@highstate/cert-manager 0.9.18 → 0.9.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +3 -52
- package/acme/v1/challenge.ts +2 -4
- package/acme/v1/challengeList.ts +0 -2
- package/acme/v1/challengePatch.ts +2 -4
- package/acme/v1/order.ts +2 -4
- package/acme/v1/orderList.ts +0 -2
- package/acme/v1/orderPatch.ts +2 -4
- package/bin/acme/v1/challenge.d.ts +2 -3
- package/bin/acme/v1/challenge.js.map +1 -1
- package/bin/acme/v1/challengeList.js.map +1 -1
- package/bin/acme/v1/challengePatch.d.ts +2 -3
- package/bin/acme/v1/challengePatch.js.map +1 -1
- package/bin/acme/v1/order.d.ts +2 -3
- package/bin/acme/v1/order.js.map +1 -1
- package/bin/acme/v1/orderList.js.map +1 -1
- package/bin/acme/v1/orderPatch.d.ts +2 -3
- package/bin/acme/v1/orderPatch.js.map +1 -1
- package/bin/cert_manager/v1/certificate.d.ts +2 -3
- package/bin/cert_manager/v1/certificate.js.map +1 -1
- package/bin/cert_manager/v1/certificateList.js.map +1 -1
- package/bin/cert_manager/v1/certificatePatch.d.ts +2 -3
- package/bin/cert_manager/v1/certificatePatch.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequest.d.ts +2 -3
- package/bin/cert_manager/v1/certificateRequest.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequestList.js.map +1 -1
- package/bin/cert_manager/v1/certificateRequestPatch.d.ts +2 -3
- package/bin/cert_manager/v1/certificateRequestPatch.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuer.d.ts +2 -3
- package/bin/cert_manager/v1/clusterIssuer.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuerList.js.map +1 -1
- package/bin/cert_manager/v1/clusterIssuerPatch.d.ts +2 -3
- package/bin/cert_manager/v1/clusterIssuerPatch.js.map +1 -1
- package/bin/cert_manager/v1/issuer.d.ts +2 -3
- package/bin/cert_manager/v1/issuer.js.map +1 -1
- package/bin/cert_manager/v1/issuerList.js.map +1 -1
- package/bin/cert_manager/v1/issuerPatch.d.ts +2 -3
- package/bin/cert_manager/v1/issuerPatch.js.map +1 -1
- package/bin/package.json +9 -8
- package/bin/types/input.d.ts +423 -72
- package/bin/types/output.d.ts +424 -73
- package/cert_manager/v1/certificate.ts +2 -4
- package/cert_manager/v1/certificateList.ts +0 -2
- package/cert_manager/v1/certificatePatch.ts +2 -4
- package/cert_manager/v1/certificateRequest.ts +2 -4
- package/cert_manager/v1/certificateRequestList.ts +0 -2
- package/cert_manager/v1/certificateRequestPatch.ts +2 -4
- package/cert_manager/v1/clusterIssuer.ts +2 -4
- package/cert_manager/v1/clusterIssuerList.ts +0 -2
- package/cert_manager/v1/clusterIssuerPatch.ts +2 -4
- package/cert_manager/v1/issuer.ts +2 -4
- package/cert_manager/v1/issuerList.ts +0 -2
- package/cert_manager/v1/issuerPatch.ts +2 -4
- package/package.json +10 -9
- package/tsconfig.json +44 -43
- package/types/input.ts +421 -73
- package/types/output.ts +422 -74
- package/bin/meta/v1.d.ts +0 -3
- package/bin/meta/v1.js +0 -3
- package/bin/meta/v1.js.map +0 -1
package/types/input.ts
CHANGED
|
@@ -5,8 +5,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
5
5
|
import * as inputs from "../types/input";
|
|
6
6
|
import * as outputs from "../types/output";
|
|
7
7
|
|
|
8
|
-
import {ObjectMeta, ObjectMetaPatch} from "../meta/v1";
|
|
9
|
-
|
|
10
8
|
export namespace acme {
|
|
11
9
|
export namespace v1 {
|
|
12
10
|
/**
|
|
@@ -24,7 +22,7 @@ export namespace acme {
|
|
|
24
22
|
/**
|
|
25
23
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
26
24
|
*/
|
|
27
|
-
metadata?: pulumi.Input<ObjectMeta>;
|
|
25
|
+
metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
|
|
28
26
|
spec?: pulumi.Input<inputs.acme.v1.ChallengeSpec>;
|
|
29
27
|
status?: pulumi.Input<inputs.acme.v1.ChallengeStatus>;
|
|
30
28
|
}
|
|
@@ -36,9 +34,9 @@ export namespace acme {
|
|
|
36
34
|
*/
|
|
37
35
|
authorizationURL?: pulumi.Input<string>;
|
|
38
36
|
/**
|
|
39
|
-
* dnsName is the identifier that this challenge is for, e.g
|
|
37
|
+
* dnsName is the identifier that this challenge is for, e.g., example.com.
|
|
40
38
|
* If the requested DNSName is a 'wildcard', this field MUST be set to the
|
|
41
|
-
* non-wildcard domain, e.g
|
|
39
|
+
* non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
|
|
42
40
|
*/
|
|
43
41
|
dnsName?: pulumi.Input<string>;
|
|
44
42
|
issuerRef?: pulumi.Input<inputs.acme.v1.ChallengeSpecIssuerRef>;
|
|
@@ -126,9 +124,9 @@ export namespace acme {
|
|
|
126
124
|
*/
|
|
127
125
|
authorizationURL?: pulumi.Input<string>;
|
|
128
126
|
/**
|
|
129
|
-
* dnsName is the identifier that this challenge is for, e.g
|
|
127
|
+
* dnsName is the identifier that this challenge is for, e.g., example.com.
|
|
130
128
|
* If the requested DNSName is a 'wildcard', this field MUST be set to the
|
|
131
|
-
* non-wildcard domain, e.g
|
|
129
|
+
* non-wildcard domain, e.g., for `*.example.com`, it must be `example.com`.
|
|
132
130
|
*/
|
|
133
131
|
dnsName?: pulumi.Input<string>;
|
|
134
132
|
issuerRef?: pulumi.Input<inputs.acme.v1.ChallengeSpecIssuerRefPatch>;
|
|
@@ -459,16 +457,16 @@ export namespace acme {
|
|
|
459
457
|
*/
|
|
460
458
|
export interface ChallengeSpecSolverDns01AzureDNSManagedIdentity {
|
|
461
459
|
/**
|
|
462
|
-
* client ID of the managed identity,
|
|
460
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
463
461
|
*/
|
|
464
462
|
clientID?: pulumi.Input<string>;
|
|
465
463
|
/**
|
|
466
|
-
* resource ID of the managed identity,
|
|
464
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
467
465
|
* Cannot be used for Azure Managed Service Identity
|
|
468
466
|
*/
|
|
469
467
|
resourceID?: pulumi.Input<string>;
|
|
470
468
|
/**
|
|
471
|
-
* tenant ID of the managed identity,
|
|
469
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
472
470
|
*/
|
|
473
471
|
tenantID?: pulumi.Input<string>;
|
|
474
472
|
}
|
|
@@ -480,16 +478,16 @@ export namespace acme {
|
|
|
480
478
|
*/
|
|
481
479
|
export interface ChallengeSpecSolverDns01AzureDNSManagedIdentityPatch {
|
|
482
480
|
/**
|
|
483
|
-
* client ID of the managed identity,
|
|
481
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
484
482
|
*/
|
|
485
483
|
clientID?: pulumi.Input<string>;
|
|
486
484
|
/**
|
|
487
|
-
* resource ID of the managed identity,
|
|
485
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
488
486
|
* Cannot be used for Azure Managed Service Identity
|
|
489
487
|
*/
|
|
490
488
|
resourceID?: pulumi.Input<string>;
|
|
491
489
|
/**
|
|
492
|
-
* tenant ID of the managed identity,
|
|
490
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
493
491
|
*/
|
|
494
492
|
tenantID?: pulumi.Input<string>;
|
|
495
493
|
}
|
|
@@ -1115,7 +1113,7 @@ export namespace acme {
|
|
|
1115
1113
|
* when challenges are processed.
|
|
1116
1114
|
* This can contain arbitrary JSON data.
|
|
1117
1115
|
* Secret values should not be specified in this stanza.
|
|
1118
|
-
* If secret values are needed (e.g
|
|
1116
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
1119
1117
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
1120
1118
|
* For details on the schema of this field, consult the webhook provider
|
|
1121
1119
|
* implementation's documentation.
|
|
@@ -1131,7 +1129,7 @@ export namespace acme {
|
|
|
1131
1129
|
/**
|
|
1132
1130
|
* The name of the solver to use, as defined in the webhook provider
|
|
1133
1131
|
* implementation.
|
|
1134
|
-
* This will typically be the name of the provider, e.g
|
|
1132
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
1135
1133
|
*/
|
|
1136
1134
|
solverName?: pulumi.Input<string>;
|
|
1137
1135
|
}
|
|
@@ -1146,7 +1144,7 @@ export namespace acme {
|
|
|
1146
1144
|
* when challenges are processed.
|
|
1147
1145
|
* This can contain arbitrary JSON data.
|
|
1148
1146
|
* Secret values should not be specified in this stanza.
|
|
1149
|
-
* If secret values are needed (e.g
|
|
1147
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
1150
1148
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
1151
1149
|
* For details on the schema of this field, consult the webhook provider
|
|
1152
1150
|
* implementation's documentation.
|
|
@@ -1162,7 +1160,7 @@ export namespace acme {
|
|
|
1162
1160
|
/**
|
|
1163
1161
|
* The name of the solver to use, as defined in the webhook provider
|
|
1164
1162
|
* implementation.
|
|
1165
|
-
* This will typically be the name of the provider, e.g
|
|
1163
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
1166
1164
|
*/
|
|
1167
1165
|
solverName?: pulumi.Input<string>;
|
|
1168
1166
|
}
|
|
@@ -1171,7 +1169,7 @@ export namespace acme {
|
|
|
1171
1169
|
* Configures cert-manager to attempt to complete authorizations by
|
|
1172
1170
|
* performing the HTTP01 challenge flow.
|
|
1173
1171
|
* It is not possible to obtain certificates for wildcard domain names
|
|
1174
|
-
* (e.g
|
|
1172
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
1175
1173
|
*/
|
|
1176
1174
|
export interface ChallengeSpecSolverHttp01 {
|
|
1177
1175
|
gatewayHTTPRoute?: pulumi.Input<inputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoute>;
|
|
@@ -5768,7 +5766,7 @@ export namespace acme {
|
|
|
5768
5766
|
* Configures cert-manager to attempt to complete authorizations by
|
|
5769
5767
|
* performing the HTTP01 challenge flow.
|
|
5770
5768
|
* It is not possible to obtain certificates for wildcard domain names
|
|
5771
|
-
* (e.g
|
|
5769
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
5772
5770
|
*/
|
|
5773
5771
|
export interface ChallengeSpecSolverHttp01Patch {
|
|
5774
5772
|
gatewayHTTPRoute?: pulumi.Input<inputs.acme.v1.ChallengeSpecSolverHttp01GatewayHTTPRoutePatch>;
|
|
@@ -5905,7 +5903,7 @@ export namespace acme {
|
|
|
5905
5903
|
/**
|
|
5906
5904
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
5907
5905
|
*/
|
|
5908
|
-
metadata?: pulumi.Input<ObjectMeta>;
|
|
5906
|
+
metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
|
|
5909
5907
|
spec?: pulumi.Input<inputs.acme.v1.OrderSpec>;
|
|
5910
5908
|
status?: pulumi.Input<inputs.acme.v1.OrderStatus>;
|
|
5911
5909
|
}
|
|
@@ -5935,6 +5933,11 @@ export namespace acme {
|
|
|
5935
5933
|
*/
|
|
5936
5934
|
ipAddresses?: pulumi.Input<pulumi.Input<string>[]>;
|
|
5937
5935
|
issuerRef?: pulumi.Input<inputs.acme.v1.OrderSpecIssuerRef>;
|
|
5936
|
+
/**
|
|
5937
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
5938
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
5939
|
+
*/
|
|
5940
|
+
profile?: pulumi.Input<string>;
|
|
5938
5941
|
/**
|
|
5939
5942
|
* Certificate signing request bytes in DER encoding.
|
|
5940
5943
|
* This will be used when finalizing the order.
|
|
@@ -6012,6 +6015,11 @@ export namespace acme {
|
|
|
6012
6015
|
*/
|
|
6013
6016
|
ipAddresses?: pulumi.Input<pulumi.Input<string>[]>;
|
|
6014
6017
|
issuerRef?: pulumi.Input<inputs.acme.v1.OrderSpecIssuerRefPatch>;
|
|
6018
|
+
/**
|
|
6019
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
6020
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
6021
|
+
*/
|
|
6022
|
+
profile?: pulumi.Input<string>;
|
|
6015
6023
|
/**
|
|
6016
6024
|
* Certificate signing request bytes in DER encoding.
|
|
6017
6025
|
* This will be used when finalizing the order.
|
|
@@ -6117,7 +6125,7 @@ export namespace acme {
|
|
|
6117
6125
|
*/
|
|
6118
6126
|
token?: pulumi.Input<string>;
|
|
6119
6127
|
/**
|
|
6120
|
-
* Type is the type of challenge being offered, e.g
|
|
6128
|
+
* Type is the type of challenge being offered, e.g., 'http-01', 'dns-01',
|
|
6121
6129
|
* 'tls-sni-01', etc.
|
|
6122
6130
|
* This is the raw value retrieved from the ACME server.
|
|
6123
6131
|
* Only 'http-01' and 'dns-01' are supported by cert-manager, other values
|
|
@@ -6154,7 +6162,7 @@ export namespace cert_manager {
|
|
|
6154
6162
|
/**
|
|
6155
6163
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
6156
6164
|
*/
|
|
6157
|
-
metadata?: pulumi.Input<ObjectMeta>;
|
|
6165
|
+
metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
|
|
6158
6166
|
spec?: pulumi.Input<inputs.cert_manager.v1.CertificateSpec>;
|
|
6159
6167
|
status?: pulumi.Input<inputs.cert_manager.v1.CertificateStatus>;
|
|
6160
6168
|
}
|
|
@@ -6182,7 +6190,7 @@ export namespace cert_manager {
|
|
|
6182
6190
|
/**
|
|
6183
6191
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
6184
6192
|
*/
|
|
6185
|
-
metadata?: pulumi.Input<ObjectMeta>;
|
|
6193
|
+
metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
|
|
6186
6194
|
spec?: pulumi.Input<inputs.cert_manager.v1.CertificateRequestSpec>;
|
|
6187
6195
|
status?: pulumi.Input<inputs.cert_manager.v1.CertificateRequestStatus>;
|
|
6188
6196
|
}
|
|
@@ -6441,10 +6449,6 @@ export namespace cert_manager {
|
|
|
6441
6449
|
/**
|
|
6442
6450
|
* Defines extra output formats of the private key and signed certificate chain
|
|
6443
6451
|
* to be written to this Certificate's target Secret.
|
|
6444
|
-
*
|
|
6445
|
-
* This is a Beta Feature enabled by default. It can be disabled with the
|
|
6446
|
-
* `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
|
|
6447
|
-
* the controller and webhook components.
|
|
6448
6452
|
*/
|
|
6449
6453
|
additionalOutputFormats?: pulumi.Input<pulumi.Input<inputs.cert_manager.v1.CertificateSpecAdditionalOutputFormats>[]>;
|
|
6450
6454
|
/**
|
|
@@ -6562,8 +6566,7 @@ export namespace cert_manager {
|
|
|
6562
6566
|
* revisions exceeds this number.
|
|
6563
6567
|
*
|
|
6564
6568
|
* If set, revisionHistoryLimit must be a value of `1` or greater.
|
|
6565
|
-
*
|
|
6566
|
-
* Default value is `nil`.
|
|
6569
|
+
* Default value is `1`.
|
|
6567
6570
|
*/
|
|
6568
6571
|
revisionHistoryLimit?: pulumi.Input<number>;
|
|
6569
6572
|
/**
|
|
@@ -6574,6 +6577,13 @@ export namespace cert_manager {
|
|
|
6574
6577
|
*/
|
|
6575
6578
|
secretName?: pulumi.Input<string>;
|
|
6576
6579
|
secretTemplate?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSecretTemplate>;
|
|
6580
|
+
/**
|
|
6581
|
+
* Signature algorithm to use.
|
|
6582
|
+
* Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
|
|
6583
|
+
* Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
|
|
6584
|
+
* Allowed values for Ed25519 keys: PureEd25519.
|
|
6585
|
+
*/
|
|
6586
|
+
signatureAlgorithm?: pulumi.Input<string>;
|
|
6577
6587
|
subject?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSubject>;
|
|
6578
6588
|
/**
|
|
6579
6589
|
* Requested URI subject alternative names.
|
|
@@ -6812,7 +6822,7 @@ export namespace cert_manager {
|
|
|
6812
6822
|
* `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
|
|
6813
6823
|
* `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
|
|
6814
6824
|
* `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
|
|
6815
|
-
* (
|
|
6825
|
+
* (e.g., because of company policy). Please note that the security of the algorithm is not that important
|
|
6816
6826
|
* in reality, because the unencrypted certificate and private key are also stored in the Secret.
|
|
6817
6827
|
*/
|
|
6818
6828
|
profile?: pulumi.Input<string>;
|
|
@@ -6890,7 +6900,7 @@ export namespace cert_manager {
|
|
|
6890
6900
|
* `LegacyRC2`: Deprecated. Not supported by default in OpenSSL 3 or Java 20.
|
|
6891
6901
|
* `LegacyDES`: Less secure algorithm. Use this option for maximal compatibility.
|
|
6892
6902
|
* `Modern2023`: Secure algorithm. Use this option in case you have to always use secure algorithms
|
|
6893
|
-
* (
|
|
6903
|
+
* (e.g., because of company policy). Please note that the security of the algorithm is not that important
|
|
6894
6904
|
* in reality, because the unencrypted certificate and private key are also stored in the Secret.
|
|
6895
6905
|
*/
|
|
6896
6906
|
profile?: pulumi.Input<string>;
|
|
@@ -7062,10 +7072,6 @@ export namespace cert_manager {
|
|
|
7062
7072
|
/**
|
|
7063
7073
|
* Defines extra output formats of the private key and signed certificate chain
|
|
7064
7074
|
* to be written to this Certificate's target Secret.
|
|
7065
|
-
*
|
|
7066
|
-
* This is a Beta Feature enabled by default. It can be disabled with the
|
|
7067
|
-
* `--feature-gates=AdditionalCertificateOutputFormats=false` option set on both
|
|
7068
|
-
* the controller and webhook components.
|
|
7069
7075
|
*/
|
|
7070
7076
|
additionalOutputFormats?: pulumi.Input<pulumi.Input<inputs.cert_manager.v1.CertificateSpecAdditionalOutputFormatsPatch>[]>;
|
|
7071
7077
|
/**
|
|
@@ -7183,8 +7189,7 @@ export namespace cert_manager {
|
|
|
7183
7189
|
* revisions exceeds this number.
|
|
7184
7190
|
*
|
|
7185
7191
|
* If set, revisionHistoryLimit must be a value of `1` or greater.
|
|
7186
|
-
*
|
|
7187
|
-
* Default value is `nil`.
|
|
7192
|
+
* Default value is `1`.
|
|
7188
7193
|
*/
|
|
7189
7194
|
revisionHistoryLimit?: pulumi.Input<number>;
|
|
7190
7195
|
/**
|
|
@@ -7195,6 +7200,13 @@ export namespace cert_manager {
|
|
|
7195
7200
|
*/
|
|
7196
7201
|
secretName?: pulumi.Input<string>;
|
|
7197
7202
|
secretTemplate?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSecretTemplatePatch>;
|
|
7203
|
+
/**
|
|
7204
|
+
* Signature algorithm to use.
|
|
7205
|
+
* Allowed values for RSA keys: SHA256WithRSA, SHA384WithRSA, SHA512WithRSA.
|
|
7206
|
+
* Allowed values for ECDSA keys: ECDSAWithSHA256, ECDSAWithSHA384, ECDSAWithSHA512.
|
|
7207
|
+
* Allowed values for Ed25519 keys: PureEd25519.
|
|
7208
|
+
*/
|
|
7209
|
+
signatureAlgorithm?: pulumi.Input<string>;
|
|
7198
7210
|
subject?: pulumi.Input<inputs.cert_manager.v1.CertificateSpecSubjectPatch>;
|
|
7199
7211
|
/**
|
|
7200
7212
|
* Requested URI subject alternative names.
|
|
@@ -7246,7 +7258,11 @@ export namespace cert_manager {
|
|
|
7246
7258
|
* to await user intervention.
|
|
7247
7259
|
* If set to `Always`, a private key matching the specified requirements
|
|
7248
7260
|
* will be generated whenever a re-issuance occurs.
|
|
7249
|
-
* Default is `
|
|
7261
|
+
* Default is `Always`.
|
|
7262
|
+
* The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
|
|
7263
|
+
* The new default can be disabled by setting the
|
|
7264
|
+
* `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
|
|
7265
|
+
* the controller component.
|
|
7250
7266
|
*/
|
|
7251
7267
|
rotationPolicy?: pulumi.Input<string>;
|
|
7252
7268
|
/**
|
|
@@ -7297,7 +7313,11 @@ export namespace cert_manager {
|
|
|
7297
7313
|
* to await user intervention.
|
|
7298
7314
|
* If set to `Always`, a private key matching the specified requirements
|
|
7299
7315
|
* will be generated whenever a re-issuance occurs.
|
|
7300
|
-
* Default is `
|
|
7316
|
+
* Default is `Always`.
|
|
7317
|
+
* The default was changed from `Never` to `Always` in cert-manager >=v1.18.0.
|
|
7318
|
+
* The new default can be disabled by setting the
|
|
7319
|
+
* `--feature-gates=DefaultPrivateKeyRotationPolicyAlways=false` option on
|
|
7320
|
+
* the controller component.
|
|
7301
7321
|
*/
|
|
7302
7322
|
rotationPolicy?: pulumi.Input<string>;
|
|
7303
7323
|
/**
|
|
@@ -7561,7 +7581,7 @@ export namespace cert_manager {
|
|
|
7561
7581
|
/**
|
|
7562
7582
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
7563
7583
|
*/
|
|
7564
|
-
metadata?: pulumi.Input<ObjectMeta>;
|
|
7584
|
+
metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
|
|
7565
7585
|
spec?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpec>;
|
|
7566
7586
|
status?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerStatus>;
|
|
7567
7587
|
}
|
|
@@ -7621,7 +7641,7 @@ export namespace cert_manager {
|
|
|
7621
7641
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
7622
7642
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
7623
7643
|
* endpoint.
|
|
7624
|
-
* For example, for Let's Encrypt's DST
|
|
7644
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
7625
7645
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
7626
7646
|
* This value picks the first certificate bundle in the combined set of
|
|
7627
7647
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -7629,6 +7649,11 @@ export namespace cert_manager {
|
|
|
7629
7649
|
*/
|
|
7630
7650
|
preferredChain?: pulumi.Input<string>;
|
|
7631
7651
|
privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRef>;
|
|
7652
|
+
/**
|
|
7653
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
7654
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
7655
|
+
*/
|
|
7656
|
+
profile?: pulumi.Input<string>;
|
|
7632
7657
|
/**
|
|
7633
7658
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
7634
7659
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -7788,7 +7813,7 @@ export namespace cert_manager {
|
|
|
7788
7813
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
7789
7814
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
7790
7815
|
* endpoint.
|
|
7791
|
-
* For example, for Let's Encrypt's DST
|
|
7816
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
7792
7817
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
7793
7818
|
* This value picks the first certificate bundle in the combined set of
|
|
7794
7819
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -7796,6 +7821,11 @@ export namespace cert_manager {
|
|
|
7796
7821
|
*/
|
|
7797
7822
|
preferredChain?: pulumi.Input<string>;
|
|
7798
7823
|
privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmePrivateKeySecretRefPatch>;
|
|
7824
|
+
/**
|
|
7825
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
7826
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
7827
|
+
*/
|
|
7828
|
+
profile?: pulumi.Input<string>;
|
|
7799
7829
|
/**
|
|
7800
7830
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
7801
7831
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -8162,16 +8192,16 @@ export namespace cert_manager {
|
|
|
8162
8192
|
*/
|
|
8163
8193
|
export interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
|
|
8164
8194
|
/**
|
|
8165
|
-
* client ID of the managed identity,
|
|
8195
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
8166
8196
|
*/
|
|
8167
8197
|
clientID?: pulumi.Input<string>;
|
|
8168
8198
|
/**
|
|
8169
|
-
* resource ID of the managed identity,
|
|
8199
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
8170
8200
|
* Cannot be used for Azure Managed Service Identity
|
|
8171
8201
|
*/
|
|
8172
8202
|
resourceID?: pulumi.Input<string>;
|
|
8173
8203
|
/**
|
|
8174
|
-
* tenant ID of the managed identity,
|
|
8204
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
8175
8205
|
*/
|
|
8176
8206
|
tenantID?: pulumi.Input<string>;
|
|
8177
8207
|
}
|
|
@@ -8183,16 +8213,16 @@ export namespace cert_manager {
|
|
|
8183
8213
|
*/
|
|
8184
8214
|
export interface ClusterIssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
|
|
8185
8215
|
/**
|
|
8186
|
-
* client ID of the managed identity,
|
|
8216
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
8187
8217
|
*/
|
|
8188
8218
|
clientID?: pulumi.Input<string>;
|
|
8189
8219
|
/**
|
|
8190
|
-
* resource ID of the managed identity,
|
|
8220
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
8191
8221
|
* Cannot be used for Azure Managed Service Identity
|
|
8192
8222
|
*/
|
|
8193
8223
|
resourceID?: pulumi.Input<string>;
|
|
8194
8224
|
/**
|
|
8195
|
-
* tenant ID of the managed identity,
|
|
8225
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
8196
8226
|
*/
|
|
8197
8227
|
tenantID?: pulumi.Input<string>;
|
|
8198
8228
|
}
|
|
@@ -8818,7 +8848,7 @@ export namespace cert_manager {
|
|
|
8818
8848
|
* when challenges are processed.
|
|
8819
8849
|
* This can contain arbitrary JSON data.
|
|
8820
8850
|
* Secret values should not be specified in this stanza.
|
|
8821
|
-
* If secret values are needed (e.g
|
|
8851
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
8822
8852
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
8823
8853
|
* For details on the schema of this field, consult the webhook provider
|
|
8824
8854
|
* implementation's documentation.
|
|
@@ -8834,7 +8864,7 @@ export namespace cert_manager {
|
|
|
8834
8864
|
/**
|
|
8835
8865
|
* The name of the solver to use, as defined in the webhook provider
|
|
8836
8866
|
* implementation.
|
|
8837
|
-
* This will typically be the name of the provider, e.g
|
|
8867
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
8838
8868
|
*/
|
|
8839
8869
|
solverName?: pulumi.Input<string>;
|
|
8840
8870
|
}
|
|
@@ -8849,7 +8879,7 @@ export namespace cert_manager {
|
|
|
8849
8879
|
* when challenges are processed.
|
|
8850
8880
|
* This can contain arbitrary JSON data.
|
|
8851
8881
|
* Secret values should not be specified in this stanza.
|
|
8852
|
-
* If secret values are needed (e.g
|
|
8882
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
8853
8883
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
8854
8884
|
* For details on the schema of this field, consult the webhook provider
|
|
8855
8885
|
* implementation's documentation.
|
|
@@ -8865,7 +8895,7 @@ export namespace cert_manager {
|
|
|
8865
8895
|
/**
|
|
8866
8896
|
* The name of the solver to use, as defined in the webhook provider
|
|
8867
8897
|
* implementation.
|
|
8868
|
-
* This will typically be the name of the provider, e.g
|
|
8898
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
8869
8899
|
*/
|
|
8870
8900
|
solverName?: pulumi.Input<string>;
|
|
8871
8901
|
}
|
|
@@ -8874,7 +8904,7 @@ export namespace cert_manager {
|
|
|
8874
8904
|
* Configures cert-manager to attempt to complete authorizations by
|
|
8875
8905
|
* performing the HTTP01 challenge flow.
|
|
8876
8906
|
* It is not possible to obtain certificates for wildcard domain names
|
|
8877
|
-
* (e.g
|
|
8907
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
8878
8908
|
*/
|
|
8879
8909
|
export interface ClusterIssuerSpecAcmeSolversHttp01 {
|
|
8880
8910
|
gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoute>;
|
|
@@ -13471,7 +13501,7 @@ export namespace cert_manager {
|
|
|
13471
13501
|
* Configures cert-manager to attempt to complete authorizations by
|
|
13472
13502
|
* performing the HTTP01 challenge flow.
|
|
13473
13503
|
* It is not possible to obtain certificates for wildcard domain names
|
|
13474
|
-
* (e.g
|
|
13504
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
13475
13505
|
*/
|
|
13476
13506
|
export interface ClusterIssuerSpecAcmeSolversHttp01Patch {
|
|
13477
13507
|
gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch>;
|
|
@@ -13698,6 +13728,11 @@ export namespace cert_manager {
|
|
|
13698
13728
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
13699
13729
|
*/
|
|
13700
13730
|
server?: pulumi.Input<string>;
|
|
13731
|
+
/**
|
|
13732
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
13733
|
+
* by the Vault server.
|
|
13734
|
+
*/
|
|
13735
|
+
serverName?: pulumi.Input<string>;
|
|
13701
13736
|
}
|
|
13702
13737
|
|
|
13703
13738
|
/**
|
|
@@ -14148,6 +14183,11 @@ export namespace cert_manager {
|
|
|
14148
14183
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
14149
14184
|
*/
|
|
14150
14185
|
server?: pulumi.Input<string>;
|
|
14186
|
+
/**
|
|
14187
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
14188
|
+
* by the Vault server.
|
|
14189
|
+
*/
|
|
14190
|
+
serverName?: pulumi.Input<string>;
|
|
14151
14191
|
}
|
|
14152
14192
|
|
|
14153
14193
|
/**
|
|
@@ -14174,7 +14214,7 @@ export namespace cert_manager {
|
|
|
14174
14214
|
apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRef>;
|
|
14175
14215
|
/**
|
|
14176
14216
|
* URL is the base URL for Venafi Cloud.
|
|
14177
|
-
* Defaults to "https://api.venafi.cloud/
|
|
14217
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
14178
14218
|
*/
|
|
14179
14219
|
url?: pulumi.Input<string>;
|
|
14180
14220
|
}
|
|
@@ -14221,7 +14261,7 @@ export namespace cert_manager {
|
|
|
14221
14261
|
apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.ClusterIssuerSpecVenafiCloudApiTokenSecretRefPatch>;
|
|
14222
14262
|
/**
|
|
14223
14263
|
* URL is the base URL for Venafi Cloud.
|
|
14224
|
-
* Defaults to "https://api.venafi.cloud/
|
|
14264
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
14225
14265
|
*/
|
|
14226
14266
|
url?: pulumi.Input<string>;
|
|
14227
14267
|
}
|
|
@@ -14444,7 +14484,7 @@ export namespace cert_manager {
|
|
|
14444
14484
|
/**
|
|
14445
14485
|
* Standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
14446
14486
|
*/
|
|
14447
|
-
metadata?: pulumi.Input<ObjectMeta>;
|
|
14487
|
+
metadata?: pulumi.Input<inputs.meta.v1.ObjectMeta>;
|
|
14448
14488
|
spec?: pulumi.Input<inputs.cert_manager.v1.IssuerSpec>;
|
|
14449
14489
|
status?: pulumi.Input<inputs.cert_manager.v1.IssuerStatus>;
|
|
14450
14490
|
}
|
|
@@ -14504,7 +14544,7 @@ export namespace cert_manager {
|
|
|
14504
14544
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
14505
14545
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
14506
14546
|
* endpoint.
|
|
14507
|
-
* For example, for Let's Encrypt's DST
|
|
14547
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
14508
14548
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
14509
14549
|
* This value picks the first certificate bundle in the combined set of
|
|
14510
14550
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -14512,6 +14552,11 @@ export namespace cert_manager {
|
|
|
14512
14552
|
*/
|
|
14513
14553
|
preferredChain?: pulumi.Input<string>;
|
|
14514
14554
|
privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRef>;
|
|
14555
|
+
/**
|
|
14556
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
14557
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
14558
|
+
*/
|
|
14559
|
+
profile?: pulumi.Input<string>;
|
|
14515
14560
|
/**
|
|
14516
14561
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
14517
14562
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -14671,7 +14716,7 @@ export namespace cert_manager {
|
|
|
14671
14716
|
* PreferredChain is the chain to use if the ACME server outputs multiple.
|
|
14672
14717
|
* PreferredChain is no guarantee that this one gets delivered by the ACME
|
|
14673
14718
|
* endpoint.
|
|
14674
|
-
* For example, for Let's Encrypt's DST
|
|
14719
|
+
* For example, for Let's Encrypt's DST cross-sign you would use:
|
|
14675
14720
|
* "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
|
|
14676
14721
|
* This value picks the first certificate bundle in the combined set of
|
|
14677
14722
|
* ACME default and alternative chains that has a root-most certificate with
|
|
@@ -14679,6 +14724,11 @@ export namespace cert_manager {
|
|
|
14679
14724
|
*/
|
|
14680
14725
|
preferredChain?: pulumi.Input<string>;
|
|
14681
14726
|
privateKeySecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmePrivateKeySecretRefPatch>;
|
|
14727
|
+
/**
|
|
14728
|
+
* Profile allows requesting a certificate profile from the ACME server.
|
|
14729
|
+
* Supported profiles are listed by the server's ACME directory URL.
|
|
14730
|
+
*/
|
|
14731
|
+
profile?: pulumi.Input<string>;
|
|
14682
14732
|
/**
|
|
14683
14733
|
* Server is the URL used to access the ACME server's 'directory' endpoint.
|
|
14684
14734
|
* For example, for Let's Encrypt's staging endpoint, you would use:
|
|
@@ -15045,16 +15095,16 @@ export namespace cert_manager {
|
|
|
15045
15095
|
*/
|
|
15046
15096
|
export interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentity {
|
|
15047
15097
|
/**
|
|
15048
|
-
* client ID of the managed identity,
|
|
15098
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
15049
15099
|
*/
|
|
15050
15100
|
clientID?: pulumi.Input<string>;
|
|
15051
15101
|
/**
|
|
15052
|
-
* resource ID of the managed identity,
|
|
15102
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
15053
15103
|
* Cannot be used for Azure Managed Service Identity
|
|
15054
15104
|
*/
|
|
15055
15105
|
resourceID?: pulumi.Input<string>;
|
|
15056
15106
|
/**
|
|
15057
|
-
* tenant ID of the managed identity,
|
|
15107
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
15058
15108
|
*/
|
|
15059
15109
|
tenantID?: pulumi.Input<string>;
|
|
15060
15110
|
}
|
|
@@ -15066,16 +15116,16 @@ export namespace cert_manager {
|
|
|
15066
15116
|
*/
|
|
15067
15117
|
export interface IssuerSpecAcmeSolversDns01AzureDNSManagedIdentityPatch {
|
|
15068
15118
|
/**
|
|
15069
|
-
* client ID of the managed identity,
|
|
15119
|
+
* client ID of the managed identity, cannot be used at the same time as resourceID
|
|
15070
15120
|
*/
|
|
15071
15121
|
clientID?: pulumi.Input<string>;
|
|
15072
15122
|
/**
|
|
15073
|
-
* resource ID of the managed identity,
|
|
15123
|
+
* resource ID of the managed identity, cannot be used at the same time as clientID
|
|
15074
15124
|
* Cannot be used for Azure Managed Service Identity
|
|
15075
15125
|
*/
|
|
15076
15126
|
resourceID?: pulumi.Input<string>;
|
|
15077
15127
|
/**
|
|
15078
|
-
* tenant ID of the managed identity,
|
|
15128
|
+
* tenant ID of the managed identity, cannot be used at the same time as resourceID
|
|
15079
15129
|
*/
|
|
15080
15130
|
tenantID?: pulumi.Input<string>;
|
|
15081
15131
|
}
|
|
@@ -15701,7 +15751,7 @@ export namespace cert_manager {
|
|
|
15701
15751
|
* when challenges are processed.
|
|
15702
15752
|
* This can contain arbitrary JSON data.
|
|
15703
15753
|
* Secret values should not be specified in this stanza.
|
|
15704
|
-
* If secret values are needed (e.g
|
|
15754
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
15705
15755
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
15706
15756
|
* For details on the schema of this field, consult the webhook provider
|
|
15707
15757
|
* implementation's documentation.
|
|
@@ -15717,7 +15767,7 @@ export namespace cert_manager {
|
|
|
15717
15767
|
/**
|
|
15718
15768
|
* The name of the solver to use, as defined in the webhook provider
|
|
15719
15769
|
* implementation.
|
|
15720
|
-
* This will typically be the name of the provider, e.g
|
|
15770
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
15721
15771
|
*/
|
|
15722
15772
|
solverName?: pulumi.Input<string>;
|
|
15723
15773
|
}
|
|
@@ -15732,7 +15782,7 @@ export namespace cert_manager {
|
|
|
15732
15782
|
* when challenges are processed.
|
|
15733
15783
|
* This can contain arbitrary JSON data.
|
|
15734
15784
|
* Secret values should not be specified in this stanza.
|
|
15735
|
-
* If secret values are needed (e.g
|
|
15785
|
+
* If secret values are needed (e.g., credentials for a DNS service), you
|
|
15736
15786
|
* should use a SecretKeySelector to reference a Secret resource.
|
|
15737
15787
|
* For details on the schema of this field, consult the webhook provider
|
|
15738
15788
|
* implementation's documentation.
|
|
@@ -15748,7 +15798,7 @@ export namespace cert_manager {
|
|
|
15748
15798
|
/**
|
|
15749
15799
|
* The name of the solver to use, as defined in the webhook provider
|
|
15750
15800
|
* implementation.
|
|
15751
|
-
* This will typically be the name of the provider, e.g
|
|
15801
|
+
* This will typically be the name of the provider, e.g., 'cloudflare'.
|
|
15752
15802
|
*/
|
|
15753
15803
|
solverName?: pulumi.Input<string>;
|
|
15754
15804
|
}
|
|
@@ -15757,7 +15807,7 @@ export namespace cert_manager {
|
|
|
15757
15807
|
* Configures cert-manager to attempt to complete authorizations by
|
|
15758
15808
|
* performing the HTTP01 challenge flow.
|
|
15759
15809
|
* It is not possible to obtain certificates for wildcard domain names
|
|
15760
|
-
* (e.g
|
|
15810
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
15761
15811
|
*/
|
|
15762
15812
|
export interface IssuerSpecAcmeSolversHttp01 {
|
|
15763
15813
|
gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoute>;
|
|
@@ -20354,7 +20404,7 @@ export namespace cert_manager {
|
|
|
20354
20404
|
* Configures cert-manager to attempt to complete authorizations by
|
|
20355
20405
|
* performing the HTTP01 challenge flow.
|
|
20356
20406
|
* It is not possible to obtain certificates for wildcard domain names
|
|
20357
|
-
* (e.g
|
|
20407
|
+
* (e.g., `*.example.com`) using the HTTP01 challenge mechanism.
|
|
20358
20408
|
*/
|
|
20359
20409
|
export interface IssuerSpecAcmeSolversHttp01Patch {
|
|
20360
20410
|
gatewayHTTPRoute?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecAcmeSolversHttp01GatewayHTTPRoutePatch>;
|
|
@@ -20581,6 +20631,11 @@ export namespace cert_manager {
|
|
|
20581
20631
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
20582
20632
|
*/
|
|
20583
20633
|
server?: pulumi.Input<string>;
|
|
20634
|
+
/**
|
|
20635
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
20636
|
+
* by the Vault server.
|
|
20637
|
+
*/
|
|
20638
|
+
serverName?: pulumi.Input<string>;
|
|
20584
20639
|
}
|
|
20585
20640
|
|
|
20586
20641
|
/**
|
|
@@ -21031,6 +21086,11 @@ export namespace cert_manager {
|
|
|
21031
21086
|
* Server is the connection address for the Vault server, e.g: "https://vault.example.com:8200".
|
|
21032
21087
|
*/
|
|
21033
21088
|
server?: pulumi.Input<string>;
|
|
21089
|
+
/**
|
|
21090
|
+
* ServerName is used to verify the hostname on the returned certificates
|
|
21091
|
+
* by the Vault server.
|
|
21092
|
+
*/
|
|
21093
|
+
serverName?: pulumi.Input<string>;
|
|
21034
21094
|
}
|
|
21035
21095
|
|
|
21036
21096
|
/**
|
|
@@ -21057,7 +21117,7 @@ export namespace cert_manager {
|
|
|
21057
21117
|
apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRef>;
|
|
21058
21118
|
/**
|
|
21059
21119
|
* URL is the base URL for Venafi Cloud.
|
|
21060
|
-
* Defaults to "https://api.venafi.cloud/
|
|
21120
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
21061
21121
|
*/
|
|
21062
21122
|
url?: pulumi.Input<string>;
|
|
21063
21123
|
}
|
|
@@ -21104,7 +21164,7 @@ export namespace cert_manager {
|
|
|
21104
21164
|
apiTokenSecretRef?: pulumi.Input<inputs.cert_manager.v1.IssuerSpecVenafiCloudApiTokenSecretRefPatch>;
|
|
21105
21165
|
/**
|
|
21106
21166
|
* URL is the base URL for Venafi Cloud.
|
|
21107
|
-
* Defaults to "https://api.venafi.cloud/
|
|
21167
|
+
* Defaults to "https://api.venafi.cloud/".
|
|
21108
21168
|
*/
|
|
21109
21169
|
url?: pulumi.Input<string>;
|
|
21110
21170
|
}
|
|
@@ -21336,5 +21396,293 @@ export namespace meta {
|
|
|
21336
21396
|
selfLink?: pulumi.Input<string>;
|
|
21337
21397
|
}
|
|
21338
21398
|
|
|
21399
|
+
/**
|
|
21400
|
+
* ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
|
|
21401
|
+
*/
|
|
21402
|
+
export interface ManagedFieldsEntry {
|
|
21403
|
+
/**
|
|
21404
|
+
* APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
|
|
21405
|
+
*/
|
|
21406
|
+
apiVersion?: pulumi.Input<string>;
|
|
21407
|
+
/**
|
|
21408
|
+
* FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
|
|
21409
|
+
*/
|
|
21410
|
+
fieldsType?: pulumi.Input<string>;
|
|
21411
|
+
/**
|
|
21412
|
+
* FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
|
|
21413
|
+
*/
|
|
21414
|
+
fieldsV1?: any;
|
|
21415
|
+
/**
|
|
21416
|
+
* Manager is an identifier of the workflow managing these fields.
|
|
21417
|
+
*/
|
|
21418
|
+
manager?: pulumi.Input<string>;
|
|
21419
|
+
/**
|
|
21420
|
+
* Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
|
|
21421
|
+
*/
|
|
21422
|
+
operation?: pulumi.Input<string>;
|
|
21423
|
+
/**
|
|
21424
|
+
* Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
|
|
21425
|
+
*/
|
|
21426
|
+
subresource?: pulumi.Input<string>;
|
|
21427
|
+
/**
|
|
21428
|
+
* Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
|
|
21429
|
+
*/
|
|
21430
|
+
time?: pulumi.Input<string>;
|
|
21431
|
+
}
|
|
21432
|
+
|
|
21433
|
+
/**
|
|
21434
|
+
* ManagedFieldsEntry is a workflow-id, a FieldSet and the group version of the resource that the fieldset applies to.
|
|
21435
|
+
*/
|
|
21436
|
+
export interface ManagedFieldsEntryPatch {
|
|
21437
|
+
/**
|
|
21438
|
+
* APIVersion defines the version of this resource that this field set applies to. The format is "group/version" just like the top-level APIVersion field. It is necessary to track the version of a field set because it cannot be automatically converted.
|
|
21439
|
+
*/
|
|
21440
|
+
apiVersion?: pulumi.Input<string>;
|
|
21441
|
+
/**
|
|
21442
|
+
* FieldsType is the discriminator for the different fields format and version. There is currently only one possible value: "FieldsV1"
|
|
21443
|
+
*/
|
|
21444
|
+
fieldsType?: pulumi.Input<string>;
|
|
21445
|
+
/**
|
|
21446
|
+
* FieldsV1 holds the first JSON version format as described in the "FieldsV1" type.
|
|
21447
|
+
*/
|
|
21448
|
+
fieldsV1?: any;
|
|
21449
|
+
/**
|
|
21450
|
+
* Manager is an identifier of the workflow managing these fields.
|
|
21451
|
+
*/
|
|
21452
|
+
manager?: pulumi.Input<string>;
|
|
21453
|
+
/**
|
|
21454
|
+
* Operation is the type of operation which lead to this ManagedFieldsEntry being created. The only valid values for this field are 'Apply' and 'Update'.
|
|
21455
|
+
*/
|
|
21456
|
+
operation?: pulumi.Input<string>;
|
|
21457
|
+
/**
|
|
21458
|
+
* Subresource is the name of the subresource used to update that object, or empty string if the object was updated through the main resource. The value of this field is used to distinguish between managers, even if they share the same name. For example, a status update will be distinct from a regular update using the same manager name. Note that the APIVersion field is not related to the Subresource field and it always corresponds to the version of the main resource.
|
|
21459
|
+
*/
|
|
21460
|
+
subresource?: pulumi.Input<string>;
|
|
21461
|
+
/**
|
|
21462
|
+
* Time is the timestamp of when the ManagedFields entry was added. The timestamp will also be updated if a field is added, the manager changes any of the owned fields value or removes a field. The timestamp does not update when a field is removed from the entry because another manager took it over.
|
|
21463
|
+
*/
|
|
21464
|
+
time?: pulumi.Input<string>;
|
|
21465
|
+
}
|
|
21466
|
+
|
|
21467
|
+
/**
|
|
21468
|
+
* ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
|
|
21469
|
+
*/
|
|
21470
|
+
export interface ObjectMeta {
|
|
21471
|
+
/**
|
|
21472
|
+
* Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
|
|
21473
|
+
*/
|
|
21474
|
+
annotations?: pulumi.Input<{[key: string]: pulumi.Input<string>}>;
|
|
21475
|
+
/**
|
|
21476
|
+
* CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
|
|
21477
|
+
*
|
|
21478
|
+
* Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21479
|
+
*/
|
|
21480
|
+
creationTimestamp?: pulumi.Input<string>;
|
|
21481
|
+
/**
|
|
21482
|
+
* Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
|
|
21483
|
+
*/
|
|
21484
|
+
deletionGracePeriodSeconds?: pulumi.Input<number>;
|
|
21485
|
+
/**
|
|
21486
|
+
* DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
|
|
21487
|
+
*
|
|
21488
|
+
* Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21489
|
+
*/
|
|
21490
|
+
deletionTimestamp?: pulumi.Input<string>;
|
|
21491
|
+
/**
|
|
21492
|
+
* Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
|
|
21493
|
+
*/
|
|
21494
|
+
finalizers?: pulumi.Input<pulumi.Input<string>[]>;
|
|
21495
|
+
/**
|
|
21496
|
+
* GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
|
|
21497
|
+
*
|
|
21498
|
+
* If this field is specified and the generated name exists, the server will return a 409.
|
|
21499
|
+
*
|
|
21500
|
+
* Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
|
|
21501
|
+
*/
|
|
21502
|
+
generateName?: pulumi.Input<string>;
|
|
21503
|
+
/**
|
|
21504
|
+
* A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
|
|
21505
|
+
*/
|
|
21506
|
+
generation?: pulumi.Input<number>;
|
|
21507
|
+
/**
|
|
21508
|
+
* Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
|
|
21509
|
+
*/
|
|
21510
|
+
labels?: pulumi.Input<{[key: string]: pulumi.Input<string>}>;
|
|
21511
|
+
/**
|
|
21512
|
+
* ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
|
|
21513
|
+
*/
|
|
21514
|
+
managedFields?: pulumi.Input<pulumi.Input<inputs.meta.v1.ManagedFieldsEntry>[]>;
|
|
21515
|
+
/**
|
|
21516
|
+
* Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21517
|
+
*/
|
|
21518
|
+
name?: pulumi.Input<string>;
|
|
21519
|
+
/**
|
|
21520
|
+
* Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
|
|
21521
|
+
*
|
|
21522
|
+
* Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
|
|
21523
|
+
*/
|
|
21524
|
+
namespace?: pulumi.Input<string>;
|
|
21525
|
+
/**
|
|
21526
|
+
* List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
|
|
21527
|
+
*/
|
|
21528
|
+
ownerReferences?: pulumi.Input<pulumi.Input<inputs.meta.v1.OwnerReference>[]>;
|
|
21529
|
+
/**
|
|
21530
|
+
* An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
|
|
21531
|
+
*
|
|
21532
|
+
* Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
|
|
21533
|
+
*/
|
|
21534
|
+
resourceVersion?: pulumi.Input<string>;
|
|
21535
|
+
/**
|
|
21536
|
+
* Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
|
|
21537
|
+
*/
|
|
21538
|
+
selfLink?: pulumi.Input<string>;
|
|
21539
|
+
/**
|
|
21540
|
+
* UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
|
|
21541
|
+
*
|
|
21542
|
+
* Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21543
|
+
*/
|
|
21544
|
+
uid?: pulumi.Input<string>;
|
|
21545
|
+
}
|
|
21546
|
+
|
|
21547
|
+
/**
|
|
21548
|
+
* ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create.
|
|
21549
|
+
*/
|
|
21550
|
+
export interface ObjectMetaPatch {
|
|
21551
|
+
/**
|
|
21552
|
+
* Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations
|
|
21553
|
+
*/
|
|
21554
|
+
annotations?: pulumi.Input<{[key: string]: pulumi.Input<string>}>;
|
|
21555
|
+
/**
|
|
21556
|
+
* CreationTimestamp is a timestamp representing the server time when this object was created. It is not guaranteed to be set in happens-before order across separate operations. Clients may not set this value. It is represented in RFC3339 form and is in UTC.
|
|
21557
|
+
*
|
|
21558
|
+
* Populated by the system. Read-only. Null for lists. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21559
|
+
*/
|
|
21560
|
+
creationTimestamp?: pulumi.Input<string>;
|
|
21561
|
+
/**
|
|
21562
|
+
* Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only.
|
|
21563
|
+
*/
|
|
21564
|
+
deletionGracePeriodSeconds?: pulumi.Input<number>;
|
|
21565
|
+
/**
|
|
21566
|
+
* DeletionTimestamp is RFC 3339 date and time at which this resource will be deleted. This field is set by the server when a graceful deletion is requested by the user, and is not directly settable by a client. The resource is expected to be deleted (no longer visible from resource lists, and not reachable by name) after the time in this field, once the finalizers list is empty. As long as the finalizers list contains items, deletion is blocked. Once the deletionTimestamp is set, this value may not be unset or be set further into the future, although it may be shortened or the resource may be deleted prior to this time. For example, a user may request that a pod is deleted in 30 seconds. The Kubelet will react by sending a graceful termination signal to the containers in the pod. After that 30 seconds, the Kubelet will send a hard termination signal (SIGKILL) to the container and after cleanup, remove the pod from the API. In the presence of network partitions, this object may still exist after this timestamp, until an administrator or automated process can determine the resource is fully terminated. If not set, graceful deletion of the object has not been requested.
|
|
21567
|
+
*
|
|
21568
|
+
* Populated by the system when a graceful deletion is requested. Read-only. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
|
21569
|
+
*/
|
|
21570
|
+
deletionTimestamp?: pulumi.Input<string>;
|
|
21571
|
+
/**
|
|
21572
|
+
* Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list.
|
|
21573
|
+
*/
|
|
21574
|
+
finalizers?: pulumi.Input<pulumi.Input<string>[]>;
|
|
21575
|
+
/**
|
|
21576
|
+
* GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.
|
|
21577
|
+
*
|
|
21578
|
+
* If this field is specified and the generated name exists, the server will return a 409.
|
|
21579
|
+
*
|
|
21580
|
+
* Applied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency
|
|
21581
|
+
*/
|
|
21582
|
+
generateName?: pulumi.Input<string>;
|
|
21583
|
+
/**
|
|
21584
|
+
* A sequence number representing a specific generation of the desired state. Populated by the system. Read-only.
|
|
21585
|
+
*/
|
|
21586
|
+
generation?: pulumi.Input<number>;
|
|
21587
|
+
/**
|
|
21588
|
+
* Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/labels
|
|
21589
|
+
*/
|
|
21590
|
+
labels?: pulumi.Input<{[key: string]: pulumi.Input<string>}>;
|
|
21591
|
+
/**
|
|
21592
|
+
* ManagedFields maps workflow-id and version to the set of fields that are managed by that workflow. This is mostly for internal housekeeping, and users typically shouldn't need to set or understand this field. A workflow can be the user's name, a controller's name, or the name of a specific apply path like "ci-cd". The set of fields is always in the version that the workflow used when modifying the object.
|
|
21593
|
+
*/
|
|
21594
|
+
managedFields?: pulumi.Input<pulumi.Input<inputs.meta.v1.ManagedFieldsEntryPatch>[]>;
|
|
21595
|
+
/**
|
|
21596
|
+
* Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21597
|
+
*/
|
|
21598
|
+
name?: pulumi.Input<string>;
|
|
21599
|
+
/**
|
|
21600
|
+
* Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the "default" namespace, but "default" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.
|
|
21601
|
+
*
|
|
21602
|
+
* Must be a DNS_LABEL. Cannot be updated. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces
|
|
21603
|
+
*/
|
|
21604
|
+
namespace?: pulumi.Input<string>;
|
|
21605
|
+
/**
|
|
21606
|
+
* List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller.
|
|
21607
|
+
*/
|
|
21608
|
+
ownerReferences?: pulumi.Input<pulumi.Input<inputs.meta.v1.OwnerReferencePatch>[]>;
|
|
21609
|
+
/**
|
|
21610
|
+
* An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.
|
|
21611
|
+
*
|
|
21612
|
+
* Populated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency
|
|
21613
|
+
*/
|
|
21614
|
+
resourceVersion?: pulumi.Input<string>;
|
|
21615
|
+
/**
|
|
21616
|
+
* Deprecated: selfLink is a legacy read-only field that is no longer populated by the system.
|
|
21617
|
+
*/
|
|
21618
|
+
selfLink?: pulumi.Input<string>;
|
|
21619
|
+
/**
|
|
21620
|
+
* UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.
|
|
21621
|
+
*
|
|
21622
|
+
* Populated by the system. Read-only. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21623
|
+
*/
|
|
21624
|
+
uid?: pulumi.Input<string>;
|
|
21625
|
+
}
|
|
21626
|
+
|
|
21627
|
+
/**
|
|
21628
|
+
* OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
|
|
21629
|
+
*/
|
|
21630
|
+
export interface OwnerReference {
|
|
21631
|
+
/**
|
|
21632
|
+
* API version of the referent.
|
|
21633
|
+
*/
|
|
21634
|
+
apiVersion: pulumi.Input<string>;
|
|
21635
|
+
/**
|
|
21636
|
+
* If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
|
|
21637
|
+
*/
|
|
21638
|
+
blockOwnerDeletion?: pulumi.Input<boolean>;
|
|
21639
|
+
/**
|
|
21640
|
+
* If true, this reference points to the managing controller.
|
|
21641
|
+
*/
|
|
21642
|
+
controller?: pulumi.Input<boolean>;
|
|
21643
|
+
/**
|
|
21644
|
+
* Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
21645
|
+
*/
|
|
21646
|
+
kind: pulumi.Input<string>;
|
|
21647
|
+
/**
|
|
21648
|
+
* Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21649
|
+
*/
|
|
21650
|
+
name: pulumi.Input<string>;
|
|
21651
|
+
/**
|
|
21652
|
+
* UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21653
|
+
*/
|
|
21654
|
+
uid: pulumi.Input<string>;
|
|
21655
|
+
}
|
|
21656
|
+
|
|
21657
|
+
/**
|
|
21658
|
+
* OwnerReference contains enough information to let you identify an owning object. An owning object must be in the same namespace as the dependent, or be cluster-scoped, so there is no namespace field.
|
|
21659
|
+
*/
|
|
21660
|
+
export interface OwnerReferencePatch {
|
|
21661
|
+
/**
|
|
21662
|
+
* API version of the referent.
|
|
21663
|
+
*/
|
|
21664
|
+
apiVersion?: pulumi.Input<string>;
|
|
21665
|
+
/**
|
|
21666
|
+
* If true, AND if the owner has the "foregroundDeletion" finalizer, then the owner cannot be deleted from the key-value store until this reference is removed. See https://kubernetes.io/docs/concepts/architecture/garbage-collection/#foreground-deletion for how the garbage collector interacts with this field and enforces the foreground deletion. Defaults to false. To set this field, a user needs "delete" permission of the owner, otherwise 422 (Unprocessable Entity) will be returned.
|
|
21667
|
+
*/
|
|
21668
|
+
blockOwnerDeletion?: pulumi.Input<boolean>;
|
|
21669
|
+
/**
|
|
21670
|
+
* If true, this reference points to the managing controller.
|
|
21671
|
+
*/
|
|
21672
|
+
controller?: pulumi.Input<boolean>;
|
|
21673
|
+
/**
|
|
21674
|
+
* Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
21675
|
+
*/
|
|
21676
|
+
kind?: pulumi.Input<string>;
|
|
21677
|
+
/**
|
|
21678
|
+
* Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#names
|
|
21679
|
+
*/
|
|
21680
|
+
name?: pulumi.Input<string>;
|
|
21681
|
+
/**
|
|
21682
|
+
* UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uids
|
|
21683
|
+
*/
|
|
21684
|
+
uid?: pulumi.Input<string>;
|
|
21685
|
+
}
|
|
21686
|
+
|
|
21339
21687
|
}
|
|
21340
21688
|
}
|