pulumi-kubernetes 4.10.0a1710355461__py3-none-any.whl → 4.20.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-kubernetes might be problematic. Click here for more details.
- pulumi_kubernetes/__init__.py +123 -3
- pulumi_kubernetes/_inputs.py +63 -6
- pulumi_kubernetes/_utilities.py +41 -5
- pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfiguration.py +11 -6
- pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfigurationList.py +11 -6
- pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfigurationPatch.py +11 -6
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicy.py +226 -0
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBinding.py +224 -0
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBindingList.py +215 -0
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBindingPatch.py +236 -0
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyList.py +215 -0
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyPatch.py +238 -0
- pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfiguration.py +11 -6
- pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfigurationList.py +11 -6
- pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfigurationPatch.py +11 -6
- pulumi_kubernetes/admissionregistration/v1/__init__.py +6 -0
- pulumi_kubernetes/admissionregistration/v1/_inputs.py +4571 -939
- pulumi_kubernetes/admissionregistration/v1/outputs.py +2880 -470
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicy.py +214 -0
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBinding.py +222 -0
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBindingList.py +215 -0
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBindingPatch.py +234 -0
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyList.py +215 -0
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyPatch.py +226 -0
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicy.py +12 -7
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBinding.py +12 -15
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBindingList.py +29 -23
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBindingPatch.py +12 -15
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyList.py +29 -23
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyPatch.py +12 -7
- pulumi_kubernetes/admissionregistration/v1alpha1/__init__.py +6 -0
- pulumi_kubernetes/admissionregistration/v1alpha1/_inputs.py +2514 -141
- pulumi_kubernetes/admissionregistration/v1alpha1/outputs.py +1370 -246
- pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfiguration.py +11 -6
- pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfigurationList.py +11 -6
- pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfigurationPatch.py +11 -6
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicy.py +12 -7
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBinding.py +12 -7
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBindingList.py +29 -23
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBindingPatch.py +12 -7
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyList.py +29 -23
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyPatch.py +12 -7
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfiguration.py +11 -6
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfigurationList.py +11 -6
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfigurationPatch.py +11 -6
- pulumi_kubernetes/admissionregistration/v1beta1/_inputs.py +1522 -42
- pulumi_kubernetes/admissionregistration/v1beta1/outputs.py +9 -4
- pulumi_kubernetes/apiextensions/v1/CustomResourceDefinition.py +11 -6
- pulumi_kubernetes/apiextensions/v1/CustomResourceDefinitionList.py +11 -6
- pulumi_kubernetes/apiextensions/v1/CustomResourceDefinitionPatch.py +11 -6
- pulumi_kubernetes/apiextensions/v1/_inputs.py +1175 -12
- pulumi_kubernetes/apiextensions/v1/outputs.py +122 -8
- pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinition.py +10 -5
- pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinitionList.py +10 -5
- pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinitionPatch.py +10 -5
- pulumi_kubernetes/apiextensions/v1beta1/_inputs.py +903 -6
- pulumi_kubernetes/apiextensions/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/apiregistration/v1/APIService.py +11 -6
- pulumi_kubernetes/apiregistration/v1/APIServiceList.py +11 -6
- pulumi_kubernetes/apiregistration/v1/APIServicePatch.py +11 -6
- pulumi_kubernetes/apiregistration/v1/_inputs.py +194 -0
- pulumi_kubernetes/apiregistration/v1/outputs.py +5 -0
- pulumi_kubernetes/apiregistration/v1beta1/APIService.py +10 -5
- pulumi_kubernetes/apiregistration/v1beta1/APIServiceList.py +9 -4
- pulumi_kubernetes/apiregistration/v1beta1/APIServicePatch.py +10 -5
- pulumi_kubernetes/apiregistration/v1beta1/_inputs.py +191 -0
- pulumi_kubernetes/apiregistration/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/apps/v1/ControllerRevision.py +8 -3
- pulumi_kubernetes/apps/v1/ControllerRevisionList.py +11 -6
- pulumi_kubernetes/apps/v1/ControllerRevisionPatch.py +8 -3
- pulumi_kubernetes/apps/v1/DaemonSet.py +11 -6
- pulumi_kubernetes/apps/v1/DaemonSetList.py +11 -6
- pulumi_kubernetes/apps/v1/DaemonSetPatch.py +11 -6
- pulumi_kubernetes/apps/v1/Deployment.py +11 -6
- pulumi_kubernetes/apps/v1/DeploymentList.py +11 -6
- pulumi_kubernetes/apps/v1/DeploymentPatch.py +11 -6
- pulumi_kubernetes/apps/v1/ReplicaSet.py +11 -6
- pulumi_kubernetes/apps/v1/ReplicaSetList.py +11 -6
- pulumi_kubernetes/apps/v1/ReplicaSetPatch.py +11 -6
- pulumi_kubernetes/apps/v1/StatefulSet.py +11 -6
- pulumi_kubernetes/apps/v1/StatefulSetList.py +11 -6
- pulumi_kubernetes/apps/v1/StatefulSetPatch.py +11 -6
- pulumi_kubernetes/apps/v1/_inputs.py +1057 -8
- pulumi_kubernetes/apps/v1/outputs.py +13 -8
- pulumi_kubernetes/apps/v1beta1/ControllerRevision.py +8 -3
- pulumi_kubernetes/apps/v1beta1/ControllerRevisionList.py +11 -6
- pulumi_kubernetes/apps/v1beta1/ControllerRevisionPatch.py +8 -3
- pulumi_kubernetes/apps/v1beta1/Deployment.py +11 -6
- pulumi_kubernetes/apps/v1beta1/DeploymentList.py +11 -6
- pulumi_kubernetes/apps/v1beta1/DeploymentPatch.py +11 -6
- pulumi_kubernetes/apps/v1beta1/StatefulSet.py +10 -5
- pulumi_kubernetes/apps/v1beta1/StatefulSetList.py +9 -4
- pulumi_kubernetes/apps/v1beta1/StatefulSetPatch.py +10 -5
- pulumi_kubernetes/apps/v1beta1/_inputs.py +603 -0
- pulumi_kubernetes/apps/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/apps/v1beta2/ControllerRevision.py +8 -3
- pulumi_kubernetes/apps/v1beta2/ControllerRevisionList.py +11 -6
- pulumi_kubernetes/apps/v1beta2/ControllerRevisionPatch.py +8 -3
- pulumi_kubernetes/apps/v1beta2/DaemonSet.py +11 -6
- pulumi_kubernetes/apps/v1beta2/DaemonSetList.py +11 -6
- pulumi_kubernetes/apps/v1beta2/DaemonSetPatch.py +11 -6
- pulumi_kubernetes/apps/v1beta2/Deployment.py +11 -6
- pulumi_kubernetes/apps/v1beta2/DeploymentList.py +11 -6
- pulumi_kubernetes/apps/v1beta2/DeploymentPatch.py +11 -6
- pulumi_kubernetes/apps/v1beta2/ReplicaSet.py +11 -6
- pulumi_kubernetes/apps/v1beta2/ReplicaSetList.py +11 -6
- pulumi_kubernetes/apps/v1beta2/ReplicaSetPatch.py +11 -6
- pulumi_kubernetes/apps/v1beta2/StatefulSet.py +10 -5
- pulumi_kubernetes/apps/v1beta2/StatefulSetList.py +9 -4
- pulumi_kubernetes/apps/v1beta2/StatefulSetPatch.py +10 -5
- pulumi_kubernetes/apps/v1beta2/_inputs.py +935 -0
- pulumi_kubernetes/apps/v1beta2/outputs.py +5 -0
- pulumi_kubernetes/auditregistration/v1alpha1/AuditSink.py +10 -5
- pulumi_kubernetes/auditregistration/v1alpha1/AuditSinkList.py +10 -5
- pulumi_kubernetes/auditregistration/v1alpha1/AuditSinkPatch.py +10 -5
- pulumi_kubernetes/auditregistration/v1alpha1/_inputs.py +281 -0
- pulumi_kubernetes/auditregistration/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscaler.py +11 -6
- pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscalerList.py +11 -6
- pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscalerPatch.py +11 -6
- pulumi_kubernetes/autoscaling/v1/_inputs.py +157 -0
- pulumi_kubernetes/autoscaling/v1/outputs.py +5 -0
- pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscaler.py +11 -6
- pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscalerList.py +11 -6
- pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscalerPatch.py +11 -6
- pulumi_kubernetes/autoscaling/v2/_inputs.py +815 -10
- pulumi_kubernetes/autoscaling/v2/outputs.py +17 -12
- pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscaler.py +11 -6
- pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscalerList.py +11 -6
- pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscalerPatch.py +11 -6
- pulumi_kubernetes/autoscaling/v2beta1/_inputs.py +652 -0
- pulumi_kubernetes/autoscaling/v2beta1/outputs.py +5 -0
- pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscaler.py +11 -6
- pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscalerList.py +11 -6
- pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscalerPatch.py +11 -6
- pulumi_kubernetes/autoscaling/v2beta2/_inputs.py +796 -0
- pulumi_kubernetes/autoscaling/v2beta2/outputs.py +5 -0
- pulumi_kubernetes/batch/v1/CronJob.py +11 -6
- pulumi_kubernetes/batch/v1/CronJobList.py +11 -6
- pulumi_kubernetes/batch/v1/CronJobPatch.py +11 -6
- pulumi_kubernetes/batch/v1/Job.py +11 -6
- pulumi_kubernetes/batch/v1/JobList.py +11 -6
- pulumi_kubernetes/batch/v1/JobPatch.py +11 -6
- pulumi_kubernetes/batch/v1/_inputs.py +1070 -85
- pulumi_kubernetes/batch/v1/outputs.py +298 -40
- pulumi_kubernetes/batch/v1beta1/CronJob.py +11 -6
- pulumi_kubernetes/batch/v1beta1/CronJobList.py +11 -6
- pulumi_kubernetes/batch/v1beta1/CronJobPatch.py +11 -6
- pulumi_kubernetes/batch/v1beta1/_inputs.py +161 -0
- pulumi_kubernetes/batch/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/batch/v2alpha1/CronJob.py +11 -6
- pulumi_kubernetes/batch/v2alpha1/CronJobList.py +11 -6
- pulumi_kubernetes/batch/v2alpha1/CronJobPatch.py +11 -6
- pulumi_kubernetes/batch/v2alpha1/_inputs.py +161 -0
- pulumi_kubernetes/batch/v2alpha1/outputs.py +5 -0
- pulumi_kubernetes/certificates/v1/CertificateSigningRequest.py +10 -5
- pulumi_kubernetes/certificates/v1/CertificateSigningRequestList.py +10 -5
- pulumi_kubernetes/certificates/v1/CertificateSigningRequestPatch.py +10 -5
- pulumi_kubernetes/certificates/v1/_inputs.py +290 -0
- pulumi_kubernetes/certificates/v1/outputs.py +5 -0
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundle.py +11 -6
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundleList.py +11 -6
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundlePatch.py +11 -6
- pulumi_kubernetes/certificates/v1alpha1/_inputs.py +94 -0
- pulumi_kubernetes/certificates/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequest.py +10 -5
- pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequestList.py +9 -4
- pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequestPatch.py +10 -5
- pulumi_kubernetes/certificates/v1beta1/_inputs.py +165 -0
- pulumi_kubernetes/certificates/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/coordination/__init__.py +6 -0
- pulumi_kubernetes/coordination/v1/Lease.py +11 -6
- pulumi_kubernetes/coordination/v1/LeaseList.py +11 -6
- pulumi_kubernetes/coordination/v1/LeasePatch.py +11 -6
- pulumi_kubernetes/coordination/v1/_inputs.py +180 -10
- pulumi_kubernetes/coordination/v1/outputs.py +67 -10
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidate.py +216 -0
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidateList.py +215 -0
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidatePatch.py +228 -0
- pulumi_kubernetes/coordination/v1alpha1/__init__.py +12 -0
- pulumi_kubernetes/coordination/v1alpha1/_inputs.py +418 -0
- pulumi_kubernetes/coordination/v1alpha1/outputs.py +334 -0
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidate.py +216 -0
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidateList.py +215 -0
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidatePatch.py +228 -0
- pulumi_kubernetes/coordination/v1alpha2/__init__.py +12 -0
- pulumi_kubernetes/coordination/v1alpha2/_inputs.py +393 -0
- pulumi_kubernetes/coordination/v1alpha2/outputs.py +313 -0
- pulumi_kubernetes/coordination/v1beta1/Lease.py +11 -6
- pulumi_kubernetes/coordination/v1beta1/LeaseList.py +11 -6
- pulumi_kubernetes/coordination/v1beta1/LeasePatch.py +11 -6
- pulumi_kubernetes/coordination/v1beta1/_inputs.py +90 -0
- pulumi_kubernetes/coordination/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/core/v1/Binding.py +13 -8
- pulumi_kubernetes/core/v1/BindingPatch.py +13 -8
- pulumi_kubernetes/core/v1/ConfigMap.py +8 -3
- pulumi_kubernetes/core/v1/ConfigMapList.py +11 -6
- pulumi_kubernetes/core/v1/ConfigMapPatch.py +8 -3
- pulumi_kubernetes/core/v1/Endpoints.py +11 -6
- pulumi_kubernetes/core/v1/EndpointsList.py +11 -6
- pulumi_kubernetes/core/v1/EndpointsPatch.py +11 -6
- pulumi_kubernetes/core/v1/Event.py +20 -15
- pulumi_kubernetes/core/v1/EventList.py +11 -6
- pulumi_kubernetes/core/v1/EventPatch.py +20 -15
- pulumi_kubernetes/core/v1/LimitRange.py +11 -6
- pulumi_kubernetes/core/v1/LimitRangeList.py +11 -6
- pulumi_kubernetes/core/v1/LimitRangePatch.py +11 -6
- pulumi_kubernetes/core/v1/Namespace.py +11 -6
- pulumi_kubernetes/core/v1/NamespaceList.py +11 -6
- pulumi_kubernetes/core/v1/NamespacePatch.py +11 -6
- pulumi_kubernetes/core/v1/Node.py +11 -6
- pulumi_kubernetes/core/v1/NodeList.py +11 -6
- pulumi_kubernetes/core/v1/NodePatch.py +11 -6
- pulumi_kubernetes/core/v1/PersistentVolume.py +11 -6
- pulumi_kubernetes/core/v1/PersistentVolumeClaim.py +11 -6
- pulumi_kubernetes/core/v1/PersistentVolumeClaimList.py +11 -6
- pulumi_kubernetes/core/v1/PersistentVolumeClaimPatch.py +11 -6
- pulumi_kubernetes/core/v1/PersistentVolumeList.py +11 -6
- pulumi_kubernetes/core/v1/PersistentVolumePatch.py +11 -6
- pulumi_kubernetes/core/v1/Pod.py +11 -6
- pulumi_kubernetes/core/v1/PodList.py +11 -6
- pulumi_kubernetes/core/v1/PodPatch.py +11 -6
- pulumi_kubernetes/core/v1/PodTemplate.py +11 -6
- pulumi_kubernetes/core/v1/PodTemplateList.py +11 -6
- pulumi_kubernetes/core/v1/PodTemplatePatch.py +11 -6
- pulumi_kubernetes/core/v1/ReplicationController.py +11 -6
- pulumi_kubernetes/core/v1/ReplicationControllerList.py +11 -6
- pulumi_kubernetes/core/v1/ReplicationControllerPatch.py +11 -6
- pulumi_kubernetes/core/v1/ResourceQuota.py +11 -6
- pulumi_kubernetes/core/v1/ResourceQuotaList.py +11 -6
- pulumi_kubernetes/core/v1/ResourceQuotaPatch.py +11 -6
- pulumi_kubernetes/core/v1/Secret.py +8 -3
- pulumi_kubernetes/core/v1/SecretList.py +11 -6
- pulumi_kubernetes/core/v1/SecretPatch.py +8 -3
- pulumi_kubernetes/core/v1/Service.py +17 -28
- pulumi_kubernetes/core/v1/ServiceAccount.py +17 -12
- pulumi_kubernetes/core/v1/ServiceAccountList.py +11 -6
- pulumi_kubernetes/core/v1/ServiceAccountPatch.py +17 -12
- pulumi_kubernetes/core/v1/ServiceList.py +11 -6
- pulumi_kubernetes/core/v1/ServicePatch.py +17 -28
- pulumi_kubernetes/core/v1/_inputs.py +11760 -756
- pulumi_kubernetes/core/v1/outputs.py +2131 -448
- pulumi_kubernetes/discovery/v1/EndpointSlice.py +14 -9
- pulumi_kubernetes/discovery/v1/EndpointSliceList.py +11 -6
- pulumi_kubernetes/discovery/v1/EndpointSlicePatch.py +14 -9
- pulumi_kubernetes/discovery/v1/_inputs.py +284 -0
- pulumi_kubernetes/discovery/v1/outputs.py +5 -0
- pulumi_kubernetes/discovery/v1beta1/EndpointSlice.py +14 -9
- pulumi_kubernetes/discovery/v1beta1/EndpointSliceList.py +11 -6
- pulumi_kubernetes/discovery/v1beta1/EndpointSlicePatch.py +14 -9
- pulumi_kubernetes/discovery/v1beta1/_inputs.py +210 -0
- pulumi_kubernetes/discovery/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/events/v1/Event.py +20 -15
- pulumi_kubernetes/events/v1/EventList.py +11 -6
- pulumi_kubernetes/events/v1/EventPatch.py +20 -15
- pulumi_kubernetes/events/v1/_inputs.py +118 -0
- pulumi_kubernetes/events/v1/outputs.py +5 -0
- pulumi_kubernetes/events/v1beta1/Event.py +19 -14
- pulumi_kubernetes/events/v1beta1/EventList.py +11 -6
- pulumi_kubernetes/events/v1beta1/EventPatch.py +19 -14
- pulumi_kubernetes/events/v1beta1/_inputs.py +123 -0
- pulumi_kubernetes/events/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/extensions/v1beta1/DaemonSet.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/DaemonSetList.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/DaemonSetPatch.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/Deployment.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/DeploymentList.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/DeploymentPatch.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/Ingress.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/IngressList.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/IngressPatch.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/NetworkPolicy.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/NetworkPolicyList.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/NetworkPolicyPatch.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicy.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicyList.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicyPatch.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/ReplicaSet.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/ReplicaSetList.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/ReplicaSetPatch.py +11 -6
- pulumi_kubernetes/extensions/v1beta1/_inputs.py +1884 -26
- pulumi_kubernetes/extensions/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/flowcontrol/v1/FlowSchema.py +11 -6
- pulumi_kubernetes/flowcontrol/v1/FlowSchemaList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1/FlowSchemaPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfiguration.py +11 -6
- pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfigurationList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfigurationPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1/_inputs.py +779 -0
- pulumi_kubernetes/flowcontrol/v1/outputs.py +5 -0
- pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchema.py +11 -6
- pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchemaList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchemaPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfiguration.py +11 -6
- pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfigurationList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfigurationPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1alpha1/_inputs.py +671 -0
- pulumi_kubernetes/flowcontrol/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/flowcontrol/v1beta1/FlowSchema.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta1/FlowSchemaList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta1/FlowSchemaPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfiguration.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfigurationList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfigurationPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta1/_inputs.py +671 -0
- pulumi_kubernetes/flowcontrol/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/flowcontrol/v1beta2/FlowSchema.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta2/FlowSchemaList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta2/FlowSchemaPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfiguration.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfigurationList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfigurationPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta2/_inputs.py +771 -0
- pulumi_kubernetes/flowcontrol/v1beta2/outputs.py +5 -0
- pulumi_kubernetes/flowcontrol/v1beta3/FlowSchema.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta3/FlowSchemaList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta3/FlowSchemaPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfiguration.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfigurationList.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfigurationPatch.py +11 -6
- pulumi_kubernetes/flowcontrol/v1beta3/_inputs.py +779 -8
- pulumi_kubernetes/flowcontrol/v1beta3/outputs.py +13 -8
- pulumi_kubernetes/helm/__init__.py +3 -0
- pulumi_kubernetes/helm/v3/Release.py +8 -3
- pulumi_kubernetes/helm/v3/_inputs.py +42 -2
- pulumi_kubernetes/helm/v3/outputs.py +7 -2
- pulumi_kubernetes/helm/v4/Chart.py +721 -0
- pulumi_kubernetes/helm/v4/__init__.py +9 -0
- pulumi_kubernetes/helm/v4/_inputs.py +216 -0
- pulumi_kubernetes/kustomize/__init__.py +8 -0
- pulumi_kubernetes/kustomize/v2/Directory.py +219 -0
- pulumi_kubernetes/kustomize/v2/__init__.py +8 -0
- pulumi_kubernetes/meta/v1/Status.py +11 -6
- pulumi_kubernetes/meta/v1/StatusPatch.py +11 -6
- pulumi_kubernetes/meta/v1/_inputs.py +596 -0
- pulumi_kubernetes/meta/v1/outputs.py +5 -0
- pulumi_kubernetes/networking/v1/Ingress.py +11 -6
- pulumi_kubernetes/networking/v1/IngressClass.py +11 -6
- pulumi_kubernetes/networking/v1/IngressClassList.py +11 -6
- pulumi_kubernetes/networking/v1/IngressClassPatch.py +11 -6
- pulumi_kubernetes/networking/v1/IngressList.py +11 -6
- pulumi_kubernetes/networking/v1/IngressPatch.py +11 -6
- pulumi_kubernetes/networking/v1/NetworkPolicy.py +11 -6
- pulumi_kubernetes/networking/v1/NetworkPolicyList.py +11 -6
- pulumi_kubernetes/networking/v1/NetworkPolicyPatch.py +11 -6
- pulumi_kubernetes/networking/v1/_inputs.py +840 -0
- pulumi_kubernetes/networking/v1/outputs.py +5 -0
- pulumi_kubernetes/networking/v1alpha1/ClusterCIDR.py +11 -6
- pulumi_kubernetes/networking/v1alpha1/ClusterCIDRList.py +11 -6
- pulumi_kubernetes/networking/v1alpha1/ClusterCIDRPatch.py +11 -6
- pulumi_kubernetes/networking/v1alpha1/IPAddress.py +13 -6
- pulumi_kubernetes/networking/v1alpha1/IPAddressList.py +11 -6
- pulumi_kubernetes/networking/v1alpha1/IPAddressPatch.py +13 -6
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDR.py +13 -6
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDRList.py +11 -6
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDRPatch.py +13 -6
- pulumi_kubernetes/networking/v1alpha1/_inputs.py +293 -37
- pulumi_kubernetes/networking/v1alpha1/outputs.py +26 -24
- pulumi_kubernetes/networking/v1beta1/IPAddress.py +216 -0
- pulumi_kubernetes/networking/v1beta1/IPAddressList.py +215 -0
- pulumi_kubernetes/networking/v1beta1/IPAddressPatch.py +228 -0
- pulumi_kubernetes/networking/v1beta1/Ingress.py +11 -6
- pulumi_kubernetes/networking/v1beta1/IngressClass.py +11 -6
- pulumi_kubernetes/networking/v1beta1/IngressClassList.py +11 -6
- pulumi_kubernetes/networking/v1beta1/IngressClassPatch.py +11 -6
- pulumi_kubernetes/networking/v1beta1/IngressList.py +11 -6
- pulumi_kubernetes/networking/v1beta1/IngressPatch.py +11 -6
- pulumi_kubernetes/networking/v1beta1/ServiceCIDR.py +226 -0
- pulumi_kubernetes/networking/v1beta1/ServiceCIDRList.py +215 -0
- pulumi_kubernetes/networking/v1beta1/ServiceCIDRPatch.py +238 -0
- pulumi_kubernetes/networking/v1beta1/__init__.py +6 -0
- pulumi_kubernetes/networking/v1beta1/_inputs.py +984 -11
- pulumi_kubernetes/networking/v1beta1/outputs.py +466 -0
- pulumi_kubernetes/node/v1/RuntimeClass.py +14 -9
- pulumi_kubernetes/node/v1/RuntimeClassList.py +11 -6
- pulumi_kubernetes/node/v1/RuntimeClassPatch.py +14 -9
- pulumi_kubernetes/node/v1/_inputs.py +101 -0
- pulumi_kubernetes/node/v1/outputs.py +5 -0
- pulumi_kubernetes/node/v1alpha1/RuntimeClass.py +11 -6
- pulumi_kubernetes/node/v1alpha1/RuntimeClassList.py +11 -6
- pulumi_kubernetes/node/v1alpha1/RuntimeClassPatch.py +11 -6
- pulumi_kubernetes/node/v1alpha1/_inputs.py +134 -0
- pulumi_kubernetes/node/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/node/v1beta1/RuntimeClass.py +14 -9
- pulumi_kubernetes/node/v1beta1/RuntimeClassList.py +11 -6
- pulumi_kubernetes/node/v1beta1/RuntimeClassPatch.py +14 -9
- pulumi_kubernetes/node/v1beta1/_inputs.py +100 -0
- pulumi_kubernetes/node/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/policy/v1/PodDisruptionBudget.py +11 -6
- pulumi_kubernetes/policy/v1/PodDisruptionBudgetList.py +11 -6
- pulumi_kubernetes/policy/v1/PodDisruptionBudgetPatch.py +11 -6
- pulumi_kubernetes/policy/v1/_inputs.py +151 -0
- pulumi_kubernetes/policy/v1/outputs.py +5 -0
- pulumi_kubernetes/policy/v1beta1/PodDisruptionBudget.py +10 -5
- pulumi_kubernetes/policy/v1beta1/PodDisruptionBudgetList.py +9 -4
- pulumi_kubernetes/policy/v1beta1/PodDisruptionBudgetPatch.py +10 -5
- pulumi_kubernetes/policy/v1beta1/PodSecurityPolicy.py +11 -6
- pulumi_kubernetes/policy/v1beta1/PodSecurityPolicyList.py +11 -6
- pulumi_kubernetes/policy/v1beta1/PodSecurityPolicyPatch.py +11 -6
- pulumi_kubernetes/policy/v1beta1/_inputs.py +713 -0
- pulumi_kubernetes/policy/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/provider.py +82 -6
- pulumi_kubernetes/pulumi-plugin.json +2 -1
- pulumi_kubernetes/rbac/v1/ClusterRole.py +14 -9
- pulumi_kubernetes/rbac/v1/ClusterRoleBinding.py +14 -9
- pulumi_kubernetes/rbac/v1/ClusterRoleBindingList.py +11 -6
- pulumi_kubernetes/rbac/v1/ClusterRoleBindingPatch.py +14 -9
- pulumi_kubernetes/rbac/v1/ClusterRoleList.py +11 -6
- pulumi_kubernetes/rbac/v1/ClusterRolePatch.py +14 -9
- pulumi_kubernetes/rbac/v1/Role.py +11 -6
- pulumi_kubernetes/rbac/v1/RoleBinding.py +14 -9
- pulumi_kubernetes/rbac/v1/RoleBindingList.py +11 -6
- pulumi_kubernetes/rbac/v1/RoleBindingPatch.py +14 -9
- pulumi_kubernetes/rbac/v1/RoleList.py +11 -6
- pulumi_kubernetes/rbac/v1/RolePatch.py +11 -6
- pulumi_kubernetes/rbac/v1/_inputs.py +295 -0
- pulumi_kubernetes/rbac/v1/outputs.py +5 -0
- pulumi_kubernetes/rbac/v1alpha1/ClusterRole.py +14 -9
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBinding.py +14 -9
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBindingList.py +11 -6
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBindingPatch.py +14 -9
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleList.py +11 -6
- pulumi_kubernetes/rbac/v1alpha1/ClusterRolePatch.py +14 -9
- pulumi_kubernetes/rbac/v1alpha1/Role.py +11 -6
- pulumi_kubernetes/rbac/v1alpha1/RoleBinding.py +14 -9
- pulumi_kubernetes/rbac/v1alpha1/RoleBindingList.py +11 -6
- pulumi_kubernetes/rbac/v1alpha1/RoleBindingPatch.py +14 -9
- pulumi_kubernetes/rbac/v1alpha1/RoleList.py +11 -6
- pulumi_kubernetes/rbac/v1alpha1/RolePatch.py +11 -6
- pulumi_kubernetes/rbac/v1alpha1/_inputs.py +295 -0
- pulumi_kubernetes/rbac/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/rbac/v1beta1/ClusterRole.py +14 -9
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleBinding.py +14 -9
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleBindingList.py +11 -6
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleBindingPatch.py +14 -9
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleList.py +11 -6
- pulumi_kubernetes/rbac/v1beta1/ClusterRolePatch.py +14 -9
- pulumi_kubernetes/rbac/v1beta1/Role.py +11 -6
- pulumi_kubernetes/rbac/v1beta1/RoleBinding.py +14 -9
- pulumi_kubernetes/rbac/v1beta1/RoleBindingList.py +11 -6
- pulumi_kubernetes/rbac/v1beta1/RoleBindingPatch.py +14 -9
- pulumi_kubernetes/rbac/v1beta1/RoleList.py +11 -6
- pulumi_kubernetes/rbac/v1beta1/RolePatch.py +11 -6
- pulumi_kubernetes/rbac/v1beta1/_inputs.py +295 -0
- pulumi_kubernetes/rbac/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/resource/__init__.py +6 -0
- pulumi_kubernetes/resource/v1alpha1/PodScheduling.py +11 -6
- pulumi_kubernetes/resource/v1alpha1/PodSchedulingList.py +11 -6
- pulumi_kubernetes/resource/v1alpha1/PodSchedulingPatch.py +11 -6
- pulumi_kubernetes/resource/v1alpha1/ResourceClaim.py +12 -7
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimList.py +11 -6
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimPatch.py +12 -7
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplate.py +12 -7
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplateList.py +11 -6
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplatePatch.py +12 -7
- pulumi_kubernetes/resource/v1alpha1/ResourceClass.py +14 -9
- pulumi_kubernetes/resource/v1alpha1/ResourceClassList.py +11 -6
- pulumi_kubernetes/resource/v1alpha1/ResourceClassPatch.py +14 -9
- pulumi_kubernetes/resource/v1alpha1/_inputs.py +458 -0
- pulumi_kubernetes/resource/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/resource/v1alpha2/PodSchedulingContext.py +13 -6
- pulumi_kubernetes/resource/v1alpha2/PodSchedulingContextList.py +11 -6
- pulumi_kubernetes/resource/v1alpha2/PodSchedulingContextPatch.py +13 -6
- pulumi_kubernetes/resource/v1alpha2/ResourceClaim.py +12 -7
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimList.py +11 -6
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimParameters.py +280 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimParametersList.py +215 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimParametersPatch.py +292 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimPatch.py +12 -7
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplate.py +12 -7
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplateList.py +11 -6
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplatePatch.py +12 -7
- pulumi_kubernetes/resource/v1alpha2/ResourceClass.py +43 -9
- pulumi_kubernetes/resource/v1alpha2/ResourceClassList.py +11 -6
- pulumi_kubernetes/resource/v1alpha2/ResourceClassParameters.py +272 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceClassParametersList.py +215 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceClassParametersPatch.py +284 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceClassPatch.py +43 -9
- pulumi_kubernetes/resource/v1alpha2/ResourceSlice.py +283 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceSliceList.py +215 -0
- pulumi_kubernetes/resource/v1alpha2/ResourceSlicePatch.py +294 -0
- pulumi_kubernetes/resource/v1alpha2/__init__.py +9 -0
- pulumi_kubernetes/resource/v1alpha2/_inputs.py +3177 -634
- pulumi_kubernetes/resource/v1alpha2/outputs.py +2628 -880
- pulumi_kubernetes/resource/v1alpha3/DeviceClass.py +238 -0
- pulumi_kubernetes/resource/v1alpha3/DeviceClassList.py +216 -0
- pulumi_kubernetes/resource/v1alpha3/DeviceClassPatch.py +249 -0
- pulumi_kubernetes/resource/v1alpha3/PodSchedulingContext.py +231 -0
- pulumi_kubernetes/resource/v1alpha3/PodSchedulingContextList.py +215 -0
- pulumi_kubernetes/resource/v1alpha3/PodSchedulingContextPatch.py +242 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceClaim.py +232 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimList.py +216 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimPatch.py +243 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplate.py +229 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplateList.py +215 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplatePatch.py +240 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceSlice.py +246 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceSliceList.py +245 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceSlicePatch.py +257 -0
- pulumi_kubernetes/resource/v1alpha3/__init__.py +24 -0
- pulumi_kubernetes/resource/v1alpha3/_inputs.py +4372 -0
- pulumi_kubernetes/resource/v1alpha3/outputs.py +3914 -0
- pulumi_kubernetes/resource/v1beta1/DeviceClass.py +237 -0
- pulumi_kubernetes/resource/v1beta1/DeviceClassList.py +215 -0
- pulumi_kubernetes/resource/v1beta1/DeviceClassPatch.py +248 -0
- pulumi_kubernetes/resource/v1beta1/ResourceClaim.py +232 -0
- pulumi_kubernetes/resource/v1beta1/ResourceClaimList.py +216 -0
- pulumi_kubernetes/resource/v1beta1/ResourceClaimPatch.py +243 -0
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplate.py +229 -0
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplateList.py +215 -0
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplatePatch.py +240 -0
- pulumi_kubernetes/resource/v1beta1/ResourceSlice.py +246 -0
- pulumi_kubernetes/resource/v1beta1/ResourceSliceList.py +216 -0
- pulumi_kubernetes/resource/v1beta1/ResourceSlicePatch.py +257 -0
- pulumi_kubernetes/resource/v1beta1/__init__.py +21 -0
- pulumi_kubernetes/resource/v1beta1/_inputs.py +3867 -0
- pulumi_kubernetes/resource/v1beta1/outputs.py +3334 -0
- pulumi_kubernetes/scheduling/v1/PriorityClass.py +8 -3
- pulumi_kubernetes/scheduling/v1/PriorityClassList.py +11 -6
- pulumi_kubernetes/scheduling/v1/PriorityClassPatch.py +8 -3
- pulumi_kubernetes/scheduling/v1/_inputs.py +44 -0
- pulumi_kubernetes/scheduling/v1/outputs.py +5 -0
- pulumi_kubernetes/scheduling/v1alpha1/PriorityClass.py +8 -3
- pulumi_kubernetes/scheduling/v1alpha1/PriorityClassList.py +11 -6
- pulumi_kubernetes/scheduling/v1alpha1/PriorityClassPatch.py +8 -3
- pulumi_kubernetes/scheduling/v1alpha1/_inputs.py +44 -0
- pulumi_kubernetes/scheduling/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/scheduling/v1beta1/PriorityClass.py +8 -3
- pulumi_kubernetes/scheduling/v1beta1/PriorityClassList.py +11 -6
- pulumi_kubernetes/scheduling/v1beta1/PriorityClassPatch.py +8 -3
- pulumi_kubernetes/scheduling/v1beta1/_inputs.py +44 -0
- pulumi_kubernetes/scheduling/v1beta1/outputs.py +5 -0
- pulumi_kubernetes/settings/v1alpha1/PodPreset.py +9 -4
- pulumi_kubernetes/settings/v1alpha1/PodPresetList.py +11 -6
- pulumi_kubernetes/settings/v1alpha1/PodPresetPatch.py +9 -4
- pulumi_kubernetes/settings/v1alpha1/_inputs.py +84 -0
- pulumi_kubernetes/settings/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/storage/v1/CSIDriver.py +11 -6
- pulumi_kubernetes/storage/v1/CSIDriverList.py +11 -6
- pulumi_kubernetes/storage/v1/CSIDriverPatch.py +11 -6
- pulumi_kubernetes/storage/v1/CSINode.py +11 -6
- pulumi_kubernetes/storage/v1/CSINodeList.py +11 -6
- pulumi_kubernetes/storage/v1/CSINodePatch.py +11 -6
- pulumi_kubernetes/storage/v1/CSIStorageCapacity.py +11 -6
- pulumi_kubernetes/storage/v1/CSIStorageCapacityList.py +11 -6
- pulumi_kubernetes/storage/v1/CSIStorageCapacityPatch.py +11 -6
- pulumi_kubernetes/storage/v1/StorageClass.py +11 -6
- pulumi_kubernetes/storage/v1/StorageClassList.py +11 -6
- pulumi_kubernetes/storage/v1/StorageClassPatch.py +11 -6
- pulumi_kubernetes/storage/v1/VolumeAttachment.py +11 -6
- pulumi_kubernetes/storage/v1/VolumeAttachmentList.py +11 -6
- pulumi_kubernetes/storage/v1/VolumeAttachmentPatch.py +11 -6
- pulumi_kubernetes/storage/v1/_inputs.py +624 -10
- pulumi_kubernetes/storage/v1/outputs.py +17 -12
- pulumi_kubernetes/storage/v1alpha1/VolumeAttachment.py +11 -6
- pulumi_kubernetes/storage/v1alpha1/VolumeAttachmentList.py +11 -6
- pulumi_kubernetes/storage/v1alpha1/VolumeAttachmentPatch.py +11 -6
- pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClass.py +10 -3
- pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClassList.py +11 -6
- pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClassPatch.py +10 -3
- pulumi_kubernetes/storage/v1alpha1/_inputs.py +187 -0
- pulumi_kubernetes/storage/v1alpha1/outputs.py +5 -0
- pulumi_kubernetes/storage/v1beta1/CSIDriver.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSIDriverList.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSIDriverPatch.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSINode.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSINodeList.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSINodePatch.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSIStorageCapacity.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSIStorageCapacityList.py +11 -6
- pulumi_kubernetes/storage/v1beta1/CSIStorageCapacityPatch.py +11 -6
- pulumi_kubernetes/storage/v1beta1/StorageClass.py +11 -6
- pulumi_kubernetes/storage/v1beta1/StorageClassList.py +11 -6
- pulumi_kubernetes/storage/v1beta1/StorageClassPatch.py +11 -6
- pulumi_kubernetes/storage/v1beta1/VolumeAttachment.py +11 -6
- pulumi_kubernetes/storage/v1beta1/VolumeAttachmentList.py +11 -6
- pulumi_kubernetes/storage/v1beta1/VolumeAttachmentPatch.py +11 -6
- pulumi_kubernetes/storage/v1beta1/VolumeAttributesClass.py +252 -0
- pulumi_kubernetes/storage/v1beta1/VolumeAttributesClassList.py +215 -0
- pulumi_kubernetes/storage/v1beta1/VolumeAttributesClassPatch.py +263 -0
- pulumi_kubernetes/storage/v1beta1/__init__.py +3 -0
- pulumi_kubernetes/storage/v1beta1/_inputs.py +689 -0
- pulumi_kubernetes/storage/v1beta1/outputs.py +99 -0
- pulumi_kubernetes/storagemigration/__init__.py +14 -0
- pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigration.py +224 -0
- pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigrationList.py +215 -0
- pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigrationPatch.py +236 -0
- pulumi_kubernetes/storagemigration/v1alpha1/__init__.py +12 -0
- pulumi_kubernetes/storagemigration/v1alpha1/_inputs.py +585 -0
- pulumi_kubernetes/storagemigration/v1alpha1/outputs.py +593 -0
- pulumi_kubernetes/yaml/v2/ConfigFile.py +81 -4
- pulumi_kubernetes/yaml/v2/ConfigGroup.py +123 -42
- pulumi_kubernetes/yaml/yaml.py +264 -0
- {pulumi_kubernetes-4.10.0a1710355461.dist-info → pulumi_kubernetes-4.20.0.dist-info}/METADATA +8 -7
- pulumi_kubernetes-4.20.0.dist-info/RECORD +679 -0
- {pulumi_kubernetes-4.10.0a1710355461.dist-info → pulumi_kubernetes-4.20.0.dist-info}/WHEEL +1 -1
- pulumi_kubernetes-4.10.0a1710355461.dist-info/RECORD +0 -592
- {pulumi_kubernetes-4.10.0a1710355461.dist-info → pulumi_kubernetes-4.20.0.dist-info}/top_level.txt +0 -0
|
@@ -4,22 +4,39 @@
|
|
|
4
4
|
|
|
5
5
|
import copy
|
|
6
6
|
import warnings
|
|
7
|
+
import sys
|
|
7
8
|
import pulumi
|
|
8
9
|
import pulumi.runtime
|
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
10
15
|
from ... import _utilities
|
|
11
16
|
from . import outputs
|
|
12
17
|
from ... import meta as _meta
|
|
13
18
|
|
|
14
19
|
__all__ = [
|
|
20
|
+
'ApplyConfiguration',
|
|
21
|
+
'ApplyConfigurationPatch',
|
|
15
22
|
'AuditAnnotation',
|
|
16
23
|
'AuditAnnotationPatch',
|
|
17
24
|
'ExpressionWarning',
|
|
18
25
|
'ExpressionWarningPatch',
|
|
26
|
+
'JSONPatch',
|
|
27
|
+
'JSONPatchPatch',
|
|
19
28
|
'MatchCondition',
|
|
20
29
|
'MatchConditionPatch',
|
|
21
30
|
'MatchResources',
|
|
22
31
|
'MatchResourcesPatch',
|
|
32
|
+
'MutatingAdmissionPolicy',
|
|
33
|
+
'MutatingAdmissionPolicyBinding',
|
|
34
|
+
'MutatingAdmissionPolicyBindingSpec',
|
|
35
|
+
'MutatingAdmissionPolicyBindingSpecPatch',
|
|
36
|
+
'MutatingAdmissionPolicySpec',
|
|
37
|
+
'MutatingAdmissionPolicySpecPatch',
|
|
38
|
+
'Mutation',
|
|
39
|
+
'MutationPatch',
|
|
23
40
|
'NamedRuleWithOperations',
|
|
24
41
|
'NamedRuleWithOperationsPatch',
|
|
25
42
|
'ParamKind',
|
|
@@ -42,6 +59,160 @@ __all__ = [
|
|
|
42
59
|
'VariablePatch',
|
|
43
60
|
]
|
|
44
61
|
|
|
62
|
+
@pulumi.output_type
|
|
63
|
+
class ApplyConfiguration(dict):
|
|
64
|
+
"""
|
|
65
|
+
ApplyConfiguration defines the desired configuration values of an object.
|
|
66
|
+
"""
|
|
67
|
+
def __init__(__self__, *,
|
|
68
|
+
expression: Optional[str] = None):
|
|
69
|
+
"""
|
|
70
|
+
ApplyConfiguration defines the desired configuration values of an object.
|
|
71
|
+
:param str expression: expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
|
|
72
|
+
|
|
73
|
+
Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
|
|
74
|
+
|
|
75
|
+
Object{
|
|
76
|
+
spec: Object.spec{
|
|
77
|
+
serviceAccountName: "example"
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
|
|
82
|
+
|
|
83
|
+
CEL expressions have access to the object types needed to create apply configurations:
|
|
84
|
+
|
|
85
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
86
|
+
|
|
87
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
88
|
+
|
|
89
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
90
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
91
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
92
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
93
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
94
|
+
request resource.
|
|
95
|
+
|
|
96
|
+
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
97
|
+
|
|
98
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
99
|
+
"""
|
|
100
|
+
if expression is not None:
|
|
101
|
+
pulumi.set(__self__, "expression", expression)
|
|
102
|
+
|
|
103
|
+
@property
|
|
104
|
+
@pulumi.getter
|
|
105
|
+
def expression(self) -> Optional[str]:
|
|
106
|
+
"""
|
|
107
|
+
expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
|
|
108
|
+
|
|
109
|
+
Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
|
|
110
|
+
|
|
111
|
+
Object{
|
|
112
|
+
spec: Object.spec{
|
|
113
|
+
serviceAccountName: "example"
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
|
|
118
|
+
|
|
119
|
+
CEL expressions have access to the object types needed to create apply configurations:
|
|
120
|
+
|
|
121
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
122
|
+
|
|
123
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
124
|
+
|
|
125
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
126
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
127
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
128
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
129
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
130
|
+
request resource.
|
|
131
|
+
|
|
132
|
+
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
133
|
+
|
|
134
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
135
|
+
"""
|
|
136
|
+
return pulumi.get(self, "expression")
|
|
137
|
+
|
|
138
|
+
|
|
139
|
+
@pulumi.output_type
|
|
140
|
+
class ApplyConfigurationPatch(dict):
|
|
141
|
+
"""
|
|
142
|
+
ApplyConfiguration defines the desired configuration values of an object.
|
|
143
|
+
"""
|
|
144
|
+
def __init__(__self__, *,
|
|
145
|
+
expression: Optional[str] = None):
|
|
146
|
+
"""
|
|
147
|
+
ApplyConfiguration defines the desired configuration values of an object.
|
|
148
|
+
:param str expression: expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
|
|
149
|
+
|
|
150
|
+
Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
|
|
151
|
+
|
|
152
|
+
Object{
|
|
153
|
+
spec: Object.spec{
|
|
154
|
+
serviceAccountName: "example"
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
|
|
159
|
+
|
|
160
|
+
CEL expressions have access to the object types needed to create apply configurations:
|
|
161
|
+
|
|
162
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
163
|
+
|
|
164
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
165
|
+
|
|
166
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
167
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
168
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
169
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
170
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
171
|
+
request resource.
|
|
172
|
+
|
|
173
|
+
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
174
|
+
|
|
175
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
176
|
+
"""
|
|
177
|
+
if expression is not None:
|
|
178
|
+
pulumi.set(__self__, "expression", expression)
|
|
179
|
+
|
|
180
|
+
@property
|
|
181
|
+
@pulumi.getter
|
|
182
|
+
def expression(self) -> Optional[str]:
|
|
183
|
+
"""
|
|
184
|
+
expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
|
|
185
|
+
|
|
186
|
+
Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
|
|
187
|
+
|
|
188
|
+
Object{
|
|
189
|
+
spec: Object.spec{
|
|
190
|
+
serviceAccountName: "example"
|
|
191
|
+
}
|
|
192
|
+
}
|
|
193
|
+
|
|
194
|
+
Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
|
|
195
|
+
|
|
196
|
+
CEL expressions have access to the object types needed to create apply configurations:
|
|
197
|
+
|
|
198
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
199
|
+
|
|
200
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
201
|
+
|
|
202
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
203
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
204
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
205
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
206
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
207
|
+
request resource.
|
|
208
|
+
|
|
209
|
+
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
210
|
+
|
|
211
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
212
|
+
"""
|
|
213
|
+
return pulumi.get(self, "expression")
|
|
214
|
+
|
|
215
|
+
|
|
45
216
|
@pulumi.output_type
|
|
46
217
|
class AuditAnnotation(dict):
|
|
47
218
|
"""
|
|
@@ -286,6 +457,264 @@ class ExpressionWarningPatch(dict):
|
|
|
286
457
|
return pulumi.get(self, "warning")
|
|
287
458
|
|
|
288
459
|
|
|
460
|
+
@pulumi.output_type
|
|
461
|
+
class JSONPatch(dict):
|
|
462
|
+
"""
|
|
463
|
+
JSONPatch defines a JSON Patch.
|
|
464
|
+
"""
|
|
465
|
+
def __init__(__self__, *,
|
|
466
|
+
expression: Optional[str] = None):
|
|
467
|
+
"""
|
|
468
|
+
JSONPatch defines a JSON Patch.
|
|
469
|
+
:param str expression: expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
|
|
470
|
+
|
|
471
|
+
expression must return an array of JSONPatch values.
|
|
472
|
+
|
|
473
|
+
For example, this CEL expression returns a JSON patch to conditionally modify a value:
|
|
474
|
+
|
|
475
|
+
[
|
|
476
|
+
JSONPatch{op: "test", path: "/spec/example", value: "Red"},
|
|
477
|
+
JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
|
|
478
|
+
]
|
|
479
|
+
|
|
480
|
+
To define an object for the patch value, use Object types. For example:
|
|
481
|
+
|
|
482
|
+
[
|
|
483
|
+
JSONPatch{
|
|
484
|
+
op: "add",
|
|
485
|
+
path: "/spec/selector",
|
|
486
|
+
value: Object.spec.selector{matchLabels: {"environment": "test"}}
|
|
487
|
+
}
|
|
488
|
+
]
|
|
489
|
+
|
|
490
|
+
To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
|
|
491
|
+
|
|
492
|
+
[
|
|
493
|
+
JSONPatch{
|
|
494
|
+
op: "add",
|
|
495
|
+
path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
|
|
496
|
+
value: "test"
|
|
497
|
+
},
|
|
498
|
+
]
|
|
499
|
+
|
|
500
|
+
CEL expressions have access to the types needed to create JSON patches and objects:
|
|
501
|
+
|
|
502
|
+
- 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
|
|
503
|
+
See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
|
|
504
|
+
integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
|
|
505
|
+
[JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
|
|
506
|
+
function may be used to escape path keys containing '/' and '~'.
|
|
507
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
508
|
+
|
|
509
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
510
|
+
|
|
511
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
512
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
513
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
514
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
515
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
516
|
+
request resource.
|
|
517
|
+
|
|
518
|
+
CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
|
|
519
|
+
|
|
520
|
+
- 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
|
|
521
|
+
|
|
522
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
523
|
+
"""
|
|
524
|
+
if expression is not None:
|
|
525
|
+
pulumi.set(__self__, "expression", expression)
|
|
526
|
+
|
|
527
|
+
@property
|
|
528
|
+
@pulumi.getter
|
|
529
|
+
def expression(self) -> Optional[str]:
|
|
530
|
+
"""
|
|
531
|
+
expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
|
|
532
|
+
|
|
533
|
+
expression must return an array of JSONPatch values.
|
|
534
|
+
|
|
535
|
+
For example, this CEL expression returns a JSON patch to conditionally modify a value:
|
|
536
|
+
|
|
537
|
+
[
|
|
538
|
+
JSONPatch{op: "test", path: "/spec/example", value: "Red"},
|
|
539
|
+
JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
|
|
540
|
+
]
|
|
541
|
+
|
|
542
|
+
To define an object for the patch value, use Object types. For example:
|
|
543
|
+
|
|
544
|
+
[
|
|
545
|
+
JSONPatch{
|
|
546
|
+
op: "add",
|
|
547
|
+
path: "/spec/selector",
|
|
548
|
+
value: Object.spec.selector{matchLabels: {"environment": "test"}}
|
|
549
|
+
}
|
|
550
|
+
]
|
|
551
|
+
|
|
552
|
+
To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
|
|
553
|
+
|
|
554
|
+
[
|
|
555
|
+
JSONPatch{
|
|
556
|
+
op: "add",
|
|
557
|
+
path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
|
|
558
|
+
value: "test"
|
|
559
|
+
},
|
|
560
|
+
]
|
|
561
|
+
|
|
562
|
+
CEL expressions have access to the types needed to create JSON patches and objects:
|
|
563
|
+
|
|
564
|
+
- 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
|
|
565
|
+
See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
|
|
566
|
+
integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
|
|
567
|
+
[JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
|
|
568
|
+
function may be used to escape path keys containing '/' and '~'.
|
|
569
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
570
|
+
|
|
571
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
572
|
+
|
|
573
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
574
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
575
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
576
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
577
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
578
|
+
request resource.
|
|
579
|
+
|
|
580
|
+
CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
|
|
581
|
+
|
|
582
|
+
- 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
|
|
583
|
+
|
|
584
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
585
|
+
"""
|
|
586
|
+
return pulumi.get(self, "expression")
|
|
587
|
+
|
|
588
|
+
|
|
589
|
+
@pulumi.output_type
|
|
590
|
+
class JSONPatchPatch(dict):
|
|
591
|
+
"""
|
|
592
|
+
JSONPatch defines a JSON Patch.
|
|
593
|
+
"""
|
|
594
|
+
def __init__(__self__, *,
|
|
595
|
+
expression: Optional[str] = None):
|
|
596
|
+
"""
|
|
597
|
+
JSONPatch defines a JSON Patch.
|
|
598
|
+
:param str expression: expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
|
|
599
|
+
|
|
600
|
+
expression must return an array of JSONPatch values.
|
|
601
|
+
|
|
602
|
+
For example, this CEL expression returns a JSON patch to conditionally modify a value:
|
|
603
|
+
|
|
604
|
+
[
|
|
605
|
+
JSONPatch{op: "test", path: "/spec/example", value: "Red"},
|
|
606
|
+
JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
|
|
607
|
+
]
|
|
608
|
+
|
|
609
|
+
To define an object for the patch value, use Object types. For example:
|
|
610
|
+
|
|
611
|
+
[
|
|
612
|
+
JSONPatch{
|
|
613
|
+
op: "add",
|
|
614
|
+
path: "/spec/selector",
|
|
615
|
+
value: Object.spec.selector{matchLabels: {"environment": "test"}}
|
|
616
|
+
}
|
|
617
|
+
]
|
|
618
|
+
|
|
619
|
+
To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
|
|
620
|
+
|
|
621
|
+
[
|
|
622
|
+
JSONPatch{
|
|
623
|
+
op: "add",
|
|
624
|
+
path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
|
|
625
|
+
value: "test"
|
|
626
|
+
},
|
|
627
|
+
]
|
|
628
|
+
|
|
629
|
+
CEL expressions have access to the types needed to create JSON patches and objects:
|
|
630
|
+
|
|
631
|
+
- 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
|
|
632
|
+
See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
|
|
633
|
+
integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
|
|
634
|
+
[JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
|
|
635
|
+
function may be used to escape path keys containing '/' and '~'.
|
|
636
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
637
|
+
|
|
638
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
639
|
+
|
|
640
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
641
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
642
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
643
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
644
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
645
|
+
request resource.
|
|
646
|
+
|
|
647
|
+
CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
|
|
648
|
+
|
|
649
|
+
- 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
|
|
650
|
+
|
|
651
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
652
|
+
"""
|
|
653
|
+
if expression is not None:
|
|
654
|
+
pulumi.set(__self__, "expression", expression)
|
|
655
|
+
|
|
656
|
+
@property
|
|
657
|
+
@pulumi.getter
|
|
658
|
+
def expression(self) -> Optional[str]:
|
|
659
|
+
"""
|
|
660
|
+
expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
|
|
661
|
+
|
|
662
|
+
expression must return an array of JSONPatch values.
|
|
663
|
+
|
|
664
|
+
For example, this CEL expression returns a JSON patch to conditionally modify a value:
|
|
665
|
+
|
|
666
|
+
[
|
|
667
|
+
JSONPatch{op: "test", path: "/spec/example", value: "Red"},
|
|
668
|
+
JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
|
|
669
|
+
]
|
|
670
|
+
|
|
671
|
+
To define an object for the patch value, use Object types. For example:
|
|
672
|
+
|
|
673
|
+
[
|
|
674
|
+
JSONPatch{
|
|
675
|
+
op: "add",
|
|
676
|
+
path: "/spec/selector",
|
|
677
|
+
value: Object.spec.selector{matchLabels: {"environment": "test"}}
|
|
678
|
+
}
|
|
679
|
+
]
|
|
680
|
+
|
|
681
|
+
To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
|
|
682
|
+
|
|
683
|
+
[
|
|
684
|
+
JSONPatch{
|
|
685
|
+
op: "add",
|
|
686
|
+
path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
|
|
687
|
+
value: "test"
|
|
688
|
+
},
|
|
689
|
+
]
|
|
690
|
+
|
|
691
|
+
CEL expressions have access to the types needed to create JSON patches and objects:
|
|
692
|
+
|
|
693
|
+
- 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
|
|
694
|
+
See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
|
|
695
|
+
integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
|
|
696
|
+
[JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
|
|
697
|
+
function may be used to escape path keys containing '/' and '~'.
|
|
698
|
+
- 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
|
|
699
|
+
|
|
700
|
+
CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
|
|
701
|
+
|
|
702
|
+
- 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
|
|
703
|
+
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
704
|
+
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
705
|
+
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
706
|
+
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
707
|
+
request resource.
|
|
708
|
+
|
|
709
|
+
CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
|
|
710
|
+
|
|
711
|
+
- 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
|
|
712
|
+
|
|
713
|
+
Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
|
|
714
|
+
"""
|
|
715
|
+
return pulumi.get(self, "expression")
|
|
716
|
+
|
|
717
|
+
|
|
289
718
|
@pulumi.output_type
|
|
290
719
|
class MatchCondition(dict):
|
|
291
720
|
def __init__(__self__, *,
|
|
@@ -497,229 +926,984 @@ class MatchResources(dict):
|
|
|
497
926
|
|
|
498
927
|
Defaults to "Equivalent"
|
|
499
928
|
"""
|
|
500
|
-
return pulumi.get(self, "match_policy")
|
|
929
|
+
return pulumi.get(self, "match_policy")
|
|
930
|
+
|
|
931
|
+
@property
|
|
932
|
+
@pulumi.getter(name="namespaceSelector")
|
|
933
|
+
def namespace_selector(self) -> Optional['_meta.v1.outputs.LabelSelector']:
|
|
934
|
+
"""
|
|
935
|
+
NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
936
|
+
|
|
937
|
+
For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
|
|
938
|
+
"matchExpressions": [
|
|
939
|
+
{
|
|
940
|
+
"key": "runlevel",
|
|
941
|
+
"operator": "NotIn",
|
|
942
|
+
"values": [
|
|
943
|
+
"0",
|
|
944
|
+
"1"
|
|
945
|
+
]
|
|
946
|
+
}
|
|
947
|
+
]
|
|
948
|
+
}
|
|
949
|
+
|
|
950
|
+
If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
|
|
951
|
+
"matchExpressions": [
|
|
952
|
+
{
|
|
953
|
+
"key": "environment",
|
|
954
|
+
"operator": "In",
|
|
955
|
+
"values": [
|
|
956
|
+
"prod",
|
|
957
|
+
"staging"
|
|
958
|
+
]
|
|
959
|
+
}
|
|
960
|
+
]
|
|
961
|
+
}
|
|
962
|
+
|
|
963
|
+
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
964
|
+
|
|
965
|
+
Default to the empty LabelSelector, which matches everything.
|
|
966
|
+
"""
|
|
967
|
+
return pulumi.get(self, "namespace_selector")
|
|
968
|
+
|
|
969
|
+
@property
|
|
970
|
+
@pulumi.getter(name="objectSelector")
|
|
971
|
+
def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelector']:
|
|
972
|
+
"""
|
|
973
|
+
ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
974
|
+
"""
|
|
975
|
+
return pulumi.get(self, "object_selector")
|
|
976
|
+
|
|
977
|
+
@property
|
|
978
|
+
@pulumi.getter(name="resourceRules")
|
|
979
|
+
def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperations']]:
|
|
980
|
+
"""
|
|
981
|
+
ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
982
|
+
"""
|
|
983
|
+
return pulumi.get(self, "resource_rules")
|
|
984
|
+
|
|
985
|
+
|
|
986
|
+
@pulumi.output_type
|
|
987
|
+
class MatchResourcesPatch(dict):
|
|
988
|
+
"""
|
|
989
|
+
MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
990
|
+
"""
|
|
991
|
+
@staticmethod
|
|
992
|
+
def __key_warning(key: str):
|
|
993
|
+
suggest = None
|
|
994
|
+
if key == "excludeResourceRules":
|
|
995
|
+
suggest = "exclude_resource_rules"
|
|
996
|
+
elif key == "matchPolicy":
|
|
997
|
+
suggest = "match_policy"
|
|
998
|
+
elif key == "namespaceSelector":
|
|
999
|
+
suggest = "namespace_selector"
|
|
1000
|
+
elif key == "objectSelector":
|
|
1001
|
+
suggest = "object_selector"
|
|
1002
|
+
elif key == "resourceRules":
|
|
1003
|
+
suggest = "resource_rules"
|
|
1004
|
+
|
|
1005
|
+
if suggest:
|
|
1006
|
+
pulumi.log.warn(f"Key '{key}' not found in MatchResourcesPatch. Access the value via the '{suggest}' property getter instead.")
|
|
1007
|
+
|
|
1008
|
+
def __getitem__(self, key: str) -> Any:
|
|
1009
|
+
MatchResourcesPatch.__key_warning(key)
|
|
1010
|
+
return super().__getitem__(key)
|
|
1011
|
+
|
|
1012
|
+
def get(self, key: str, default = None) -> Any:
|
|
1013
|
+
MatchResourcesPatch.__key_warning(key)
|
|
1014
|
+
return super().get(key, default)
|
|
1015
|
+
|
|
1016
|
+
def __init__(__self__, *,
|
|
1017
|
+
exclude_resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None,
|
|
1018
|
+
match_policy: Optional[str] = None,
|
|
1019
|
+
namespace_selector: Optional['_meta.v1.outputs.LabelSelectorPatch'] = None,
|
|
1020
|
+
object_selector: Optional['_meta.v1.outputs.LabelSelectorPatch'] = None,
|
|
1021
|
+
resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None):
|
|
1022
|
+
"""
|
|
1023
|
+
MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1024
|
+
:param Sequence['NamedRuleWithOperationsPatchArgs'] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1025
|
+
:param str match_policy: matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1026
|
+
|
|
1027
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
|
|
1028
|
+
|
|
1029
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
|
|
1030
|
+
|
|
1031
|
+
Defaults to "Equivalent"
|
|
1032
|
+
:param '_meta.v1.LabelSelectorPatchArgs' namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
1033
|
+
|
|
1034
|
+
For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
|
|
1035
|
+
"matchExpressions": [
|
|
1036
|
+
{
|
|
1037
|
+
"key": "runlevel",
|
|
1038
|
+
"operator": "NotIn",
|
|
1039
|
+
"values": [
|
|
1040
|
+
"0",
|
|
1041
|
+
"1"
|
|
1042
|
+
]
|
|
1043
|
+
}
|
|
1044
|
+
]
|
|
1045
|
+
}
|
|
1046
|
+
|
|
1047
|
+
If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
|
|
1048
|
+
"matchExpressions": [
|
|
1049
|
+
{
|
|
1050
|
+
"key": "environment",
|
|
1051
|
+
"operator": "In",
|
|
1052
|
+
"values": [
|
|
1053
|
+
"prod",
|
|
1054
|
+
"staging"
|
|
1055
|
+
]
|
|
1056
|
+
}
|
|
1057
|
+
]
|
|
1058
|
+
}
|
|
1059
|
+
|
|
1060
|
+
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
1061
|
+
|
|
1062
|
+
Default to the empty LabelSelector, which matches everything.
|
|
1063
|
+
:param '_meta.v1.LabelSelectorPatchArgs' object_selector: ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1064
|
+
:param Sequence['NamedRuleWithOperationsPatchArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1065
|
+
"""
|
|
1066
|
+
if exclude_resource_rules is not None:
|
|
1067
|
+
pulumi.set(__self__, "exclude_resource_rules", exclude_resource_rules)
|
|
1068
|
+
if match_policy is not None:
|
|
1069
|
+
pulumi.set(__self__, "match_policy", match_policy)
|
|
1070
|
+
if namespace_selector is not None:
|
|
1071
|
+
pulumi.set(__self__, "namespace_selector", namespace_selector)
|
|
1072
|
+
if object_selector is not None:
|
|
1073
|
+
pulumi.set(__self__, "object_selector", object_selector)
|
|
1074
|
+
if resource_rules is not None:
|
|
1075
|
+
pulumi.set(__self__, "resource_rules", resource_rules)
|
|
1076
|
+
|
|
1077
|
+
@property
|
|
1078
|
+
@pulumi.getter(name="excludeResourceRules")
|
|
1079
|
+
def exclude_resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
|
|
1080
|
+
"""
|
|
1081
|
+
ExcludeResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1082
|
+
"""
|
|
1083
|
+
return pulumi.get(self, "exclude_resource_rules")
|
|
1084
|
+
|
|
1085
|
+
@property
|
|
1086
|
+
@pulumi.getter(name="matchPolicy")
|
|
1087
|
+
def match_policy(self) -> Optional[str]:
|
|
1088
|
+
"""
|
|
1089
|
+
matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1090
|
+
|
|
1091
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
|
|
1092
|
+
|
|
1093
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
|
|
1094
|
+
|
|
1095
|
+
Defaults to "Equivalent"
|
|
1096
|
+
"""
|
|
1097
|
+
return pulumi.get(self, "match_policy")
|
|
1098
|
+
|
|
1099
|
+
@property
|
|
1100
|
+
@pulumi.getter(name="namespaceSelector")
|
|
1101
|
+
def namespace_selector(self) -> Optional['_meta.v1.outputs.LabelSelectorPatch']:
|
|
1102
|
+
"""
|
|
1103
|
+
NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
1104
|
+
|
|
1105
|
+
For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
|
|
1106
|
+
"matchExpressions": [
|
|
1107
|
+
{
|
|
1108
|
+
"key": "runlevel",
|
|
1109
|
+
"operator": "NotIn",
|
|
1110
|
+
"values": [
|
|
1111
|
+
"0",
|
|
1112
|
+
"1"
|
|
1113
|
+
]
|
|
1114
|
+
}
|
|
1115
|
+
]
|
|
1116
|
+
}
|
|
1117
|
+
|
|
1118
|
+
If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
|
|
1119
|
+
"matchExpressions": [
|
|
1120
|
+
{
|
|
1121
|
+
"key": "environment",
|
|
1122
|
+
"operator": "In",
|
|
1123
|
+
"values": [
|
|
1124
|
+
"prod",
|
|
1125
|
+
"staging"
|
|
1126
|
+
]
|
|
1127
|
+
}
|
|
1128
|
+
]
|
|
1129
|
+
}
|
|
1130
|
+
|
|
1131
|
+
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
1132
|
+
|
|
1133
|
+
Default to the empty LabelSelector, which matches everything.
|
|
1134
|
+
"""
|
|
1135
|
+
return pulumi.get(self, "namespace_selector")
|
|
1136
|
+
|
|
1137
|
+
@property
|
|
1138
|
+
@pulumi.getter(name="objectSelector")
|
|
1139
|
+
def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelectorPatch']:
|
|
1140
|
+
"""
|
|
1141
|
+
ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1142
|
+
"""
|
|
1143
|
+
return pulumi.get(self, "object_selector")
|
|
1144
|
+
|
|
1145
|
+
@property
|
|
1146
|
+
@pulumi.getter(name="resourceRules")
|
|
1147
|
+
def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
|
|
1148
|
+
"""
|
|
1149
|
+
ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1150
|
+
"""
|
|
1151
|
+
return pulumi.get(self, "resource_rules")
|
|
1152
|
+
|
|
1153
|
+
|
|
1154
|
+
@pulumi.output_type
|
|
1155
|
+
class MutatingAdmissionPolicy(dict):
|
|
1156
|
+
"""
|
|
1157
|
+
MutatingAdmissionPolicy describes the definition of an admission mutation policy that mutates the object coming into admission chain.
|
|
1158
|
+
"""
|
|
1159
|
+
@staticmethod
|
|
1160
|
+
def __key_warning(key: str):
|
|
1161
|
+
suggest = None
|
|
1162
|
+
if key == "apiVersion":
|
|
1163
|
+
suggest = "api_version"
|
|
1164
|
+
|
|
1165
|
+
if suggest:
|
|
1166
|
+
pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicy. Access the value via the '{suggest}' property getter instead.")
|
|
1167
|
+
|
|
1168
|
+
def __getitem__(self, key: str) -> Any:
|
|
1169
|
+
MutatingAdmissionPolicy.__key_warning(key)
|
|
1170
|
+
return super().__getitem__(key)
|
|
1171
|
+
|
|
1172
|
+
def get(self, key: str, default = None) -> Any:
|
|
1173
|
+
MutatingAdmissionPolicy.__key_warning(key)
|
|
1174
|
+
return super().get(key, default)
|
|
1175
|
+
|
|
1176
|
+
def __init__(__self__, *,
|
|
1177
|
+
api_version: Optional[str] = None,
|
|
1178
|
+
kind: Optional[str] = None,
|
|
1179
|
+
metadata: Optional['_meta.v1.outputs.ObjectMeta'] = None,
|
|
1180
|
+
spec: Optional['outputs.MutatingAdmissionPolicySpec'] = None):
|
|
1181
|
+
"""
|
|
1182
|
+
MutatingAdmissionPolicy describes the definition of an admission mutation policy that mutates the object coming into admission chain.
|
|
1183
|
+
:param str api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
1184
|
+
:param str kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
1185
|
+
:param '_meta.v1.ObjectMetaArgs' metadata: Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
|
|
1186
|
+
:param 'MutatingAdmissionPolicySpecArgs' spec: Specification of the desired behavior of the MutatingAdmissionPolicy.
|
|
1187
|
+
"""
|
|
1188
|
+
if api_version is not None:
|
|
1189
|
+
pulumi.set(__self__, "api_version", 'admissionregistration.k8s.io/v1alpha1')
|
|
1190
|
+
if kind is not None:
|
|
1191
|
+
pulumi.set(__self__, "kind", 'MutatingAdmissionPolicy')
|
|
1192
|
+
if metadata is not None:
|
|
1193
|
+
pulumi.set(__self__, "metadata", metadata)
|
|
1194
|
+
if spec is not None:
|
|
1195
|
+
pulumi.set(__self__, "spec", spec)
|
|
1196
|
+
|
|
1197
|
+
@property
|
|
1198
|
+
@pulumi.getter(name="apiVersion")
|
|
1199
|
+
def api_version(self) -> Optional[str]:
|
|
1200
|
+
"""
|
|
1201
|
+
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
1202
|
+
"""
|
|
1203
|
+
return pulumi.get(self, "api_version")
|
|
1204
|
+
|
|
1205
|
+
@property
|
|
1206
|
+
@pulumi.getter
|
|
1207
|
+
def kind(self) -> Optional[str]:
|
|
1208
|
+
"""
|
|
1209
|
+
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
1210
|
+
"""
|
|
1211
|
+
return pulumi.get(self, "kind")
|
|
1212
|
+
|
|
1213
|
+
@property
|
|
1214
|
+
@pulumi.getter
|
|
1215
|
+
def metadata(self) -> Optional['_meta.v1.outputs.ObjectMeta']:
|
|
1216
|
+
"""
|
|
1217
|
+
Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
|
|
1218
|
+
"""
|
|
1219
|
+
return pulumi.get(self, "metadata")
|
|
1220
|
+
|
|
1221
|
+
@property
|
|
1222
|
+
@pulumi.getter
|
|
1223
|
+
def spec(self) -> Optional['outputs.MutatingAdmissionPolicySpec']:
|
|
1224
|
+
"""
|
|
1225
|
+
Specification of the desired behavior of the MutatingAdmissionPolicy.
|
|
1226
|
+
"""
|
|
1227
|
+
return pulumi.get(self, "spec")
|
|
1228
|
+
|
|
1229
|
+
|
|
1230
|
+
@pulumi.output_type
|
|
1231
|
+
class MutatingAdmissionPolicyBinding(dict):
|
|
1232
|
+
"""
|
|
1233
|
+
MutatingAdmissionPolicyBinding binds the MutatingAdmissionPolicy with parametrized resources. MutatingAdmissionPolicyBinding and the optional parameter resource together define how cluster administrators configure policies for clusters.
|
|
1234
|
+
|
|
1235
|
+
For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding. Each evaluation is constrained by a [runtime cost budget](https://kubernetes.io/docs/reference/using-api/cel/#runtime-cost-budget).
|
|
1236
|
+
|
|
1237
|
+
Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
|
|
1238
|
+
"""
|
|
1239
|
+
@staticmethod
|
|
1240
|
+
def __key_warning(key: str):
|
|
1241
|
+
suggest = None
|
|
1242
|
+
if key == "apiVersion":
|
|
1243
|
+
suggest = "api_version"
|
|
1244
|
+
|
|
1245
|
+
if suggest:
|
|
1246
|
+
pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicyBinding. Access the value via the '{suggest}' property getter instead.")
|
|
1247
|
+
|
|
1248
|
+
def __getitem__(self, key: str) -> Any:
|
|
1249
|
+
MutatingAdmissionPolicyBinding.__key_warning(key)
|
|
1250
|
+
return super().__getitem__(key)
|
|
1251
|
+
|
|
1252
|
+
def get(self, key: str, default = None) -> Any:
|
|
1253
|
+
MutatingAdmissionPolicyBinding.__key_warning(key)
|
|
1254
|
+
return super().get(key, default)
|
|
1255
|
+
|
|
1256
|
+
def __init__(__self__, *,
|
|
1257
|
+
api_version: Optional[str] = None,
|
|
1258
|
+
kind: Optional[str] = None,
|
|
1259
|
+
metadata: Optional['_meta.v1.outputs.ObjectMeta'] = None,
|
|
1260
|
+
spec: Optional['outputs.MutatingAdmissionPolicyBindingSpec'] = None):
|
|
1261
|
+
"""
|
|
1262
|
+
MutatingAdmissionPolicyBinding binds the MutatingAdmissionPolicy with parametrized resources. MutatingAdmissionPolicyBinding and the optional parameter resource together define how cluster administrators configure policies for clusters.
|
|
1263
|
+
|
|
1264
|
+
For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding. Each evaluation is constrained by a [runtime cost budget](https://kubernetes.io/docs/reference/using-api/cel/#runtime-cost-budget).
|
|
1265
|
+
|
|
1266
|
+
Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
|
|
1267
|
+
:param str api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
1268
|
+
:param str kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
1269
|
+
:param '_meta.v1.ObjectMetaArgs' metadata: Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
|
|
1270
|
+
:param 'MutatingAdmissionPolicyBindingSpecArgs' spec: Specification of the desired behavior of the MutatingAdmissionPolicyBinding.
|
|
1271
|
+
"""
|
|
1272
|
+
if api_version is not None:
|
|
1273
|
+
pulumi.set(__self__, "api_version", 'admissionregistration.k8s.io/v1alpha1')
|
|
1274
|
+
if kind is not None:
|
|
1275
|
+
pulumi.set(__self__, "kind", 'MutatingAdmissionPolicyBinding')
|
|
1276
|
+
if metadata is not None:
|
|
1277
|
+
pulumi.set(__self__, "metadata", metadata)
|
|
1278
|
+
if spec is not None:
|
|
1279
|
+
pulumi.set(__self__, "spec", spec)
|
|
1280
|
+
|
|
1281
|
+
@property
|
|
1282
|
+
@pulumi.getter(name="apiVersion")
|
|
1283
|
+
def api_version(self) -> Optional[str]:
|
|
1284
|
+
"""
|
|
1285
|
+
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
1286
|
+
"""
|
|
1287
|
+
return pulumi.get(self, "api_version")
|
|
1288
|
+
|
|
1289
|
+
@property
|
|
1290
|
+
@pulumi.getter
|
|
1291
|
+
def kind(self) -> Optional[str]:
|
|
1292
|
+
"""
|
|
1293
|
+
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
1294
|
+
"""
|
|
1295
|
+
return pulumi.get(self, "kind")
|
|
1296
|
+
|
|
1297
|
+
@property
|
|
1298
|
+
@pulumi.getter
|
|
1299
|
+
def metadata(self) -> Optional['_meta.v1.outputs.ObjectMeta']:
|
|
1300
|
+
"""
|
|
1301
|
+
Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
|
|
1302
|
+
"""
|
|
1303
|
+
return pulumi.get(self, "metadata")
|
|
1304
|
+
|
|
1305
|
+
@property
|
|
1306
|
+
@pulumi.getter
|
|
1307
|
+
def spec(self) -> Optional['outputs.MutatingAdmissionPolicyBindingSpec']:
|
|
1308
|
+
"""
|
|
1309
|
+
Specification of the desired behavior of the MutatingAdmissionPolicyBinding.
|
|
1310
|
+
"""
|
|
1311
|
+
return pulumi.get(self, "spec")
|
|
1312
|
+
|
|
1313
|
+
|
|
1314
|
+
@pulumi.output_type
|
|
1315
|
+
class MutatingAdmissionPolicyBindingSpec(dict):
|
|
1316
|
+
"""
|
|
1317
|
+
MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
|
|
1318
|
+
"""
|
|
1319
|
+
@staticmethod
|
|
1320
|
+
def __key_warning(key: str):
|
|
1321
|
+
suggest = None
|
|
1322
|
+
if key == "matchResources":
|
|
1323
|
+
suggest = "match_resources"
|
|
1324
|
+
elif key == "paramRef":
|
|
1325
|
+
suggest = "param_ref"
|
|
1326
|
+
elif key == "policyName":
|
|
1327
|
+
suggest = "policy_name"
|
|
1328
|
+
|
|
1329
|
+
if suggest:
|
|
1330
|
+
pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicyBindingSpec. Access the value via the '{suggest}' property getter instead.")
|
|
1331
|
+
|
|
1332
|
+
def __getitem__(self, key: str) -> Any:
|
|
1333
|
+
MutatingAdmissionPolicyBindingSpec.__key_warning(key)
|
|
1334
|
+
return super().__getitem__(key)
|
|
1335
|
+
|
|
1336
|
+
def get(self, key: str, default = None) -> Any:
|
|
1337
|
+
MutatingAdmissionPolicyBindingSpec.__key_warning(key)
|
|
1338
|
+
return super().get(key, default)
|
|
1339
|
+
|
|
1340
|
+
def __init__(__self__, *,
|
|
1341
|
+
match_resources: Optional['outputs.MatchResources'] = None,
|
|
1342
|
+
param_ref: Optional['outputs.ParamRef'] = None,
|
|
1343
|
+
policy_name: Optional[str] = None):
|
|
1344
|
+
"""
|
|
1345
|
+
MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
|
|
1346
|
+
:param 'MatchResourcesArgs' match_resources: matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
|
|
1347
|
+
:param 'ParamRefArgs' param_ref: paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
|
|
1348
|
+
:param str policy_name: policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
|
|
1349
|
+
"""
|
|
1350
|
+
if match_resources is not None:
|
|
1351
|
+
pulumi.set(__self__, "match_resources", match_resources)
|
|
1352
|
+
if param_ref is not None:
|
|
1353
|
+
pulumi.set(__self__, "param_ref", param_ref)
|
|
1354
|
+
if policy_name is not None:
|
|
1355
|
+
pulumi.set(__self__, "policy_name", policy_name)
|
|
1356
|
+
|
|
1357
|
+
@property
|
|
1358
|
+
@pulumi.getter(name="matchResources")
|
|
1359
|
+
def match_resources(self) -> Optional['outputs.MatchResources']:
|
|
1360
|
+
"""
|
|
1361
|
+
matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
|
|
1362
|
+
"""
|
|
1363
|
+
return pulumi.get(self, "match_resources")
|
|
1364
|
+
|
|
1365
|
+
@property
|
|
1366
|
+
@pulumi.getter(name="paramRef")
|
|
1367
|
+
def param_ref(self) -> Optional['outputs.ParamRef']:
|
|
1368
|
+
"""
|
|
1369
|
+
paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
|
|
1370
|
+
"""
|
|
1371
|
+
return pulumi.get(self, "param_ref")
|
|
1372
|
+
|
|
1373
|
+
@property
|
|
1374
|
+
@pulumi.getter(name="policyName")
|
|
1375
|
+
def policy_name(self) -> Optional[str]:
|
|
1376
|
+
"""
|
|
1377
|
+
policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
|
|
1378
|
+
"""
|
|
1379
|
+
return pulumi.get(self, "policy_name")
|
|
1380
|
+
|
|
1381
|
+
|
|
1382
|
+
@pulumi.output_type
|
|
1383
|
+
class MutatingAdmissionPolicyBindingSpecPatch(dict):
|
|
1384
|
+
"""
|
|
1385
|
+
MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
|
|
1386
|
+
"""
|
|
1387
|
+
@staticmethod
|
|
1388
|
+
def __key_warning(key: str):
|
|
1389
|
+
suggest = None
|
|
1390
|
+
if key == "matchResources":
|
|
1391
|
+
suggest = "match_resources"
|
|
1392
|
+
elif key == "paramRef":
|
|
1393
|
+
suggest = "param_ref"
|
|
1394
|
+
elif key == "policyName":
|
|
1395
|
+
suggest = "policy_name"
|
|
1396
|
+
|
|
1397
|
+
if suggest:
|
|
1398
|
+
pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicyBindingSpecPatch. Access the value via the '{suggest}' property getter instead.")
|
|
1399
|
+
|
|
1400
|
+
def __getitem__(self, key: str) -> Any:
|
|
1401
|
+
MutatingAdmissionPolicyBindingSpecPatch.__key_warning(key)
|
|
1402
|
+
return super().__getitem__(key)
|
|
1403
|
+
|
|
1404
|
+
def get(self, key: str, default = None) -> Any:
|
|
1405
|
+
MutatingAdmissionPolicyBindingSpecPatch.__key_warning(key)
|
|
1406
|
+
return super().get(key, default)
|
|
1407
|
+
|
|
1408
|
+
def __init__(__self__, *,
|
|
1409
|
+
match_resources: Optional['outputs.MatchResourcesPatch'] = None,
|
|
1410
|
+
param_ref: Optional['outputs.ParamRefPatch'] = None,
|
|
1411
|
+
policy_name: Optional[str] = None):
|
|
1412
|
+
"""
|
|
1413
|
+
MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
|
|
1414
|
+
:param 'MatchResourcesPatchArgs' match_resources: matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
|
|
1415
|
+
:param 'ParamRefPatchArgs' param_ref: paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
|
|
1416
|
+
:param str policy_name: policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
|
|
1417
|
+
"""
|
|
1418
|
+
if match_resources is not None:
|
|
1419
|
+
pulumi.set(__self__, "match_resources", match_resources)
|
|
1420
|
+
if param_ref is not None:
|
|
1421
|
+
pulumi.set(__self__, "param_ref", param_ref)
|
|
1422
|
+
if policy_name is not None:
|
|
1423
|
+
pulumi.set(__self__, "policy_name", policy_name)
|
|
1424
|
+
|
|
1425
|
+
@property
|
|
1426
|
+
@pulumi.getter(name="matchResources")
|
|
1427
|
+
def match_resources(self) -> Optional['outputs.MatchResourcesPatch']:
|
|
1428
|
+
"""
|
|
1429
|
+
matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
|
|
1430
|
+
"""
|
|
1431
|
+
return pulumi.get(self, "match_resources")
|
|
1432
|
+
|
|
1433
|
+
@property
|
|
1434
|
+
@pulumi.getter(name="paramRef")
|
|
1435
|
+
def param_ref(self) -> Optional['outputs.ParamRefPatch']:
|
|
1436
|
+
"""
|
|
1437
|
+
paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
|
|
1438
|
+
"""
|
|
1439
|
+
return pulumi.get(self, "param_ref")
|
|
1440
|
+
|
|
1441
|
+
@property
|
|
1442
|
+
@pulumi.getter(name="policyName")
|
|
1443
|
+
def policy_name(self) -> Optional[str]:
|
|
1444
|
+
"""
|
|
1445
|
+
policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
|
|
1446
|
+
"""
|
|
1447
|
+
return pulumi.get(self, "policy_name")
|
|
1448
|
+
|
|
1449
|
+
|
|
1450
|
+
@pulumi.output_type
|
|
1451
|
+
class MutatingAdmissionPolicySpec(dict):
|
|
1452
|
+
"""
|
|
1453
|
+
MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
|
|
1454
|
+
"""
|
|
1455
|
+
@staticmethod
|
|
1456
|
+
def __key_warning(key: str):
|
|
1457
|
+
suggest = None
|
|
1458
|
+
if key == "failurePolicy":
|
|
1459
|
+
suggest = "failure_policy"
|
|
1460
|
+
elif key == "matchConditions":
|
|
1461
|
+
suggest = "match_conditions"
|
|
1462
|
+
elif key == "matchConstraints":
|
|
1463
|
+
suggest = "match_constraints"
|
|
1464
|
+
elif key == "paramKind":
|
|
1465
|
+
suggest = "param_kind"
|
|
1466
|
+
elif key == "reinvocationPolicy":
|
|
1467
|
+
suggest = "reinvocation_policy"
|
|
1468
|
+
|
|
1469
|
+
if suggest:
|
|
1470
|
+
pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicySpec. Access the value via the '{suggest}' property getter instead.")
|
|
1471
|
+
|
|
1472
|
+
def __getitem__(self, key: str) -> Any:
|
|
1473
|
+
MutatingAdmissionPolicySpec.__key_warning(key)
|
|
1474
|
+
return super().__getitem__(key)
|
|
1475
|
+
|
|
1476
|
+
def get(self, key: str, default = None) -> Any:
|
|
1477
|
+
MutatingAdmissionPolicySpec.__key_warning(key)
|
|
1478
|
+
return super().get(key, default)
|
|
1479
|
+
|
|
1480
|
+
def __init__(__self__, *,
|
|
1481
|
+
failure_policy: Optional[str] = None,
|
|
1482
|
+
match_conditions: Optional[Sequence['outputs.MatchCondition']] = None,
|
|
1483
|
+
match_constraints: Optional['outputs.MatchResources'] = None,
|
|
1484
|
+
mutations: Optional[Sequence['outputs.Mutation']] = None,
|
|
1485
|
+
param_kind: Optional['outputs.ParamKind'] = None,
|
|
1486
|
+
reinvocation_policy: Optional[str] = None,
|
|
1487
|
+
variables: Optional[Sequence['outputs.Variable']] = None):
|
|
1488
|
+
"""
|
|
1489
|
+
MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
|
|
1490
|
+
:param str failure_policy: failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
|
|
1491
|
+
|
|
1492
|
+
A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
|
|
1493
|
+
|
|
1494
|
+
failurePolicy does not define how validations that evaluate to false are handled.
|
|
1495
|
+
|
|
1496
|
+
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
1497
|
+
:param Sequence['MatchConditionArgs'] match_conditions: matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
|
|
1498
|
+
|
|
1499
|
+
If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
|
|
1500
|
+
|
|
1501
|
+
The exact matching logic is (in order):
|
|
1502
|
+
1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
|
|
1503
|
+
2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
|
|
1504
|
+
3. If any matchCondition evaluates to an error (but none are FALSE):
|
|
1505
|
+
- If failurePolicy=Fail, reject the request
|
|
1506
|
+
- If failurePolicy=Ignore, the policy is skipped
|
|
1507
|
+
:param 'MatchResourcesArgs' match_constraints: matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
|
|
1508
|
+
:param Sequence['MutationArgs'] mutations: mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
|
|
1509
|
+
:param 'ParamKindArgs' param_kind: paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
|
|
1510
|
+
:param str reinvocation_policy: reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
|
|
1511
|
+
|
|
1512
|
+
Never: These mutations will not be called more than once per binding in a single admission evaluation.
|
|
1513
|
+
|
|
1514
|
+
IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
|
|
1515
|
+
:param Sequence['VariableArgs'] variables: variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
|
|
1516
|
+
|
|
1517
|
+
The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
|
|
1518
|
+
"""
|
|
1519
|
+
if failure_policy is not None:
|
|
1520
|
+
pulumi.set(__self__, "failure_policy", failure_policy)
|
|
1521
|
+
if match_conditions is not None:
|
|
1522
|
+
pulumi.set(__self__, "match_conditions", match_conditions)
|
|
1523
|
+
if match_constraints is not None:
|
|
1524
|
+
pulumi.set(__self__, "match_constraints", match_constraints)
|
|
1525
|
+
if mutations is not None:
|
|
1526
|
+
pulumi.set(__self__, "mutations", mutations)
|
|
1527
|
+
if param_kind is not None:
|
|
1528
|
+
pulumi.set(__self__, "param_kind", param_kind)
|
|
1529
|
+
if reinvocation_policy is not None:
|
|
1530
|
+
pulumi.set(__self__, "reinvocation_policy", reinvocation_policy)
|
|
1531
|
+
if variables is not None:
|
|
1532
|
+
pulumi.set(__self__, "variables", variables)
|
|
1533
|
+
|
|
1534
|
+
@property
|
|
1535
|
+
@pulumi.getter(name="failurePolicy")
|
|
1536
|
+
def failure_policy(self) -> Optional[str]:
|
|
1537
|
+
"""
|
|
1538
|
+
failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
|
|
1539
|
+
|
|
1540
|
+
A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
|
|
1541
|
+
|
|
1542
|
+
failurePolicy does not define how validations that evaluate to false are handled.
|
|
1543
|
+
|
|
1544
|
+
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
1545
|
+
"""
|
|
1546
|
+
return pulumi.get(self, "failure_policy")
|
|
1547
|
+
|
|
1548
|
+
@property
|
|
1549
|
+
@pulumi.getter(name="matchConditions")
|
|
1550
|
+
def match_conditions(self) -> Optional[Sequence['outputs.MatchCondition']]:
|
|
1551
|
+
"""
|
|
1552
|
+
matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
|
|
1553
|
+
|
|
1554
|
+
If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
|
|
1555
|
+
|
|
1556
|
+
The exact matching logic is (in order):
|
|
1557
|
+
1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
|
|
1558
|
+
2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
|
|
1559
|
+
3. If any matchCondition evaluates to an error (but none are FALSE):
|
|
1560
|
+
- If failurePolicy=Fail, reject the request
|
|
1561
|
+
- If failurePolicy=Ignore, the policy is skipped
|
|
1562
|
+
"""
|
|
1563
|
+
return pulumi.get(self, "match_conditions")
|
|
1564
|
+
|
|
1565
|
+
@property
|
|
1566
|
+
@pulumi.getter(name="matchConstraints")
|
|
1567
|
+
def match_constraints(self) -> Optional['outputs.MatchResources']:
|
|
1568
|
+
"""
|
|
1569
|
+
matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
|
|
1570
|
+
"""
|
|
1571
|
+
return pulumi.get(self, "match_constraints")
|
|
1572
|
+
|
|
1573
|
+
@property
|
|
1574
|
+
@pulumi.getter
|
|
1575
|
+
def mutations(self) -> Optional[Sequence['outputs.Mutation']]:
|
|
1576
|
+
"""
|
|
1577
|
+
mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
|
|
1578
|
+
"""
|
|
1579
|
+
return pulumi.get(self, "mutations")
|
|
1580
|
+
|
|
1581
|
+
@property
|
|
1582
|
+
@pulumi.getter(name="paramKind")
|
|
1583
|
+
def param_kind(self) -> Optional['outputs.ParamKind']:
|
|
1584
|
+
"""
|
|
1585
|
+
paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
|
|
1586
|
+
"""
|
|
1587
|
+
return pulumi.get(self, "param_kind")
|
|
1588
|
+
|
|
1589
|
+
@property
|
|
1590
|
+
@pulumi.getter(name="reinvocationPolicy")
|
|
1591
|
+
def reinvocation_policy(self) -> Optional[str]:
|
|
1592
|
+
"""
|
|
1593
|
+
reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
|
|
1594
|
+
|
|
1595
|
+
Never: These mutations will not be called more than once per binding in a single admission evaluation.
|
|
1596
|
+
|
|
1597
|
+
IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
|
|
1598
|
+
"""
|
|
1599
|
+
return pulumi.get(self, "reinvocation_policy")
|
|
1600
|
+
|
|
1601
|
+
@property
|
|
1602
|
+
@pulumi.getter
|
|
1603
|
+
def variables(self) -> Optional[Sequence['outputs.Variable']]:
|
|
1604
|
+
"""
|
|
1605
|
+
variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
|
|
1606
|
+
|
|
1607
|
+
The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
|
|
1608
|
+
"""
|
|
1609
|
+
return pulumi.get(self, "variables")
|
|
1610
|
+
|
|
1611
|
+
|
|
1612
|
+
@pulumi.output_type
|
|
1613
|
+
class MutatingAdmissionPolicySpecPatch(dict):
|
|
1614
|
+
"""
|
|
1615
|
+
MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
|
|
1616
|
+
"""
|
|
1617
|
+
@staticmethod
|
|
1618
|
+
def __key_warning(key: str):
|
|
1619
|
+
suggest = None
|
|
1620
|
+
if key == "failurePolicy":
|
|
1621
|
+
suggest = "failure_policy"
|
|
1622
|
+
elif key == "matchConditions":
|
|
1623
|
+
suggest = "match_conditions"
|
|
1624
|
+
elif key == "matchConstraints":
|
|
1625
|
+
suggest = "match_constraints"
|
|
1626
|
+
elif key == "paramKind":
|
|
1627
|
+
suggest = "param_kind"
|
|
1628
|
+
elif key == "reinvocationPolicy":
|
|
1629
|
+
suggest = "reinvocation_policy"
|
|
1630
|
+
|
|
1631
|
+
if suggest:
|
|
1632
|
+
pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicySpecPatch. Access the value via the '{suggest}' property getter instead.")
|
|
1633
|
+
|
|
1634
|
+
def __getitem__(self, key: str) -> Any:
|
|
1635
|
+
MutatingAdmissionPolicySpecPatch.__key_warning(key)
|
|
1636
|
+
return super().__getitem__(key)
|
|
1637
|
+
|
|
1638
|
+
def get(self, key: str, default = None) -> Any:
|
|
1639
|
+
MutatingAdmissionPolicySpecPatch.__key_warning(key)
|
|
1640
|
+
return super().get(key, default)
|
|
1641
|
+
|
|
1642
|
+
def __init__(__self__, *,
|
|
1643
|
+
failure_policy: Optional[str] = None,
|
|
1644
|
+
match_conditions: Optional[Sequence['outputs.MatchConditionPatch']] = None,
|
|
1645
|
+
match_constraints: Optional['outputs.MatchResourcesPatch'] = None,
|
|
1646
|
+
mutations: Optional[Sequence['outputs.MutationPatch']] = None,
|
|
1647
|
+
param_kind: Optional['outputs.ParamKindPatch'] = None,
|
|
1648
|
+
reinvocation_policy: Optional[str] = None,
|
|
1649
|
+
variables: Optional[Sequence['outputs.VariablePatch']] = None):
|
|
1650
|
+
"""
|
|
1651
|
+
MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
|
|
1652
|
+
:param str failure_policy: failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
|
|
1653
|
+
|
|
1654
|
+
A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
|
|
1655
|
+
|
|
1656
|
+
failurePolicy does not define how validations that evaluate to false are handled.
|
|
1657
|
+
|
|
1658
|
+
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
1659
|
+
:param Sequence['MatchConditionPatchArgs'] match_conditions: matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
|
|
1660
|
+
|
|
1661
|
+
If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
|
|
1662
|
+
|
|
1663
|
+
The exact matching logic is (in order):
|
|
1664
|
+
1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
|
|
1665
|
+
2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
|
|
1666
|
+
3. If any matchCondition evaluates to an error (but none are FALSE):
|
|
1667
|
+
- If failurePolicy=Fail, reject the request
|
|
1668
|
+
- If failurePolicy=Ignore, the policy is skipped
|
|
1669
|
+
:param 'MatchResourcesPatchArgs' match_constraints: matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
|
|
1670
|
+
:param Sequence['MutationPatchArgs'] mutations: mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
|
|
1671
|
+
:param 'ParamKindPatchArgs' param_kind: paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
|
|
1672
|
+
:param str reinvocation_policy: reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
|
|
1673
|
+
|
|
1674
|
+
Never: These mutations will not be called more than once per binding in a single admission evaluation.
|
|
1675
|
+
|
|
1676
|
+
IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
|
|
1677
|
+
:param Sequence['VariablePatchArgs'] variables: variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
|
|
1678
|
+
|
|
1679
|
+
The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
|
|
1680
|
+
"""
|
|
1681
|
+
if failure_policy is not None:
|
|
1682
|
+
pulumi.set(__self__, "failure_policy", failure_policy)
|
|
1683
|
+
if match_conditions is not None:
|
|
1684
|
+
pulumi.set(__self__, "match_conditions", match_conditions)
|
|
1685
|
+
if match_constraints is not None:
|
|
1686
|
+
pulumi.set(__self__, "match_constraints", match_constraints)
|
|
1687
|
+
if mutations is not None:
|
|
1688
|
+
pulumi.set(__self__, "mutations", mutations)
|
|
1689
|
+
if param_kind is not None:
|
|
1690
|
+
pulumi.set(__self__, "param_kind", param_kind)
|
|
1691
|
+
if reinvocation_policy is not None:
|
|
1692
|
+
pulumi.set(__self__, "reinvocation_policy", reinvocation_policy)
|
|
1693
|
+
if variables is not None:
|
|
1694
|
+
pulumi.set(__self__, "variables", variables)
|
|
1695
|
+
|
|
1696
|
+
@property
|
|
1697
|
+
@pulumi.getter(name="failurePolicy")
|
|
1698
|
+
def failure_policy(self) -> Optional[str]:
|
|
1699
|
+
"""
|
|
1700
|
+
failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
|
|
1701
|
+
|
|
1702
|
+
A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
|
|
1703
|
+
|
|
1704
|
+
failurePolicy does not define how validations that evaluate to false are handled.
|
|
1705
|
+
|
|
1706
|
+
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
1707
|
+
"""
|
|
1708
|
+
return pulumi.get(self, "failure_policy")
|
|
1709
|
+
|
|
1710
|
+
@property
|
|
1711
|
+
@pulumi.getter(name="matchConditions")
|
|
1712
|
+
def match_conditions(self) -> Optional[Sequence['outputs.MatchConditionPatch']]:
|
|
1713
|
+
"""
|
|
1714
|
+
matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
|
|
1715
|
+
|
|
1716
|
+
If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
|
|
1717
|
+
|
|
1718
|
+
The exact matching logic is (in order):
|
|
1719
|
+
1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
|
|
1720
|
+
2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
|
|
1721
|
+
3. If any matchCondition evaluates to an error (but none are FALSE):
|
|
1722
|
+
- If failurePolicy=Fail, reject the request
|
|
1723
|
+
- If failurePolicy=Ignore, the policy is skipped
|
|
1724
|
+
"""
|
|
1725
|
+
return pulumi.get(self, "match_conditions")
|
|
1726
|
+
|
|
1727
|
+
@property
|
|
1728
|
+
@pulumi.getter(name="matchConstraints")
|
|
1729
|
+
def match_constraints(self) -> Optional['outputs.MatchResourcesPatch']:
|
|
1730
|
+
"""
|
|
1731
|
+
matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
|
|
1732
|
+
"""
|
|
1733
|
+
return pulumi.get(self, "match_constraints")
|
|
501
1734
|
|
|
502
1735
|
@property
|
|
503
|
-
@pulumi.getter
|
|
504
|
-
def
|
|
1736
|
+
@pulumi.getter
|
|
1737
|
+
def mutations(self) -> Optional[Sequence['outputs.MutationPatch']]:
|
|
505
1738
|
"""
|
|
506
|
-
|
|
507
|
-
|
|
508
|
-
|
|
509
|
-
"matchExpressions": [
|
|
510
|
-
{
|
|
511
|
-
"key": "runlevel",
|
|
512
|
-
"operator": "NotIn",
|
|
513
|
-
"values": [
|
|
514
|
-
"0",
|
|
515
|
-
"1"
|
|
516
|
-
]
|
|
517
|
-
}
|
|
518
|
-
]
|
|
519
|
-
}
|
|
520
|
-
|
|
521
|
-
If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
|
|
522
|
-
"matchExpressions": [
|
|
523
|
-
{
|
|
524
|
-
"key": "environment",
|
|
525
|
-
"operator": "In",
|
|
526
|
-
"values": [
|
|
527
|
-
"prod",
|
|
528
|
-
"staging"
|
|
529
|
-
]
|
|
530
|
-
}
|
|
531
|
-
]
|
|
532
|
-
}
|
|
533
|
-
|
|
534
|
-
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
1739
|
+
mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
|
|
1740
|
+
"""
|
|
1741
|
+
return pulumi.get(self, "mutations")
|
|
535
1742
|
|
|
536
|
-
|
|
1743
|
+
@property
|
|
1744
|
+
@pulumi.getter(name="paramKind")
|
|
1745
|
+
def param_kind(self) -> Optional['outputs.ParamKindPatch']:
|
|
537
1746
|
"""
|
|
538
|
-
|
|
1747
|
+
paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
|
|
1748
|
+
"""
|
|
1749
|
+
return pulumi.get(self, "param_kind")
|
|
539
1750
|
|
|
540
1751
|
@property
|
|
541
|
-
@pulumi.getter(name="
|
|
542
|
-
def
|
|
1752
|
+
@pulumi.getter(name="reinvocationPolicy")
|
|
1753
|
+
def reinvocation_policy(self) -> Optional[str]:
|
|
543
1754
|
"""
|
|
544
|
-
|
|
1755
|
+
reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
|
|
1756
|
+
|
|
1757
|
+
Never: These mutations will not be called more than once per binding in a single admission evaluation.
|
|
1758
|
+
|
|
1759
|
+
IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
|
|
545
1760
|
"""
|
|
546
|
-
return pulumi.get(self, "
|
|
1761
|
+
return pulumi.get(self, "reinvocation_policy")
|
|
547
1762
|
|
|
548
1763
|
@property
|
|
549
|
-
@pulumi.getter
|
|
550
|
-
def
|
|
1764
|
+
@pulumi.getter
|
|
1765
|
+
def variables(self) -> Optional[Sequence['outputs.VariablePatch']]:
|
|
551
1766
|
"""
|
|
552
|
-
|
|
1767
|
+
variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
|
|
1768
|
+
|
|
1769
|
+
The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
|
|
553
1770
|
"""
|
|
554
|
-
return pulumi.get(self, "
|
|
1771
|
+
return pulumi.get(self, "variables")
|
|
555
1772
|
|
|
556
1773
|
|
|
557
1774
|
@pulumi.output_type
|
|
558
|
-
class
|
|
1775
|
+
class Mutation(dict):
|
|
559
1776
|
"""
|
|
560
|
-
|
|
1777
|
+
Mutation specifies the CEL expression which is used to apply the Mutation.
|
|
561
1778
|
"""
|
|
562
1779
|
@staticmethod
|
|
563
1780
|
def __key_warning(key: str):
|
|
564
1781
|
suggest = None
|
|
565
|
-
if key == "
|
|
566
|
-
suggest = "
|
|
567
|
-
elif key == "
|
|
568
|
-
suggest = "
|
|
569
|
-
elif key == "
|
|
570
|
-
suggest = "
|
|
571
|
-
elif key == "objectSelector":
|
|
572
|
-
suggest = "object_selector"
|
|
573
|
-
elif key == "resourceRules":
|
|
574
|
-
suggest = "resource_rules"
|
|
1782
|
+
if key == "patchType":
|
|
1783
|
+
suggest = "patch_type"
|
|
1784
|
+
elif key == "applyConfiguration":
|
|
1785
|
+
suggest = "apply_configuration"
|
|
1786
|
+
elif key == "jsonPatch":
|
|
1787
|
+
suggest = "json_patch"
|
|
575
1788
|
|
|
576
1789
|
if suggest:
|
|
577
|
-
pulumi.log.warn(f"Key '{key}' not found in
|
|
1790
|
+
pulumi.log.warn(f"Key '{key}' not found in Mutation. Access the value via the '{suggest}' property getter instead.")
|
|
578
1791
|
|
|
579
1792
|
def __getitem__(self, key: str) -> Any:
|
|
580
|
-
|
|
1793
|
+
Mutation.__key_warning(key)
|
|
581
1794
|
return super().__getitem__(key)
|
|
582
1795
|
|
|
583
1796
|
def get(self, key: str, default = None) -> Any:
|
|
584
|
-
|
|
1797
|
+
Mutation.__key_warning(key)
|
|
585
1798
|
return super().get(key, default)
|
|
586
1799
|
|
|
587
1800
|
def __init__(__self__, *,
|
|
588
|
-
|
|
589
|
-
|
|
590
|
-
|
|
591
|
-
object_selector: Optional['_meta.v1.outputs.LabelSelectorPatch'] = None,
|
|
592
|
-
resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None):
|
|
1801
|
+
patch_type: str,
|
|
1802
|
+
apply_configuration: Optional['outputs.ApplyConfiguration'] = None,
|
|
1803
|
+
json_patch: Optional['outputs.JSONPatch'] = None):
|
|
593
1804
|
"""
|
|
594
|
-
|
|
595
|
-
:param
|
|
596
|
-
:param
|
|
597
|
-
|
|
598
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
|
|
599
|
-
|
|
600
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
|
|
601
|
-
|
|
602
|
-
Defaults to "Equivalent"
|
|
603
|
-
:param '_meta.v1.LabelSelectorPatchArgs' namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
604
|
-
|
|
605
|
-
For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
|
|
606
|
-
"matchExpressions": [
|
|
607
|
-
{
|
|
608
|
-
"key": "runlevel",
|
|
609
|
-
"operator": "NotIn",
|
|
610
|
-
"values": [
|
|
611
|
-
"0",
|
|
612
|
-
"1"
|
|
613
|
-
]
|
|
614
|
-
}
|
|
615
|
-
]
|
|
616
|
-
}
|
|
617
|
-
|
|
618
|
-
If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
|
|
619
|
-
"matchExpressions": [
|
|
620
|
-
{
|
|
621
|
-
"key": "environment",
|
|
622
|
-
"operator": "In",
|
|
623
|
-
"values": [
|
|
624
|
-
"prod",
|
|
625
|
-
"staging"
|
|
626
|
-
]
|
|
627
|
-
}
|
|
628
|
-
]
|
|
629
|
-
}
|
|
630
|
-
|
|
631
|
-
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
632
|
-
|
|
633
|
-
Default to the empty LabelSelector, which matches everything.
|
|
634
|
-
:param '_meta.v1.LabelSelectorPatchArgs' object_selector: ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
635
|
-
:param Sequence['NamedRuleWithOperationsPatchArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1805
|
+
Mutation specifies the CEL expression which is used to apply the Mutation.
|
|
1806
|
+
:param str patch_type: patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
|
|
1807
|
+
:param 'ApplyConfigurationArgs' apply_configuration: applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
|
|
1808
|
+
:param 'JSONPatchArgs' json_patch: jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
|
|
636
1809
|
"""
|
|
637
|
-
|
|
638
|
-
|
|
639
|
-
|
|
640
|
-
|
|
641
|
-
|
|
642
|
-
pulumi.set(__self__, "namespace_selector", namespace_selector)
|
|
643
|
-
if object_selector is not None:
|
|
644
|
-
pulumi.set(__self__, "object_selector", object_selector)
|
|
645
|
-
if resource_rules is not None:
|
|
646
|
-
pulumi.set(__self__, "resource_rules", resource_rules)
|
|
1810
|
+
pulumi.set(__self__, "patch_type", patch_type)
|
|
1811
|
+
if apply_configuration is not None:
|
|
1812
|
+
pulumi.set(__self__, "apply_configuration", apply_configuration)
|
|
1813
|
+
if json_patch is not None:
|
|
1814
|
+
pulumi.set(__self__, "json_patch", json_patch)
|
|
647
1815
|
|
|
648
1816
|
@property
|
|
649
|
-
@pulumi.getter(name="
|
|
650
|
-
def
|
|
1817
|
+
@pulumi.getter(name="patchType")
|
|
1818
|
+
def patch_type(self) -> str:
|
|
651
1819
|
"""
|
|
652
|
-
|
|
1820
|
+
patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
|
|
653
1821
|
"""
|
|
654
|
-
return pulumi.get(self, "
|
|
1822
|
+
return pulumi.get(self, "patch_type")
|
|
655
1823
|
|
|
656
1824
|
@property
|
|
657
|
-
@pulumi.getter(name="
|
|
658
|
-
def
|
|
1825
|
+
@pulumi.getter(name="applyConfiguration")
|
|
1826
|
+
def apply_configuration(self) -> Optional['outputs.ApplyConfiguration']:
|
|
659
1827
|
"""
|
|
660
|
-
|
|
661
|
-
|
|
662
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
|
|
663
|
-
|
|
664
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
|
|
665
|
-
|
|
666
|
-
Defaults to "Equivalent"
|
|
1828
|
+
applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
|
|
667
1829
|
"""
|
|
668
|
-
return pulumi.get(self, "
|
|
1830
|
+
return pulumi.get(self, "apply_configuration")
|
|
669
1831
|
|
|
670
1832
|
@property
|
|
671
|
-
@pulumi.getter(name="
|
|
672
|
-
def
|
|
1833
|
+
@pulumi.getter(name="jsonPatch")
|
|
1834
|
+
def json_patch(self) -> Optional['outputs.JSONPatch']:
|
|
673
1835
|
"""
|
|
674
|
-
|
|
1836
|
+
jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
|
|
1837
|
+
"""
|
|
1838
|
+
return pulumi.get(self, "json_patch")
|
|
675
1839
|
|
|
676
|
-
For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
|
|
677
|
-
"matchExpressions": [
|
|
678
|
-
{
|
|
679
|
-
"key": "runlevel",
|
|
680
|
-
"operator": "NotIn",
|
|
681
|
-
"values": [
|
|
682
|
-
"0",
|
|
683
|
-
"1"
|
|
684
|
-
]
|
|
685
|
-
}
|
|
686
|
-
]
|
|
687
|
-
}
|
|
688
1840
|
|
|
689
|
-
|
|
690
|
-
|
|
691
|
-
|
|
692
|
-
|
|
693
|
-
|
|
694
|
-
|
|
695
|
-
|
|
696
|
-
|
|
697
|
-
|
|
698
|
-
|
|
699
|
-
|
|
700
|
-
|
|
1841
|
+
@pulumi.output_type
|
|
1842
|
+
class MutationPatch(dict):
|
|
1843
|
+
"""
|
|
1844
|
+
Mutation specifies the CEL expression which is used to apply the Mutation.
|
|
1845
|
+
"""
|
|
1846
|
+
@staticmethod
|
|
1847
|
+
def __key_warning(key: str):
|
|
1848
|
+
suggest = None
|
|
1849
|
+
if key == "applyConfiguration":
|
|
1850
|
+
suggest = "apply_configuration"
|
|
1851
|
+
elif key == "jsonPatch":
|
|
1852
|
+
suggest = "json_patch"
|
|
1853
|
+
elif key == "patchType":
|
|
1854
|
+
suggest = "patch_type"
|
|
701
1855
|
|
|
702
|
-
|
|
1856
|
+
if suggest:
|
|
1857
|
+
pulumi.log.warn(f"Key '{key}' not found in MutationPatch. Access the value via the '{suggest}' property getter instead.")
|
|
703
1858
|
|
|
704
|
-
|
|
1859
|
+
def __getitem__(self, key: str) -> Any:
|
|
1860
|
+
MutationPatch.__key_warning(key)
|
|
1861
|
+
return super().__getitem__(key)
|
|
1862
|
+
|
|
1863
|
+
def get(self, key: str, default = None) -> Any:
|
|
1864
|
+
MutationPatch.__key_warning(key)
|
|
1865
|
+
return super().get(key, default)
|
|
1866
|
+
|
|
1867
|
+
def __init__(__self__, *,
|
|
1868
|
+
apply_configuration: Optional['outputs.ApplyConfigurationPatch'] = None,
|
|
1869
|
+
json_patch: Optional['outputs.JSONPatchPatch'] = None,
|
|
1870
|
+
patch_type: Optional[str] = None):
|
|
705
1871
|
"""
|
|
706
|
-
|
|
1872
|
+
Mutation specifies the CEL expression which is used to apply the Mutation.
|
|
1873
|
+
:param 'ApplyConfigurationPatchArgs' apply_configuration: applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
|
|
1874
|
+
:param 'JSONPatchPatchArgs' json_patch: jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
|
|
1875
|
+
:param str patch_type: patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
|
|
1876
|
+
"""
|
|
1877
|
+
if apply_configuration is not None:
|
|
1878
|
+
pulumi.set(__self__, "apply_configuration", apply_configuration)
|
|
1879
|
+
if json_patch is not None:
|
|
1880
|
+
pulumi.set(__self__, "json_patch", json_patch)
|
|
1881
|
+
if patch_type is not None:
|
|
1882
|
+
pulumi.set(__self__, "patch_type", patch_type)
|
|
707
1883
|
|
|
708
1884
|
@property
|
|
709
|
-
@pulumi.getter(name="
|
|
710
|
-
def
|
|
1885
|
+
@pulumi.getter(name="applyConfiguration")
|
|
1886
|
+
def apply_configuration(self) -> Optional['outputs.ApplyConfigurationPatch']:
|
|
711
1887
|
"""
|
|
712
|
-
|
|
1888
|
+
applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
|
|
713
1889
|
"""
|
|
714
|
-
return pulumi.get(self, "
|
|
1890
|
+
return pulumi.get(self, "apply_configuration")
|
|
715
1891
|
|
|
716
1892
|
@property
|
|
717
|
-
@pulumi.getter(name="
|
|
718
|
-
def
|
|
1893
|
+
@pulumi.getter(name="jsonPatch")
|
|
1894
|
+
def json_patch(self) -> Optional['outputs.JSONPatchPatch']:
|
|
719
1895
|
"""
|
|
720
|
-
|
|
1896
|
+
jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
|
|
721
1897
|
"""
|
|
722
|
-
return pulumi.get(self, "
|
|
1898
|
+
return pulumi.get(self, "json_patch")
|
|
1899
|
+
|
|
1900
|
+
@property
|
|
1901
|
+
@pulumi.getter(name="patchType")
|
|
1902
|
+
def patch_type(self) -> Optional[str]:
|
|
1903
|
+
"""
|
|
1904
|
+
patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
|
|
1905
|
+
"""
|
|
1906
|
+
return pulumi.get(self, "patch_type")
|
|
723
1907
|
|
|
724
1908
|
|
|
725
1909
|
@pulumi.output_type
|
|
@@ -1438,10 +2622,6 @@ class ValidatingAdmissionPolicy(dict):
|
|
|
1438
2622
|
class ValidatingAdmissionPolicyBinding(dict):
|
|
1439
2623
|
"""
|
|
1440
2624
|
ValidatingAdmissionPolicyBinding binds the ValidatingAdmissionPolicy with paramerized resources. ValidatingAdmissionPolicyBinding and parameter CRDs together define how cluster administrators configure policies for clusters.
|
|
1441
|
-
|
|
1442
|
-
For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding.
|
|
1443
|
-
|
|
1444
|
-
The CEL expressions of a policy must have a computed CEL cost below the maximum CEL budget. Each evaluation of the policy is given an independent CEL cost budget. Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
|
|
1445
2625
|
"""
|
|
1446
2626
|
@staticmethod
|
|
1447
2627
|
def __key_warning(key: str):
|
|
@@ -1467,10 +2647,6 @@ class ValidatingAdmissionPolicyBinding(dict):
|
|
|
1467
2647
|
spec: Optional['outputs.ValidatingAdmissionPolicyBindingSpec'] = None):
|
|
1468
2648
|
"""
|
|
1469
2649
|
ValidatingAdmissionPolicyBinding binds the ValidatingAdmissionPolicy with paramerized resources. ValidatingAdmissionPolicyBinding and parameter CRDs together define how cluster administrators configure policies for clusters.
|
|
1470
|
-
|
|
1471
|
-
For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding.
|
|
1472
|
-
|
|
1473
|
-
The CEL expressions of a policy must have a computed CEL cost below the maximum CEL budget. Each evaluation of the policy is given an independent CEL cost budget. Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
|
|
1474
2650
|
:param str api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
1475
2651
|
:param str kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
1476
2652
|
:param '_meta.v1.ObjectMetaArgs' metadata: Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
|
|
@@ -1554,7 +2730,7 @@ class ValidatingAdmissionPolicyBindingSpec(dict):
|
|
|
1554
2730
|
"""
|
|
1555
2731
|
ValidatingAdmissionPolicyBindingSpec is the specification of the ValidatingAdmissionPolicyBinding.
|
|
1556
2732
|
:param 'MatchResourcesArgs' match_resources: MatchResources declares what resources match this binding and will be validated by it. Note that this is intersected with the policy's matchConstraints, so only requests that are matched by the policy can be selected by this. If this is unset, all resources matched by the policy are validated by this binding When resourceRules is unset, it does not constrain resource matching. If a resource is matched by the other fields of this object, it will be validated. Note that this is differs from ValidatingAdmissionPolicy matchConstraints, where resourceRules are required.
|
|
1557
|
-
:param 'ParamRefArgs' param_ref:
|
|
2733
|
+
:param 'ParamRefArgs' param_ref: ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
|
|
1558
2734
|
:param str policy_name: PolicyName references a ValidatingAdmissionPolicy name which the ValidatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
|
|
1559
2735
|
:param Sequence[str] validation_actions: validationActions declares how Validations of the referenced ValidatingAdmissionPolicy are enforced. If a validation evaluates to false it is always enforced according to these actions.
|
|
1560
2736
|
|
|
@@ -1597,7 +2773,7 @@ class ValidatingAdmissionPolicyBindingSpec(dict):
|
|
|
1597
2773
|
@pulumi.getter(name="paramRef")
|
|
1598
2774
|
def param_ref(self) -> Optional['outputs.ParamRef']:
|
|
1599
2775
|
"""
|
|
1600
|
-
|
|
2776
|
+
ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
|
|
1601
2777
|
"""
|
|
1602
2778
|
return pulumi.get(self, "param_ref")
|
|
1603
2779
|
|
|
@@ -1672,7 +2848,7 @@ class ValidatingAdmissionPolicyBindingSpecPatch(dict):
|
|
|
1672
2848
|
"""
|
|
1673
2849
|
ValidatingAdmissionPolicyBindingSpec is the specification of the ValidatingAdmissionPolicyBinding.
|
|
1674
2850
|
:param 'MatchResourcesPatchArgs' match_resources: MatchResources declares what resources match this binding and will be validated by it. Note that this is intersected with the policy's matchConstraints, so only requests that are matched by the policy can be selected by this. If this is unset, all resources matched by the policy are validated by this binding When resourceRules is unset, it does not constrain resource matching. If a resource is matched by the other fields of this object, it will be validated. Note that this is differs from ValidatingAdmissionPolicy matchConstraints, where resourceRules are required.
|
|
1675
|
-
:param 'ParamRefPatchArgs' param_ref:
|
|
2851
|
+
:param 'ParamRefPatchArgs' param_ref: ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
|
|
1676
2852
|
:param str policy_name: PolicyName references a ValidatingAdmissionPolicy name which the ValidatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
|
|
1677
2853
|
:param Sequence[str] validation_actions: validationActions declares how Validations of the referenced ValidatingAdmissionPolicy are enforced. If a validation evaluates to false it is always enforced according to these actions.
|
|
1678
2854
|
|
|
@@ -1715,7 +2891,7 @@ class ValidatingAdmissionPolicyBindingSpecPatch(dict):
|
|
|
1715
2891
|
@pulumi.getter(name="paramRef")
|
|
1716
2892
|
def param_ref(self) -> Optional['outputs.ParamRefPatch']:
|
|
1717
2893
|
"""
|
|
1718
|
-
|
|
2894
|
+
ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
|
|
1719
2895
|
"""
|
|
1720
2896
|
return pulumi.get(self, "param_ref")
|
|
1721
2897
|
|
|
@@ -1794,17 +2970,9 @@ class ValidatingAdmissionPolicySpec(dict):
|
|
|
1794
2970
|
variables: Optional[Sequence['outputs.Variable']] = None):
|
|
1795
2971
|
"""
|
|
1796
2972
|
ValidatingAdmissionPolicySpec is the specification of the desired behavior of the AdmissionPolicy.
|
|
1797
|
-
:param Sequence['ValidationArgs'] validations: Validations contain CEL expressions which is used to apply the validation.
|
|
2973
|
+
:param Sequence['ValidationArgs'] validations: Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
|
|
1798
2974
|
:param Sequence['AuditAnnotationArgs'] audit_annotations: auditAnnotations contains CEL expressions which are used to produce audit annotations for the audit event of the API request. validations and auditAnnotations may not both be empty; a least one of validations or auditAnnotations is required.
|
|
1799
|
-
:param str failure_policy:
|
|
1800
|
-
|
|
1801
|
-
A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
|
|
1802
|
-
|
|
1803
|
-
failurePolicy does not define how validations that evaluate to false are handled.
|
|
1804
|
-
|
|
1805
|
-
When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
|
|
1806
|
-
|
|
1807
|
-
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
2975
|
+
:param str failure_policy: FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
|
|
1808
2976
|
:param Sequence['MatchConditionArgs'] match_conditions: MatchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the rules, namespaceSelector, and objectSelector. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
|
|
1809
2977
|
|
|
1810
2978
|
If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
|
|
@@ -1839,7 +3007,7 @@ class ValidatingAdmissionPolicySpec(dict):
|
|
|
1839
3007
|
@pulumi.getter
|
|
1840
3008
|
def validations(self) -> Sequence['outputs.Validation']:
|
|
1841
3009
|
"""
|
|
1842
|
-
Validations contain CEL expressions which is used to apply the validation.
|
|
3010
|
+
Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
|
|
1843
3011
|
"""
|
|
1844
3012
|
return pulumi.get(self, "validations")
|
|
1845
3013
|
|
|
@@ -1855,15 +3023,7 @@ class ValidatingAdmissionPolicySpec(dict):
|
|
|
1855
3023
|
@pulumi.getter(name="failurePolicy")
|
|
1856
3024
|
def failure_policy(self) -> Optional[str]:
|
|
1857
3025
|
"""
|
|
1858
|
-
|
|
1859
|
-
|
|
1860
|
-
A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
|
|
1861
|
-
|
|
1862
|
-
failurePolicy does not define how validations that evaluate to false are handled.
|
|
1863
|
-
|
|
1864
|
-
When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
|
|
1865
|
-
|
|
1866
|
-
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
3026
|
+
FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
|
|
1867
3027
|
"""
|
|
1868
3028
|
return pulumi.get(self, "failure_policy")
|
|
1869
3029
|
|
|
@@ -1952,15 +3112,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
|
|
|
1952
3112
|
"""
|
|
1953
3113
|
ValidatingAdmissionPolicySpec is the specification of the desired behavior of the AdmissionPolicy.
|
|
1954
3114
|
:param Sequence['AuditAnnotationPatchArgs'] audit_annotations: auditAnnotations contains CEL expressions which are used to produce audit annotations for the audit event of the API request. validations and auditAnnotations may not both be empty; a least one of validations or auditAnnotations is required.
|
|
1955
|
-
:param str failure_policy:
|
|
1956
|
-
|
|
1957
|
-
A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
|
|
1958
|
-
|
|
1959
|
-
failurePolicy does not define how validations that evaluate to false are handled.
|
|
1960
|
-
|
|
1961
|
-
When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
|
|
1962
|
-
|
|
1963
|
-
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
3115
|
+
:param str failure_policy: FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
|
|
1964
3116
|
:param Sequence['MatchConditionPatchArgs'] match_conditions: MatchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the rules, namespaceSelector, and objectSelector. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
|
|
1965
3117
|
|
|
1966
3118
|
If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
|
|
@@ -1973,7 +3125,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
|
|
|
1973
3125
|
- If failurePolicy=Ignore, the policy is skipped
|
|
1974
3126
|
:param 'MatchResourcesPatchArgs' match_constraints: MatchConstraints specifies what resources this policy is designed to validate. The AdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API ValidatingAdmissionPolicy cannot match ValidatingAdmissionPolicy and ValidatingAdmissionPolicyBinding. Required.
|
|
1975
3127
|
:param 'ParamKindPatchArgs' param_kind: ParamKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If ParamKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in ValidatingAdmissionPolicyBinding, the params variable will be null.
|
|
1976
|
-
:param Sequence['ValidationPatchArgs'] validations: Validations contain CEL expressions which is used to apply the validation.
|
|
3128
|
+
:param Sequence['ValidationPatchArgs'] validations: Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
|
|
1977
3129
|
:param Sequence['VariablePatchArgs'] variables: Variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except MatchConditions because MatchConditions are evaluated before the rest of the policy.
|
|
1978
3130
|
|
|
1979
3131
|
The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, Variables must be sorted by the order of first appearance and acyclic.
|
|
@@ -2005,15 +3157,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
|
|
|
2005
3157
|
@pulumi.getter(name="failurePolicy")
|
|
2006
3158
|
def failure_policy(self) -> Optional[str]:
|
|
2007
3159
|
"""
|
|
2008
|
-
|
|
2009
|
-
|
|
2010
|
-
A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
|
|
2011
|
-
|
|
2012
|
-
failurePolicy does not define how validations that evaluate to false are handled.
|
|
2013
|
-
|
|
2014
|
-
When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
|
|
2015
|
-
|
|
2016
|
-
Allowed values are Ignore or Fail. Defaults to Fail.
|
|
3160
|
+
FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
|
|
2017
3161
|
"""
|
|
2018
3162
|
return pulumi.get(self, "failure_policy")
|
|
2019
3163
|
|
|
@@ -2054,7 +3198,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
|
|
|
2054
3198
|
@pulumi.getter
|
|
2055
3199
|
def validations(self) -> Optional[Sequence['outputs.ValidationPatch']]:
|
|
2056
3200
|
"""
|
|
2057
|
-
Validations contain CEL expressions which is used to apply the validation.
|
|
3201
|
+
Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
|
|
2058
3202
|
"""
|
|
2059
3203
|
return pulumi.get(self, "validations")
|
|
2060
3204
|
|
|
@@ -2230,14 +3374,9 @@ class Validation(dict):
|
|
|
2230
3374
|
reason: Optional[str] = None):
|
|
2231
3375
|
"""
|
|
2232
3376
|
Validation specifies the CEL expression which is used to apply the validation.
|
|
2233
|
-
:param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the
|
|
3377
|
+
:param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
|
|
2234
3378
|
|
|
2235
|
-
|
|
2236
|
-
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
2237
|
-
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
2238
|
-
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
2239
|
-
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
2240
|
-
request resource.
|
|
3379
|
+
'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
|
|
2241
3380
|
|
|
2242
3381
|
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
2243
3382
|
|
|
@@ -2272,14 +3411,9 @@ class Validation(dict):
|
|
|
2272
3411
|
@pulumi.getter
|
|
2273
3412
|
def expression(self) -> str:
|
|
2274
3413
|
"""
|
|
2275
|
-
Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the
|
|
3414
|
+
Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
|
|
2276
3415
|
|
|
2277
|
-
|
|
2278
|
-
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
2279
|
-
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
2280
|
-
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
2281
|
-
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
2282
|
-
request resource.
|
|
3416
|
+
'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
|
|
2283
3417
|
|
|
2284
3418
|
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
2285
3419
|
|
|
@@ -2355,14 +3489,9 @@ class ValidationPatch(dict):
|
|
|
2355
3489
|
reason: Optional[str] = None):
|
|
2356
3490
|
"""
|
|
2357
3491
|
Validation specifies the CEL expression which is used to apply the validation.
|
|
2358
|
-
:param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the
|
|
3492
|
+
:param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
|
|
2359
3493
|
|
|
2360
|
-
|
|
2361
|
-
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
2362
|
-
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
2363
|
-
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
2364
|
-
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
2365
|
-
request resource.
|
|
3494
|
+
'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
|
|
2366
3495
|
|
|
2367
3496
|
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
2368
3497
|
|
|
@@ -2398,14 +3527,9 @@ class ValidationPatch(dict):
|
|
|
2398
3527
|
@pulumi.getter
|
|
2399
3528
|
def expression(self) -> Optional[str]:
|
|
2400
3529
|
"""
|
|
2401
|
-
Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the
|
|
3530
|
+
Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
|
|
2402
3531
|
|
|
2403
|
-
|
|
2404
|
-
For example, a variable named 'foo' can be accessed as 'variables.foo'.
|
|
2405
|
-
- 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
|
|
2406
|
-
See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
|
|
2407
|
-
- 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
|
|
2408
|
-
request resource.
|
|
3532
|
+
'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
|
|
2409
3533
|
|
|
2410
3534
|
The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
|
|
2411
3535
|
|