7707,7 @@ export declare namespace cert_manager {
|
|
|
7686
7707
|
/**
|
|
7687
7708
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
7688
7709
|
*/
|
|
7689
|
-
metadata: ObjectMeta;
|
|
7710
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
7690
7711
|
spec: outputs.cert_manager.v1.ClusterIssuerSpec;
|
|
7691
7712
|
status: outputs.cert_manager.v1.ClusterIssuerStatus;
|
|
7692
7713
|
}
|
|
@@ -7744,7 +7765,7 @@ export declare namespace cert_manager {
|
|
|
7744
7765
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
7745
7766
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
7746
7767
|
* endpoint.
|
|
7747
|
-
* For example, for Let's Encrypt's DST
|
|
7768
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
7748
7769
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
7749
7770
|
* This value picks the first certificate bundle in the combined set of
|
|
7750
7771
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -7752,6 +7773,11 @@ export declare namespace cert_manager {
|
|
|
7752
7773
|
*/
|
|
7753
7774
|
preferredChain: string;
|
|
7754
7775
|
privateKeySecretRef: outputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRef;
|
|
7776
|
+
/**
|
|
7777
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
7778
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
7779
|
+
*/
|
|
7780
|
+
profile: string;
|
|
7755
7781
|
/**
|
|
7756
7782
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
7757
7783
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -7906,7 +7932,7 @@ export declare namespace cert_manager {
|
|
|
7906
7932
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
7907
7933
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
7908
7934
|
* endpoint.
|
|
7909
|
-
* For example, for Let's Encrypt's DST
|
|
7935
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
7910
7936
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
7911
7937
|
* This value picks the first certificate bundle in the combined set of
|
|
7912
7938
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -7914,6 +7940,11 @@ export declare namespace cert_manager {
|
|
|
7914
7940
|
*/
|
|
7915
7941
|
preferredChain: string;
|
|
7916
7942
|
privateKeySecretRef: outputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRefPatch;
|
|
7943
|
+
/**
|
|
7944
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
7945
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
7946
|
+
*/
|
|
7947
|
+
profile: string;
|
|
7917
7948
|
/**
|
|
7918
7949
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
7919
7950
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -8260,16 +8291,16 @@ export declare namespace cert_manager {
|
|
|
8260
8291
|
*/
|
|
8261
8292
|
interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
|
|
8262
8293
|
/**
|
|
8263
|
-
* client ID of the managed identity,
|
|
8294
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
8264
8295
|
*/
|
|
8265
8296
|
clientID: string;
|
|
8266
8297
|
/**
|
|
8267
|
-
* resource ID of the managed identity,
|
|
8298
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
8268
8299
|
* Cannot be used for Azure Managed Service Identity
|
|
8269
8300
|
*/
|
|
8270
8301
|
resourceID: string;
|
|
8271
8302
|
/**
|
|
8272
|
-
* tenant ID of the managed identity,
|
|
8303
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
8273
8304
|
*/
|
|
8274
8305
|
tenantID: string;
|
|
8275
8306
|
}
|
|
@@ -8280,16 +8311,16 @@ export declare namespace cert_manager {
|
|
|
8280
8311
|
*/
|
|
8281
8312
|
interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
|
|
8282
8313
|
/**
|
|
8283
|
-
* client ID of the managed identity,
|
|
8314
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
8284
8315
|
*/
|
|
8285
8316
|
clientID: string;
|
|
8286
8317
|
/**
|
|
8287
|
-
* resource ID of the managed identity,
|
|
8318
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
8288
8319
|
* Cannot be used for Azure Managed Service Identity
|
|
8289
8320
|
*/
|
|
8290
8321
|
resourceID: string;
|
|
8291
8322
|
/**
|
|
8292
|
-
* tenant ID of the managed identity,
|
|
8323
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
8293
8324
|
*/
|
|
8294
8325
|
tenantID: string;
|
|
8295
8326
|
}
|
|
@@ -8882,7 +8913,7 @@ export declare namespace cert_manager {
|
|
|
8882
8913
|
* when challenges are processed.
|
|
8883
8914
|
* This can contain arbitrary JSON data.
|
|
8884
8915
|
* Secret values should not be specified in this stanza.
|
|
8885
|
-
* If secret values are needed (e.g
|
|
8916
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
8886
8917
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
8887
8918
|
* For details on the schema of this field, consult the webhook provider
|
|
8888
8919
|
* implementation's documentation.
|
|
@@ -8900,7 +8931,7 @@ export declare namespace cert_manager {
|
|
|
8900
8931
|
/**
|
|
8901
8932
|
* The name of the solver to use, as defined in the webhook provider
|
|
8902
8933
|
* implementation.
|
|
8903
|
-
* This will typically be the name of the provider, e.g
|
|
8934
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
8904
8935
|
*/
|
|
8905
8936
|
solverName: string;
|
|
8906
8937
|
}
|
|
@@ -8914,7 +8945,7 @@ export declare namespace cert_manager {
|
|
|
8914
8945
|
* when challenges are processed.
|
|
8915
8946
|
* This can contain arbitrary JSON data.
|
|
8916
8947
|
* Secret values should not be specified in this stanza.
|
|
8917
|
-
* If secret values are needed (e.g
|
|
8948
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
8918
8949
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
8919
8950
|
* For details on the schema of this field, consult the webhook provider
|
|
8920
8951
|
* implementation's documentation.
|
|
@@ -8932,7 +8963,7 @@ export declare namespace cert_manager {
|
|
|
8932
8963
|
/**
|
|
8933
8964
|
* The name of the solver to use, as defined in the webhook provider
|
|
8934
8965
|
* implementation.
|
|
8935
|
-
* This will typically be the name of the provider, e.g
|
|
8966
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
8936
8967
|
*/
|
|
8937
8968
|
solverName: string;
|
|
8938
8969
|
}
|
|
@@ -8940,7 +8971,7 @@ export declare namespace cert_manager {
|
|
|
8940
8971
|
* Configures cert-manager to attempt to complete authorizations by
|
|
8941
8972
|
* performing the HTTP01 challenge flow.
|
|
8942
8973
|
* It is not possible to obtain certificates for wildcard domain names
|
|
8943
|
-
* (e.g
|
|
8974
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
8944
8975
|
*/
|
|
8945
8976
|
interface ClusterIssuerSpecAcmeSolversHttp01 {
|
|
8946
8977
|
gatewayHTTPRoute: outputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoute;
|
|
@@ -13454,7 +13485,7 @@ export declare namespace cert_manager {
|
|
|
13454
13485
|
* Configures cert-manager to attempt to complete authorizations by
|
|
13455
13486
|
* performing the HTTP01 challenge flow.
|
|
13456
13487
|
* It is not possible to obtain certificates for wildcard domain names
|
|
13457
|
-
* (e.g
|
|
13488
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
13458
13489
|
*/
|
|
13459
13490
|
interface ClusterIssuerSpecAcmeSolversHttp01Patch {
|
|
13460
13491
|
gatewayHTTPRoute: outputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch;
|
|
@@ -13676,6 +13707,11 @@ export declare namespace cert_manager {
|
|
|
13676
13707
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
13677
13708
|
*/
|
|
13678
13709
|
server: string;
|
|
13710
|
+
/**
|
|
13711
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
13712
|
+
* by the Vault server.
|
|
13713
|
+
*/
|
|
13714
|
+
serverName: string;
|
|
13679
13715
|
}
|
|
13680
13716
|
/**
|
|
13681
13717
|
* Auth configures how cert-manager authenticates with the Vault server.
|
|
@@ -14103,6 +14139,11 @@ export declare namespace cert_manager {
|
|
|
14103
14139
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
14104
14140
|
*/
|
|
14105
14141
|
server: string;
|
|
14142
|
+
/**
|
|
14143
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
14144
|
+
* by the Vault server.
|
|
14145
|
+
*/
|
|
14146
|
+
serverName: string;
|
|
14106
14147
|
}
|
|
14107
14148
|
/**
|
|
14108
14149
|
* Venafi configures this issuer to sign certificates using a Venafi TPP
|
|
@@ -14127,7 +14168,7 @@ export declare namespace cert_manager {
|
|
|
14127
14168
|
apiTokenSecretRef: outputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRef;
|
|
14128
14169
|
/**
|
|
14129
14170
|
* URL is the base URL for Venafi Cloud.
|
|
14130
|
-
* Defaults to "https://api.venafi.cloud/
|
|
14171
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
14131
14172
|
*/
|
|
14132
14173
|
url: string;
|
|
14133
14174
|
}
|
|
@@ -14171,7 +14212,7 @@ export declare namespace cert_manager {
|
|
|
14171
14212
|
apiTokenSecretRef: outputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRefPatch;
|
|
14172
14213
|
/**
|
|
14173
14214
|
* URL is the base URL for Venafi Cloud.
|
|
14174
|
-
* Defaults to "https://api.venafi.cloud/
|
|
14215
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
14175
14216
|
*/
|
|
14176
14217
|
url: string;
|
|
14177
14218
|
}
|
|
@@ -14454,7 +14495,7 @@ export declare namespace cert_manager {
|
|
|
14454
14495
|
/**
|
|
14455
14496
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
14456
14497
|
*/
|
|
14457
|
-
metadata: ObjectMeta;
|
|
14498
|
+
metadata: outputs.meta.v1.ObjectMeta;
|
|
14458
14499
|
spec: outputs.cert_manager.v1.IssuerSpec;
|
|
14459
14500
|
status: outputs.cert_manager.v1.IssuerStatus;
|
|
14460
14501
|
}
|
|
@@ -14512,7 +14553,7 @@ export declare namespace cert_manager {
|
|
|
14512
14553
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
14513
14554
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
14514
14555
|
* endpoint.
|
|
14515
|
-
* For example, for Let's Encrypt's DST
|
|
14556
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
14516
14557
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
14517
14558
|
* This value picks the first certificate bundle in the combined set of
|
|
14518
14559
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -14520,6 +14561,11 @@ export declare namespace cert_manager {
|
|
|
14520
14561
|
*/
|
|
14521
14562
|
preferredChain: string;
|
|
14522
14563
|
privateKeySecretRef: outputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRef;
|
|
14564
|
+
/**
|
|
14565
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
14566
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
14567
|
+
*/
|
|
14568
|
+
profile: string;
|
|
14523
14569
|
/**
|
|
14524
14570
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
14525
14571
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -14674,7 +14720,7 @@ export declare namespace cert_manager {
|
|
|
14674
14720
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
14675
14721
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
14676
14722
|
* endpoint.
|
|
14677
|
-
* For example, for Let's Encrypt's DST
|
|
14723
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
14678
14724
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
14679
14725
|
* This value picks the first certificate bundle in the combined set of
|
|
14680
14726
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -14682,6 +14728,11 @@ export declare namespace cert_manager {
|
|
|
14682
14728
|
*/
|
|
14683
14729
|
preferredChain: string;
|
|
14684
14730
|
privateKeySecretRef: outputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRefPatch;
|
|
14731
|
+
/**
|
|
14732
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
14733
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
14734
|
+
*/
|
|
14735
|
+
profile: string;
|
|
14685
14736
|
/**
|
|
14686
14737
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
14687
14738
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -15028,16 +15079,16 @@ export declare namespace cert_manager {
|
|
|
15028
15079
|
*/
|
|
15029
15080
|
interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
|
|
15030
15081
|
/**
|
|
15031
|
-
* client ID of the managed identity,
|
|
15082
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
15032
15083
|
*/
|
|
15033
15084
|
clientID: string;
|
|
15034
15085
|
/**
|
|
15035
|
-
* resource ID of the managed identity,
|
|
15086
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
15036
15087
|
* Cannot be used for Azure Managed Service Identity
|
|
15037
15088
|
*/
|
|
15038
15089
|
resourceID: string;
|
|
15039
15090
|
/**
|
|
15040
|
-
* tenant ID of the managed identity,
|
|
15091
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
15041
15092
|
*/
|
|
15042
15093
|
tenantID: string;
|
|
15043
15094
|
}
|
|
@@ -15048,16 +15099,16 @@ export declare namespace cert_manager {
|
|
|
15048
15099
|
*/
|
|
15049
15100
|
interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
|
|
15050
15101
|
/**
|
|
15051
|
-
* client ID of the managed identity,
|
|
15102
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
15052
15103
|
*/
|
|
15053
15104
|
clientID: string;
|
|
15054
15105
|
/**
|
|
15055
|
-
* resource ID of the managed identity,
|
|
15106
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
15056
15107
|
* Cannot be used for Azure Managed Service Identity
|
|
15057
15108
|
*/
|
|
15058
15109
|
resourceID: string;
|
|
15059
15110
|
/**
|
|
15060
|
-
* tenant ID of the managed identity,
|
|
15111
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
15061
15112
|
*/
|
|
15062
15113
|
tenantID: string;
|
|
15063
15114
|
}
|
|
@@ -15650,7 +15701,7 @@ export declare namespace cert_manager {
|
|
|
15650
15701
|
* when challenges are processed.
|
|
15651
15702
|
* This can contain arbitrary JSON data.
|
|
15652
15703
|
* Secret values should not be specified in this stanza.
|
|
15653
|
-
* If secret values are needed (e.g
|
|
15704
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
15654
15705
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
15655
15706
|
* For details on the schema of this field, consult the webhook provider
|
|
15656
15707
|
* implementation's documentation.
|
|
@@ -15668,7 +15719,7 @@ export declare namespace cert_manager {
|
|
|
15668
15719
|
/**
|
|
15669
15720
|
* The name of the solver to use, as defined in the webhook provider
|
|
15670
15721
|
* implementation.
|
|
15671
|
-
* This will typically be the name of the provider, e.g
|
|
15722
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
15672
15723
|
*/
|
|
15673
15724
|
solverName: string;
|
|
15674
15725
|
}
|
|
@@ -15682,7 +15733,7 @@ export declare namespace cert_manager {
|
|
|
15682
15733
|
* when challenges are processed.
|
|
15683
15734
|
* This can contain arbitrary JSON data.
|
|
15684
15735
|
* Secret values should not be specified in this stanza.
|
|
15685
|
-
* If secret values are needed (e.g
|
|
15736
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
15686
15737
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
15687
15738
|
* For details on the schema of this field, consult the webhook provider
|
|
15688
15739
|
* implementation's documentation.
|
|
@@ -15700,7 +15751,7 @@ export declare namespace cert_manager {
|
|
|
15700
15751
|
/**
|
|
15701
15752
|
* The name of the solver to use, as defined in the webhook provider
|
|
15702
15753
|
* implementation.
|
|
15703
|
-
* This will typically be the name of the provider, e.g
|
|
15754
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
15704
15755
|
*/
|
|
15705
15756
|
solverName: string;
|
|
15706
15757
|
}
|
|
@@ -15708,7 +15759,7 @@ export declare namespace cert_manager {
|
|
|
15708
15759
|
* Configures cert-manager to attempt to complete authorizations by
|
|
15709
15760
|
* performing the HTTP01 challenge flow.
|
|
15710
15761
|
* It is not possible to obtain certificates for wildcard domain names
|
|
15711
|
-
* (e.g
|
|
15762
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
15712
15763
|
*/
|
|
15713
15764
|
interface IssuerSpecAcmeSolversHttp01 {
|
|
15714
15765
|
gatewayHTTPRoute: outputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoute;
|
|
@@ -20222,7 +20273,7 @@ export declare namespace cert_manager {
|
|
|
20222
20273
|
* Configures cert-manager to attempt to complete authorizations by
|
|
20223
20274
|
* performing the HTTP01 challenge flow.
|
|
20224
20275
|
* It is not possible to obtain certificates for wildcard domain names
|
|
20225
|
-
* (e.g
|
|
20276
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
20226
20277
|
*/
|
|
20227
20278
|
interface IssuerSpecAcmeSolversHttp01Patch {
|
|
20228
20279
|
gatewayHTTPRoute: outputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch;
|
|
@@ -20444,6 +20495,11 @@ export declare namespace cert_manager {
|
|
|
20444
20495
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
20445
20496
|
*/
|
|
20446
20497
|
server: string;
|
|
20498
|
+
/**
|
|
20499
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
20500
|
+
* by the Vault server.
|
|
20501
|
+
*/
|
|
20502
|
+
serverName: string;
|
|
20447
20503
|
}
|
|
20448
20504
|
/**
|
|
20449
20505
|
* Auth configures how cert-manager authenticates with the Vault server.
|
|
@@ -20871,6 +20927,11 @@ export declare namespace cert_manager {
|
|
|
20871
20927
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
20872
20928
|
*/
|
|
20873
20929
|
server: string;
|
|
20930
|
+
/**
|
|
20931
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
20932
|
+
* by the Vault server.
|
|
20933
|
+
*/
|
|
20934
|
+
serverName: string;
|
|
20874
20935
|
}
|
|
20875
20936
|
/**
|
|
20876
20937
|
* Venafi configures this issuer to sign certificates using a Venafi TPP
|
|
@@ -20895,7 +20956,7 @@ export declare namespace cert_manager {
|
|
|
20895
20956
|
apiTokenSecretRef: outputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRef;
|
|
20896
20957
|
/**
|
|
20897
20958
|
* URL is the base URL for Venafi Cloud.
|
|
20898
|
-
* Defaults to "https://api.venafi.cloud/
|
|
20959
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
20899
20960
|
*/
|
|
20900
20961
|
url: string;
|
|
20901
20962
|
}
|
|
@@ -20939,7 +21000,7 @@ export declare namespace cert_manager {
|
|
|
20939
21000
|
apiTokenSecretRef: outputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRefPatch;
|
|
20940
21001
|
/**
|
|
20941
21002
|
* URL is the base URL for Venafi Cloud.
|
|
20942
|
-
* Defaults to "https://api.venafi.cloud/
|
|
21003
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
20943
21004
|
*/
|
|
20944
21005
|
url: string;
|
|
20945
21006
|
}
|
|
@@ -21229,5 +21290,295 @@ export declare namespace meta {
|
|
|
21229
21290
|
*/
|
|
21230
21291
|
selfLink: string;
|
|
21231
21292
|
}
|
|
21293
|
+
/**
|
|
21294
|
+
* ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
|
|
21295
|
+
*/
|
|
21296
|
+
interface ManagedFieldsEntry {
|
|
21297
|
+
/**
|
|
21298
|
+
* APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
|
|
21299
|
+
*/
|
|
21300
|
+
apiVersion: string;
|
|
21301
|
+
/**
|
|
21302
|
+
* FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
|
|
21303
|
+
*/
|
|
21304
|
+
fieldsType: string;
|
|
21305
|
+
/**
|
|
21306
|
+
* FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
|
|
21307
|
+
*/
|
|
21308
|
+
fieldsV1: any;
|
|
21309
|
+
/**
|
|
21310
|
+
* Manager is an identifier of the workflow managing these fields.
|
|
21311
|
+
*/
|
|
21312
|
+
manager: string;
|
|
21313
|
+
/**
|
|
21314
|
+
* Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
|
|
21315
|
+
*/
|
|
21316
|
+
operation: string;
|
|
21317
|
+
/**
|
|
21318
|
+
* Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
|
|
21319
|
+
*/
|
|
21320
|
+
subresource: string;
|
|
21321
|
+
/**
|
|
21322
|
+
* Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
|
|
21323
|
+
*/
|
|
21324
|
+
time: string;
|
|
21325
|
+
}
|
|
21326
|
+
/**
|
|
21327
|
+
* ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
|
|
21328
|
+
*/
|
|
21329
|
+
interface ManagedFieldsEntryPatch {
|
|
21330
|
+
/**
|
|
21331
|
+
* APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
|
|
21332
|
+
*/
|
|
21333
|
+
apiVersion: string;
|
|
21334
|
+
/**
|
|
21335
|
+
* FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
|
|
21336
|
+
*/
|
|
21337
|
+
fieldsType: string;
|
|
21338
|
+
/**
|
|
21339
|
+
* FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
|
|
21340
|
+
*/
|
|
21341
|
+
fieldsV1: any;
|
|
21342
|
+
/**
|
|
21343
|
+
* Manager is an identifier of the workflow managing these fields.
|
|
21344
|
+
*/
|
|
21345
|
+
manager: string;
|
|
21346
|
+
/**
|
|
21347
|
+
* Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
|
|
21348
|
+
*/
|
|
21349
|
+
operation: string;
|
|
21350
|
+
/**
|
|
21351
|
+
* Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
|
|
21352
|
+
*/
|
|
21353
|
+
subresource: string;
|
|
21354
|
+
/**
|
|
21355
|
+
* Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
|
|
21356
|
+
*/
|
|
21357
|
+
time: string;
|
|
21358
|
+
}
|
|
21359
|
+
/**
|
|
21360
|
+
* ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
|
|
21361
|
+
*/
|
|
21362
|
+
interface ObjectMeta {
|
|
21363
|
+
/**
|
|
21364
|
+
* Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
|
|
21365
|
+
*/
|
|
21366
|
+
annotations: {
|
|
21367
|
+
[key: string]: string;
|
|
21368
|
+
};
|
|
21369
|
+
/**
|
|
21370
|
+
* CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
|
|
21371
|
+
*
|
|
21372
|
+
* Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21373
|
+
*/
|
|
21374
|
+
creationTimestamp: string;
|
|
21375
|
+
/**
|
|
21376
|
+
* Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
|
|
21377
|
+
*/
|
|
21378
|
+
deletionGracePeriodSeconds: number;
|
|
21379
|
+
/**
|
|
21380
|
+
* DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
|
|
21381
|
+
*
|
|
21382
|
+
* Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21383
|
+
*/
|
|
21384
|
+
deletionTimestamp: string;
|
|
21385
|
+
/**
|
|
21386
|
+
* Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
|
|
21387
|
+
*/
|
|
21388
|
+
finalizers: string[];
|
|
21389
|
+
/**
|
|
21390
|
+
* GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
|
|
21391
|
+
*
|
|
21392
|
+
* If this field is specified and the generated name exists, the server will return a 409.
|
|
21393
|
+
*
|
|
21394
|
+
* Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
|
|
21395
|
+
*/
|
|
21396
|
+
generateName: string;
|
|
21397
|
+
/**
|
|
21398
|
+
* A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
|
|
21399
|
+
*/
|
|
21400
|
+
generation: number;
|
|
21401
|
+
/**
|
|
21402
|
+
* Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
|
|
21403
|
+
*/
|
|
21404
|
+
labels: {
|
|
21405
|
+
[key: string]: string;
|
|
21406
|
+
};
|
|
21407
|
+
/**
|
|
21408
|
+
* ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
|
|
21409
|
+
*/
|
|
21410
|
+
managedFields: outputs.meta.v1.ManagedFieldsEntry[];
|
|
21411
|
+
/**
|
|
21412
|
+
* Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21413
|
+
*/
|
|
21414
|
+
name: string;
|
|
21415
|
+
/**
|
|
21416
|
+
* Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
|
|
21417
|
+
*
|
|
21418
|
+
* Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
|
|
21419
|
+
*/
|
|
21420
|
+
namespace: string;
|
|
21421
|
+
/**
|
|
21422
|
+
* List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
|
|
21423
|
+
*/
|
|
21424
|
+
ownerReferences: outputs.meta.v1.OwnerReference[];
|
|
21425
|
+
/**
|
|
21426
|
+
* An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
|
|
21427
|
+
*
|
|
21428
|
+
* Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
|
|
21429
|
+
*/
|
|
21430
|
+
resourceVersion: string;
|
|
21431
|
+
/**
|
|
21432
|
+
* Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
|
|
21433
|
+
*/
|
|
21434
|
+
selfLink: string;
|
|
21435
|
+
/**
|
|
21436
|
+
* UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
|
|
21437
|
+
*
|
|
21438
|
+
* Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21439
|
+
*/
|
|
21440
|
+
uid: string;
|
|
21441
|
+
}
|
|
21442
|
+
/**
|
|
21443
|
+
* ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
|
|
21444
|
+
*/
|
|
21445
|
+
interface ObjectMetaPatch {
|
|
21446
|
+
/**
|
|
21447
|
+
* Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
|
|
21448
|
+
*/
|
|
21449
|
+
annotations: {
|
|
21450
|
+
[key: string]: string;
|
|
21451
|
+
};
|
|
21452
|
+
/**
|
|
21453
|
+
* CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
|
|
21454
|
+
*
|
|
21455
|
+
* Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21456
|
+
*/
|
|
21457
|
+
creationTimestamp: string;
|
|
21458
|
+
/**
|
|
21459
|
+
* Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
|
|
21460
|
+
*/
|
|
21461
|
+
deletionGracePeriodSeconds: number;
|
|
21462
|
+
/**
|
|
21463
|
+
* DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
|
|
21464
|
+
*
|
|
21465
|
+
* Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21466
|
+
*/
|
|
21467
|
+
deletionTimestamp: string;
|
|
21468
|
+
/**
|
|
21469
|
+
* Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
|
|
21470
|
+
*/
|
|
21471
|
+
finalizers: string[];
|
|
21472
|
+
/**
|
|
21473
|
+
* GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
|
|
21474
|
+
*
|
|
21475
|
+
* If this field is specified and the generated name exists, the server will return a 409.
|
|
21476
|
+
*
|
|
21477
|
+
* Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
|
|
21478
|
+
*/
|
|
21479
|
+
generateName: string;
|
|
21480
|
+
/**
|
|
21481
|
+
* A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
|
|
21482
|
+
*/
|
|
21483
|
+
generation: number;
|
|
21484
|
+
/**
|
|
21485
|
+
* Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
|
|
21486
|
+
*/
|
|
21487
|
+
labels: {
|
|
21488
|
+
[key: string]: string;
|
|
21489
|
+
};
|
|
21490
|
+
/**
|
|
21491
|
+
* ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
|
|
21492
|
+
*/
|
|
21493
|
+
managedFields: outputs.meta.v1.ManagedFieldsEntryPatch[];
|
|
21494
|
+
/**
|
|
21495
|
+
* Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21496
|
+
*/
|
|
21497
|
+
name: string;
|
|
21498
|
+
/**
|
|
21499
|
+
* Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
|
|
21500
|
+
*
|
|
21501
|
+
* Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
|
|
21502
|
+
*/
|
|
21503
|
+
namespace: string;
|
|
21504
|
+
/**
|
|
21505
|
+
* List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
|
|
21506
|
+
*/
|
|
21507
|
+
ownerReferences: outputs.meta.v1.OwnerReferencePatch[];
|
|
21508
|
+
/**
|
|
21509
|
+
* An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
|
|
21510
|
+
*
|
|
21511
|
+
* Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
|
|
21512
|
+
*/
|
|
21513
|
+
resourceVersion: string;
|
|
21514
|
+
/**
|
|
21515
|
+
* Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
|
|
21516
|
+
*/
|
|
21517
|
+
selfLink: string;
|
|
21518
|
+
/**
|
|
21519
|
+
* UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
|
|
21520
|
+
*
|
|
21521
|
+
* Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21522
|
+
*/
|
|
21523
|
+
uid: string;
|
|
21524
|
+
}
|
|
21525
|
+
/**
|
|
21526
|
+
* OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
|
|
21527
|
+
*/
|
|
21528
|
+
interface OwnerReference {
|
|
21529
|
+
/**
|
|
21530
|
+
* API version of the referent.
|
|
21531
|
+
*/
|
|
21532
|
+
apiVersion: string;
|
|
21533
|
+
/**
|
|
21534
|
+
* If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
|
|
21535
|
+
*/
|
|
21536
|
+
blockOwnerDeletion: boolean;
|
|
21537
|
+
/**
|
|
21538
|
+
* If true, this reference points to the managing controller.
|
|
21539
|
+
*/
|
|
21540
|
+
controller: boolean;
|
|
21541
|
+
/**
|
|
21542
|
+
* Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
21543
|
+
*/
|
|
21544
|
+
kind: string;
|
|
21545
|
+
/**
|
|
21546
|
+
* Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21547
|
+
*/
|
|
21548
|
+
name: string;
|
|
21549
|
+
/**
|
|
21550
|
+
* UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21551
|
+
*/
|
|
21552
|
+
uid: string;
|
|
21553
|
+
}
|
|
21554
|
+
/**
|
|
21555
|
+
* OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
|
|
21556
|
+
*/
|
|
21557
|
+
interface OwnerReferencePatch {
|
|
21558
|
+
/**
|
|
21559
|
+
* API version of the referent.
|
|
21560
|
+
*/
|
|
21561
|
+
apiVersion: string;
|
|
21562
|
+
/**
|
|
21563
|
+
* If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
|
|
21564
|
+
*/
|
|
21565
|
+
blockOwnerDeletion: boolean;
|
|
21566
|
+
/**
|
|
21567
|
+
* If true, this reference points to the managing controller.
|
|
21568
|
+
*/
|
|
21569
|
+
controller: boolean;
|
|
21570
|
+
/**
|
|
21571
|
+
* Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
21572
|
+
*/
|
|
21573
|
+
kind: string;
|
|
21574
|
+
/**
|
|
21575
|
+
* Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21576
|
+
*/
|
|
21577
|
+
name: string;
|
|
21578
|
+
/**
|
|
21579
|
+
* UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21580
|
+
*/
|
|
21581
|
+
uid: string;
|
|
21582
|
+
}
|
|
21232
21583
|
}
|
|
21233
21584
|
}
|