@pulumiverse/talos 0.1.7 → 0.1.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/machine/{configuration.d.ts → getConfiguration.d.ts} +13 -13
- package/machine/{configuration.js → getConfiguration.js} +10 -10
- package/machine/getConfiguration.js.map +1 -0
- package/machine/index.d.ts +3 -3
- package/machine/index.js +4 -4
- package/machine/index.js.map +1 -1
- package/machine/secrets.d.ts +2 -2
- package/package.json +1 -1
- package/types/input.d.ts +122 -309
- package/types/output.d.ts +65 -215
- package/machine/configuration.js.map +0 -1
|
@@ -14,7 +14,7 @@ import * as outputs from "../types/output";
|
|
|
14
14
|
* import * as talos from "@pulumiverse/talos";
|
|
15
15
|
*
|
|
16
16
|
* const thisSecrets = new talos.machine.Secrets("thisSecrets", {});
|
|
17
|
-
* const thisConfiguration = talos.machine.
|
|
17
|
+
* const thisConfiguration = talos.machine.getConfigurationOutput({
|
|
18
18
|
* clusterName: "example-cluster",
|
|
19
19
|
* machineType: "controlplane",
|
|
20
20
|
* clusterEndpoint: "https://cluster.local:6443",
|
|
@@ -22,11 +22,11 @@ import * as outputs from "../types/output";
|
|
|
22
22
|
* });
|
|
23
23
|
* ```
|
|
24
24
|
*/
|
|
25
|
-
export declare function
|
|
25
|
+
export declare function getConfiguration(args: GetConfigurationArgs, opts?: pulumi.InvokeOptions): Promise<GetConfigurationResult>;
|
|
26
26
|
/**
|
|
27
|
-
* A collection of arguments for invoking
|
|
27
|
+
* A collection of arguments for invoking getConfiguration.
|
|
28
28
|
*/
|
|
29
|
-
export interface
|
|
29
|
+
export interface GetConfigurationArgs {
|
|
30
30
|
/**
|
|
31
31
|
* The endpoint of the talos kubernetes cluster
|
|
32
32
|
*/
|
|
@@ -54,7 +54,7 @@ export interface ConfigurationArgs {
|
|
|
54
54
|
/**
|
|
55
55
|
* The secrets for the talos cluster
|
|
56
56
|
*/
|
|
57
|
-
machineSecrets: inputs.machine.
|
|
57
|
+
machineSecrets: inputs.machine.MachineSecrets;
|
|
58
58
|
/**
|
|
59
59
|
* The type of machine to generate the configuration for
|
|
60
60
|
*/
|
|
@@ -65,9 +65,9 @@ export interface ConfigurationArgs {
|
|
|
65
65
|
talosVersion?: string;
|
|
66
66
|
}
|
|
67
67
|
/**
|
|
68
|
-
* A collection of values returned by
|
|
68
|
+
* A collection of values returned by getConfiguration.
|
|
69
69
|
*/
|
|
70
|
-
export interface
|
|
70
|
+
export interface GetConfigurationResult {
|
|
71
71
|
/**
|
|
72
72
|
* The endpoint of the talos kubernetes cluster
|
|
73
73
|
*/
|
|
@@ -103,7 +103,7 @@ export interface ConfigurationResult {
|
|
|
103
103
|
/**
|
|
104
104
|
* The secrets for the talos cluster
|
|
105
105
|
*/
|
|
106
|
-
readonly machineSecrets: outputs.machine.
|
|
106
|
+
readonly machineSecrets: outputs.machine.MachineSecrets;
|
|
107
107
|
/**
|
|
108
108
|
* The type of machine to generate the configuration for
|
|
109
109
|
*/
|
|
@@ -126,7 +126,7 @@ export interface ConfigurationResult {
|
|
|
126
126
|
* import * as talos from "@pulumiverse/talos";
|
|
127
127
|
*
|
|
128
128
|
* const thisSecrets = new talos.machine.Secrets("thisSecrets", {});
|
|
129
|
-
* const thisConfiguration = talos.machine.
|
|
129
|
+
* const thisConfiguration = talos.machine.getConfigurationOutput({
|
|
130
130
|
* clusterName: "example-cluster",
|
|
131
131
|
* machineType: "controlplane",
|
|
132
132
|
* clusterEndpoint: "https://cluster.local:6443",
|
|
@@ -134,11 +134,11 @@ export interface ConfigurationResult {
|
|
|
134
134
|
* });
|
|
135
135
|
* ```
|
|
136
136
|
*/
|
|
137
|
-
export declare function
|
|
137
|
+
export declare function getConfigurationOutput(args: GetConfigurationOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetConfigurationResult>;
|
|
138
138
|
/**
|
|
139
|
-
* A collection of arguments for invoking
|
|
139
|
+
* A collection of arguments for invoking getConfiguration.
|
|
140
140
|
*/
|
|
141
|
-
export interface
|
|
141
|
+
export interface GetConfigurationOutputArgs {
|
|
142
142
|
/**
|
|
143
143
|
* The endpoint of the talos kubernetes cluster
|
|
144
144
|
*/
|
|
@@ -166,7 +166,7 @@ export interface ConfigurationOutputArgs {
|
|
|
166
166
|
/**
|
|
167
167
|
* The secrets for the talos cluster
|
|
168
168
|
*/
|
|
169
|
-
machineSecrets: pulumi.Input<inputs.machine.
|
|
169
|
+
machineSecrets: pulumi.Input<inputs.machine.MachineSecretsArgs>;
|
|
170
170
|
/**
|
|
171
171
|
* The type of machine to generate the configuration for
|
|
172
172
|
*/
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.
|
|
5
|
+
exports.getConfigurationOutput = exports.getConfiguration = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
@@ -18,7 +18,7 @@ const utilities = require("../utilities");
|
|
|
18
18
|
* import * as talos from "@pulumiverse/talos";
|
|
19
19
|
*
|
|
20
20
|
* const thisSecrets = new talos.machine.Secrets("thisSecrets", {});
|
|
21
|
-
* const thisConfiguration = talos.machine.
|
|
21
|
+
* const thisConfiguration = talos.machine.getConfigurationOutput({
|
|
22
22
|
* clusterName: "example-cluster",
|
|
23
23
|
* machineType: "controlplane",
|
|
24
24
|
* clusterEndpoint: "https://cluster.local:6443",
|
|
@@ -26,9 +26,9 @@ const utilities = require("../utilities");
|
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
28
28
|
*/
|
|
29
|
-
function
|
|
29
|
+
function getConfiguration(args, opts) {
|
|
30
30
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts || {});
|
|
31
|
-
return pulumi.runtime.invoke("talos:machine/
|
|
31
|
+
return pulumi.runtime.invoke("talos:machine/getConfiguration:getConfiguration", {
|
|
32
32
|
"clusterEndpoint": args.clusterEndpoint,
|
|
33
33
|
"clusterName": args.clusterName,
|
|
34
34
|
"configPatches": args.configPatches,
|
|
@@ -40,7 +40,7 @@ function configuration(args, opts) {
|
|
|
40
40
|
"talosVersion": args.talosVersion,
|
|
41
41
|
}, opts);
|
|
42
42
|
}
|
|
43
|
-
exports.
|
|
43
|
+
exports.getConfiguration = getConfiguration;
|
|
44
44
|
/**
|
|
45
45
|
* Generate a machine configuration for a node type
|
|
46
46
|
*
|
|
@@ -54,7 +54,7 @@ exports.configuration = configuration;
|
|
|
54
54
|
* import * as talos from "@pulumiverse/talos";
|
|
55
55
|
*
|
|
56
56
|
* const thisSecrets = new talos.machine.Secrets("thisSecrets", {});
|
|
57
|
-
* const thisConfiguration = talos.machine.
|
|
57
|
+
* const thisConfiguration = talos.machine.getConfigurationOutput({
|
|
58
58
|
* clusterName: "example-cluster",
|
|
59
59
|
* machineType: "controlplane",
|
|
60
60
|
* clusterEndpoint: "https://cluster.local:6443",
|
|
@@ -62,8 +62,8 @@ exports.configuration = configuration;
|
|
|
62
62
|
* });
|
|
63
63
|
* ```
|
|
64
64
|
*/
|
|
65
|
-
function
|
|
66
|
-
return pulumi.output(args).apply((a) =>
|
|
65
|
+
function getConfigurationOutput(args, opts) {
|
|
66
|
+
return pulumi.output(args).apply((a) => getConfiguration(a, opts));
|
|
67
67
|
}
|
|
68
|
-
exports.
|
|
69
|
-
//# sourceMappingURL=
|
|
68
|
+
exports.getConfigurationOutput = getConfigurationOutput;
|
|
69
|
+
//# sourceMappingURL=getConfiguration.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getConfiguration.js","sourceRoot":"","sources":["../../machine/getConfiguration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,gBAAgB,CAAC,IAA0B,EAAE,IAA2B;IAEpF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,iDAAiD,EAAE;QAC5E,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,4CAcC;AA6FD;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,gBAAgB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC3E,CAAC;AAFD,wDAEC"}
|
package/machine/index.d.ts
CHANGED
|
@@ -1,15 +1,15 @@
|
|
|
1
1
|
export { BootstrapArgs, BootstrapState } from "./bootstrap";
|
|
2
2
|
export type Bootstrap = import("./bootstrap").Bootstrap;
|
|
3
3
|
export declare const Bootstrap: typeof import("./bootstrap").Bootstrap;
|
|
4
|
-
export { ConfigurationArgs, ConfigurationResult, ConfigurationOutputArgs } from "./configuration";
|
|
5
|
-
export declare const configuration: typeof import("./configuration").configuration;
|
|
6
|
-
export declare const configurationOutput: typeof import("./configuration").configurationOutput;
|
|
7
4
|
export { ConfigurationApplyArgs, ConfigurationApplyState } from "./configurationApply";
|
|
8
5
|
export type ConfigurationApply = import("./configurationApply").ConfigurationApply;
|
|
9
6
|
export declare const ConfigurationApply: typeof import("./configurationApply").ConfigurationApply;
|
|
10
7
|
export { DisksArgs, DisksResult, DisksOutputArgs } from "./disks";
|
|
11
8
|
export declare const disks: typeof import("./disks").disks;
|
|
12
9
|
export declare const disksOutput: typeof import("./disks").disksOutput;
|
|
10
|
+
export { GetConfigurationArgs, GetConfigurationResult, GetConfigurationOutputArgs } from "./getConfiguration";
|
|
11
|
+
export declare const getConfiguration: typeof import("./getConfiguration").getConfiguration;
|
|
12
|
+
export declare const getConfigurationOutput: typeof import("./getConfiguration").getConfigurationOutput;
|
|
13
13
|
export { SecretsArgs, SecretsState } from "./secrets";
|
|
14
14
|
export type Secrets = import("./secrets").Secrets;
|
|
15
15
|
export declare const Secrets: typeof import("./secrets").Secrets;
|
package/machine/index.js
CHANGED
|
@@ -2,19 +2,19 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.Secrets = exports.
|
|
5
|
+
exports.Secrets = exports.getConfigurationOutput = exports.getConfiguration = exports.disksOutput = exports.disks = exports.ConfigurationApply = exports.Bootstrap = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
exports.Bootstrap = null;
|
|
9
9
|
utilities.lazyLoad(exports, ["Bootstrap"], () => require("./bootstrap"));
|
|
10
|
-
exports.configuration = null;
|
|
11
|
-
exports.configurationOutput = null;
|
|
12
|
-
utilities.lazyLoad(exports, ["configuration", "configurationOutput"], () => require("./configuration"));
|
|
13
10
|
exports.ConfigurationApply = null;
|
|
14
11
|
utilities.lazyLoad(exports, ["ConfigurationApply"], () => require("./configurationApply"));
|
|
15
12
|
exports.disks = null;
|
|
16
13
|
exports.disksOutput = null;
|
|
17
14
|
utilities.lazyLoad(exports, ["disks", "disksOutput"], () => require("./disks"));
|
|
15
|
+
exports.getConfiguration = null;
|
|
16
|
+
exports.getConfigurationOutput = null;
|
|
17
|
+
utilities.lazyLoad(exports, ["getConfiguration", "getConfigurationOutput"], () => require("./getConfiguration"));
|
|
18
18
|
exports.Secrets = null;
|
|
19
19
|
utilities.lazyLoad(exports, ["Secrets"], () => require("./secrets"));
|
|
20
20
|
const _module = {
|
package/machine/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../machine/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../machine/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAG9E,QAAA,KAAK,GAAmC,IAAW,CAAC;AACpD,QAAA,WAAW,GAAyC,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,EAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAGlE,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AACrF,QAAA,sBAAsB,GAA+D,IAAW,CAAC;AAC9G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,EAAC,wBAAwB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAInG,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAGrE,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,mCAAmC;gBACpC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,qDAAqD;gBACtD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,+BAA+B;gBAChC,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA"}
|
package/machine/secrets.d.ts
CHANGED
|
@@ -44,7 +44,7 @@ export declare class Secrets extends pulumi.CustomResource {
|
|
|
44
44
|
/**
|
|
45
45
|
* The secrets for the talos cluster
|
|
46
46
|
*/
|
|
47
|
-
readonly machineSecrets: pulumi.Output<outputs.machine.
|
|
47
|
+
readonly machineSecrets: pulumi.Output<outputs.machine.MachineSecrets>;
|
|
48
48
|
/**
|
|
49
49
|
* The version of talos features to use in generated machine configuration
|
|
50
50
|
*/
|
|
@@ -69,7 +69,7 @@ export interface SecretsState {
|
|
|
69
69
|
/**
|
|
70
70
|
* The secrets for the talos cluster
|
|
71
71
|
*/
|
|
72
|
-
machineSecrets?: pulumi.Input<inputs.machine.
|
|
72
|
+
machineSecrets?: pulumi.Input<inputs.machine.MachineSecretsArgs>;
|
|
73
73
|
/**
|
|
74
74
|
* The version of talos features to use in generated machine configuration
|
|
75
75
|
*/
|
package/package.json
CHANGED
package/types/input.d.ts
CHANGED
|
@@ -93,245 +93,91 @@ export declare namespace machine {
|
|
|
93
93
|
*/
|
|
94
94
|
create?: pulumi.Input<string>;
|
|
95
95
|
}
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
caCertificate: pulumi.Input<string>;
|
|
101
|
-
/**
|
|
102
|
-
* The client certificate
|
|
103
|
-
*/
|
|
104
|
-
clientCertificate: pulumi.Input<string>;
|
|
105
|
-
/**
|
|
106
|
-
* The client key
|
|
107
|
-
*/
|
|
108
|
-
clientKey: pulumi.Input<string>;
|
|
109
|
-
}
|
|
110
|
-
interface ConfigurationMachineSecrets {
|
|
111
|
-
/**
|
|
112
|
-
* The certs for the talos kubernetes cluster
|
|
113
|
-
*/
|
|
114
|
-
certs: inputs.machine.ConfigurationMachineSecretsCerts;
|
|
115
|
-
/**
|
|
116
|
-
* The cluster secrets
|
|
117
|
-
*/
|
|
118
|
-
cluster: inputs.machine.ConfigurationMachineSecretsCluster;
|
|
119
|
-
/**
|
|
120
|
-
* The secrets for the talos kubernetes cluster
|
|
121
|
-
*/
|
|
122
|
-
secrets: inputs.machine.ConfigurationMachineSecretsSecrets;
|
|
123
|
-
/**
|
|
124
|
-
* The trustd info for the talos kubernetes cluster
|
|
125
|
-
*/
|
|
126
|
-
trustdinfo: inputs.machine.ConfigurationMachineSecretsTrustdinfo;
|
|
127
|
-
}
|
|
128
|
-
interface ConfigurationMachineSecretsArgs {
|
|
129
|
-
/**
|
|
130
|
-
* The certs for the talos kubernetes cluster
|
|
131
|
-
*/
|
|
132
|
-
certs: pulumi.Input<inputs.machine.ConfigurationMachineSecretsCertsArgs>;
|
|
133
|
-
/**
|
|
134
|
-
* The cluster secrets
|
|
135
|
-
*/
|
|
136
|
-
cluster: pulumi.Input<inputs.machine.ConfigurationMachineSecretsClusterArgs>;
|
|
137
|
-
/**
|
|
138
|
-
* The secrets for the talos kubernetes cluster
|
|
139
|
-
*/
|
|
140
|
-
secrets: pulumi.Input<inputs.machine.ConfigurationMachineSecretsSecretsArgs>;
|
|
141
|
-
/**
|
|
142
|
-
* The trustd info for the talos kubernetes cluster
|
|
143
|
-
*/
|
|
144
|
-
trustdinfo: pulumi.Input<inputs.machine.ConfigurationMachineSecretsTrustdinfoArgs>;
|
|
145
|
-
}
|
|
146
|
-
interface ConfigurationMachineSecretsCerts {
|
|
147
|
-
/**
|
|
148
|
-
* The certificate and key pair
|
|
149
|
-
*/
|
|
150
|
-
etcd: inputs.machine.ConfigurationMachineSecretsCertsEtcd;
|
|
151
|
-
/**
|
|
152
|
-
* The certificate and key pair
|
|
153
|
-
*/
|
|
154
|
-
k8s: inputs.machine.ConfigurationMachineSecretsCertsK8s;
|
|
155
|
-
/**
|
|
156
|
-
* The certificate and key pair
|
|
157
|
-
*/
|
|
158
|
-
k8sAggregator: inputs.machine.ConfigurationMachineSecretsCertsK8sAggregator;
|
|
159
|
-
k8sServiceaccount: inputs.machine.ConfigurationMachineSecretsCertsK8sServiceaccount;
|
|
160
|
-
/**
|
|
161
|
-
* The certificate and key pair
|
|
162
|
-
*/
|
|
163
|
-
os: inputs.machine.ConfigurationMachineSecretsCertsOs;
|
|
164
|
-
}
|
|
165
|
-
interface ConfigurationMachineSecretsCertsArgs {
|
|
166
|
-
/**
|
|
167
|
-
* The certificate and key pair
|
|
168
|
-
*/
|
|
169
|
-
etcd: pulumi.Input<inputs.machine.ConfigurationMachineSecretsCertsEtcdArgs>;
|
|
170
|
-
/**
|
|
171
|
-
* The certificate and key pair
|
|
172
|
-
*/
|
|
173
|
-
k8s: pulumi.Input<inputs.machine.ConfigurationMachineSecretsCertsK8sArgs>;
|
|
174
|
-
/**
|
|
175
|
-
* The certificate and key pair
|
|
176
|
-
*/
|
|
177
|
-
k8sAggregator: pulumi.Input<inputs.machine.ConfigurationMachineSecretsCertsK8sAggregatorArgs>;
|
|
178
|
-
k8sServiceaccount: pulumi.Input<inputs.machine.ConfigurationMachineSecretsCertsK8sServiceaccountArgs>;
|
|
179
|
-
/**
|
|
180
|
-
* The certificate and key pair
|
|
181
|
-
*/
|
|
182
|
-
os: pulumi.Input<inputs.machine.ConfigurationMachineSecretsCertsOsArgs>;
|
|
183
|
-
}
|
|
184
|
-
interface ConfigurationMachineSecretsCertsEtcd {
|
|
96
|
+
/**
|
|
97
|
+
* A Machine Secrets Certificate
|
|
98
|
+
*/
|
|
99
|
+
interface Certificate {
|
|
185
100
|
/**
|
|
186
|
-
*
|
|
101
|
+
* Certificate
|
|
187
102
|
*/
|
|
188
103
|
cert: string;
|
|
189
104
|
/**
|
|
190
|
-
*
|
|
105
|
+
* Private Key
|
|
191
106
|
*/
|
|
192
107
|
key: string;
|
|
193
108
|
}
|
|
194
|
-
|
|
109
|
+
/**
|
|
110
|
+
* A Machine Secrets Certificate
|
|
111
|
+
*/
|
|
112
|
+
interface CertificateArgs {
|
|
195
113
|
/**
|
|
196
|
-
*
|
|
114
|
+
* Certificate
|
|
197
115
|
*/
|
|
198
116
|
cert: pulumi.Input<string>;
|
|
199
117
|
/**
|
|
200
|
-
*
|
|
118
|
+
* Private Key
|
|
201
119
|
*/
|
|
202
120
|
key: pulumi.Input<string>;
|
|
203
121
|
}
|
|
204
|
-
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
}
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
217
|
-
|
|
218
|
-
|
|
219
|
-
|
|
220
|
-
|
|
221
|
-
|
|
222
|
-
|
|
223
|
-
}
|
|
224
|
-
|
|
225
|
-
|
|
226
|
-
|
|
227
|
-
|
|
228
|
-
|
|
229
|
-
|
|
230
|
-
* key data
|
|
231
|
-
*/
|
|
232
|
-
key: string;
|
|
233
|
-
}
|
|
234
|
-
interface ConfigurationMachineSecretsCertsK8sAggregatorArgs {
|
|
235
|
-
/**
|
|
236
|
-
* certificate data
|
|
237
|
-
*/
|
|
238
|
-
cert: pulumi.Input<string>;
|
|
239
|
-
/**
|
|
240
|
-
* key data
|
|
241
|
-
*/
|
|
242
|
-
key: pulumi.Input<string>;
|
|
243
|
-
}
|
|
244
|
-
interface ConfigurationMachineSecretsCertsK8sServiceaccount {
|
|
245
|
-
/**
|
|
246
|
-
* key data
|
|
247
|
-
*/
|
|
248
|
-
key: string;
|
|
249
|
-
}
|
|
250
|
-
interface ConfigurationMachineSecretsCertsK8sServiceaccountArgs {
|
|
251
|
-
/**
|
|
252
|
-
* key data
|
|
253
|
-
*/
|
|
254
|
-
key: pulumi.Input<string>;
|
|
255
|
-
}
|
|
256
|
-
interface ConfigurationMachineSecretsCertsOs {
|
|
257
|
-
/**
|
|
258
|
-
* certificate data
|
|
259
|
-
*/
|
|
260
|
-
cert: string;
|
|
261
|
-
/**
|
|
262
|
-
* key data
|
|
263
|
-
*/
|
|
264
|
-
key: string;
|
|
265
|
-
}
|
|
266
|
-
interface ConfigurationMachineSecretsCertsOsArgs {
|
|
267
|
-
/**
|
|
268
|
-
* certificate data
|
|
269
|
-
*/
|
|
270
|
-
cert: pulumi.Input<string>;
|
|
271
|
-
/**
|
|
272
|
-
* key data
|
|
273
|
-
*/
|
|
274
|
-
key: pulumi.Input<string>;
|
|
275
|
-
}
|
|
276
|
-
interface ConfigurationMachineSecretsCluster {
|
|
277
|
-
/**
|
|
278
|
-
* The cluster id
|
|
122
|
+
/**
|
|
123
|
+
* A complete Machine Secrets Certificates configuration
|
|
124
|
+
*/
|
|
125
|
+
interface Certificates {
|
|
126
|
+
etcd: inputs.machine.Certificate;
|
|
127
|
+
k8s: inputs.machine.Certificate;
|
|
128
|
+
k8s_aggregator: inputs.machine.Certificate;
|
|
129
|
+
k8s_serviceaccount: inputs.machine.Key;
|
|
130
|
+
os: inputs.machine.Certificate;
|
|
131
|
+
}
|
|
132
|
+
/**
|
|
133
|
+
* A complete Machine Secrets Certificates configuration
|
|
134
|
+
*/
|
|
135
|
+
interface CertificatesArgs {
|
|
136
|
+
etcd: pulumi.Input<inputs.machine.CertificateArgs>;
|
|
137
|
+
k8s: pulumi.Input<inputs.machine.CertificateArgs>;
|
|
138
|
+
k8s_aggregator: pulumi.Input<inputs.machine.CertificateArgs>;
|
|
139
|
+
k8s_serviceaccount: pulumi.Input<inputs.machine.KeyArgs>;
|
|
140
|
+
os: pulumi.Input<inputs.machine.CertificateArgs>;
|
|
141
|
+
}
|
|
142
|
+
/**
|
|
143
|
+
* A Machine Secrets Cluster Info
|
|
144
|
+
*/
|
|
145
|
+
interface Cluster {
|
|
146
|
+
/**
|
|
147
|
+
* Certificate
|
|
279
148
|
*/
|
|
280
149
|
id: string;
|
|
281
150
|
/**
|
|
282
|
-
*
|
|
151
|
+
* Private Key
|
|
283
152
|
*/
|
|
284
153
|
secret: string;
|
|
285
154
|
}
|
|
286
|
-
|
|
155
|
+
/**
|
|
156
|
+
* A Machine Secrets Cluster Info
|
|
157
|
+
*/
|
|
158
|
+
interface ClusterArgs {
|
|
287
159
|
/**
|
|
288
|
-
*
|
|
160
|
+
* Certificate
|
|
289
161
|
*/
|
|
290
162
|
id: pulumi.Input<string>;
|
|
291
163
|
/**
|
|
292
|
-
*
|
|
164
|
+
* Private Key
|
|
293
165
|
*/
|
|
294
166
|
secret: pulumi.Input<string>;
|
|
295
167
|
}
|
|
296
|
-
interface
|
|
297
|
-
/**
|
|
298
|
-
* The aescbc encryption secret for the talos kubernetes cluster
|
|
299
|
-
*/
|
|
300
|
-
aescbcEncryptionSecret?: string;
|
|
301
|
-
/**
|
|
302
|
-
* The bootstrap token for the talos kubernetes cluster
|
|
303
|
-
*/
|
|
304
|
-
bootstrapToken: string;
|
|
305
|
-
/**
|
|
306
|
-
* The secretbox encryption secret for the talos kubernetes cluster
|
|
307
|
-
*/
|
|
308
|
-
secretboxEncryptionSecret: string;
|
|
309
|
-
}
|
|
310
|
-
interface ConfigurationMachineSecretsSecretsArgs {
|
|
311
|
-
/**
|
|
312
|
-
* The aescbc encryption secret for the talos kubernetes cluster
|
|
313
|
-
*/
|
|
314
|
-
aescbcEncryptionSecret?: pulumi.Input<string>;
|
|
315
|
-
/**
|
|
316
|
-
* The bootstrap token for the talos kubernetes cluster
|
|
317
|
-
*/
|
|
318
|
-
bootstrapToken: pulumi.Input<string>;
|
|
168
|
+
interface ConfigurationApplyClientConfiguration {
|
|
319
169
|
/**
|
|
320
|
-
* The
|
|
170
|
+
* The client CA certificate
|
|
321
171
|
*/
|
|
322
|
-
|
|
323
|
-
}
|
|
324
|
-
interface ConfigurationMachineSecretsTrustdinfo {
|
|
172
|
+
caCertificate: pulumi.Input<string>;
|
|
325
173
|
/**
|
|
326
|
-
* The
|
|
174
|
+
* The client certificate
|
|
327
175
|
*/
|
|
328
|
-
|
|
329
|
-
}
|
|
330
|
-
interface ConfigurationMachineSecretsTrustdinfoArgs {
|
|
176
|
+
clientCertificate: pulumi.Input<string>;
|
|
331
177
|
/**
|
|
332
|
-
* The
|
|
178
|
+
* The client key
|
|
333
179
|
*/
|
|
334
|
-
|
|
180
|
+
clientKey: pulumi.Input<string>;
|
|
335
181
|
}
|
|
336
182
|
interface DisksClientConfiguration {
|
|
337
183
|
/**
|
|
@@ -449,141 +295,108 @@ export declare namespace machine {
|
|
|
449
295
|
*/
|
|
450
296
|
read?: pulumi.Input<string>;
|
|
451
297
|
}
|
|
452
|
-
|
|
453
|
-
|
|
454
|
-
|
|
455
|
-
|
|
456
|
-
caCertificate?: pulumi.Input<string>;
|
|
457
|
-
/**
|
|
458
|
-
* The client certificate
|
|
459
|
-
*/
|
|
460
|
-
clientCertificate?: pulumi.Input<string>;
|
|
461
|
-
/**
|
|
462
|
-
* The client key
|
|
463
|
-
*/
|
|
464
|
-
clientKey?: pulumi.Input<string>;
|
|
465
|
-
}
|
|
466
|
-
interface SecretsMachineSecrets {
|
|
467
|
-
certs?: pulumi.Input<inputs.machine.SecretsMachineSecretsCerts>;
|
|
468
|
-
/**
|
|
469
|
-
* The cluster secrets
|
|
470
|
-
*/
|
|
471
|
-
cluster?: pulumi.Input<inputs.machine.SecretsMachineSecretsCluster>;
|
|
472
|
-
/**
|
|
473
|
-
* kubernetes cluster secrets
|
|
474
|
-
*/
|
|
475
|
-
secrets?: pulumi.Input<inputs.machine.SecretsMachineSecretsSecrets>;
|
|
476
|
-
/**
|
|
477
|
-
* trustd secrets
|
|
478
|
-
*/
|
|
479
|
-
trustdinfo?: pulumi.Input<inputs.machine.SecretsMachineSecretsTrustdinfo>;
|
|
480
|
-
}
|
|
481
|
-
interface SecretsMachineSecretsCerts {
|
|
482
|
-
/**
|
|
483
|
-
* The certificate and key pair
|
|
484
|
-
*/
|
|
485
|
-
etcd?: pulumi.Input<inputs.machine.SecretsMachineSecretsCertsEtcd>;
|
|
298
|
+
/**
|
|
299
|
+
* A Machine Secrets Private Key
|
|
300
|
+
*/
|
|
301
|
+
interface Key {
|
|
486
302
|
/**
|
|
487
|
-
*
|
|
303
|
+
* Private Key
|
|
488
304
|
*/
|
|
489
|
-
|
|
490
|
-
/**
|
|
491
|
-
* The certificate and key pair
|
|
492
|
-
*/
|
|
493
|
-
k8sAggregator?: pulumi.Input<inputs.machine.SecretsMachineSecretsCertsK8sAggregator>;
|
|
494
|
-
/**
|
|
495
|
-
* The service account secrets
|
|
496
|
-
*/
|
|
497
|
-
k8sServiceaccount?: pulumi.Input<inputs.machine.SecretsMachineSecretsCertsK8sServiceaccount>;
|
|
498
|
-
/**
|
|
499
|
-
* The certificate and key pair
|
|
500
|
-
*/
|
|
501
|
-
os?: pulumi.Input<inputs.machine.SecretsMachineSecretsCertsOs>;
|
|
305
|
+
key: string;
|
|
502
306
|
}
|
|
503
|
-
|
|
504
|
-
|
|
505
|
-
|
|
506
|
-
|
|
507
|
-
cert?: pulumi.Input<string>;
|
|
307
|
+
/**
|
|
308
|
+
* A Machine Secrets Private Key
|
|
309
|
+
*/
|
|
310
|
+
interface KeyArgs {
|
|
508
311
|
/**
|
|
509
|
-
*
|
|
312
|
+
* Private Key
|
|
510
313
|
*/
|
|
511
|
-
key
|
|
314
|
+
key: pulumi.Input<string>;
|
|
512
315
|
}
|
|
513
|
-
|
|
316
|
+
/**
|
|
317
|
+
* A complete Machine Secrets configuration
|
|
318
|
+
*/
|
|
319
|
+
interface MachineSecrets {
|
|
320
|
+
certs: inputs.machine.Certificates;
|
|
321
|
+
cluster: inputs.machine.Cluster;
|
|
322
|
+
secrets: inputs.machine.Secrets;
|
|
323
|
+
trustdinfo: inputs.machine.TrustdInfo;
|
|
324
|
+
}
|
|
325
|
+
/**
|
|
326
|
+
* A complete Machine Secrets configuration
|
|
327
|
+
*/
|
|
328
|
+
interface MachineSecretsArgs {
|
|
329
|
+
certs: pulumi.Input<inputs.machine.CertificatesArgs>;
|
|
330
|
+
cluster: pulumi.Input<inputs.machine.ClusterArgs>;
|
|
331
|
+
secrets: pulumi.Input<inputs.machine.SecretsArgs>;
|
|
332
|
+
trustdinfo: pulumi.Input<inputs.machine.TrustdInfoArgs>;
|
|
333
|
+
}
|
|
334
|
+
/**
|
|
335
|
+
* A Machine Secrets Bootstrap data
|
|
336
|
+
*/
|
|
337
|
+
interface Secrets {
|
|
514
338
|
/**
|
|
515
|
-
*
|
|
339
|
+
* The bootstrap token for the talos kubernetes cluster
|
|
516
340
|
*/
|
|
517
|
-
|
|
341
|
+
bootstrap_token: string;
|
|
518
342
|
/**
|
|
519
|
-
*
|
|
343
|
+
* The secretbox encryption secret for the talos kubernetes cluster
|
|
520
344
|
*/
|
|
521
|
-
|
|
345
|
+
secretbox_encryption_secret: string;
|
|
522
346
|
}
|
|
523
|
-
|
|
347
|
+
/**
|
|
348
|
+
* A Machine Secrets Bootstrap data
|
|
349
|
+
*/
|
|
350
|
+
interface SecretsArgs {
|
|
524
351
|
/**
|
|
525
|
-
*
|
|
526
|
-
*/
|
|
527
|
-
cert?: pulumi.Input<string>;
|
|
528
|
-
/**
|
|
529
|
-
* key data
|
|
352
|
+
* The bootstrap token for the talos kubernetes cluster
|
|
530
353
|
*/
|
|
531
|
-
|
|
532
|
-
}
|
|
533
|
-
interface SecretsMachineSecretsCertsK8sServiceaccount {
|
|
354
|
+
bootstrap_token: pulumi.Input<string>;
|
|
534
355
|
/**
|
|
535
|
-
*
|
|
356
|
+
* The secretbox encryption secret for the talos kubernetes cluster
|
|
536
357
|
*/
|
|
537
|
-
|
|
358
|
+
secretbox_encryption_secret: pulumi.Input<string>;
|
|
538
359
|
}
|
|
539
|
-
interface
|
|
540
|
-
/**
|
|
541
|
-
* certificate data
|
|
542
|
-
*/
|
|
543
|
-
cert?: pulumi.Input<string>;
|
|
360
|
+
interface SecretsClientConfiguration {
|
|
544
361
|
/**
|
|
545
|
-
*
|
|
362
|
+
* The client CA certificate
|
|
546
363
|
*/
|
|
547
|
-
|
|
548
|
-
}
|
|
549
|
-
interface SecretsMachineSecretsCluster {
|
|
364
|
+
caCertificate?: pulumi.Input<string>;
|
|
550
365
|
/**
|
|
551
|
-
* The
|
|
366
|
+
* The client certificate
|
|
552
367
|
*/
|
|
553
|
-
|
|
368
|
+
clientCertificate?: pulumi.Input<string>;
|
|
554
369
|
/**
|
|
555
|
-
* The
|
|
370
|
+
* The client key
|
|
556
371
|
*/
|
|
557
|
-
|
|
372
|
+
clientKey?: pulumi.Input<string>;
|
|
558
373
|
}
|
|
559
|
-
interface
|
|
560
|
-
/**
|
|
561
|
-
* The AES-CBC encryption secret
|
|
562
|
-
*/
|
|
563
|
-
aescbcEncryptionSecret?: pulumi.Input<string>;
|
|
374
|
+
interface Timeout {
|
|
564
375
|
/**
|
|
565
|
-
*
|
|
376
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
566
377
|
*/
|
|
567
|
-
|
|
378
|
+
create?: pulumi.Input<string>;
|
|
568
379
|
/**
|
|
569
|
-
*
|
|
380
|
+
* A string that can be [parsed as a duration](https://pkg.go.dev/time#ParseDuration) consisting of numbers and unit suffixes, such as "30s" or "2h45m". Valid time units are "s" (seconds), "m" (minutes), "h" (hours).
|
|
570
381
|
*/
|
|
571
|
-
|
|
382
|
+
update?: pulumi.Input<string>;
|
|
572
383
|
}
|
|
573
|
-
|
|
384
|
+
/**
|
|
385
|
+
* A Machine Secrets Trust daemon info
|
|
386
|
+
*/
|
|
387
|
+
interface TrustdInfo {
|
|
574
388
|
/**
|
|
575
|
-
* The trustd token
|
|
389
|
+
* The trustd token for the talos kubernetes cluster
|
|
576
390
|
*/
|
|
577
|
-
token
|
|
391
|
+
token: string;
|
|
578
392
|
}
|
|
579
|
-
|
|
580
|
-
|
|
581
|
-
|
|
582
|
-
|
|
583
|
-
create?: pulumi.Input<string>;
|
|
393
|
+
/**
|
|
394
|
+
* A Machine Secrets Trust daemon info
|
|
395
|
+
*/
|
|
396
|
+
interface TrustdInfoArgs {
|
|
584
397
|
/**
|
|
585
|
-
*
|
|
398
|
+
* The trustd token for the talos kubernetes cluster
|
|
586
399
|
*/
|
|
587
|
-
|
|
400
|
+
token: pulumi.Input<string>;
|
|
588
401
|
}
|
|
589
402
|
}
|
package/types/output.d.ts
CHANGED
|
@@ -76,132 +76,55 @@ export declare namespace machine {
|
|
|
76
76
|
*/
|
|
77
77
|
create?: string;
|
|
78
78
|
}
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
caCertificate: string;
|
|
84
|
-
/**
|
|
85
|
-
* The client certificate
|
|
86
|
-
*/
|
|
87
|
-
clientCertificate: string;
|
|
88
|
-
/**
|
|
89
|
-
* The client key
|
|
90
|
-
*/
|
|
91
|
-
clientKey: string;
|
|
92
|
-
}
|
|
93
|
-
interface ConfigurationMachineSecrets {
|
|
94
|
-
/**
|
|
95
|
-
* The certs for the talos kubernetes cluster
|
|
96
|
-
*/
|
|
97
|
-
certs: outputs.machine.ConfigurationMachineSecretsCerts;
|
|
98
|
-
/**
|
|
99
|
-
* The cluster secrets
|
|
100
|
-
*/
|
|
101
|
-
cluster: outputs.machine.ConfigurationMachineSecretsCluster;
|
|
102
|
-
/**
|
|
103
|
-
* The secrets for the talos kubernetes cluster
|
|
104
|
-
*/
|
|
105
|
-
secrets: outputs.machine.ConfigurationMachineSecretsSecrets;
|
|
106
|
-
/**
|
|
107
|
-
* The trustd info for the talos kubernetes cluster
|
|
108
|
-
*/
|
|
109
|
-
trustdinfo: outputs.machine.ConfigurationMachineSecretsTrustdinfo;
|
|
110
|
-
}
|
|
111
|
-
interface ConfigurationMachineSecretsCerts {
|
|
112
|
-
/**
|
|
113
|
-
* The certificate and key pair
|
|
114
|
-
*/
|
|
115
|
-
etcd: outputs.machine.ConfigurationMachineSecretsCertsEtcd;
|
|
116
|
-
/**
|
|
117
|
-
* The certificate and key pair
|
|
118
|
-
*/
|
|
119
|
-
k8s: outputs.machine.ConfigurationMachineSecretsCertsK8s;
|
|
120
|
-
/**
|
|
121
|
-
* The certificate and key pair
|
|
122
|
-
*/
|
|
123
|
-
k8sAggregator: outputs.machine.ConfigurationMachineSecretsCertsK8sAggregator;
|
|
124
|
-
k8sServiceaccount: outputs.machine.ConfigurationMachineSecretsCertsK8sServiceaccount;
|
|
79
|
+
/**
|
|
80
|
+
* A Machine Secrets Certificate
|
|
81
|
+
*/
|
|
82
|
+
interface Certificate {
|
|
125
83
|
/**
|
|
126
|
-
*
|
|
127
|
-
*/
|
|
128
|
-
os: outputs.machine.ConfigurationMachineSecretsCertsOs;
|
|
129
|
-
}
|
|
130
|
-
interface ConfigurationMachineSecretsCertsEtcd {
|
|
131
|
-
/**
|
|
132
|
-
* certificate data
|
|
84
|
+
* Certificate
|
|
133
85
|
*/
|
|
134
86
|
cert: string;
|
|
135
87
|
/**
|
|
136
|
-
*
|
|
88
|
+
* Private Key
|
|
137
89
|
*/
|
|
138
90
|
key: string;
|
|
139
91
|
}
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
|
|
148
|
-
|
|
92
|
+
/**
|
|
93
|
+
* A complete Machine Secrets Certificates configuration
|
|
94
|
+
*/
|
|
95
|
+
interface Certificates {
|
|
96
|
+
etcd: outputs.machine.Certificate;
|
|
97
|
+
k8s: outputs.machine.Certificate;
|
|
98
|
+
k8s_aggregator: outputs.machine.Certificate;
|
|
99
|
+
k8s_serviceaccount: outputs.machine.Key;
|
|
100
|
+
os: outputs.machine.Certificate;
|
|
149
101
|
}
|
|
150
|
-
|
|
102
|
+
/**
|
|
103
|
+
* A Machine Secrets Cluster Info
|
|
104
|
+
*/
|
|
105
|
+
interface Cluster {
|
|
151
106
|
/**
|
|
152
|
-
*
|
|
153
|
-
*/
|
|
154
|
-
cert: string;
|
|
155
|
-
/**
|
|
156
|
-
* key data
|
|
157
|
-
*/
|
|
158
|
-
key: string;
|
|
159
|
-
}
|
|
160
|
-
interface ConfigurationMachineSecretsCertsK8sServiceaccount {
|
|
161
|
-
/**
|
|
162
|
-
* key data
|
|
163
|
-
*/
|
|
164
|
-
key: string;
|
|
165
|
-
}
|
|
166
|
-
interface ConfigurationMachineSecretsCertsOs {
|
|
167
|
-
/**
|
|
168
|
-
* certificate data
|
|
169
|
-
*/
|
|
170
|
-
cert: string;
|
|
171
|
-
/**
|
|
172
|
-
* key data
|
|
173
|
-
*/
|
|
174
|
-
key: string;
|
|
175
|
-
}
|
|
176
|
-
interface ConfigurationMachineSecretsCluster {
|
|
177
|
-
/**
|
|
178
|
-
* The cluster id
|
|
107
|
+
* Certificate
|
|
179
108
|
*/
|
|
180
109
|
id: string;
|
|
181
110
|
/**
|
|
182
|
-
*
|
|
111
|
+
* Private Key
|
|
183
112
|
*/
|
|
184
113
|
secret: string;
|
|
185
114
|
}
|
|
186
|
-
interface
|
|
187
|
-
/**
|
|
188
|
-
* The aescbc encryption secret for the talos kubernetes cluster
|
|
189
|
-
*/
|
|
190
|
-
aescbcEncryptionSecret?: string;
|
|
115
|
+
interface ConfigurationApplyClientConfiguration {
|
|
191
116
|
/**
|
|
192
|
-
* The
|
|
117
|
+
* The client CA certificate
|
|
193
118
|
*/
|
|
194
|
-
|
|
119
|
+
caCertificate: string;
|
|
195
120
|
/**
|
|
196
|
-
* The
|
|
121
|
+
* The client certificate
|
|
197
122
|
*/
|
|
198
|
-
|
|
199
|
-
}
|
|
200
|
-
interface ConfigurationMachineSecretsTrustdinfo {
|
|
123
|
+
clientCertificate: string;
|
|
201
124
|
/**
|
|
202
|
-
* The
|
|
125
|
+
* The client key
|
|
203
126
|
*/
|
|
204
|
-
|
|
127
|
+
clientKey: string;
|
|
205
128
|
}
|
|
206
129
|
interface DisksClientConfiguration {
|
|
207
130
|
/**
|
|
@@ -299,132 +222,50 @@ export declare namespace machine {
|
|
|
299
222
|
*/
|
|
300
223
|
read?: string;
|
|
301
224
|
}
|
|
302
|
-
|
|
225
|
+
/**
|
|
226
|
+
* A Machine Secrets Private Key
|
|
227
|
+
*/
|
|
228
|
+
interface Key {
|
|
303
229
|
/**
|
|
304
|
-
*
|
|
305
|
-
*/
|
|
306
|
-
caCertificate: string;
|
|
307
|
-
/**
|
|
308
|
-
* The client certificate
|
|
309
|
-
*/
|
|
310
|
-
clientCertificate: string;
|
|
311
|
-
/**
|
|
312
|
-
* The client key
|
|
313
|
-
*/
|
|
314
|
-
clientKey: string;
|
|
315
|
-
}
|
|
316
|
-
interface SecretsMachineSecrets {
|
|
317
|
-
certs: outputs.machine.SecretsMachineSecretsCerts;
|
|
318
|
-
/**
|
|
319
|
-
* The cluster secrets
|
|
320
|
-
*/
|
|
321
|
-
cluster: outputs.machine.SecretsMachineSecretsCluster;
|
|
322
|
-
/**
|
|
323
|
-
* kubernetes cluster secrets
|
|
324
|
-
*/
|
|
325
|
-
secrets: outputs.machine.SecretsMachineSecretsSecrets;
|
|
326
|
-
/**
|
|
327
|
-
* trustd secrets
|
|
328
|
-
*/
|
|
329
|
-
trustdinfo: outputs.machine.SecretsMachineSecretsTrustdinfo;
|
|
330
|
-
}
|
|
331
|
-
interface SecretsMachineSecretsCerts {
|
|
332
|
-
/**
|
|
333
|
-
* The certificate and key pair
|
|
334
|
-
*/
|
|
335
|
-
etcd: outputs.machine.SecretsMachineSecretsCertsEtcd;
|
|
336
|
-
/**
|
|
337
|
-
* The certificate and key pair
|
|
338
|
-
*/
|
|
339
|
-
k8s: outputs.machine.SecretsMachineSecretsCertsK8s;
|
|
340
|
-
/**
|
|
341
|
-
* The certificate and key pair
|
|
342
|
-
*/
|
|
343
|
-
k8sAggregator: outputs.machine.SecretsMachineSecretsCertsK8sAggregator;
|
|
344
|
-
/**
|
|
345
|
-
* The service account secrets
|
|
346
|
-
*/
|
|
347
|
-
k8sServiceaccount: outputs.machine.SecretsMachineSecretsCertsK8sServiceaccount;
|
|
348
|
-
/**
|
|
349
|
-
* The certificate and key pair
|
|
350
|
-
*/
|
|
351
|
-
os: outputs.machine.SecretsMachineSecretsCertsOs;
|
|
352
|
-
}
|
|
353
|
-
interface SecretsMachineSecretsCertsEtcd {
|
|
354
|
-
/**
|
|
355
|
-
* certificate data
|
|
356
|
-
*/
|
|
357
|
-
cert: string;
|
|
358
|
-
/**
|
|
359
|
-
* key data
|
|
360
|
-
*/
|
|
361
|
-
key: string;
|
|
362
|
-
}
|
|
363
|
-
interface SecretsMachineSecretsCertsK8s {
|
|
364
|
-
/**
|
|
365
|
-
* certificate data
|
|
366
|
-
*/
|
|
367
|
-
cert: string;
|
|
368
|
-
/**
|
|
369
|
-
* key data
|
|
230
|
+
* Private Key
|
|
370
231
|
*/
|
|
371
232
|
key: string;
|
|
372
233
|
}
|
|
373
|
-
|
|
374
|
-
|
|
375
|
-
|
|
376
|
-
|
|
377
|
-
|
|
378
|
-
|
|
379
|
-
|
|
380
|
-
|
|
381
|
-
key: string;
|
|
382
|
-
}
|
|
383
|
-
interface SecretsMachineSecretsCertsK8sServiceaccount {
|
|
384
|
-
/**
|
|
385
|
-
* key data
|
|
386
|
-
*/
|
|
387
|
-
key: string;
|
|
234
|
+
/**
|
|
235
|
+
* A complete Machine Secrets configuration
|
|
236
|
+
*/
|
|
237
|
+
interface MachineSecrets {
|
|
238
|
+
certs: outputs.machine.Certificates;
|
|
239
|
+
cluster: outputs.machine.Cluster;
|
|
240
|
+
secrets: outputs.machine.Secrets;
|
|
241
|
+
trustdinfo: outputs.machine.TrustdInfo;
|
|
388
242
|
}
|
|
389
|
-
|
|
243
|
+
/**
|
|
244
|
+
* A Machine Secrets Bootstrap data
|
|
245
|
+
*/
|
|
246
|
+
interface Secrets {
|
|
390
247
|
/**
|
|
391
|
-
*
|
|
392
|
-
*/
|
|
393
|
-
cert: string;
|
|
394
|
-
/**
|
|
395
|
-
* key data
|
|
396
|
-
*/
|
|
397
|
-
key: string;
|
|
398
|
-
}
|
|
399
|
-
interface SecretsMachineSecretsCluster {
|
|
400
|
-
/**
|
|
401
|
-
* The cluster ID
|
|
248
|
+
* The bootstrap token for the talos kubernetes cluster
|
|
402
249
|
*/
|
|
403
|
-
|
|
250
|
+
bootstrap_token: string;
|
|
404
251
|
/**
|
|
405
|
-
* The
|
|
252
|
+
* The secretbox encryption secret for the talos kubernetes cluster
|
|
406
253
|
*/
|
|
407
|
-
|
|
254
|
+
secretbox_encryption_secret: string;
|
|
408
255
|
}
|
|
409
|
-
interface
|
|
410
|
-
/**
|
|
411
|
-
* The AES-CBC encryption secret
|
|
412
|
-
*/
|
|
413
|
-
aescbcEncryptionSecret: string;
|
|
256
|
+
interface SecretsClientConfiguration {
|
|
414
257
|
/**
|
|
415
|
-
* The
|
|
258
|
+
* The client CA certificate
|
|
416
259
|
*/
|
|
417
|
-
|
|
260
|
+
caCertificate: string;
|
|
418
261
|
/**
|
|
419
|
-
* The
|
|
262
|
+
* The client certificate
|
|
420
263
|
*/
|
|
421
|
-
|
|
422
|
-
}
|
|
423
|
-
interface SecretsMachineSecretsTrustdinfo {
|
|
264
|
+
clientCertificate: string;
|
|
424
265
|
/**
|
|
425
|
-
* The
|
|
266
|
+
* The client key
|
|
426
267
|
*/
|
|
427
|
-
|
|
268
|
+
clientKey: string;
|
|
428
269
|
}
|
|
429
270
|
interface Timeout {
|
|
430
271
|
/**
|
|
@@ -436,4 +277,13 @@ export declare namespace machine {
|
|
|
436
277
|
*/
|
|
437
278
|
update?: string;
|
|
438
279
|
}
|
|
280
|
+
/**
|
|
281
|
+
* A Machine Secrets Trust daemon info
|
|
282
|
+
*/
|
|
283
|
+
interface TrustdInfo {
|
|
284
|
+
/**
|
|
285
|
+
* The trustd token for the talos kubernetes cluster
|
|
286
|
+
*/
|
|
287
|
+
token: string;
|
|
288
|
+
}
|
|
439
289
|
}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"configuration.js","sourceRoot":"","sources":["../../machine/configuration.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,aAAa,CAAC,IAAuB,EAAE,IAA2B;IAE9E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,2CAA2C,EAAE;QACtE,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,sCAcC;AA6FD;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,aAAa,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,kDAEC"}
|