pulumi-kubernetes-cert-manager 0.1.0a1733770037__tar.gz → 0.1.0a1734475956__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/PKG-INFO +4 -4
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/_inputs.py +19 -19
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/pulumi-plugin.json +1 -1
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager.egg-info/PKG-INFO +4 -4
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager.egg-info/requires.txt +2 -2
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pyproject.toml +3 -3
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/README.md +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/__init__.py +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/_utilities.py +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/cert_manager.py +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/outputs.py +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/provider.py +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager/py.typed +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager.egg-info/SOURCES.txt +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager.egg-info/dependency_links.txt +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/pulumi_kubernetes_cert_manager.egg-info/top_level.txt +0 -0
- {pulumi_kubernetes_cert_manager-0.1.0a1733770037 → pulumi_kubernetes_cert_manager-0.1.0a1734475956}/setup.cfg +0 -0
@@ -1,16 +1,16 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: pulumi_kubernetes_cert_manager
|
3
|
-
Version: 0.1.
|
3
|
+
Version: 0.1.0a1734475956
|
4
4
|
Summary: Strongly-typed Cert Manager installation
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
7
7
|
Project-URL: Repository, https://github.com/pulumi/pulumi-kubernetes-cert-manager
|
8
8
|
Keywords: pulumi,kubernetes,cert-manager,kind/component,category/infrastructure
|
9
|
-
Requires-Python: >=3.
|
9
|
+
Requires-Python: >=3.9
|
10
10
|
Description-Content-Type: text/markdown
|
11
11
|
Requires-Dist: parver>=0.2.1
|
12
|
-
Requires-Dist: pulumi<4.0.0,>=3.
|
13
|
-
Requires-Dist: pulumi-kubernetes<5.0.0,>=
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.142.0
|
13
|
+
Requires-Dist: pulumi-kubernetes<5.0.0,>=4.0.0
|
14
14
|
Requires-Dist: semver>=2.8.1
|
15
15
|
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
16
16
|
|
@@ -54,8 +54,8 @@ MYPY = False
|
|
54
54
|
|
55
55
|
if not MYPY:
|
56
56
|
class CertManagerCaInjectorArgsDict(TypedDict):
|
57
|
-
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
58
|
-
container_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
57
|
+
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.AffinityArgsDict']]
|
58
|
+
container_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.SecurityContextArgsDict']]
|
59
59
|
"""
|
60
60
|
Container Security Context to be set on the cainjector component container. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
61
61
|
"""
|
@@ -77,16 +77,16 @@ if not MYPY:
|
|
77
77
|
"""
|
78
78
|
Optional additional labels to add to the Webhook Pods
|
79
79
|
"""
|
80
|
-
pod_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
80
|
+
pod_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.PodSecurityContextArgsDict']]
|
81
81
|
"""
|
82
82
|
Pod Security Context to be set on the cainjector component Pod. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
83
83
|
"""
|
84
84
|
replica_count: NotRequired[pulumi.Input[int]]
|
85
|
-
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
85
|
+
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ResourceRequirementsArgsDict']]
|
86
86
|
service_account: NotRequired[pulumi.Input['CertManagerServiceAccountArgsDict']]
|
87
|
-
strategy: NotRequired[pulumi.Input['pulumi_kubernetes.apps.v1.
|
87
|
+
strategy: NotRequired[pulumi.Input['pulumi_kubernetes.apps.v1.DeploymentStrategyArgsDict']]
|
88
88
|
timeout_seconds: NotRequired[pulumi.Input[int]]
|
89
|
-
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.
|
89
|
+
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.TolerationArgsDict']]]]
|
90
90
|
elif False:
|
91
91
|
CertManagerCaInjectorArgsDict: TypeAlias = Mapping[str, Any]
|
92
92
|
|
@@ -434,7 +434,7 @@ class CertManagerGlobalRbacArgs:
|
|
434
434
|
|
435
435
|
if not MYPY:
|
436
436
|
class CertManagerGlobalArgsDict(TypedDict):
|
437
|
-
image_pull_secrets: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.
|
437
|
+
image_pull_secrets: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.LocalObjectReferenceArgsDict']]]]
|
438
438
|
"""
|
439
439
|
Reference to one or more secrets to be used when pulling images. ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
440
440
|
"""
|
@@ -960,7 +960,7 @@ class CertManagerStartupAPICheckRBACArgs:
|
|
960
960
|
|
961
961
|
if not MYPY:
|
962
962
|
class CertManagerStartupAPICheckArgsDict(TypedDict):
|
963
|
-
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
963
|
+
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.AffinityArgsDict']]
|
964
964
|
backoff_limit: NotRequired[pulumi.Input[int]]
|
965
965
|
"""
|
966
966
|
Job backoffLimit
|
@@ -985,8 +985,8 @@ if not MYPY:
|
|
985
985
|
Optional additional labels to add to the startupapicheck Pods
|
986
986
|
"""
|
987
987
|
rbac: NotRequired[pulumi.Input['CertManagerStartupAPICheckRBACArgsDict']]
|
988
|
-
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
989
|
-
security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
988
|
+
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ResourceRequirementsArgsDict']]
|
989
|
+
security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.PodSecurityContextArgsDict']]
|
990
990
|
"""
|
991
991
|
Pod Security Context to be set on the startupapicheck component Pod. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
992
992
|
"""
|
@@ -995,7 +995,7 @@ if not MYPY:
|
|
995
995
|
"""
|
996
996
|
Timeout for 'kubectl check api' command
|
997
997
|
"""
|
998
|
-
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.
|
998
|
+
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.TolerationArgsDict']]]]
|
999
999
|
elif False:
|
1000
1000
|
CertManagerStartupAPICheckArgsDict: TypeAlias = Mapping[str, Any]
|
1001
1001
|
|
@@ -1239,8 +1239,8 @@ class CertManagerWebhookURLArgs:
|
|
1239
1239
|
|
1240
1240
|
if not MYPY:
|
1241
1241
|
class CertManagerWebhookArgsDict(TypedDict):
|
1242
|
-
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
1243
|
-
container_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
1242
|
+
affinity: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.AffinityArgsDict']]
|
1243
|
+
container_security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.SecurityContextArgsDict']]
|
1244
1244
|
"""
|
1245
1245
|
Container Security Context to be set on the webhook component container. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
1246
1246
|
"""
|
@@ -1257,7 +1257,7 @@ if not MYPY:
|
|
1257
1257
|
Specifies if the webhook should be started in hostNetwork mode. Required for use in some managed kubernetes clusters (such as AWS EKS) with custom CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
|
1258
1258
|
"""
|
1259
1259
|
image: NotRequired[pulumi.Input['CertManagerImageArgsDict']]
|
1260
|
-
liveness_probe: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
1260
|
+
liveness_probe: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ProbeArgsDict']]
|
1261
1261
|
"""
|
1262
1262
|
Liveness probe values. Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
|
1263
1263
|
"""
|
@@ -1275,17 +1275,17 @@ if not MYPY:
|
|
1275
1275
|
"""
|
1276
1276
|
Optional additional labels to add to the Webhook Pods
|
1277
1277
|
"""
|
1278
|
-
readiness_probe: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
1278
|
+
readiness_probe: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ProbeArgsDict']]
|
1279
1279
|
"""
|
1280
1280
|
Readiness probe values. Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
|
1281
1281
|
"""
|
1282
1282
|
replica_count: NotRequired[pulumi.Input[int]]
|
1283
|
-
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
1283
|
+
resources: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.ResourceRequirementsArgsDict']]
|
1284
1284
|
secure_port: NotRequired[pulumi.Input[int]]
|
1285
1285
|
"""
|
1286
1286
|
The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
|
1287
1287
|
"""
|
1288
|
-
security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.
|
1288
|
+
security_context: NotRequired[pulumi.Input['pulumi_kubernetes.core.v1.PodSecurityContextArgsDict']]
|
1289
1289
|
"""
|
1290
1290
|
Pod Security Context to be set on the webhook component Pod. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
|
1291
1291
|
"""
|
@@ -1302,9 +1302,9 @@ if not MYPY:
|
|
1302
1302
|
"""
|
1303
1303
|
Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
|
1304
1304
|
"""
|
1305
|
-
strategy: NotRequired[pulumi.Input['pulumi_kubernetes.apps.v1.
|
1305
|
+
strategy: NotRequired[pulumi.Input['pulumi_kubernetes.apps.v1.DeploymentStrategyArgsDict']]
|
1306
1306
|
timeout_seconds: NotRequired[pulumi.Input[int]]
|
1307
|
-
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.
|
1307
|
+
tolerations: NotRequired[pulumi.Input[Sequence[pulumi.Input['pulumi_kubernetes.core.v1.TolerationArgsDict']]]]
|
1308
1308
|
url: NotRequired[pulumi.Input['CertManagerWebhookURLArgsDict']]
|
1309
1309
|
"""
|
1310
1310
|
Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
|
@@ -1,16 +1,16 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: pulumi_kubernetes_cert_manager
|
3
|
-
Version: 0.1.
|
3
|
+
Version: 0.1.0a1734475956
|
4
4
|
Summary: Strongly-typed Cert Manager installation
|
5
5
|
License: Apache-2.0
|
6
6
|
Project-URL: Homepage, https://pulumi.io
|
7
7
|
Project-URL: Repository, https://github.com/pulumi/pulumi-kubernetes-cert-manager
|
8
8
|
Keywords: pulumi,kubernetes,cert-manager,kind/component,category/infrastructure
|
9
|
-
Requires-Python: >=3.
|
9
|
+
Requires-Python: >=3.9
|
10
10
|
Description-Content-Type: text/markdown
|
11
11
|
Requires-Dist: parver>=0.2.1
|
12
|
-
Requires-Dist: pulumi<4.0.0,>=3.
|
13
|
-
Requires-Dist: pulumi-kubernetes<5.0.0,>=
|
12
|
+
Requires-Dist: pulumi<4.0.0,>=3.142.0
|
13
|
+
Requires-Dist: pulumi-kubernetes<5.0.0,>=4.0.0
|
14
14
|
Requires-Dist: semver>=2.8.1
|
15
15
|
Requires-Dist: typing-extensions>=4.11; python_version < "3.11"
|
16
16
|
|
@@ -1,11 +1,11 @@
|
|
1
1
|
[project]
|
2
2
|
name = "pulumi_kubernetes_cert_manager"
|
3
3
|
description = "Strongly-typed Cert Manager installation"
|
4
|
-
dependencies = ["parver>=0.2.1", "pulumi>=3.
|
4
|
+
dependencies = ["parver>=0.2.1", "pulumi>=3.142.0,<4.0.0", "pulumi-kubernetes>=4.0.0,<5.0.0", "semver>=2.8.1", "typing-extensions>=4.11; python_version < \"3.11\""]
|
5
5
|
keywords = ["pulumi", "kubernetes", "cert-manager", "kind/component", "category/infrastructure"]
|
6
6
|
readme = "README.md"
|
7
|
-
requires-python = ">=3.
|
8
|
-
version = "0.1.
|
7
|
+
requires-python = ">=3.9"
|
8
|
+
version = "0.1.0a1734475956"
|
9
9
|
[project.license]
|
10
10
|
text = "Apache-2.0"
|
11
11
|
[project.urls]
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|