pulumi-kubernetes-cert-manager 0.0.5__tar.gz → 0.2.0a1736858812__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/PKG-INFO +13 -9
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager/__init__.py +1 -1
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager/_inputs.py +492 -1
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager/_utilities.py +97 -6
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager/cert_manager.py +27 -24
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager/outputs.py +7 -1
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager/provider.py +8 -5
- pulumi_kubernetes_cert_manager-0.2.0a1736858812/pulumi_kubernetes_cert_manager/pulumi-plugin.json +5 -0
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager.egg-info/PKG-INFO +14 -10
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager.egg-info/SOURCES.txt +1 -2
- pulumi_kubernetes_cert_manager-0.2.0a1736858812/pulumi_kubernetes_cert_manager.egg-info/requires.txt +7 -0
- pulumi_kubernetes_cert_manager-0.2.0a1736858812/pyproject.toml +22 -0
- pulumi_kubernetes_cert_manager-0.0.5/pulumi_kubernetes_cert_manager/pulumi-plugin.json +0 -4
- pulumi_kubernetes_cert_manager-0.0.5/pulumi_kubernetes_cert_manager.egg-info/not-zip-safe +0 -1
- pulumi_kubernetes_cert_manager-0.0.5/pulumi_kubernetes_cert_manager.egg-info/requires.txt +0 -4
- pulumi_kubernetes_cert_manager-0.0.5/setup.py +0 -61
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/README.md +0 -0
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager/py.typed +0 -0
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager.egg-info/dependency_links.txt +0 -0
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/pulumi_kubernetes_cert_manager.egg-info/top_level.txt +0 -0
- {pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/setup.cfg +0 -0
{pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/PKG-INFO
RENAMED
@@ -1,12 +1,18 @@
|
|
1
|
-
Metadata-Version: 2.
|
1
|
+
Metadata-Version: 2.2
|
2
2
|
Name: pulumi_kubernetes_cert_manager
|
3
|
-
Version: 0.
|
4
|
-
Summary:
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
3
|
+
Version: 0.2.0a1736858812
|
4
|
+
Summary: Strongly-typed Cert Manager installation
|
5
|
+
License: Apache-2.0
|
6
|
+
Project-URL: Homepage, https://pulumi.io
|
7
|
+
Project-URL: Repository, https://github.com/pulumi/pulumi-kubernetes-cert-manager
|
8
|
+
Keywords: pulumi,kubernetes,cert-manager,kind/component,category/infrastructure
|
9
|
+
Requires-Python: >=3.9
|
9
10
|
Description-Content-Type: text/markdown
|
11
|
+
Requires-Dist: parver>=0.2.1
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.142.0
|
13
|
+
Requires-Dist: pulumi-kubernetes<5.0.0,>=4.0.0
|
14
|
+
Requires-Dist: semver>=2.8.1
|
15
|
+
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
10
16
|
|
11
17
|
# Pulumi Cert Manager Component
|
12
18
|
|
@@ -39,5 +45,3 @@ if you need to override them, you may do so using the `helmOptions` parameter. R
|
|
39
45
|
https://www.pulumi.com/docs/reference/pkg/kubernetes/helm/v3/release/#inputs) for a full set of choices.
|
40
46
|
|
41
47
|
For complete details, refer to the Pulumi Package details within the Pulumi Registry.
|
42
|
-
|
43
|
-
|
@@ -1,33 +1,95 @@
|
|
1
1
|
# coding=utf-8
|
2
|
-
# *** WARNING: this file was generated by
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import copy
|
5
6
|
import warnings
|
7
|
+
import sys
|
6
8
|
import pulumi
|
7
9
|
import pulumi.runtime
|
8
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
9
15
|
from . import _utilities
|
10
16
|
import pulumi_kubernetes
|
11
17
|
|
12
18
|
__all__ = [
|
13
19
|
'CertManagerCaInjectorArgs',
|
20
|
+
'CertManagerCaInjectorArgsDict',
|
14
21
|
'CertManagerGlobalLeaderElectionArgs',
|
22
|
+
'CertManagerGlobalLeaderElectionArgsDict',
|
15
23
|
'CertManagerGlobalPodSecurityPolicyArgs',
|
24
|
+
'CertManagerGlobalPodSecurityPolicyArgsDict',
|
16
25
|
'CertManagerGlobalRbacArgs',
|
26
|
+
'CertManagerGlobalRbacArgsDict',
|
17
27
|
'CertManagerGlobalArgs',
|
28
|
+
'CertManagerGlobalArgsDict',
|
18
29
|
'CertManagerImageArgs',
|
30
|
+
'CertManagerImageArgsDict',
|
19
31
|
'CertManagerIngressShimArgs',
|
32
|
+
'CertManagerIngressShimArgsDict',
|
20
33
|
'CertManagerPrometheusServiceMonitorArgs',
|
34
|
+
'CertManagerPrometheusServiceMonitorArgsDict',
|
21
35
|
'CertManagerPrometheusArgs',
|
36
|
+
'CertManagerPrometheusArgsDict',
|
22
37
|
'CertManagerServiceAccountArgs',
|
38
|
+
'CertManagerServiceAccountArgsDict',
|
23
39
|
'CertManagerStartupAPICheckRBACArgs',
|
40
|
+
'CertManagerStartupAPICheckRBACArgsDict',
|
24
41
|
'CertManagerStartupAPICheckArgs',
|
42
|
+
'CertManagerStartupAPICheckArgsDict',
|
25
43
|
'CertManagerWebhookURLArgs',
|
44
|
+
'CertManagerWebhookURLArgsDict',
|
26
45
|
'CertManagerWebhookArgs',
|
46
|
+
'CertManagerWebhookArgsDict',
|
27
47
|
'ReleaseArgs',
|
48
|
+
'ReleaseArgsDict',
|
28
49
|
'RepositoryOptsArgs',
|
50
|
+
'RepositoryOptsArgsDict',
|
29
51
|
]
|
30
52
|
|
53
|
+
MYPY = False
|
54
|
+
|
55
|
+
if not MYPY:
|
56
|
+
class CertManagerCaInjectorArgsDict(TypedDict):
|
57
|
+
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.AffinityArgsDict']]
|
58
|
+
container_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.SecurityContextArgsDict']]
|
59
|
+
"""
|
60
|
+
Container Security Context to be set on the cainjector component container. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
61
|
+
"""
|
62
|
+
deployment_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
63
|
+
"""
|
64
|
+
Optional additional annotations to add to the cainjector Deployment
|
65
|
+
"""
|
66
|
+
extra_args: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
67
|
+
"""
|
68
|
+
Optional additional arguments for cainjector
|
69
|
+
"""
|
70
|
+
image: NotRequired[pulumi.Input['CertManagerImageArgsDict']]
|
71
|
+
node_selector: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
72
|
+
pod_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
73
|
+
"""
|
74
|
+
Optional additional annotations to add to the cainjector Pods
|
75
|
+
"""
|
76
|
+
pod_labels: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
77
|
+
"""
|
78
|
+
Optional additional labels to add to the Webhook Pods
|
79
|
+
"""
|
80
|
+
pod_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.PodSecurityContextArgsDict']]
|
81
|
+
"""
|
82
|
+
Pod Security Context to be set on the cainjector component Pod. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
83
|
+
"""
|
84
|
+
replica_count: NotRequired[pulumi.Input[int]]
|
85
|
+
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ResourceRequirementsArgsDict']]
|
86
|
+
service_account: NotRequired[pulumi.Input['CertManagerServiceAccountArgsDict']]
|
87
|
+
strategy: NotRequired[pulumi.Input['pulumi_kubernetes.apps.v1.DeploymentStrategyArgsDict']]
|
88
|
+
timeout_seconds: NotRequired[pulumi.Input[int]]
|
89
|
+
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.TolerationArgsDict']]]]
|
90
|
+
elif False:
|
91
|
+
CertManagerCaInjectorArgsDict: TypeAlias = Mapping[str, Any]
|
92
|
+
|
31
93
|
@pulumi.input_type
|
32
94
|
class CertManagerCaInjectorArgs:
|
33
95
|
def __init__(__self__, *,
|
@@ -239,6 +301,23 @@ class CertManagerCaInjectorArgs:
|
|
239
301
|
pulumi.set(self, "tolerations", value)
|
240
302
|
|
241
303
|
|
304
|
+
if not MYPY:
|
305
|
+
class CertManagerGlobalLeaderElectionArgsDict(TypedDict):
|
306
|
+
lease_duration: NotRequired[pulumi.Input[str]]
|
307
|
+
"""
|
308
|
+
The duration that non-leader candidates will wait after observing a leadership renewal until attempting to acquire leadership of a led but unrenewed leader slot. This is effectively the maximum duration that a leader can be stopped before it is replaced by another candidate.
|
309
|
+
"""
|
310
|
+
namespace: NotRequired[pulumi.Input[str]]
|
311
|
+
"""
|
312
|
+
Override the namespace used to store the ConfigMap for leader election.
|
313
|
+
"""
|
314
|
+
renew_deadline: NotRequired[pulumi.Input[str]]
|
315
|
+
"""
|
316
|
+
The interval between attempts by the acting master to renew a leadership slot before it stops leading. This must be less than or equal to the lease duration.
|
317
|
+
"""
|
318
|
+
elif False:
|
319
|
+
CertManagerGlobalLeaderElectionArgsDict: TypeAlias = Mapping[str, Any]
|
320
|
+
|
242
321
|
@pulumi.input_type
|
243
322
|
class CertManagerGlobalLeaderElectionArgs:
|
244
323
|
def __init__(__self__, *,
|
@@ -294,6 +373,13 @@ class CertManagerGlobalLeaderElectionArgs:
|
|
294
373
|
pulumi.set(self, "renew_deadline", value)
|
295
374
|
|
296
375
|
|
376
|
+
if not MYPY:
|
377
|
+
class CertManagerGlobalPodSecurityPolicyArgsDict(TypedDict):
|
378
|
+
enabled: NotRequired[pulumi.Input[bool]]
|
379
|
+
use_app_armor: NotRequired[pulumi.Input[bool]]
|
380
|
+
elif False:
|
381
|
+
CertManagerGlobalPodSecurityPolicyArgsDict: TypeAlias = Mapping[str, Any]
|
382
|
+
|
297
383
|
@pulumi.input_type
|
298
384
|
class CertManagerGlobalPodSecurityPolicyArgs:
|
299
385
|
def __init__(__self__, *,
|
@@ -323,6 +409,12 @@ class CertManagerGlobalPodSecurityPolicyArgs:
|
|
323
409
|
pulumi.set(self, "use_app_armor", value)
|
324
410
|
|
325
411
|
|
412
|
+
if not MYPY:
|
413
|
+
class CertManagerGlobalRbacArgsDict(TypedDict):
|
414
|
+
create: NotRequired[pulumi.Input[bool]]
|
415
|
+
elif False:
|
416
|
+
CertManagerGlobalRbacArgsDict: TypeAlias = Mapping[str, Any]
|
417
|
+
|
326
418
|
@pulumi.input_type
|
327
419
|
class CertManagerGlobalRbacArgs:
|
328
420
|
def __init__(__self__, *,
|
@@ -340,6 +432,26 @@ class CertManagerGlobalRbacArgs:
|
|
340
432
|
pulumi.set(self, "create", value)
|
341
433
|
|
342
434
|
|
435
|
+
if not MYPY:
|
436
|
+
class CertManagerGlobalArgsDict(TypedDict):
|
437
|
+
image_pull_secrets: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.LocalObjectReferenceArgsDict']]]]
|
438
|
+
"""
|
439
|
+
Reference to one or more secrets to be used when pulling images. ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
440
|
+
"""
|
441
|
+
leader_election: NotRequired[pulumi.Input['CertManagerGlobalLeaderElectionArgsDict']]
|
442
|
+
log_level: NotRequired[pulumi.Input[int]]
|
443
|
+
"""
|
444
|
+
Set the verbosity of cert-manager. Range of 0 - 6 with 6 being the most verbose.
|
445
|
+
"""
|
446
|
+
pod_security_policy: NotRequired[pulumi.Input['CertManagerGlobalPodSecurityPolicyArgsDict']]
|
447
|
+
priority_class_name: NotRequired[pulumi.Input[str]]
|
448
|
+
"""
|
449
|
+
Optional priority class to be used for the cert-manager pods.
|
450
|
+
"""
|
451
|
+
rbac: NotRequired[pulumi.Input['CertManagerGlobalRbacArgsDict']]
|
452
|
+
elif False:
|
453
|
+
CertManagerGlobalArgsDict: TypeAlias = Mapping[str, Any]
|
454
|
+
|
343
455
|
@pulumi.input_type
|
344
456
|
class CertManagerGlobalArgs:
|
345
457
|
def __init__(__self__, *,
|
@@ -431,6 +543,28 @@ class CertManagerGlobalArgs:
|
|
431
543
|
pulumi.set(self, "rbac", value)
|
432
544
|
|
433
545
|
|
546
|
+
if not MYPY:
|
547
|
+
class CertManagerImageArgsDict(TypedDict):
|
548
|
+
digest: NotRequired[pulumi.Input[str]]
|
549
|
+
"""
|
550
|
+
Setting a digest will override any tag, e.g. `digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20`.
|
551
|
+
"""
|
552
|
+
pull_policy: NotRequired[pulumi.Input[str]]
|
553
|
+
registry: NotRequired[pulumi.Input[str]]
|
554
|
+
"""
|
555
|
+
You can manage a registry with `registry: quay.io`.
|
556
|
+
"""
|
557
|
+
repository: NotRequired[pulumi.Input[str]]
|
558
|
+
"""
|
559
|
+
You can manage a registry with `repository: jetstack/cert-manager-controller`.
|
560
|
+
"""
|
561
|
+
tag: NotRequired[pulumi.Input[str]]
|
562
|
+
"""
|
563
|
+
Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
|
564
|
+
"""
|
565
|
+
elif False:
|
566
|
+
CertManagerImageArgsDict: TypeAlias = Mapping[str, Any]
|
567
|
+
|
434
568
|
@pulumi.input_type
|
435
569
|
class CertManagerImageArgs:
|
436
570
|
def __init__(__self__, *,
|
@@ -514,6 +648,14 @@ class CertManagerImageArgs:
|
|
514
648
|
pulumi.set(self, "tag", value)
|
515
649
|
|
516
650
|
|
651
|
+
if not MYPY:
|
652
|
+
class CertManagerIngressShimArgsDict(TypedDict):
|
653
|
+
default_issuer_group: NotRequired[pulumi.Input[str]]
|
654
|
+
default_issuer_kind: NotRequired[pulumi.Input[str]]
|
655
|
+
default_issuer_name: NotRequired[pulumi.Input[str]]
|
656
|
+
elif False:
|
657
|
+
CertManagerIngressShimArgsDict: TypeAlias = Mapping[str, Any]
|
658
|
+
|
517
659
|
@pulumi.input_type
|
518
660
|
class CertManagerIngressShimArgs:
|
519
661
|
def __init__(__self__, *,
|
@@ -555,6 +697,18 @@ class CertManagerIngressShimArgs:
|
|
555
697
|
pulumi.set(self, "default_issuer_name", value)
|
556
698
|
|
557
699
|
|
700
|
+
if not MYPY:
|
701
|
+
class CertManagerPrometheusServiceMonitorArgsDict(TypedDict):
|
702
|
+
enabled: NotRequired[pulumi.Input[bool]]
|
703
|
+
interval: NotRequired[pulumi.Input[str]]
|
704
|
+
labels: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
705
|
+
path: NotRequired[pulumi.Input[str]]
|
706
|
+
prometheus_instance: NotRequired[pulumi.Input[str]]
|
707
|
+
string: NotRequired[pulumi.Input[str]]
|
708
|
+
target_port: NotRequired[pulumi.Input[int]]
|
709
|
+
elif False:
|
710
|
+
CertManagerPrometheusServiceMonitorArgsDict: TypeAlias = Mapping[str, Any]
|
711
|
+
|
558
712
|
@pulumi.input_type
|
559
713
|
class CertManagerPrometheusServiceMonitorArgs:
|
560
714
|
def __init__(__self__, *,
|
@@ -644,6 +798,13 @@ class CertManagerPrometheusServiceMonitorArgs:
|
|
644
798
|
pulumi.set(self, "target_port", value)
|
645
799
|
|
646
800
|
|
801
|
+
if not MYPY:
|
802
|
+
class CertManagerPrometheusArgsDict(TypedDict):
|
803
|
+
enabled: NotRequired[pulumi.Input[bool]]
|
804
|
+
service_monitor: NotRequired[pulumi.Input['CertManagerPrometheusServiceMonitorArgsDict']]
|
805
|
+
elif False:
|
806
|
+
CertManagerPrometheusArgsDict: TypeAlias = Mapping[str, Any]
|
807
|
+
|
647
808
|
@pulumi.input_type
|
648
809
|
class CertManagerPrometheusArgs:
|
649
810
|
def __init__(__self__, *,
|
@@ -673,6 +834,27 @@ class CertManagerPrometheusArgs:
|
|
673
834
|
pulumi.set(self, "service_monitor", value)
|
674
835
|
|
675
836
|
|
837
|
+
if not MYPY:
|
838
|
+
class CertManagerServiceAccountArgsDict(TypedDict):
|
839
|
+
annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
840
|
+
"""
|
841
|
+
Optional additional annotations to add to the controller's ServiceAccount.
|
842
|
+
"""
|
843
|
+
automount_service_account_token: NotRequired[pulumi.Input[bool]]
|
844
|
+
"""
|
845
|
+
Automount API credentials for a Service Account.
|
846
|
+
"""
|
847
|
+
create: NotRequired[pulumi.Input[bool]]
|
848
|
+
"""
|
849
|
+
Specifies whether a service account should be created
|
850
|
+
"""
|
851
|
+
name: NotRequired[pulumi.Input[str]]
|
852
|
+
"""
|
853
|
+
The name of the service account to use. If not set and create is true, a name is generated using the fullname template.
|
854
|
+
"""
|
855
|
+
elif False:
|
856
|
+
CertManagerServiceAccountArgsDict: TypeAlias = Mapping[str, Any]
|
857
|
+
|
676
858
|
@pulumi.input_type
|
677
859
|
class CertManagerServiceAccountArgs:
|
678
860
|
def __init__(__self__, *,
|
@@ -744,6 +926,15 @@ class CertManagerServiceAccountArgs:
|
|
744
926
|
pulumi.set(self, "name", value)
|
745
927
|
|
746
928
|
|
929
|
+
if not MYPY:
|
930
|
+
class CertManagerStartupAPICheckRBACArgsDict(TypedDict):
|
931
|
+
annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
932
|
+
"""
|
933
|
+
annotations for the startup API Check job RBAC and PSP resources
|
934
|
+
"""
|
935
|
+
elif False:
|
936
|
+
CertManagerStartupAPICheckRBACArgsDict: TypeAlias = Mapping[str, Any]
|
937
|
+
|
747
938
|
@pulumi.input_type
|
748
939
|
class CertManagerStartupAPICheckRBACArgs:
|
749
940
|
def __init__(__self__, *,
|
@@ -767,6 +958,47 @@ class CertManagerStartupAPICheckRBACArgs:
|
|
767
958
|
pulumi.set(self, "annotations", value)
|
768
959
|
|
769
960
|
|
961
|
+
if not MYPY:
|
962
|
+
class CertManagerStartupAPICheckArgsDict(TypedDict):
|
963
|
+
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.AffinityArgsDict']]
|
964
|
+
backoff_limit: NotRequired[pulumi.Input[int]]
|
965
|
+
"""
|
966
|
+
Job backoffLimit
|
967
|
+
"""
|
968
|
+
enabled: NotRequired[pulumi.Input[bool]]
|
969
|
+
extra_args: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
970
|
+
"""
|
971
|
+
Optional additional arguments for startupapicheck
|
972
|
+
"""
|
973
|
+
image: NotRequired[pulumi.Input['CertManagerImageArgsDict']]
|
974
|
+
job_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
975
|
+
"""
|
976
|
+
Optional additional annotations to add to the startupapicheck Job
|
977
|
+
"""
|
978
|
+
node_selector: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
979
|
+
pod_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
980
|
+
"""
|
981
|
+
Optional additional annotations to add to the startupapicheck Pods
|
982
|
+
"""
|
983
|
+
pod_labels: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
984
|
+
"""
|
985
|
+
Optional additional labels to add to the startupapicheck Pods
|
986
|
+
"""
|
987
|
+
rbac: NotRequired[pulumi.Input['CertManagerStartupAPICheckRBACArgsDict']]
|
988
|
+
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ResourceRequirementsArgsDict']]
|
989
|
+
security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.PodSecurityContextArgsDict']]
|
990
|
+
"""
|
991
|
+
Pod Security Context to be set on the startupapicheck component Pod. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
992
|
+
"""
|
993
|
+
service_account: NotRequired[pulumi.Input['CertManagerServiceAccountArgsDict']]
|
994
|
+
timeout: NotRequired[pulumi.Input[str]]
|
995
|
+
"""
|
996
|
+
Timeout for 'kubectl check api' command
|
997
|
+
"""
|
998
|
+
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.TolerationArgsDict']]]]
|
999
|
+
elif False:
|
1000
|
+
CertManagerStartupAPICheckArgsDict: TypeAlias = Mapping[str, Any]
|
1001
|
+
|
770
1002
|
@pulumi.input_type
|
771
1003
|
class CertManagerStartupAPICheckArgs:
|
772
1004
|
def __init__(__self__, *,
|
@@ -982,6 +1214,12 @@ class CertManagerStartupAPICheckArgs:
|
|
982
1214
|
pulumi.set(self, "tolerations", value)
|
983
1215
|
|
984
1216
|
|
1217
|
+
if not MYPY:
|
1218
|
+
class CertManagerWebhookURLArgsDict(TypedDict):
|
1219
|
+
host: NotRequired[pulumi.Input[str]]
|
1220
|
+
elif False:
|
1221
|
+
CertManagerWebhookURLArgsDict: TypeAlias = Mapping[str, Any]
|
1222
|
+
|
985
1223
|
@pulumi.input_type
|
986
1224
|
class CertManagerWebhookURLArgs:
|
987
1225
|
def __init__(__self__, *,
|
@@ -999,6 +1237,85 @@ class CertManagerWebhookURLArgs:
|
|
999
1237
|
pulumi.set(self, "host", value)
|
1000
1238
|
|
1001
1239
|
|
1240
|
+
if not MYPY:
|
1241
|
+
class CertManagerWebhookArgsDict(TypedDict):
|
1242
|
+
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.AffinityArgsDict']]
|
1243
|
+
container_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.SecurityContextArgsDict']]
|
1244
|
+
"""
|
1245
|
+
Container Security Context to be set on the webhook component container. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
1246
|
+
"""
|
1247
|
+
deployment_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1248
|
+
"""
|
1249
|
+
Optional additional annotations to add to the webhook Deployment
|
1250
|
+
"""
|
1251
|
+
extra_args: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
|
1252
|
+
"""
|
1253
|
+
Optional additional arguments for webhook
|
1254
|
+
"""
|
1255
|
+
host_network: NotRequired[pulumi.Input[bool]]
|
1256
|
+
"""
|
1257
|
+
Specifies if the webhook should be started in hostNetwork mode. Required for use in some managed kubernetes clusters (such as AWS EKS) with custom CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
|
1258
|
+
"""
|
1259
|
+
image: NotRequired[pulumi.Input['CertManagerImageArgsDict']]
|
1260
|
+
liveness_probe: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ProbeArgsDict']]
|
1261
|
+
"""
|
1262
|
+
Liveness probe values. Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
|
1263
|
+
"""
|
1264
|
+
load_balancer_ip: NotRequired[pulumi.Input[str]]
|
1265
|
+
mutating_webhook_configuration_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1266
|
+
"""
|
1267
|
+
Optional additional annotations to add to the webhook MutatingWebhookConfiguration
|
1268
|
+
"""
|
1269
|
+
node_selector: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1270
|
+
pod_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1271
|
+
"""
|
1272
|
+
Optional additional annotations to add to the webhook Pods
|
1273
|
+
"""
|
1274
|
+
pod_labels: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1275
|
+
"""
|
1276
|
+
Optional additional labels to add to the Webhook Pods
|
1277
|
+
"""
|
1278
|
+
readiness_probe: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ProbeArgsDict']]
|
1279
|
+
"""
|
1280
|
+
Readiness probe values. Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
|
1281
|
+
"""
|
1282
|
+
replica_count: NotRequired[pulumi.Input[int]]
|
1283
|
+
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ResourceRequirementsArgsDict']]
|
1284
|
+
secure_port: NotRequired[pulumi.Input[int]]
|
1285
|
+
"""
|
1286
|
+
The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
|
1287
|
+
"""
|
1288
|
+
security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.PodSecurityContextArgsDict']]
|
1289
|
+
"""
|
1290
|
+
Pod Security Context to be set on the webhook component Pod. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
1291
|
+
"""
|
1292
|
+
service_account: NotRequired[pulumi.Input['CertManagerServiceAccountArgsDict']]
|
1293
|
+
service_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1294
|
+
"""
|
1295
|
+
Optional additional annotations to add to the webhook service
|
1296
|
+
"""
|
1297
|
+
service_labels: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1298
|
+
"""
|
1299
|
+
Optional additional labels to add to the Webhook Service
|
1300
|
+
"""
|
1301
|
+
service_type: NotRequired[pulumi.Input[str]]
|
1302
|
+
"""
|
1303
|
+
Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
|
1304
|
+
"""
|
1305
|
+
strategy: NotRequired[pulumi.Input['pulumi_kubernetes.apps.v1.DeploymentStrategyArgsDict']]
|
1306
|
+
timeout_seconds: NotRequired[pulumi.Input[int]]
|
1307
|
+
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.TolerationArgsDict']]]]
|
1308
|
+
url: NotRequired[pulumi.Input['CertManagerWebhookURLArgsDict']]
|
1309
|
+
"""
|
1310
|
+
Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
|
1311
|
+
"""
|
1312
|
+
validating_webhook_configuration_annotations: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
1313
|
+
"""
|
1314
|
+
Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
|
1315
|
+
"""
|
1316
|
+
elif False:
|
1317
|
+
CertManagerWebhookArgsDict: TypeAlias = Mapping[str, Any]
|
1318
|
+
|
1002
1319
|
@pulumi.input_type
|
1003
1320
|
class CertManagerWebhookArgs:
|
1004
1321
|
def __init__(__self__, *,
|
@@ -1382,6 +1699,148 @@ class CertManagerWebhookArgs:
|
|
1382
1699
|
pulumi.set(self, "validating_webhook_configuration_annotations", value)
|
1383
1700
|
|
1384
1701
|
|
1702
|
+
if not MYPY:
|
1703
|
+
class ReleaseArgsDict(TypedDict):
|
1704
|
+
"""
|
1705
|
+
A Release is an instance of a chart running in a Kubernetes cluster.
|
1706
|
+
A Chart is a Helm package. It contains all of the resource definitions necessary to run an application, tool, or service inside of a Kubernetes cluster.
|
1707
|
+
Note - Helm Release is currently in BETA and may change. Use in production environment is discouraged.
|
1708
|
+
"""
|
1709
|
+
atomic: NotRequired[pulumi.Input[bool]]
|
1710
|
+
"""
|
1711
|
+
If set, installation process purges chart on fail. `skipAwait` will be disabled automatically if atomic is used.
|
1712
|
+
"""
|
1713
|
+
chart: NotRequired[pulumi.Input[str]]
|
1714
|
+
"""
|
1715
|
+
Chart name to be installed. A path may be used.
|
1716
|
+
"""
|
1717
|
+
cleanup_on_fail: NotRequired[pulumi.Input[bool]]
|
1718
|
+
"""
|
1719
|
+
Allow deletion of new resources created in this upgrade when upgrade fails.
|
1720
|
+
"""
|
1721
|
+
create_namespace: NotRequired[pulumi.Input[bool]]
|
1722
|
+
"""
|
1723
|
+
Create the namespace if it does not exist.
|
1724
|
+
"""
|
1725
|
+
dependency_update: NotRequired[pulumi.Input[bool]]
|
1726
|
+
"""
|
1727
|
+
Run helm dependency update before installing the chart.
|
1728
|
+
"""
|
1729
|
+
description: NotRequired[pulumi.Input[str]]
|
1730
|
+
"""
|
1731
|
+
Add a custom description
|
1732
|
+
"""
|
1733
|
+
devel: NotRequired[pulumi.Input[bool]]
|
1734
|
+
"""
|
1735
|
+
Use chart development versions, too. Equivalent to version '>0.0.0-0'. If `version` is set, this is ignored.
|
1736
|
+
"""
|
1737
|
+
disable_crd_hooks: NotRequired[pulumi.Input[bool]]
|
1738
|
+
"""
|
1739
|
+
Prevent CRD hooks from, running, but run other hooks. See helm install --no-crd-hook
|
1740
|
+
"""
|
1741
|
+
disable_openapi_validation: NotRequired[pulumi.Input[bool]]
|
1742
|
+
"""
|
1743
|
+
If set, the installation process will not validate rendered templates against the Kubernetes OpenAPI Schema
|
1744
|
+
"""
|
1745
|
+
disable_webhooks: NotRequired[pulumi.Input[bool]]
|
1746
|
+
"""
|
1747
|
+
Prevent hooks from running.
|
1748
|
+
"""
|
1749
|
+
force_update: NotRequired[pulumi.Input[bool]]
|
1750
|
+
"""
|
1751
|
+
Force resource update through delete/recreate if needed.
|
1752
|
+
"""
|
1753
|
+
keyring: NotRequired[pulumi.Input[str]]
|
1754
|
+
"""
|
1755
|
+
Location of public keys used for verification. Used only if `verify` is true
|
1756
|
+
"""
|
1757
|
+
lint: NotRequired[pulumi.Input[bool]]
|
1758
|
+
"""
|
1759
|
+
Run helm lint when planning.
|
1760
|
+
"""
|
1761
|
+
manifest: NotRequired[pulumi.Input[Mapping[str, Any]]]
|
1762
|
+
"""
|
1763
|
+
The rendered manifests as JSON. Not yet supported.
|
1764
|
+
"""
|
1765
|
+
max_history: NotRequired[pulumi.Input[int]]
|
1766
|
+
"""
|
1767
|
+
Limit the maximum number of revisions saved per release. Use 0 for no limit.
|
1768
|
+
"""
|
1769
|
+
name: NotRequired[pulumi.Input[str]]
|
1770
|
+
"""
|
1771
|
+
Release name.
|
1772
|
+
"""
|
1773
|
+
namespace: NotRequired[pulumi.Input[str]]
|
1774
|
+
"""
|
1775
|
+
Namespace to install the release into.
|
1776
|
+
"""
|
1777
|
+
postrender: NotRequired[pulumi.Input[str]]
|
1778
|
+
"""
|
1779
|
+
Postrender command to run.
|
1780
|
+
"""
|
1781
|
+
recreate_pods: NotRequired[pulumi.Input[bool]]
|
1782
|
+
"""
|
1783
|
+
Perform pods restart during upgrade/rollback.
|
1784
|
+
"""
|
1785
|
+
render_subchart_notes: NotRequired[pulumi.Input[bool]]
|
1786
|
+
"""
|
1787
|
+
If set, render subchart notes along with the parent.
|
1788
|
+
"""
|
1789
|
+
replace: NotRequired[pulumi.Input[bool]]
|
1790
|
+
"""
|
1791
|
+
Re-use the given name, even if that name is already used. This is unsafe in production
|
1792
|
+
"""
|
1793
|
+
repository_opts: NotRequired[pulumi.Input['RepositoryOptsArgsDict']]
|
1794
|
+
"""
|
1795
|
+
Specification defining the Helm chart repository to use.
|
1796
|
+
"""
|
1797
|
+
reset_values: NotRequired[pulumi.Input[bool]]
|
1798
|
+
"""
|
1799
|
+
When upgrading, reset the values to the ones built into the chart.
|
1800
|
+
"""
|
1801
|
+
resource_names: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[Sequence[pulumi.Input[str]]]]]]
|
1802
|
+
"""
|
1803
|
+
Names of resources created by the release grouped by "kind/version".
|
1804
|
+
"""
|
1805
|
+
reuse_values: NotRequired[pulumi.Input[bool]]
|
1806
|
+
"""
|
1807
|
+
When upgrading, reuse the last release's values and merge in any overrides. If 'resetValues' is specified, this is ignored
|
1808
|
+
"""
|
1809
|
+
skip_await: NotRequired[pulumi.Input[bool]]
|
1810
|
+
"""
|
1811
|
+
By default, the provider waits until all resources are in a ready state before marking the release as successful. Setting this to true will skip such await logic.
|
1812
|
+
"""
|
1813
|
+
skip_crds: NotRequired[pulumi.Input[bool]]
|
1814
|
+
"""
|
1815
|
+
If set, no CRDs will be installed. By default, CRDs are installed if not already present.
|
1816
|
+
"""
|
1817
|
+
timeout: NotRequired[pulumi.Input[int]]
|
1818
|
+
"""
|
1819
|
+
Time in seconds to wait for any individual kubernetes operation.
|
1820
|
+
"""
|
1821
|
+
value_yaml_files: NotRequired[pulumi.Input[Sequence[pulumi.Input[Union[pulumi.Asset, pulumi.Archive]]]]]
|
1822
|
+
"""
|
1823
|
+
List of assets (raw yaml files). Content is read and merged with values. Not yet supported.
|
1824
|
+
"""
|
1825
|
+
values: NotRequired[pulumi.Input[Mapping[str, Any]]]
|
1826
|
+
"""
|
1827
|
+
Custom values set for the release.
|
1828
|
+
"""
|
1829
|
+
verify: NotRequired[pulumi.Input[bool]]
|
1830
|
+
"""
|
1831
|
+
Verify the package before installing it.
|
1832
|
+
"""
|
1833
|
+
version: NotRequired[pulumi.Input[str]]
|
1834
|
+
"""
|
1835
|
+
Specify the exact chart version to install. If this is not specified, the latest version is installed.
|
1836
|
+
"""
|
1837
|
+
wait_for_jobs: NotRequired[pulumi.Input[bool]]
|
1838
|
+
"""
|
1839
|
+
Will wait until all Jobs have been completed before marking the release as successful. This is ignored if `skipAwait` is enabled.
|
1840
|
+
"""
|
1841
|
+
elif False:
|
1842
|
+
ReleaseArgsDict: TypeAlias = Mapping[str, Any]
|
1843
|
+
|
1385
1844
|
@pulumi.input_type
|
1386
1845
|
class ReleaseArgs:
|
1387
1846
|
def __init__(__self__, *,
|
@@ -1920,6 +2379,38 @@ class ReleaseArgs:
|
|
1920
2379
|
pulumi.set(self, "wait_for_jobs", value)
|
1921
2380
|
|
1922
2381
|
|
2382
|
+
if not MYPY:
|
2383
|
+
class RepositoryOptsArgsDict(TypedDict):
|
2384
|
+
"""
|
2385
|
+
Specification defining the Helm chart repository to use.
|
2386
|
+
"""
|
2387
|
+
ca_file: NotRequired[pulumi.Input[str]]
|
2388
|
+
"""
|
2389
|
+
The Repository's CA File
|
2390
|
+
"""
|
2391
|
+
cert_file: NotRequired[pulumi.Input[str]]
|
2392
|
+
"""
|
2393
|
+
The repository's cert file
|
2394
|
+
"""
|
2395
|
+
key_file: NotRequired[pulumi.Input[str]]
|
2396
|
+
"""
|
2397
|
+
The repository's cert key file
|
2398
|
+
"""
|
2399
|
+
password: NotRequired[pulumi.Input[str]]
|
2400
|
+
"""
|
2401
|
+
Password for HTTP basic authentication
|
2402
|
+
"""
|
2403
|
+
repo: NotRequired[pulumi.Input[str]]
|
2404
|
+
"""
|
2405
|
+
Repository where to locate the requested chart. If is a URL the chart is installed without installing the repository.
|
2406
|
+
"""
|
2407
|
+
username: NotRequired[pulumi.Input[str]]
|
2408
|
+
"""
|
2409
|
+
Username for HTTP basic authentication
|
2410
|
+
"""
|
2411
|
+
elif False:
|
2412
|
+
RepositoryOptsArgsDict: TypeAlias = Mapping[str, Any]
|
2413
|
+
|
1923
2414
|
@pulumi.input_type
|
1924
2415
|
class RepositoryOptsArgs:
|
1925
2416
|
def __init__(__self__, *,
|
@@ -1,22 +1,30 @@
|
|
1
1
|
# coding=utf-8
|
2
|
-
# *** WARNING: this file was generated by
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
5
|
|
6
|
+
import asyncio
|
7
|
+
import functools
|
8
|
+
import importlib.metadata
|
6
9
|
import importlib.util
|
7
10
|
import inspect
|
8
11
|
import json
|
9
12
|
import os
|
10
|
-
import pkg_resources
|
11
13
|
import sys
|
12
14
|
import typing
|
15
|
+
import warnings
|
16
|
+
import base64
|
13
17
|
|
14
18
|
import pulumi
|
15
19
|
import pulumi.runtime
|
20
|
+
from pulumi.runtime.sync_await import _sync_await
|
21
|
+
from pulumi.runtime.proto import resource_pb2
|
16
22
|
|
17
23
|
from semver import VersionInfo as SemverVersion
|
18
24
|
from parver import Version as PEP440Version
|
19
25
|
|
26
|
+
C = typing.TypeVar("C", bound=typing.Callable)
|
27
|
+
|
20
28
|
|
21
29
|
def get_env(*args):
|
22
30
|
for v in args:
|
@@ -70,7 +78,7 @@ def _get_semver_version():
|
|
70
78
|
# to receive a valid semver string when receiving requests from the language host, so it's our
|
71
79
|
# responsibility as the library to convert our own PEP440 version into a valid semver string.
|
72
80
|
|
73
|
-
pep440_version_string =
|
81
|
+
pep440_version_string = importlib.metadata.version(root_package)
|
74
82
|
pep440_version = PEP440Version.parse(pep440_version_string)
|
75
83
|
(major, minor, patch) = pep440_version.release
|
76
84
|
prerelease = None
|
@@ -94,10 +102,17 @@ def _get_semver_version():
|
|
94
102
|
_version = _get_semver_version()
|
95
103
|
_version_str = str(_version)
|
96
104
|
|
105
|
+
def get_resource_opts_defaults() -> pulumi.ResourceOptions:
|
106
|
+
return pulumi.ResourceOptions(
|
107
|
+
version=get_version(),
|
108
|
+
plugin_download_url=get_plugin_download_url(),
|
109
|
+
)
|
97
110
|
|
98
|
-
def
|
99
|
-
return
|
100
|
-
|
111
|
+
def get_invoke_opts_defaults() -> pulumi.InvokeOptions:
|
112
|
+
return pulumi.InvokeOptions(
|
113
|
+
version=get_version(),
|
114
|
+
plugin_download_url=get_plugin_download_url(),
|
115
|
+
)
|
101
116
|
|
102
117
|
def get_resource_args_opts(resource_args_type, resource_options_type, *args, **kwargs):
|
103
118
|
"""
|
@@ -234,3 +249,79 @@ def lift_output_func(func: typing.Any) -> typing.Callable[[_F], _F]:
|
|
234
249
|
**resolved_args['kwargs']))
|
235
250
|
|
236
251
|
return (lambda _: lifted_func)
|
252
|
+
|
253
|
+
|
254
|
+
def call_plain(
|
255
|
+
tok: str,
|
256
|
+
props: pulumi.Inputs,
|
257
|
+
res: typing.Optional[pulumi.Resource] = None,
|
258
|
+
typ: typing.Optional[type] = None,
|
259
|
+
) -> typing.Any:
|
260
|
+
"""
|
261
|
+
Wraps pulumi.runtime.plain to force the output and return it plainly.
|
262
|
+
"""
|
263
|
+
|
264
|
+
output = pulumi.runtime.call(tok, props, res, typ)
|
265
|
+
|
266
|
+
# Ingoring deps silently. They are typically non-empty, r.f() calls include r as a dependency.
|
267
|
+
result, known, secret, _ = _sync_await(asyncio.create_task(_await_output(output)))
|
268
|
+
|
269
|
+
problem = None
|
270
|
+
if not known:
|
271
|
+
problem = ' an unknown value'
|
272
|
+
elif secret:
|
273
|
+
problem = ' a secret value'
|
274
|
+
|
275
|
+
if problem:
|
276
|
+
raise AssertionError(
|
277
|
+
f"Plain resource method '{tok}' incorrectly returned {problem}. "
|
278
|
+
+ "This is an error in the provider, please report this to the provider developer."
|
279
|
+
)
|
280
|
+
|
281
|
+
return result
|
282
|
+
|
283
|
+
|
284
|
+
async def _await_output(o: pulumi.Output[typing.Any]) -> typing.Tuple[object, bool, bool, set]:
|
285
|
+
return (
|
286
|
+
await o._future,
|
287
|
+
await o._is_known,
|
288
|
+
await o._is_secret,
|
289
|
+
await o._resources,
|
290
|
+
)
|
291
|
+
|
292
|
+
|
293
|
+
# This is included to provide an upgrade path for users who are using a version
|
294
|
+
# of the Pulumi SDK (<3.121.0) that does not include the `deprecated` decorator.
|
295
|
+
def deprecated(message: str) -> typing.Callable[[C], C]:
|
296
|
+
"""
|
297
|
+
Decorator to indicate a function is deprecated.
|
298
|
+
|
299
|
+
As well as inserting appropriate statements to indicate that the function is
|
300
|
+
deprecated, this decorator also tags the function with a special attribute
|
301
|
+
so that Pulumi code can detect that it is deprecated and react appropriately
|
302
|
+
in certain situations.
|
303
|
+
|
304
|
+
message is the deprecation message that should be printed if the function is called.
|
305
|
+
"""
|
306
|
+
|
307
|
+
def decorator(fn: C) -> C:
|
308
|
+
if not callable(fn):
|
309
|
+
raise TypeError("Expected fn to be callable")
|
310
|
+
|
311
|
+
@functools.wraps(fn)
|
312
|
+
def deprecated_fn(*args, **kwargs):
|
313
|
+
warnings.warn(message)
|
314
|
+
pulumi.warn(f"{fn.__name__} is deprecated: {message}")
|
315
|
+
|
316
|
+
return fn(*args, **kwargs)
|
317
|
+
|
318
|
+
deprecated_fn.__dict__["_pulumi_deprecated_callable"] = fn
|
319
|
+
return typing.cast(C, deprecated_fn)
|
320
|
+
|
321
|
+
return decorator
|
322
|
+
|
323
|
+
def get_plugin_download_url():
|
324
|
+
return None
|
325
|
+
|
326
|
+
def get_version():
|
327
|
+
return _version_str
|
@@ -1,11 +1,17 @@
|
|
1
1
|
# coding=utf-8
|
2
|
-
# *** WARNING: this file was generated by
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import copy
|
5
6
|
import warnings
|
7
|
+
import sys
|
6
8
|
import pulumi
|
7
9
|
import pulumi.runtime
|
8
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
9
15
|
from . import _utilities
|
10
16
|
from . import outputs
|
11
17
|
from ._inputs import *
|
@@ -479,7 +485,7 @@ class CertManager(pulumi.ComponentResource):
|
|
479
485
|
resource_name: str,
|
480
486
|
opts: Optional[pulumi.ResourceOptions] = None,
|
481
487
|
affinity: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.AffinityArgs']]] = None,
|
482
|
-
cainjector: Optional[pulumi.Input[
|
488
|
+
cainjector: Optional[pulumi.Input[Union['CertManagerCaInjectorArgs', 'CertManagerCaInjectorArgsDict']]] = None,
|
483
489
|
cluster_resource_namespace: Optional[pulumi.Input[str]] = None,
|
484
490
|
container_security_context: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.SecurityContextArgs']]] = None,
|
485
491
|
deployment_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -488,12 +494,12 @@ class CertManager(pulumi.ComponentResource):
|
|
488
494
|
extra_volume_mounts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.VolumeMountArgs']]]]] = None,
|
489
495
|
extra_volumes: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.VolumeArgs']]]]] = None,
|
490
496
|
feature_gates: Optional[pulumi.Input[str]] = None,
|
491
|
-
global_: Optional[pulumi.Input[
|
492
|
-
helm_options: Optional[pulumi.Input[
|
497
|
+
global_: Optional[pulumi.Input[Union['CertManagerGlobalArgs', 'CertManagerGlobalArgsDict']]] = None,
|
498
|
+
helm_options: Optional[pulumi.Input[Union['ReleaseArgs', 'ReleaseArgsDict']]] = None,
|
493
499
|
http_proxy: Optional[pulumi.Input[str]] = None,
|
494
500
|
https_proxy: Optional[pulumi.Input[str]] = None,
|
495
|
-
image: Optional[pulumi.Input[
|
496
|
-
ingress_shim: Optional[pulumi.Input[
|
501
|
+
image: Optional[pulumi.Input[Union['CertManagerImageArgs', 'CertManagerImageArgsDict']]] = None,
|
502
|
+
ingress_shim: Optional[pulumi.Input[Union['CertManagerIngressShimArgs', 'CertManagerIngressShimArgsDict']]] = None,
|
497
503
|
install_crds: Optional[pulumi.Input[bool]] = None,
|
498
504
|
no_proxy: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
499
505
|
node_selector: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.NodeSelectorArgs']]] = None,
|
@@ -501,17 +507,17 @@ class CertManager(pulumi.ComponentResource):
|
|
501
507
|
pod_dns_config: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.PodDNSConfigArgs']]] = None,
|
502
508
|
pod_dns_policy: Optional[pulumi.Input[str]] = None,
|
503
509
|
pod_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
504
|
-
prometheus: Optional[pulumi.Input[
|
510
|
+
prometheus: Optional[pulumi.Input[Union['CertManagerPrometheusArgs', 'CertManagerPrometheusArgsDict']]] = None,
|
505
511
|
replica_count: Optional[pulumi.Input[int]] = None,
|
506
512
|
resources: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.ResourceRequirementsArgs']]] = None,
|
507
513
|
security_context: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.PodSecurityContextArgs']]] = None,
|
508
|
-
service_account: Optional[pulumi.Input[
|
514
|
+
service_account: Optional[pulumi.Input[Union['CertManagerServiceAccountArgs', 'CertManagerServiceAccountArgsDict']]] = None,
|
509
515
|
service_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
510
516
|
service_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
511
|
-
startupapicheck: Optional[pulumi.Input[
|
517
|
+
startupapicheck: Optional[pulumi.Input[Union['CertManagerStartupAPICheckArgs', 'CertManagerStartupAPICheckArgsDict']]] = None,
|
512
518
|
strategy: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.apps.v1.DeploymentStrategyArgs']]] = None,
|
513
519
|
tolerations: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.TolerationArgs']]]]] = None,
|
514
|
-
webhook: Optional[pulumi.Input[
|
520
|
+
webhook: Optional[pulumi.Input[Union['CertManagerWebhookArgs', 'CertManagerWebhookArgsDict']]] = None,
|
515
521
|
__props__=None):
|
516
522
|
"""
|
517
523
|
Automates the management and issuance of TLS certificates from various issuing sources within Kubernetes
|
@@ -523,7 +529,7 @@ class CertManager(pulumi.ComponentResource):
|
|
523
529
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] deployment_annotations: Optional additional annotations to add to the controller Deployment
|
524
530
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] extra_args: Optional additional arguments.
|
525
531
|
:param pulumi.Input[str] feature_gates: Comma separated list of feature gates that should be enabled on the controller pod.
|
526
|
-
:param pulumi.Input[
|
532
|
+
:param pulumi.Input[Union['ReleaseArgs', 'ReleaseArgsDict']] helm_options: HelmOptions is an escape hatch that lets the end user control any aspect of the Helm deployment. This exposes the entirety of the underlying Helm Release component args.
|
527
533
|
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] pod_annotations: Optional additional annotations to add to the controller Pods
|
528
534
|
:param pulumi.Input[str] pod_dns_policy: Optional DNS settings, useful if you have a public and private DNS zone for the same domain on Route 53. What follows is an example of ensuring cert-manager can access an ingress or DNS TXT records at all times. NOTE: This requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for the cluster to work.
|
529
535
|
:param pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.PodSecurityContextArgs']] security_context: Pod Security Context. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
@@ -555,7 +561,7 @@ class CertManager(pulumi.ComponentResource):
|
|
555
561
|
resource_name: str,
|
556
562
|
opts: Optional[pulumi.ResourceOptions] = None,
|
557
563
|
affinity: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.AffinityArgs']]] = None,
|
558
|
-
cainjector: Optional[pulumi.Input[
|
564
|
+
cainjector: Optional[pulumi.Input[Union['CertManagerCaInjectorArgs', 'CertManagerCaInjectorArgsDict']]] = None,
|
559
565
|
cluster_resource_namespace: Optional[pulumi.Input[str]] = None,
|
560
566
|
container_security_context: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.SecurityContextArgs']]] = None,
|
561
567
|
deployment_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
@@ -564,12 +570,12 @@ class CertManager(pulumi.ComponentResource):
|
|
564
570
|
extra_volume_mounts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.VolumeMountArgs']]]]] = None,
|
565
571
|
extra_volumes: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.VolumeArgs']]]]] = None,
|
566
572
|
feature_gates: Optional[pulumi.Input[str]] = None,
|
567
|
-
global_: Optional[pulumi.Input[
|
568
|
-
helm_options: Optional[pulumi.Input[
|
573
|
+
global_: Optional[pulumi.Input[Union['CertManagerGlobalArgs', 'CertManagerGlobalArgsDict']]] = None,
|
574
|
+
helm_options: Optional[pulumi.Input[Union['ReleaseArgs', 'ReleaseArgsDict']]] = None,
|
569
575
|
http_proxy: Optional[pulumi.Input[str]] = None,
|
570
576
|
https_proxy: Optional[pulumi.Input[str]] = None,
|
571
|
-
image: Optional[pulumi.Input[
|
572
|
-
ingress_shim: Optional[pulumi.Input[
|
577
|
+
image: Optional[pulumi.Input[Union['CertManagerImageArgs', 'CertManagerImageArgsDict']]] = None,
|
578
|
+
ingress_shim: Optional[pulumi.Input[Union['CertManagerIngressShimArgs', 'CertManagerIngressShimArgsDict']]] = None,
|
573
579
|
install_crds: Optional[pulumi.Input[bool]] = None,
|
574
580
|
no_proxy: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
575
581
|
node_selector: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.NodeSelectorArgs']]] = None,
|
@@ -577,24 +583,21 @@ class CertManager(pulumi.ComponentResource):
|
|
577
583
|
pod_dns_config: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.PodDNSConfigArgs']]] = None,
|
578
584
|
pod_dns_policy: Optional[pulumi.Input[str]] = None,
|
579
585
|
pod_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
580
|
-
prometheus: Optional[pulumi.Input[
|
586
|
+
prometheus: Optional[pulumi.Input[Union['CertManagerPrometheusArgs', 'CertManagerPrometheusArgsDict']]] = None,
|
581
587
|
replica_count: Optional[pulumi.Input[int]] = None,
|
582
588
|
resources: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.ResourceRequirementsArgs']]] = None,
|
583
589
|
security_context: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.PodSecurityContextArgs']]] = None,
|
584
|
-
service_account: Optional[pulumi.Input[
|
590
|
+
service_account: Optional[pulumi.Input[Union['CertManagerServiceAccountArgs', 'CertManagerServiceAccountArgsDict']]] = None,
|
585
591
|
service_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
586
592
|
service_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
587
|
-
startupapicheck: Optional[pulumi.Input[
|
593
|
+
startupapicheck: Optional[pulumi.Input[Union['CertManagerStartupAPICheckArgs', 'CertManagerStartupAPICheckArgsDict']]] = None,
|
588
594
|
strategy: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.apps.v1.DeploymentStrategyArgs']]] = None,
|
589
595
|
tolerations: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.TolerationArgs']]]]] = None,
|
590
|
-
webhook: Optional[pulumi.Input[
|
596
|
+
webhook: Optional[pulumi.Input[Union['CertManagerWebhookArgs', 'CertManagerWebhookArgsDict']]] = None,
|
591
597
|
__props__=None):
|
592
|
-
|
593
|
-
opts = pulumi.ResourceOptions()
|
598
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
594
599
|
if not isinstance(opts, pulumi.ResourceOptions):
|
595
600
|
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
596
|
-
if opts.version is None:
|
597
|
-
opts.version = _utilities.get_version()
|
598
601
|
if opts.id is not None:
|
599
602
|
raise ValueError('ComponentResource classes do not support opts.id')
|
600
603
|
else:
|
@@ -1,11 +1,17 @@
|
|
1
1
|
# coding=utf-8
|
2
|
-
# *** WARNING: this file was generated by
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import copy
|
5
6
|
import warnings
|
7
|
+
import sys
|
6
8
|
import pulumi
|
7
9
|
import pulumi.runtime
|
8
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
9
15
|
from . import _utilities
|
10
16
|
|
11
17
|
__all__ = [
|
@@ -1,11 +1,17 @@
|
|
1
1
|
# coding=utf-8
|
2
|
-
# *** WARNING: this file was generated by
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import copy
|
5
6
|
import warnings
|
7
|
+
import sys
|
6
8
|
import pulumi
|
7
9
|
import pulumi.runtime
|
8
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
9
15
|
from . import _utilities
|
10
16
|
|
11
17
|
__all__ = ['ProviderArgs', 'Provider']
|
@@ -54,12 +60,9 @@ class Provider(pulumi.ProviderResource):
|
|
54
60
|
resource_name: str,
|
55
61
|
opts: Optional[pulumi.ResourceOptions] = None,
|
56
62
|
__props__=None):
|
57
|
-
|
58
|
-
opts = pulumi.ResourceOptions()
|
63
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
59
64
|
if not isinstance(opts, pulumi.ResourceOptions):
|
60
65
|
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
61
|
-
if opts.version is None:
|
62
|
-
opts.version = _utilities.get_version()
|
63
66
|
if opts.id is None:
|
64
67
|
if __props__ is not None:
|
65
68
|
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
@@ -1,12 +1,18 @@
|
|
1
|
-
Metadata-Version: 2.
|
2
|
-
Name:
|
3
|
-
Version: 0.
|
4
|
-
Summary:
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
1
|
+
Metadata-Version: 2.2
|
2
|
+
Name: pulumi_kubernetes_cert_manager
|
3
|
+
Version: 0.2.0a1736858812
|
4
|
+
Summary: Strongly-typed Cert Manager installation
|
5
|
+
License: Apache-2.0
|
6
|
+
Project-URL: Homepage, https://pulumi.io
|
7
|
+
Project-URL: Repository, https://github.com/pulumi/pulumi-kubernetes-cert-manager
|
8
|
+
Keywords: pulumi,kubernetes,cert-manager,kind/component,category/infrastructure
|
9
|
+
Requires-Python: >=3.9
|
9
10
|
Description-Content-Type: text/markdown
|
11
|
+
Requires-Dist: parver>=0.2.1
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.142.0
|
13
|
+
Requires-Dist: pulumi-kubernetes<5.0.0,>=4.0.0
|
14
|
+
Requires-Dist: semver>=2.8.1
|
15
|
+
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
10
16
|
|
11
17
|
# Pulumi Cert Manager Component
|
12
18
|
|
@@ -39,5 +45,3 @@ if you need to override them, you may do so using the `helmOptions` parameter. R
|
|
39
45
|
https://www.pulumi.com/docs/reference/pkg/kubernetes/helm/v3/release/#inputs) for a full set of choices.
|
40
46
|
|
41
47
|
For complete details, refer to the Pulumi Package details within the Pulumi Registry.
|
42
|
-
|
43
|
-
|
@@ -1,5 +1,5 @@
|
|
1
1
|
README.md
|
2
|
-
|
2
|
+
pyproject.toml
|
3
3
|
pulumi_kubernetes_cert_manager/__init__.py
|
4
4
|
pulumi_kubernetes_cert_manager/_inputs.py
|
5
5
|
pulumi_kubernetes_cert_manager/_utilities.py
|
@@ -11,6 +11,5 @@ pulumi_kubernetes_cert_manager/py.typed
|
|
11
11
|
pulumi_kubernetes_cert_manager.egg-info/PKG-INFO
|
12
12
|
pulumi_kubernetes_cert_manager.egg-info/SOURCES.txt
|
13
13
|
pulumi_kubernetes_cert_manager.egg-info/dependency_links.txt
|
14
|
-
pulumi_kubernetes_cert_manager.egg-info/not-zip-safe
|
15
14
|
pulumi_kubernetes_cert_manager.egg-info/requires.txt
|
16
15
|
pulumi_kubernetes_cert_manager.egg-info/top_level.txt
|
@@ -0,0 +1,22 @@
|
|
1
|
+
[project]
|
2
|
+
name = "pulumi_kubernetes_cert_manager"
|
3
|
+
description = "Strongly-typed Cert Manager installation"
|
4
|
+
dependencies = ["parver>=0.2.1", "pulumi>=3.142.0,<4.0.0", "pulumi-kubernetes>=4.0.0,<5.0.0", "semver>=2.8.1", "typing-extensions>=4.11; python_version < \"3.11\""]
|
5
|
+
keywords = ["pulumi", "kubernetes", "cert-manager", "kind/component", "category/infrastructure"]
|
6
|
+
readme = "README.md"
|
7
|
+
requires-python = ">=3.9"
|
8
|
+
version = "0.2.0a1736858812"
|
9
|
+
[project.license]
|
10
|
+
text = "Apache-2.0"
|
11
|
+
[project.urls]
|
12
|
+
Homepage = "https://pulumi.io"
|
13
|
+
Repository = "https://github.com/pulumi/pulumi-kubernetes-cert-manager"
|
14
|
+
|
15
|
+
[build-system]
|
16
|
+
requires = ["setuptools>=61.0"]
|
17
|
+
build-backend = "setuptools.build_meta"
|
18
|
+
|
19
|
+
[tool]
|
20
|
+
[tool.setuptools]
|
21
|
+
[tool.setuptools.package-data]
|
22
|
+
pulumi_kubernetes_cert_manager = ["py.typed", "pulumi-plugin.json"]
|
@@ -1 +0,0 @@
|
|
1
|
-
|
@@ -1,61 +0,0 @@
|
|
1
|
-
# coding=utf-8
|
2
|
-
# *** WARNING: this file was generated by Pulumi SDK Generator. ***
|
3
|
-
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
|
-
|
5
|
-
import errno
|
6
|
-
from setuptools import setup, find_packages
|
7
|
-
from setuptools.command.install import install
|
8
|
-
from subprocess import check_call
|
9
|
-
|
10
|
-
|
11
|
-
VERSION = "0.0.5"
|
12
|
-
PLUGIN_VERSION = "0.0.5"
|
13
|
-
|
14
|
-
class InstallPluginCommand(install):
|
15
|
-
def run(self):
|
16
|
-
install.run(self)
|
17
|
-
try:
|
18
|
-
check_call(['pulumi', 'plugin', 'install', 'resource', 'kubernetes-cert-manager', PLUGIN_VERSION])
|
19
|
-
except OSError as error:
|
20
|
-
if error.errno == errno.ENOENT:
|
21
|
-
print(f"""
|
22
|
-
There was an error installing the kubernetes-cert-manager resource provider plugin.
|
23
|
-
It looks like `pulumi` is not installed on your system.
|
24
|
-
Please visit https://pulumi.com/ to install the Pulumi CLI.
|
25
|
-
You may try manually installing the plugin by running
|
26
|
-
`pulumi plugin install resource kubernetes-cert-manager {PLUGIN_VERSION}`
|
27
|
-
""")
|
28
|
-
else:
|
29
|
-
raise
|
30
|
-
|
31
|
-
|
32
|
-
def readme():
|
33
|
-
try:
|
34
|
-
with open('README.md', encoding='utf-8') as f:
|
35
|
-
return f.read()
|
36
|
-
except FileNotFoundError:
|
37
|
-
return "kubernetes-cert-manager Pulumi Package - Development Version"
|
38
|
-
|
39
|
-
|
40
|
-
setup(name='pulumi_kubernetes_cert_manager',
|
41
|
-
version=VERSION,
|
42
|
-
long_description=readme(),
|
43
|
-
long_description_content_type='text/markdown',
|
44
|
-
cmdclass={
|
45
|
-
'install': InstallPluginCommand,
|
46
|
-
},
|
47
|
-
keywords='pulumi kubernetes cert-manager kind/component category/infrastructure',
|
48
|
-
packages=find_packages(),
|
49
|
-
package_data={
|
50
|
-
'pulumi_kubernetes_cert_manager': [
|
51
|
-
'py.typed',
|
52
|
-
'pulumi-plugin.json',
|
53
|
-
]
|
54
|
-
},
|
55
|
-
install_requires=[
|
56
|
-
'parver>=0.2.1',
|
57
|
-
'pulumi>=3.0.0,<4.0.0',
|
58
|
-
'pulumi-kubernetes>=3.7.1,<4.0.0',
|
59
|
-
'semver>=2.8.1'
|
60
|
-
],
|
61
|
-
zip_safe=False)
|
{pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/README.md
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_kubernetes_cert_manager-0.0.5 → pulumi_kubernetes_cert_manager-0.2.0a1736858812}/setup.cfg
RENAMED
File without changes
|