cdk8s-plus-32 2.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +90710 -0
- package/CODE_OF_CONDUCT.md +3 -0
- package/CONTRIBUTING.md +185 -0
- package/DCO +34 -0
- package/LICENSE +202 -0
- package/NOTICE +1 -0
- package/OWNERS.md +5 -0
- package/README.md +32 -0
- package/SECURITY.md +5 -0
- package/cdk8s.yaml +9 -0
- package/docs/java.md +24089 -0
- package/docs/plus/config-map.md +98 -0
- package/docs/plus/container.md +133 -0
- package/docs/plus/cronjob.md +67 -0
- package/docs/plus/deployment.md +232 -0
- package/docs/plus/horizontal-pod-autoscaler.md +226 -0
- package/docs/plus/ingress.md +68 -0
- package/docs/plus/job.md +48 -0
- package/docs/plus/namespace.md +58 -0
- package/docs/plus/network-policy.md +341 -0
- package/docs/plus/pod.md +455 -0
- package/docs/plus/pv.md +82 -0
- package/docs/plus/pvc.md +77 -0
- package/docs/plus/rbac.md +104 -0
- package/docs/plus/secret.md +32 -0
- package/docs/plus/service-account.md +35 -0
- package/docs/plus/service.md +41 -0
- package/docs/plus/volume.md +38 -0
- package/docs/python.md +26313 -0
- package/docs/typescript.md +19695 -0
- package/git-hooks/README.md +9 -0
- package/git-hooks/prepare-commit-msg +18 -0
- package/git-hooks/setup.sh +10 -0
- package/lib/_action.d.ts +21 -0
- package/lib/_action.js +32 -0
- package/lib/api-resource.d.ts +298 -0
- package/lib/api-resource.js +430 -0
- package/lib/base.d.ts +79 -0
- package/lib/base.js +92 -0
- package/lib/config-map.d.ts +126 -0
- package/lib/config-map.js +159 -0
- package/lib/container.d.ts +1057 -0
- package/lib/container.js +845 -0
- package/lib/cron-job.d.ts +138 -0
- package/lib/cron-job.js +103 -0
- package/lib/daemon-set.d.ts +45 -0
- package/lib/daemon-set.js +55 -0
- package/lib/deployment.d.ts +223 -0
- package/lib/deployment.js +214 -0
- package/lib/handler.d.ts +62 -0
- package/lib/handler.js +54 -0
- package/lib/horizontal-pod-autoscaler.d.ts +500 -0
- package/lib/horizontal-pod-autoscaler.js +569 -0
- package/lib/imports/k8s.d.ts +21811 -0
- package/lib/imports/k8s.js +16678 -0
- package/lib/index.d.ts +26 -0
- package/lib/index.js +44 -0
- package/lib/ingress.d.ts +230 -0
- package/lib/ingress.js +246 -0
- package/lib/job.d.ts +64 -0
- package/lib/job.js +54 -0
- package/lib/namespace.d.ts +128 -0
- package/lib/namespace.js +109 -0
- package/lib/network-policy.d.ts +311 -0
- package/lib/network-policy.js +344 -0
- package/lib/pod.d.ts +1088 -0
- package/lib/pod.js +1141 -0
- package/lib/probe.d.ts +141 -0
- package/lib/probe.js +77 -0
- package/lib/pv.d.ts +375 -0
- package/lib/pv.js +273 -0
- package/lib/pvc.d.ts +163 -0
- package/lib/pvc.js +152 -0
- package/lib/role-binding.d.ts +138 -0
- package/lib/role-binding.js +165 -0
- package/lib/role.d.ts +268 -0
- package/lib/role.js +401 -0
- package/lib/secret.d.ts +195 -0
- package/lib/secret.js +185 -0
- package/lib/service-account.d.ts +83 -0
- package/lib/service-account.js +105 -0
- package/lib/service.d.ts +289 -0
- package/lib/service.js +182 -0
- package/lib/stateful-set.d.ts +169 -0
- package/lib/stateful-set.js +174 -0
- package/lib/utils.d.ts +4 -0
- package/lib/utils.js +33 -0
- package/lib/volume.d.ts +573 -0
- package/lib/volume.js +371 -0
- package/lib/workload.d.ts +121 -0
- package/lib/workload.js +122 -0
- package/node_modules/balanced-match/.github/FUNDING.yml +2 -0
- package/node_modules/balanced-match/LICENSE.md +21 -0
- package/node_modules/balanced-match/README.md +97 -0
- package/node_modules/balanced-match/index.js +62 -0
- package/node_modules/balanced-match/package.json +48 -0
- package/node_modules/concat-map/.travis.yml +4 -0
- package/node_modules/concat-map/LICENSE +18 -0
- package/node_modules/concat-map/README.markdown +62 -0
- package/node_modules/concat-map/example/map.js +6 -0
- package/node_modules/concat-map/index.js +13 -0
- package/node_modules/concat-map/package.json +43 -0
- package/node_modules/concat-map/test/map.js +39 -0
- package/node_modules/minimatch/LICENSE +15 -0
- package/node_modules/minimatch/README.md +230 -0
- package/node_modules/minimatch/minimatch.js +947 -0
- package/node_modules/minimatch/node_modules/brace-expansion/LICENSE +21 -0
- package/node_modules/minimatch/node_modules/brace-expansion/README.md +129 -0
- package/node_modules/minimatch/node_modules/brace-expansion/index.js +201 -0
- package/node_modules/minimatch/node_modules/brace-expansion/package.json +47 -0
- package/node_modules/minimatch/package.json +33 -0
- package/package.json +181 -0
- package/rotate.md +84 -0
package/lib/secret.js
ADDED
|
@@ -0,0 +1,185 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var _a, _b, _c, _d, _e, _f;
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
4
|
+
exports.DockerConfigSecret = exports.TlsSecret = exports.ServiceAccountTokenSecret = exports.SshAuthSecret = exports.BasicAuthSecret = exports.Secret = void 0;
|
|
5
|
+
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
|
|
6
|
+
const constructs_1 = require("constructs");
|
|
7
|
+
const base = require("./base");
|
|
8
|
+
const container_1 = require("./container");
|
|
9
|
+
const k8s = require("./imports/k8s");
|
|
10
|
+
class ImportedSecret extends constructs_1.Construct {
|
|
11
|
+
constructor(scope, id, name) {
|
|
12
|
+
super(scope, id);
|
|
13
|
+
this.resourceType = 'secrets';
|
|
14
|
+
this._name = name;
|
|
15
|
+
}
|
|
16
|
+
get name() {
|
|
17
|
+
return this._name;
|
|
18
|
+
}
|
|
19
|
+
get apiVersion() {
|
|
20
|
+
return k8s.KubeSecret.GVK.apiVersion;
|
|
21
|
+
}
|
|
22
|
+
get apiGroup() {
|
|
23
|
+
return '';
|
|
24
|
+
}
|
|
25
|
+
get kind() {
|
|
26
|
+
return k8s.KubeSecret.GVK.kind;
|
|
27
|
+
}
|
|
28
|
+
get resourceName() {
|
|
29
|
+
return this.name;
|
|
30
|
+
}
|
|
31
|
+
envValue(key, options) {
|
|
32
|
+
return container_1.EnvValue.fromSecretValue({ secret: this, key }, options);
|
|
33
|
+
}
|
|
34
|
+
}
|
|
35
|
+
/**
|
|
36
|
+
* Kubernetes Secrets let you store and manage sensitive information, such as
|
|
37
|
+
* passwords, OAuth tokens, and ssh keys. Storing confidential information in a
|
|
38
|
+
* Secret is safer and more flexible than putting it verbatim in a Pod
|
|
39
|
+
* definition or in a container image.
|
|
40
|
+
*
|
|
41
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret
|
|
42
|
+
*/
|
|
43
|
+
class Secret extends base.Resource {
|
|
44
|
+
/**
|
|
45
|
+
* Imports a secret from the cluster as a reference.
|
|
46
|
+
*/
|
|
47
|
+
static fromSecretName(scope, id, name) {
|
|
48
|
+
return new ImportedSecret(scope, id, name);
|
|
49
|
+
}
|
|
50
|
+
constructor(scope, id, props = {}) {
|
|
51
|
+
super(scope, id);
|
|
52
|
+
this.resourceType = 'secrets';
|
|
53
|
+
this.stringData = props.stringData ?? {};
|
|
54
|
+
this.immutable = props.immutable ?? false;
|
|
55
|
+
this.apiObject = new k8s.KubeSecret(this, 'Resource', {
|
|
56
|
+
metadata: props.metadata,
|
|
57
|
+
type: props.type,
|
|
58
|
+
stringData: this.stringData,
|
|
59
|
+
immutable: this.immutable,
|
|
60
|
+
});
|
|
61
|
+
}
|
|
62
|
+
/**
|
|
63
|
+
* Adds a string data field to the secret.
|
|
64
|
+
* @param key Key
|
|
65
|
+
* @param value Value
|
|
66
|
+
*/
|
|
67
|
+
addStringData(key, value) {
|
|
68
|
+
this.stringData[key] = value;
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Gets a string data by key or undefined
|
|
72
|
+
* @param key Key
|
|
73
|
+
*/
|
|
74
|
+
getStringData(key) {
|
|
75
|
+
return this.stringData[key];
|
|
76
|
+
}
|
|
77
|
+
envValue(key, options) {
|
|
78
|
+
return container_1.EnvValue.fromSecretValue({ secret: this, key }, options);
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
exports.Secret = Secret;
|
|
82
|
+
_a = JSII_RTTI_SYMBOL_1;
|
|
83
|
+
Secret[_a] = { fqn: "cdk8s-plus-32.Secret", version: "2.0.0" };
|
|
84
|
+
/**
|
|
85
|
+
* Create a secret for basic authentication.
|
|
86
|
+
*
|
|
87
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#basic-authentication-secret
|
|
88
|
+
*/
|
|
89
|
+
class BasicAuthSecret extends Secret {
|
|
90
|
+
constructor(scope, id, props) {
|
|
91
|
+
super(scope, id, {
|
|
92
|
+
type: 'kubernetes.io/basic-auth',
|
|
93
|
+
stringData: {
|
|
94
|
+
username: props.username,
|
|
95
|
+
password: props.password,
|
|
96
|
+
},
|
|
97
|
+
immutable: props.immutable,
|
|
98
|
+
metadata: props.metadata,
|
|
99
|
+
});
|
|
100
|
+
}
|
|
101
|
+
}
|
|
102
|
+
exports.BasicAuthSecret = BasicAuthSecret;
|
|
103
|
+
_b = JSII_RTTI_SYMBOL_1;
|
|
104
|
+
BasicAuthSecret[_b] = { fqn: "cdk8s-plus-32.BasicAuthSecret", version: "2.0.0" };
|
|
105
|
+
/**
|
|
106
|
+
* Create a secret for ssh authentication.
|
|
107
|
+
*
|
|
108
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#ssh-authentication-secrets
|
|
109
|
+
*/
|
|
110
|
+
class SshAuthSecret extends Secret {
|
|
111
|
+
constructor(scope, id, props) {
|
|
112
|
+
super(scope, id, {
|
|
113
|
+
type: 'kubernetes.io/ssh-auth',
|
|
114
|
+
stringData: {
|
|
115
|
+
'ssh-privatekey': props.sshPrivateKey,
|
|
116
|
+
},
|
|
117
|
+
immutable: props.immutable,
|
|
118
|
+
metadata: props.metadata,
|
|
119
|
+
});
|
|
120
|
+
}
|
|
121
|
+
}
|
|
122
|
+
exports.SshAuthSecret = SshAuthSecret;
|
|
123
|
+
_c = JSII_RTTI_SYMBOL_1;
|
|
124
|
+
SshAuthSecret[_c] = { fqn: "cdk8s-plus-32.SshAuthSecret", version: "2.0.0" };
|
|
125
|
+
/**
|
|
126
|
+
* Create a secret for a service account token.
|
|
127
|
+
*
|
|
128
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#service-account-token-secrets
|
|
129
|
+
*/
|
|
130
|
+
class ServiceAccountTokenSecret extends Secret {
|
|
131
|
+
constructor(scope, id, props) {
|
|
132
|
+
super(scope, id, {
|
|
133
|
+
type: 'kubernetes.io/service-account-token',
|
|
134
|
+
metadata: props.metadata,
|
|
135
|
+
immutable: props.immutable,
|
|
136
|
+
});
|
|
137
|
+
this.metadata.addAnnotation('kubernetes.io/service-account.name', props.serviceAccount.name);
|
|
138
|
+
}
|
|
139
|
+
}
|
|
140
|
+
exports.ServiceAccountTokenSecret = ServiceAccountTokenSecret;
|
|
141
|
+
_d = JSII_RTTI_SYMBOL_1;
|
|
142
|
+
ServiceAccountTokenSecret[_d] = { fqn: "cdk8s-plus-32.ServiceAccountTokenSecret", version: "2.0.0" };
|
|
143
|
+
/**
|
|
144
|
+
* Create a secret for storing a TLS certificate and its associated key.
|
|
145
|
+
*
|
|
146
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#tls-secrets
|
|
147
|
+
*/
|
|
148
|
+
class TlsSecret extends Secret {
|
|
149
|
+
constructor(scope, id, props) {
|
|
150
|
+
super(scope, id, {
|
|
151
|
+
type: 'kubernetes.io/tls',
|
|
152
|
+
stringData: {
|
|
153
|
+
'tls.crt': props.tlsCert,
|
|
154
|
+
'tls.key': props.tlsKey,
|
|
155
|
+
},
|
|
156
|
+
immutable: props.immutable,
|
|
157
|
+
metadata: props.metadata,
|
|
158
|
+
});
|
|
159
|
+
}
|
|
160
|
+
}
|
|
161
|
+
exports.TlsSecret = TlsSecret;
|
|
162
|
+
_e = JSII_RTTI_SYMBOL_1;
|
|
163
|
+
TlsSecret[_e] = { fqn: "cdk8s-plus-32.TlsSecret", version: "2.0.0" };
|
|
164
|
+
/**
|
|
165
|
+
* Create a secret for storing credentials for accessing a container image
|
|
166
|
+
* registry.
|
|
167
|
+
*
|
|
168
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret/#docker-config-secrets
|
|
169
|
+
*/
|
|
170
|
+
class DockerConfigSecret extends Secret {
|
|
171
|
+
constructor(scope, id, props) {
|
|
172
|
+
super(scope, id, {
|
|
173
|
+
type: 'kubernetes.io/dockerconfigjson',
|
|
174
|
+
stringData: {
|
|
175
|
+
'.dockerconfigjson': JSON.stringify(props.data),
|
|
176
|
+
},
|
|
177
|
+
immutable: props.immutable,
|
|
178
|
+
metadata: props.metadata,
|
|
179
|
+
});
|
|
180
|
+
}
|
|
181
|
+
}
|
|
182
|
+
exports.DockerConfigSecret = DockerConfigSecret;
|
|
183
|
+
_f = JSII_RTTI_SYMBOL_1;
|
|
184
|
+
DockerConfigSecret[_f] = { fqn: "cdk8s-plus-32.DockerConfigSecret", version: "2.0.0" };
|
|
185
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"secret.js","sourceRoot":"","sources":["../src/secret.ts"],"names":[],"mappings":";;;;;AACA,2CAAuC;AACvC,+BAA+B;AAC/B,2CAAkE;AAClE,qCAAqC;AAgErC,MAAM,cAAe,SAAQ,sBAAS;IAMpC,YAAY,KAAgB,EAAE,EAAU,EAAE,IAAY;QACpD,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAHH,iBAAY,GAAG,SAAS,CAAC;QAIvC,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;IACpB,CAAC;IAED,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAED,IAAW,UAAU;QACnB,OAAO,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,UAAU,CAAC;IACvC,CAAC;IAED,IAAW,QAAQ;QACjB,OAAO,EAAE,CAAC;IACZ,CAAC;IAED,IAAW,IAAI;QACb,OAAO,GAAG,CAAC,UAAU,CAAC,GAAG,CAAC,IAAI,CAAC;IACjC,CAAC;IAED,IAAW,YAAY;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC;IACnB,CAAC;IAEM,QAAQ,CAAC,GAAW,EAAE,OAAmC;QAC9D,OAAO,oBAAQ,CAAC,eAAe,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,EAAE,EAAE,OAAO,CAAC,CAAC;IAClE,CAAC;CAEF;AAED;;;;;;;GAOG;AACH,MAAa,MAAO,SAAQ,IAAI,CAAC,QAAQ;IAEvC;;OAEG;IACI,MAAM,CAAC,cAAc,CAAC,KAAgB,EAAE,EAAU,EAAE,IAAY;QACrE,OAAO,IAAI,cAAc,CAAC,KAAK,EAAE,EAAE,EAAE,IAAI,CAAC,CAAC;IAC7C,CAAC;IAgBD,YAAmB,KAAgB,EAAE,EAAU,EAAE,QAAqB,EAAG;QACvE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAVH,iBAAY,GAAG,SAAS,CAAC;QAYvC,IAAI,CAAC,UAAU,GAAG,KAAK,CAAC,UAAU,IAAI,EAAE,CAAC;QAEzC,IAAI,CAAC,SAAS,GAAG,KAAK,CAAC,SAAS,IAAI,KAAK,CAAC;QAC1C,IAAI,CAAC,SAAS,GAAG,IAAI,GAAG,CAAC,UAAU,CAAC,IAAI,EAAE,UAAU,EAAE;YACpD,QAAQ,EAAE,KAAK,CAAC,QAAQ;YACxB,IAAI,EAAE,KAAK,CAAC,IAAI;YAChB,UAAU,EAAE,IAAI,CAAC,UAAU;YAC3B,SAAS,EAAE,IAAI,CAAC,SAAS;SAC1B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,aAAa,CAAC,GAAW,EAAE,KAAa;QAC7C,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,GAAG,KAAK,CAAC;IAC/B,CAAC;IAED;;;OAGG;IACI,aAAa,CAAC,GAAW;QAC9B,OAAO,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,CAAC;IAC9B,CAAC;IAEM,QAAQ,CAAC,GAAW,EAAE,OAAmC;QAC9D,OAAO,oBAAQ,CAAC,eAAe,CAAC,EAAE,MAAM,EAAE,IAAI,EAAE,GAAG,EAAE,EAAE,OAAO,CAAC,CAAC;IAClE,CAAC;;AAxDH,wBAyDC;;;AAiBD;;;;GAIG;AACH,MAAa,eAAgB,SAAQ,MAAM;IACzC,YAAmB,KAAgB,EAAE,EAAU,EAAE,KAA2B;QAC1E,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,IAAI,EAAE,0BAA0B;YAChC,UAAU,EAAE;gBACV,QAAQ,EAAE,KAAK,CAAC,QAAQ;gBACxB,QAAQ,EAAE,KAAK,CAAC,QAAQ;aACzB;YACD,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,QAAQ,EAAE,KAAK,CAAC,QAAQ;SACzB,CAAC,CAAC;IACL,CAAC;;AAXH,0CAYC;;;AAYD;;;;GAIG;AACH,MAAa,aAAc,SAAQ,MAAM;IACvC,YAAmB,KAAgB,EAAE,EAAU,EAAE,KAAyB;QACxE,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,IAAI,EAAE,wBAAwB;YAC9B,UAAU,EAAE;gBACV,gBAAgB,EAAE,KAAK,CAAC,aAAa;aACtC;YACD,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,QAAQ,EAAE,KAAK,CAAC,QAAQ;SACzB,CAAC,CAAC;IACL,CAAC;;AAVH,sCAWC;;;AAYD;;;;GAIG;AACH,MAAa,yBAA0B,SAAQ,MAAM;IACnD,YAAmB,KAAgB,EAAE,EAAU,EAAE,KAAqC;QACpF,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,IAAI,EAAE,qCAAqC;YAC3C,QAAQ,EAAE,KAAK,CAAC,QAAQ;YACxB,SAAS,EAAE,KAAK,CAAC,SAAS;SAC3B,CAAC,CAAC;QAEH,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,oCAAoC,EAAE,KAAK,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;IAC/F,CAAC;;AATH,8DAUC;;;AAiBD;;;;GAIG;AACH,MAAa,SAAU,SAAQ,MAAM;IACnC,YAAmB,KAAgB,EAAE,EAAU,EAAE,KAAqB;QACpE,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,IAAI,EAAE,mBAAmB;YACzB,UAAU,EAAE;gBACV,SAAS,EAAE,KAAK,CAAC,OAAO;gBACxB,SAAS,EAAE,KAAK,CAAC,MAAM;aACxB;YACD,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,QAAQ,EAAE,KAAK,CAAC,QAAQ;SACzB,CAAC,CAAC;IACL,CAAC;;AAXH,8BAYC;;;AAeD;;;;;GAKG;AACH,MAAa,kBAAmB,SAAQ,MAAM;IAC5C,YAAmB,KAAgB,EAAE,EAAU,EAAE,KAA8B;QAC7E,KAAK,CAAC,KAAK,EAAE,EAAE,EAAE;YACf,IAAI,EAAE,gCAAgC;YACtC,UAAU,EAAE;gBACV,mBAAmB,EAAE,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC,IAAI,CAAC;aAChD;YACD,SAAS,EAAE,KAAK,CAAC,SAAS;YAC1B,QAAQ,EAAE,KAAK,CAAC,QAAQ;SACzB,CAAC,CAAC;IACL,CAAC;;AAVH,gDAWC","sourcesContent":["import { ApiObject } from 'cdk8s';\nimport { Construct } from 'constructs';\nimport * as base from './base';\nimport { EnvValue, EnvValueFromSecretOptions } from './container';\nimport * as k8s from './imports/k8s';\nimport * as serviceaccount from './service-account';\n\n/**\n * Common properties for `Secret`.\n */\nexport interface CommonSecretProps extends base.ResourceProps {\n\n  /**\n   * If set to true, ensures that data stored in the Secret cannot be updated (only object metadata can be modified).\n   * If not set to true, the field can be modified at any time.\n   *\n   * @default false\n   */\n  readonly immutable?: boolean;\n\n}\n\n/**\n * Options for `Secret`.\n */\nexport interface SecretProps extends CommonSecretProps {\n  /**\n   * stringData allows specifying non-binary secret data in string form. It is\n   * provided as a write-only convenience method. All keys and values are merged\n   * into the data field on write, overwriting any existing values. It is never\n   * output when reading from the API.\n   */\n  readonly stringData?: { [key: string]: string };\n\n  /**\n   * Optional type associated with the secret.  Used to facilitate programmatic\n   * handling of secret data by various controllers.\n   *\n   * @default undefined - Don't set a type.\n   */\n  readonly type?: string;\n\n}\n\nexport interface ISecret extends base.IResource {\n  /**\n   * Returns EnvValue object from a secret's key.\n   * @param key Secret's key\n   * @param options Additional EnvValue options\n   */\n  envValue(key: string, options?: EnvValueFromSecretOptions): EnvValue;\n}\n\n/**\n * Represents a specific value in JSON secret.\n */\nexport interface SecretValue {\n  /**\n   * The secret\n   */\n  readonly secret: ISecret;\n\n  /**\n   * The JSON key\n   */\n  readonly key: string;\n}\n\nclass ImportedSecret extends Construct implements ISecret {\n\n  private readonly _name: string;\n\n  public readonly resourceType = 'secrets';\n\n  constructor(scope: Construct, id: string, name: string) {\n    super(scope, id);\n    this._name = name;\n  }\n\n  public get name(): string {\n    return this._name;\n  }\n\n  public get apiVersion(): string {\n    return k8s.KubeSecret.GVK.apiVersion;\n  }\n\n  public get apiGroup(): string {\n    return '';\n  }\n\n  public get kind(): string {\n    return k8s.KubeSecret.GVK.kind;\n  }\n\n  public get resourceName(): string {\n    return this.name;\n  }\n\n  public envValue(key: string, options?: EnvValueFromSecretOptions): EnvValue {\n    return EnvValue.fromSecretValue({ secret: this, key }, options);\n  }\n\n}\n\n/**\n * Kubernetes Secrets let you store and manage sensitive information, such as\n * passwords, OAuth tokens, and ssh keys. Storing confidential information in a\n * Secret is safer and more flexible than putting it verbatim in a Pod\n * definition or in a container image.\n *\n * @see https://kubernetes.io/docs/concepts/configuration/secret\n */\nexport class Secret extends base.Resource implements ISecret {\n\n  /**\n   * Imports a secret from the cluster as a reference.\n   */\n  public static fromSecretName(scope: Construct, id: string, name: string): ISecret {\n    return new ImportedSecret(scope, id, name);\n  }\n\n  /**\n   * @see base.Resource.apiObject\n   */\n  protected readonly apiObject: ApiObject;\n\n  public readonly resourceType = 'secrets';\n\n  /**\n   * Whether or not the secret is immutable.\n   */\n  public readonly immutable: boolean;\n\n  private readonly stringData: { [key: string]: string };\n\n  public constructor(scope: Construct, id: string, props: SecretProps = { }) {\n    super(scope, id);\n\n    this.stringData = props.stringData ?? {};\n\n    this.immutable = props.immutable ?? false;\n    this.apiObject = new k8s.KubeSecret(this, 'Resource', {\n      metadata: props.metadata,\n      type: props.type,\n      stringData: this.stringData,\n      immutable: this.immutable,\n    });\n  }\n\n  /**\n   * Adds a string data field to the secret.\n   * @param key Key\n   * @param value Value\n   */\n  public addStringData(key: string, value: string) {\n    this.stringData[key] = value;\n  }\n\n  /**\n   * Gets a string data by key or undefined\n   * @param key Key\n   */\n  public getStringData(key: string): string | undefined {\n    return this.stringData[key];\n  }\n\n  public envValue(key: string, options?: EnvValueFromSecretOptions): EnvValue {\n    return EnvValue.fromSecretValue({ secret: this, key }, options);\n  }\n}\n\n/**\n * Options for `BasicAuthSecret`.\n */\nexport interface BasicAuthSecretProps extends CommonSecretProps {\n  /**\n   * The user name for authentication\n   */\n  readonly username: string;\n\n  /**\n   * The password or token for authentication\n   */\n  readonly password: string;\n}\n\n/**\n * Create a secret for basic authentication.\n *\n * @see https://kubernetes.io/docs/concepts/configuration/secret/#basic-authentication-secret\n */\nexport class BasicAuthSecret extends Secret {\n  public constructor(scope: Construct, id: string, props: BasicAuthSecretProps) {\n    super(scope, id, {\n      type: 'kubernetes.io/basic-auth',\n      stringData: {\n        username: props.username,\n        password: props.password,\n      },\n      immutable: props.immutable,\n      metadata: props.metadata,\n    });\n  }\n}\n\n/**\n * Options for `SshAuthSecret`.\n */\nexport interface SshAuthSecretProps extends CommonSecretProps {\n  /**\n   * The SSH private key to use\n   */\n  readonly sshPrivateKey: string;\n}\n\n/**\n * Create a secret for ssh authentication.\n *\n * @see https://kubernetes.io/docs/concepts/configuration/secret/#ssh-authentication-secrets\n */\nexport class SshAuthSecret extends Secret {\n  public constructor(scope: Construct, id: string, props: SshAuthSecretProps) {\n    super(scope, id, {\n      type: 'kubernetes.io/ssh-auth',\n      stringData: {\n        'ssh-privatekey': props.sshPrivateKey,\n      },\n      immutable: props.immutable,\n      metadata: props.metadata,\n    });\n  }\n}\n\n/**\n * Options for `ServiceAccountTokenSecret`.\n */\nexport interface ServiceAccountTokenSecretProps extends CommonSecretProps {\n  /**\n   * The service account to store a secret for\n   */\n  readonly serviceAccount: serviceaccount.IServiceAccount;\n}\n\n/**\n * Create a secret for a service account token.\n *\n * @see https://kubernetes.io/docs/concepts/configuration/secret/#service-account-token-secrets\n */\nexport class ServiceAccountTokenSecret extends Secret {\n  public constructor(scope: Construct, id: string, props: ServiceAccountTokenSecretProps) {\n    super(scope, id, {\n      type: 'kubernetes.io/service-account-token',\n      metadata: props.metadata,\n      immutable: props.immutable,\n    });\n\n    this.metadata.addAnnotation('kubernetes.io/service-account.name', props.serviceAccount.name);\n  }\n}\n\n/**\n * Options for `TlsSecret`.\n */\nexport interface TlsSecretProps extends CommonSecretProps {\n  /**\n   * The TLS cert\n   */\n  readonly tlsCert: string;\n\n  /**\n   * The TLS key\n   */\n  readonly tlsKey: string;\n}\n\n/**\n * Create a secret for storing a TLS certificate and its associated key.\n *\n * @see https://kubernetes.io/docs/concepts/configuration/secret/#tls-secrets\n */\nexport class TlsSecret extends Secret {\n  public constructor(scope: Construct, id: string, props: TlsSecretProps) {\n    super(scope, id, {\n      type: 'kubernetes.io/tls',\n      stringData: {\n        'tls.crt': props.tlsCert,\n        'tls.key': props.tlsKey,\n      },\n      immutable: props.immutable,\n      metadata: props.metadata,\n    });\n  }\n}\n\n/**\n * Options for `DockerConfigSecret`.\n */\nexport interface DockerConfigSecretProps extends CommonSecretProps {\n  /**\n   * JSON content to provide for the `~/.docker/config.json` file. This will\n   * be stringified and inserted as stringData.\n   *\n   * @see https://docs.docker.com/engine/reference/commandline/cli/#sample-configuration-file\n   */\n  readonly data: { [key: string]: any };\n}\n\n/**\n * Create a secret for storing credentials for accessing a container image\n * registry.\n *\n * @see https://kubernetes.io/docs/concepts/configuration/secret/#docker-config-secrets\n */\nexport class DockerConfigSecret extends Secret {\n  public constructor(scope: Construct, id: string, props: DockerConfigSecretProps) {\n    super(scope, id, {\n      type: 'kubernetes.io/dockerconfigjson',\n      stringData: {\n        '.dockerconfigjson': JSON.stringify(props.data),\n      },\n      immutable: props.immutable,\n      metadata: props.metadata,\n    });\n  }\n}\n"]}
|
|
@@ -0,0 +1,83 @@
|
|
|
1
|
+
import { ApiObject } from 'cdk8s';
|
|
2
|
+
import { Construct } from 'constructs';
|
|
3
|
+
import * as base from './base';
|
|
4
|
+
import * as rb from './role-binding';
|
|
5
|
+
import * as secret from './secret';
|
|
6
|
+
export interface IServiceAccount extends base.IResource, rb.ISubject {
|
|
7
|
+
}
|
|
8
|
+
/**
|
|
9
|
+
* Properties for initialization of `ServiceAccount`.
|
|
10
|
+
*/
|
|
11
|
+
export interface ServiceAccountProps extends base.ResourceProps {
|
|
12
|
+
/**
|
|
13
|
+
* List of secrets allowed to be used by pods running using this
|
|
14
|
+
* ServiceAccount.
|
|
15
|
+
*
|
|
16
|
+
* @see https://kubernetes.io/docs/concepts/configuration/secret
|
|
17
|
+
*/
|
|
18
|
+
readonly secrets?: secret.ISecret[];
|
|
19
|
+
/**
|
|
20
|
+
* Indicates whether pods running as this service account
|
|
21
|
+
* should have an API token automatically mounted. Can be overridden at the pod level.
|
|
22
|
+
*
|
|
23
|
+
* @default false
|
|
24
|
+
* @see https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#use-the-default-service-account-to-access-the-api-server
|
|
25
|
+
*/
|
|
26
|
+
readonly automountToken?: boolean;
|
|
27
|
+
}
|
|
28
|
+
export interface FromServiceAccountNameOptions {
|
|
29
|
+
/**
|
|
30
|
+
* The name of the namespace the service account belongs to.
|
|
31
|
+
*
|
|
32
|
+
* @default "default"
|
|
33
|
+
*/
|
|
34
|
+
readonly namespaceName?: string;
|
|
35
|
+
}
|
|
36
|
+
/**
|
|
37
|
+
* A service account provides an identity for processes that run in a Pod.
|
|
38
|
+
*
|
|
39
|
+
* When you (a human) access the cluster (for example, using kubectl), you are
|
|
40
|
+
* authenticated by the apiserver as a particular User Account (currently this
|
|
41
|
+
* is usually admin, unless your cluster administrator has customized your
|
|
42
|
+
* cluster). Processes in containers inside pods can also contact the apiserver.
|
|
43
|
+
* When they do, they are authenticated as a particular Service Account (for
|
|
44
|
+
* example, default).
|
|
45
|
+
*
|
|
46
|
+
* @see https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account
|
|
47
|
+
*/
|
|
48
|
+
export declare class ServiceAccount extends base.Resource implements IServiceAccount, rb.ISubject {
|
|
49
|
+
/**
|
|
50
|
+
* Imports a service account from the cluster as a reference.
|
|
51
|
+
* @param name The name of the service account resource.
|
|
52
|
+
* @param options additional options.
|
|
53
|
+
*/
|
|
54
|
+
static fromServiceAccountName(scope: Construct, id: string, name: string, options?: FromServiceAccountNameOptions): IServiceAccount;
|
|
55
|
+
/**
|
|
56
|
+
* @see base.Resource.apiObject
|
|
57
|
+
*/
|
|
58
|
+
protected readonly apiObject: ApiObject;
|
|
59
|
+
readonly resourceType = "serviceaccounts";
|
|
60
|
+
private readonly _secrets;
|
|
61
|
+
/**
|
|
62
|
+
* Whether or not a token is automatically mounted for this
|
|
63
|
+
* service account.
|
|
64
|
+
*/
|
|
65
|
+
readonly automountToken: boolean;
|
|
66
|
+
constructor(scope: Construct, id: string, props?: ServiceAccountProps);
|
|
67
|
+
/**
|
|
68
|
+
* Allow a secret to be accessed by pods using this service account.
|
|
69
|
+
* @param secr The secret
|
|
70
|
+
*/
|
|
71
|
+
addSecret(secr: secret.ISecret): void;
|
|
72
|
+
/**
|
|
73
|
+
* List of secrets allowed to be used by pods running using this service
|
|
74
|
+
* account.
|
|
75
|
+
*
|
|
76
|
+
* Returns a copy. To add a secret, use `addSecret()`.
|
|
77
|
+
*/
|
|
78
|
+
get secrets(): secret.ISecret[];
|
|
79
|
+
/**
|
|
80
|
+
* @see ISubect.toSubjectConfiguration()
|
|
81
|
+
*/
|
|
82
|
+
toSubjectConfiguration(): rb.SubjectConfiguration;
|
|
83
|
+
}
|
|
@@ -0,0 +1,105 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var _a;
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
4
|
+
exports.ServiceAccount = void 0;
|
|
5
|
+
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
|
|
6
|
+
const cdk8s_1 = require("cdk8s");
|
|
7
|
+
const constructs_1 = require("constructs");
|
|
8
|
+
const base = require("./base");
|
|
9
|
+
const k8s = require("./imports/k8s");
|
|
10
|
+
const utils_1 = require("./utils");
|
|
11
|
+
class ImportedServiceAccount extends constructs_1.Construct {
|
|
12
|
+
constructor(scope, id, name, options = {}) {
|
|
13
|
+
super(scope, id);
|
|
14
|
+
this.resourceType = 'serviceaccounts';
|
|
15
|
+
this._name = name;
|
|
16
|
+
this._namespaceName = options.namespaceName ?? 'default';
|
|
17
|
+
}
|
|
18
|
+
toSubjectConfiguration() {
|
|
19
|
+
return {
|
|
20
|
+
kind: this.kind,
|
|
21
|
+
name: this.name,
|
|
22
|
+
apiGroup: this.apiGroup,
|
|
23
|
+
namespace: this._namespaceName,
|
|
24
|
+
};
|
|
25
|
+
}
|
|
26
|
+
get name() {
|
|
27
|
+
return this._name;
|
|
28
|
+
}
|
|
29
|
+
get apiVersion() {
|
|
30
|
+
return k8s.KubeServiceAccount.GVK.apiVersion;
|
|
31
|
+
}
|
|
32
|
+
get apiGroup() {
|
|
33
|
+
return '';
|
|
34
|
+
}
|
|
35
|
+
get kind() {
|
|
36
|
+
return k8s.KubeServiceAccount.GVK.kind;
|
|
37
|
+
}
|
|
38
|
+
get resourceName() {
|
|
39
|
+
return this.name;
|
|
40
|
+
}
|
|
41
|
+
}
|
|
42
|
+
/**
|
|
43
|
+
* A service account provides an identity for processes that run in a Pod.
|
|
44
|
+
*
|
|
45
|
+
* When you (a human) access the cluster (for example, using kubectl), you are
|
|
46
|
+
* authenticated by the apiserver as a particular User Account (currently this
|
|
47
|
+
* is usually admin, unless your cluster administrator has customized your
|
|
48
|
+
* cluster). Processes in containers inside pods can also contact the apiserver.
|
|
49
|
+
* When they do, they are authenticated as a particular Service Account (for
|
|
50
|
+
* example, default).
|
|
51
|
+
*
|
|
52
|
+
* @see https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account
|
|
53
|
+
*/
|
|
54
|
+
class ServiceAccount extends base.Resource {
|
|
55
|
+
/**
|
|
56
|
+
* Imports a service account from the cluster as a reference.
|
|
57
|
+
* @param name The name of the service account resource.
|
|
58
|
+
* @param options additional options.
|
|
59
|
+
*/
|
|
60
|
+
static fromServiceAccountName(scope, id, name, options = {}) {
|
|
61
|
+
return new ImportedServiceAccount(scope, id, name, options);
|
|
62
|
+
}
|
|
63
|
+
constructor(scope, id, props = {}) {
|
|
64
|
+
super(scope, id);
|
|
65
|
+
this.resourceType = 'serviceaccounts';
|
|
66
|
+
this._secrets = props.secrets ?? [];
|
|
67
|
+
this.automountToken = props.automountToken ?? false;
|
|
68
|
+
this.apiObject = new k8s.KubeServiceAccount(this, 'Resource', {
|
|
69
|
+
metadata: props.metadata,
|
|
70
|
+
secrets: cdk8s_1.Lazy.any({ produce: () => (0, utils_1.undefinedIfEmpty)(this._secrets.map(s => ({ name: s.name }))) }),
|
|
71
|
+
automountServiceAccountToken: this.automountToken,
|
|
72
|
+
});
|
|
73
|
+
}
|
|
74
|
+
/**
|
|
75
|
+
* Allow a secret to be accessed by pods using this service account.
|
|
76
|
+
* @param secr The secret
|
|
77
|
+
*/
|
|
78
|
+
addSecret(secr) {
|
|
79
|
+
this._secrets.push(secr);
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
* List of secrets allowed to be used by pods running using this service
|
|
83
|
+
* account.
|
|
84
|
+
*
|
|
85
|
+
* Returns a copy. To add a secret, use `addSecret()`.
|
|
86
|
+
*/
|
|
87
|
+
get secrets() {
|
|
88
|
+
return [...this._secrets];
|
|
89
|
+
}
|
|
90
|
+
/**
|
|
91
|
+
* @see ISubect.toSubjectConfiguration()
|
|
92
|
+
*/
|
|
93
|
+
toSubjectConfiguration() {
|
|
94
|
+
return {
|
|
95
|
+
kind: this.kind,
|
|
96
|
+
name: this.name,
|
|
97
|
+
apiGroup: this.apiGroup,
|
|
98
|
+
namespace: this.metadata.namespace,
|
|
99
|
+
};
|
|
100
|
+
}
|
|
101
|
+
}
|
|
102
|
+
exports.ServiceAccount = ServiceAccount;
|
|
103
|
+
_a = JSII_RTTI_SYMBOL_1;
|
|
104
|
+
ServiceAccount[_a] = { fqn: "cdk8s-plus-32.ServiceAccount", version: "2.0.0" };
|
|
105
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"service-account.js","sourceRoot":"","sources":["../src/service-account.ts"],"names":[],"mappings":";;;;;AAAA,iCAAwC;AACxC,2CAAuC;AACvC,+BAA+B;AAC/B,qCAAqC;AAGrC,mCAA2C;AAuC3C,MAAM,sBAAuB,SAAQ,sBAAS;IAO5C,YAAY,KAAgB,EAAE,EAAU,EAAE,IAAY,EAAE,UAAyC,EAAE;QACjG,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAHH,iBAAY,GAAG,iBAAiB,CAAC;QAI/C,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC;QAClB,IAAI,CAAC,cAAc,GAAG,OAAO,CAAC,aAAa,IAAI,SAAS,CAAC;IAC3D,CAAC;IAEM,sBAAsB;QAC3B,OAAO;YACL,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,SAAS,EAAE,IAAI,CAAC,cAAc;SAC/B,CAAC;IACJ,CAAC;IAED,IAAW,IAAI;QACb,OAAO,IAAI,CAAC,KAAK,CAAC;IACpB,CAAC;IAED,IAAW,UAAU;QACnB,OAAO,GAAG,CAAC,kBAAkB,CAAC,GAAG,CAAC,UAAU,CAAC;IAC/C,CAAC;IAED,IAAW,QAAQ;QACjB,OAAO,EAAE,CAAC;IACZ,CAAC;IAED,IAAW,IAAI;QACb,OAAO,GAAG,CAAC,kBAAkB,CAAC,GAAG,CAAC,IAAI,CAAC;IACzC,CAAC;IAED,IAAW,YAAY;QACrB,OAAO,IAAI,CAAC,IAAI,CAAC;IACnB,CAAC;CAEF;AAED;;;;;;;;;;;GAWG;AACH,MAAa,cAAe,SAAQ,IAAI,CAAC,QAAQ;IAE/C;;;;OAIG;IACI,MAAM,CAAC,sBAAsB,CAAC,KAAgB,EAAE,EAAU,EAAE,IAAY,EAAE,UAAyC,EAAE;QAC1H,OAAO,IAAI,sBAAsB,CAAC,KAAK,EAAE,EAAE,EAAE,IAAI,EAAE,OAAO,CAAC,CAAC;IAC9D,CAAC;IAiBD,YAAY,KAAgB,EAAE,EAAU,EAAE,QAA6B,EAAG;QACxE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAXH,iBAAY,GAAG,iBAAiB,CAAC;QAa/C,IAAI,CAAC,QAAQ,GAAG,KAAK,CAAC,OAAO,IAAI,EAAE,CAAC;QACpC,IAAI,CAAC,cAAc,GAAG,KAAK,CAAC,cAAc,IAAI,KAAK,CAAC;QAEpD,IAAI,CAAC,SAAS,GAAG,IAAI,GAAG,CAAC,kBAAkB,CAAC,IAAI,EAAE,UAAU,EAAE;YAC5D,QAAQ,EAAE,KAAK,CAAC,QAAQ;YACxB,OAAO,EAAE,YAAI,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,GAAG,EAAE,CAAC,IAAA,wBAAgB,EAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,EAAE,IAAI,EAAE,CAAC,CAAC,IAAI,EAAE,CAAC,CAAC,CAAC,EAAE,CAAC;YAClG,4BAA4B,EAAE,IAAI,CAAC,cAAc;SAClD,CAAC,CAAC;IACL,CAAC;IAED;;;OAGG;IACI,SAAS,CAAC,IAAoB;QACnC,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC3B,CAAC;IAED;;;;;OAKG;IACH,IAAW,OAAO;QAChB,OAAO,CAAC,GAAG,IAAI,CAAC,QAAQ,CAAC,CAAC;IAC5B,CAAC;IAED;;OAEG;IACI,sBAAsB;QAC3B,OAAO;YACL,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,IAAI,EAAE,IAAI,CAAC,IAAI;YACf,QAAQ,EAAE,IAAI,CAAC,QAAQ;YACvB,SAAS,EAAE,IAAI,CAAC,QAAQ,CAAC,SAAS;SACnC,CAAC;IACJ,CAAC;;AAnEH,wCAqEC","sourcesContent":["import { ApiObject, Lazy } from 'cdk8s';\nimport { Construct } from 'constructs';\nimport * as base from './base';\nimport * as k8s from './imports/k8s';\nimport * as rb from './role-binding';\nimport * as secret from './secret';\nimport { undefinedIfEmpty } from './utils';\n\n\nexport interface IServiceAccount extends base.IResource, rb.ISubject {\n\n}\n\n/**\n * Properties for initialization of `ServiceAccount`.\n */\nexport interface ServiceAccountProps extends base.ResourceProps {\n  /**\n   * List of secrets allowed to be used by pods running using this\n   * ServiceAccount.\n   *\n   * @see https://kubernetes.io/docs/concepts/configuration/secret\n   */\n  readonly secrets?: secret.ISecret[];\n\n  /**\n   * Indicates whether pods running as this service account\n   * should have an API token automatically mounted. Can be overridden at the pod level.\n   *\n   * @default false\n   * @see https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#use-the-default-service-account-to-access-the-api-server\n   */\n  readonly automountToken?: boolean;\n}\n\nexport interface FromServiceAccountNameOptions {\n\n  /**\n   * The name of the namespace the service account belongs to.\n   *\n   * @default \"default\"\n   */\n  readonly namespaceName?: string;\n}\n\nclass ImportedServiceAccount extends Construct implements IServiceAccount {\n\n  private readonly _name: string;\n  private readonly _namespaceName: string;\n\n  public readonly resourceType = 'serviceaccounts';\n\n  constructor(scope: Construct, id: string, name: string, options: FromServiceAccountNameOptions = {}) {\n    super(scope, id);\n    this._name = name;\n    this._namespaceName = options.namespaceName ?? 'default';\n  }\n\n  public toSubjectConfiguration(): rb.SubjectConfiguration {\n    return {\n      kind: this.kind,\n      name: this.name,\n      apiGroup: this.apiGroup,\n      namespace: this._namespaceName,\n    };\n  }\n\n  public get name(): string {\n    return this._name;\n  }\n\n  public get apiVersion(): string {\n    return k8s.KubeServiceAccount.GVK.apiVersion;\n  }\n\n  public get apiGroup(): string {\n    return '';\n  }\n\n  public get kind(): string {\n    return k8s.KubeServiceAccount.GVK.kind;\n  }\n\n  public get resourceName(): string {\n    return this.name;\n  }\n\n}\n\n/**\n * A service account provides an identity for processes that run in a Pod.\n *\n * When you (a human) access the cluster (for example, using kubectl), you are\n * authenticated by the apiserver as a particular User Account (currently this\n * is usually admin, unless your cluster administrator has customized your\n * cluster). Processes in containers inside pods can also contact the apiserver.\n * When they do, they are authenticated as a particular Service Account (for\n * example, default).\n *\n * @see https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account\n */\nexport class ServiceAccount extends base.Resource implements IServiceAccount, rb.ISubject {\n\n  /**\n   * Imports a service account from the cluster as a reference.\n   * @param name The name of the service account resource.\n   * @param options additional options.\n   */\n  public static fromServiceAccountName(scope: Construct, id: string, name: string, options: FromServiceAccountNameOptions = {}): IServiceAccount {\n    return new ImportedServiceAccount(scope, id, name, options);\n  }\n\n  /**\n   * @see base.Resource.apiObject\n   */\n  protected readonly apiObject: ApiObject;\n\n  public readonly resourceType = 'serviceaccounts';\n\n  private readonly _secrets: secret.ISecret[];\n\n  /**\n   * Whether or not a token is automatically mounted for this\n   * service account.\n   */\n  public readonly automountToken: boolean;\n\n  constructor(scope: Construct, id: string, props: ServiceAccountProps = { }) {\n    super(scope, id);\n\n    this._secrets = props.secrets ?? [];\n    this.automountToken = props.automountToken ?? false;\n\n    this.apiObject = new k8s.KubeServiceAccount(this, 'Resource', {\n      metadata: props.metadata,\n      secrets: Lazy.any({ produce: () => undefinedIfEmpty(this._secrets.map(s => ({ name: s.name }))) }),\n      automountServiceAccountToken: this.automountToken,\n    });\n  }\n\n  /**\n   * Allow a secret to be accessed by pods using this service account.\n   * @param secr The secret\n   */\n  public addSecret(secr: secret.ISecret) {\n    this._secrets.push(secr);\n  }\n\n  /**\n   * List of secrets allowed to be used by pods running using this service\n   * account.\n   *\n   * Returns a copy. To add a secret, use `addSecret()`.\n   */\n  public get secrets() {\n    return [...this._secrets];\n  }\n\n  /**\n   * @see ISubect.toSubjectConfiguration()\n   */\n  public toSubjectConfiguration(): rb.SubjectConfiguration {\n    return {\n      kind: this.kind,\n      name: this.name,\n      apiGroup: this.apiGroup,\n      namespace: this.metadata.namespace,\n    };\n  }\n\n}"]}
|