pulumi-kubernetes 4.10.0a1710355461__py3-none-any.whl → 4.20.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-kubernetes might be problematic. Click here for more details.

Files changed (598) hide show
  1. pulumi_kubernetes/__init__.py +123 -3
  2. pulumi_kubernetes/_inputs.py +63 -6
  3. pulumi_kubernetes/_utilities.py +41 -5
  4. pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfiguration.py +11 -6
  5. pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfigurationList.py +11 -6
  6. pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfigurationPatch.py +11 -6
  7. pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicy.py +226 -0
  8. pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBinding.py +224 -0
  9. pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBindingList.py +215 -0
  10. pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBindingPatch.py +236 -0
  11. pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyList.py +215 -0
  12. pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyPatch.py +238 -0
  13. pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfiguration.py +11 -6
  14. pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfigurationList.py +11 -6
  15. pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfigurationPatch.py +11 -6
  16. pulumi_kubernetes/admissionregistration/v1/__init__.py +6 -0
  17. pulumi_kubernetes/admissionregistration/v1/_inputs.py +4571 -939
  18. pulumi_kubernetes/admissionregistration/v1/outputs.py +2880 -470
  19. pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicy.py +214 -0
  20. pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBinding.py +222 -0
  21. pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBindingList.py +215 -0
  22. pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBindingPatch.py +234 -0
  23. pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyList.py +215 -0
  24. pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyPatch.py +226 -0
  25. pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicy.py +12 -7
  26. pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBinding.py +12 -15
  27. pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBindingList.py +29 -23
  28. pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBindingPatch.py +12 -15
  29. pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyList.py +29 -23
  30. pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyPatch.py +12 -7
  31. pulumi_kubernetes/admissionregistration/v1alpha1/__init__.py +6 -0
  32. pulumi_kubernetes/admissionregistration/v1alpha1/_inputs.py +2514 -141
  33. pulumi_kubernetes/admissionregistration/v1alpha1/outputs.py +1370 -246
  34. pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfiguration.py +11 -6
  35. pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfigurationList.py +11 -6
  36. pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfigurationPatch.py +11 -6
  37. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicy.py +12 -7
  38. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBinding.py +12 -7
  39. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBindingList.py +29 -23
  40. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBindingPatch.py +12 -7
  41. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyList.py +29 -23
  42. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyPatch.py +12 -7
  43. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfiguration.py +11 -6
  44. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfigurationList.py +11 -6
  45. pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfigurationPatch.py +11 -6
  46. pulumi_kubernetes/admissionregistration/v1beta1/_inputs.py +1522 -42
  47. pulumi_kubernetes/admissionregistration/v1beta1/outputs.py +9 -4
  48. pulumi_kubernetes/apiextensions/v1/CustomResourceDefinition.py +11 -6
  49. pulumi_kubernetes/apiextensions/v1/CustomResourceDefinitionList.py +11 -6
  50. pulumi_kubernetes/apiextensions/v1/CustomResourceDefinitionPatch.py +11 -6
  51. pulumi_kubernetes/apiextensions/v1/_inputs.py +1175 -12
  52. pulumi_kubernetes/apiextensions/v1/outputs.py +122 -8
  53. pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinition.py +10 -5
  54. pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinitionList.py +10 -5
  55. pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinitionPatch.py +10 -5
  56. pulumi_kubernetes/apiextensions/v1beta1/_inputs.py +903 -6
  57. pulumi_kubernetes/apiextensions/v1beta1/outputs.py +5 -0
  58. pulumi_kubernetes/apiregistration/v1/APIService.py +11 -6
  59. pulumi_kubernetes/apiregistration/v1/APIServiceList.py +11 -6
  60. pulumi_kubernetes/apiregistration/v1/APIServicePatch.py +11 -6
  61. pulumi_kubernetes/apiregistration/v1/_inputs.py +194 -0
  62. pulumi_kubernetes/apiregistration/v1/outputs.py +5 -0
  63. pulumi_kubernetes/apiregistration/v1beta1/APIService.py +10 -5
  64. pulumi_kubernetes/apiregistration/v1beta1/APIServiceList.py +9 -4
  65. pulumi_kubernetes/apiregistration/v1beta1/APIServicePatch.py +10 -5
  66. pulumi_kubernetes/apiregistration/v1beta1/_inputs.py +191 -0
  67. pulumi_kubernetes/apiregistration/v1beta1/outputs.py +5 -0
  68. pulumi_kubernetes/apps/v1/ControllerRevision.py +8 -3
  69. pulumi_kubernetes/apps/v1/ControllerRevisionList.py +11 -6
  70. pulumi_kubernetes/apps/v1/ControllerRevisionPatch.py +8 -3
  71. pulumi_kubernetes/apps/v1/DaemonSet.py +11 -6
  72. pulumi_kubernetes/apps/v1/DaemonSetList.py +11 -6
  73. pulumi_kubernetes/apps/v1/DaemonSetPatch.py +11 -6
  74. pulumi_kubernetes/apps/v1/Deployment.py +11 -6
  75. pulumi_kubernetes/apps/v1/DeploymentList.py +11 -6
  76. pulumi_kubernetes/apps/v1/DeploymentPatch.py +11 -6
  77. pulumi_kubernetes/apps/v1/ReplicaSet.py +11 -6
  78. pulumi_kubernetes/apps/v1/ReplicaSetList.py +11 -6
  79. pulumi_kubernetes/apps/v1/ReplicaSetPatch.py +11 -6
  80. pulumi_kubernetes/apps/v1/StatefulSet.py +11 -6
  81. pulumi_kubernetes/apps/v1/StatefulSetList.py +11 -6
  82. pulumi_kubernetes/apps/v1/StatefulSetPatch.py +11 -6
  83. pulumi_kubernetes/apps/v1/_inputs.py +1057 -8
  84. pulumi_kubernetes/apps/v1/outputs.py +13 -8
  85. pulumi_kubernetes/apps/v1beta1/ControllerRevision.py +8 -3
  86. pulumi_kubernetes/apps/v1beta1/ControllerRevisionList.py +11 -6
  87. pulumi_kubernetes/apps/v1beta1/ControllerRevisionPatch.py +8 -3
  88. pulumi_kubernetes/apps/v1beta1/Deployment.py +11 -6
  89. pulumi_kubernetes/apps/v1beta1/DeploymentList.py +11 -6
  90. pulumi_kubernetes/apps/v1beta1/DeploymentPatch.py +11 -6
  91. pulumi_kubernetes/apps/v1beta1/StatefulSet.py +10 -5
  92. pulumi_kubernetes/apps/v1beta1/StatefulSetList.py +9 -4
  93. pulumi_kubernetes/apps/v1beta1/StatefulSetPatch.py +10 -5
  94. pulumi_kubernetes/apps/v1beta1/_inputs.py +603 -0
  95. pulumi_kubernetes/apps/v1beta1/outputs.py +5 -0
  96. pulumi_kubernetes/apps/v1beta2/ControllerRevision.py +8 -3
  97. pulumi_kubernetes/apps/v1beta2/ControllerRevisionList.py +11 -6
  98. pulumi_kubernetes/apps/v1beta2/ControllerRevisionPatch.py +8 -3
  99. pulumi_kubernetes/apps/v1beta2/DaemonSet.py +11 -6
  100. pulumi_kubernetes/apps/v1beta2/DaemonSetList.py +11 -6
  101. pulumi_kubernetes/apps/v1beta2/DaemonSetPatch.py +11 -6
  102. pulumi_kubernetes/apps/v1beta2/Deployment.py +11 -6
  103. pulumi_kubernetes/apps/v1beta2/DeploymentList.py +11 -6
  104. pulumi_kubernetes/apps/v1beta2/DeploymentPatch.py +11 -6
  105. pulumi_kubernetes/apps/v1beta2/ReplicaSet.py +11 -6
  106. pulumi_kubernetes/apps/v1beta2/ReplicaSetList.py +11 -6
  107. pulumi_kubernetes/apps/v1beta2/ReplicaSetPatch.py +11 -6
  108. pulumi_kubernetes/apps/v1beta2/StatefulSet.py +10 -5
  109. pulumi_kubernetes/apps/v1beta2/StatefulSetList.py +9 -4
  110. pulumi_kubernetes/apps/v1beta2/StatefulSetPatch.py +10 -5
  111. pulumi_kubernetes/apps/v1beta2/_inputs.py +935 -0
  112. pulumi_kubernetes/apps/v1beta2/outputs.py +5 -0
  113. pulumi_kubernetes/auditregistration/v1alpha1/AuditSink.py +10 -5
  114. pulumi_kubernetes/auditregistration/v1alpha1/AuditSinkList.py +10 -5
  115. pulumi_kubernetes/auditregistration/v1alpha1/AuditSinkPatch.py +10 -5
  116. pulumi_kubernetes/auditregistration/v1alpha1/_inputs.py +281 -0
  117. pulumi_kubernetes/auditregistration/v1alpha1/outputs.py +5 -0
  118. pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscaler.py +11 -6
  119. pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscalerList.py +11 -6
  120. pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscalerPatch.py +11 -6
  121. pulumi_kubernetes/autoscaling/v1/_inputs.py +157 -0
  122. pulumi_kubernetes/autoscaling/v1/outputs.py +5 -0
  123. pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscaler.py +11 -6
  124. pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscalerList.py +11 -6
  125. pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscalerPatch.py +11 -6
  126. pulumi_kubernetes/autoscaling/v2/_inputs.py +815 -10
  127. pulumi_kubernetes/autoscaling/v2/outputs.py +17 -12
  128. pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscaler.py +11 -6
  129. pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscalerList.py +11 -6
  130. pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscalerPatch.py +11 -6
  131. pulumi_kubernetes/autoscaling/v2beta1/_inputs.py +652 -0
  132. pulumi_kubernetes/autoscaling/v2beta1/outputs.py +5 -0
  133. pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscaler.py +11 -6
  134. pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscalerList.py +11 -6
  135. pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscalerPatch.py +11 -6
  136. pulumi_kubernetes/autoscaling/v2beta2/_inputs.py +796 -0
  137. pulumi_kubernetes/autoscaling/v2beta2/outputs.py +5 -0
  138. pulumi_kubernetes/batch/v1/CronJob.py +11 -6
  139. pulumi_kubernetes/batch/v1/CronJobList.py +11 -6
  140. pulumi_kubernetes/batch/v1/CronJobPatch.py +11 -6
  141. pulumi_kubernetes/batch/v1/Job.py +11 -6
  142. pulumi_kubernetes/batch/v1/JobList.py +11 -6
  143. pulumi_kubernetes/batch/v1/JobPatch.py +11 -6
  144. pulumi_kubernetes/batch/v1/_inputs.py +1070 -85
  145. pulumi_kubernetes/batch/v1/outputs.py +298 -40
  146. pulumi_kubernetes/batch/v1beta1/CronJob.py +11 -6
  147. pulumi_kubernetes/batch/v1beta1/CronJobList.py +11 -6
  148. pulumi_kubernetes/batch/v1beta1/CronJobPatch.py +11 -6
  149. pulumi_kubernetes/batch/v1beta1/_inputs.py +161 -0
  150. pulumi_kubernetes/batch/v1beta1/outputs.py +5 -0
  151. pulumi_kubernetes/batch/v2alpha1/CronJob.py +11 -6
  152. pulumi_kubernetes/batch/v2alpha1/CronJobList.py +11 -6
  153. pulumi_kubernetes/batch/v2alpha1/CronJobPatch.py +11 -6
  154. pulumi_kubernetes/batch/v2alpha1/_inputs.py +161 -0
  155. pulumi_kubernetes/batch/v2alpha1/outputs.py +5 -0
  156. pulumi_kubernetes/certificates/v1/CertificateSigningRequest.py +10 -5
  157. pulumi_kubernetes/certificates/v1/CertificateSigningRequestList.py +10 -5
  158. pulumi_kubernetes/certificates/v1/CertificateSigningRequestPatch.py +10 -5
  159. pulumi_kubernetes/certificates/v1/_inputs.py +290 -0
  160. pulumi_kubernetes/certificates/v1/outputs.py +5 -0
  161. pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundle.py +11 -6
  162. pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundleList.py +11 -6
  163. pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundlePatch.py +11 -6
  164. pulumi_kubernetes/certificates/v1alpha1/_inputs.py +94 -0
  165. pulumi_kubernetes/certificates/v1alpha1/outputs.py +5 -0
  166. pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequest.py +10 -5
  167. pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequestList.py +9 -4
  168. pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequestPatch.py +10 -5
  169. pulumi_kubernetes/certificates/v1beta1/_inputs.py +165 -0
  170. pulumi_kubernetes/certificates/v1beta1/outputs.py +5 -0
  171. pulumi_kubernetes/coordination/__init__.py +6 -0
  172. pulumi_kubernetes/coordination/v1/Lease.py +11 -6
  173. pulumi_kubernetes/coordination/v1/LeaseList.py +11 -6
  174. pulumi_kubernetes/coordination/v1/LeasePatch.py +11 -6
  175. pulumi_kubernetes/coordination/v1/_inputs.py +180 -10
  176. pulumi_kubernetes/coordination/v1/outputs.py +67 -10
  177. pulumi_kubernetes/coordination/v1alpha1/LeaseCandidate.py +216 -0
  178. pulumi_kubernetes/coordination/v1alpha1/LeaseCandidateList.py +215 -0
  179. pulumi_kubernetes/coordination/v1alpha1/LeaseCandidatePatch.py +228 -0
  180. pulumi_kubernetes/coordination/v1alpha1/__init__.py +12 -0
  181. pulumi_kubernetes/coordination/v1alpha1/_inputs.py +418 -0
  182. pulumi_kubernetes/coordination/v1alpha1/outputs.py +334 -0
  183. pulumi_kubernetes/coordination/v1alpha2/LeaseCandidate.py +216 -0
  184. pulumi_kubernetes/coordination/v1alpha2/LeaseCandidateList.py +215 -0
  185. pulumi_kubernetes/coordination/v1alpha2/LeaseCandidatePatch.py +228 -0
  186. pulumi_kubernetes/coordination/v1alpha2/__init__.py +12 -0
  187. pulumi_kubernetes/coordination/v1alpha2/_inputs.py +393 -0
  188. pulumi_kubernetes/coordination/v1alpha2/outputs.py +313 -0
  189. pulumi_kubernetes/coordination/v1beta1/Lease.py +11 -6
  190. pulumi_kubernetes/coordination/v1beta1/LeaseList.py +11 -6
  191. pulumi_kubernetes/coordination/v1beta1/LeasePatch.py +11 -6
  192. pulumi_kubernetes/coordination/v1beta1/_inputs.py +90 -0
  193. pulumi_kubernetes/coordination/v1beta1/outputs.py +5 -0
  194. pulumi_kubernetes/core/v1/Binding.py +13 -8
  195. pulumi_kubernetes/core/v1/BindingPatch.py +13 -8
  196. pulumi_kubernetes/core/v1/ConfigMap.py +8 -3
  197. pulumi_kubernetes/core/v1/ConfigMapList.py +11 -6
  198. pulumi_kubernetes/core/v1/ConfigMapPatch.py +8 -3
  199. pulumi_kubernetes/core/v1/Endpoints.py +11 -6
  200. pulumi_kubernetes/core/v1/EndpointsList.py +11 -6
  201. pulumi_kubernetes/core/v1/EndpointsPatch.py +11 -6
  202. pulumi_kubernetes/core/v1/Event.py +20 -15
  203. pulumi_kubernetes/core/v1/EventList.py +11 -6
  204. pulumi_kubernetes/core/v1/EventPatch.py +20 -15
  205. pulumi_kubernetes/core/v1/LimitRange.py +11 -6
  206. pulumi_kubernetes/core/v1/LimitRangeList.py +11 -6
  207. pulumi_kubernetes/core/v1/LimitRangePatch.py +11 -6
  208. pulumi_kubernetes/core/v1/Namespace.py +11 -6
  209. pulumi_kubernetes/core/v1/NamespaceList.py +11 -6
  210. pulumi_kubernetes/core/v1/NamespacePatch.py +11 -6
  211. pulumi_kubernetes/core/v1/Node.py +11 -6
  212. pulumi_kubernetes/core/v1/NodeList.py +11 -6
  213. pulumi_kubernetes/core/v1/NodePatch.py +11 -6
  214. pulumi_kubernetes/core/v1/PersistentVolume.py +11 -6
  215. pulumi_kubernetes/core/v1/PersistentVolumeClaim.py +11 -6
  216. pulumi_kubernetes/core/v1/PersistentVolumeClaimList.py +11 -6
  217. pulumi_kubernetes/core/v1/PersistentVolumeClaimPatch.py +11 -6
  218. pulumi_kubernetes/core/v1/PersistentVolumeList.py +11 -6
  219. pulumi_kubernetes/core/v1/PersistentVolumePatch.py +11 -6
  220. pulumi_kubernetes/core/v1/Pod.py +11 -6
  221. pulumi_kubernetes/core/v1/PodList.py +11 -6
  222. pulumi_kubernetes/core/v1/PodPatch.py +11 -6
  223. pulumi_kubernetes/core/v1/PodTemplate.py +11 -6
  224. pulumi_kubernetes/core/v1/PodTemplateList.py +11 -6
  225. pulumi_kubernetes/core/v1/PodTemplatePatch.py +11 -6
  226. pulumi_kubernetes/core/v1/ReplicationController.py +11 -6
  227. pulumi_kubernetes/core/v1/ReplicationControllerList.py +11 -6
  228. pulumi_kubernetes/core/v1/ReplicationControllerPatch.py +11 -6
  229. pulumi_kubernetes/core/v1/ResourceQuota.py +11 -6
  230. pulumi_kubernetes/core/v1/ResourceQuotaList.py +11 -6
  231. pulumi_kubernetes/core/v1/ResourceQuotaPatch.py +11 -6
  232. pulumi_kubernetes/core/v1/Secret.py +8 -3
  233. pulumi_kubernetes/core/v1/SecretList.py +11 -6
  234. pulumi_kubernetes/core/v1/SecretPatch.py +8 -3
  235. pulumi_kubernetes/core/v1/Service.py +17 -28
  236. pulumi_kubernetes/core/v1/ServiceAccount.py +17 -12
  237. pulumi_kubernetes/core/v1/ServiceAccountList.py +11 -6
  238. pulumi_kubernetes/core/v1/ServiceAccountPatch.py +17 -12
  239. pulumi_kubernetes/core/v1/ServiceList.py +11 -6
  240. pulumi_kubernetes/core/v1/ServicePatch.py +17 -28
  241. pulumi_kubernetes/core/v1/_inputs.py +11760 -756
  242. pulumi_kubernetes/core/v1/outputs.py +2131 -448
  243. pulumi_kubernetes/discovery/v1/EndpointSlice.py +14 -9
  244. pulumi_kubernetes/discovery/v1/EndpointSliceList.py +11 -6
  245. pulumi_kubernetes/discovery/v1/EndpointSlicePatch.py +14 -9
  246. pulumi_kubernetes/discovery/v1/_inputs.py +284 -0
  247. pulumi_kubernetes/discovery/v1/outputs.py +5 -0
  248. pulumi_kubernetes/discovery/v1beta1/EndpointSlice.py +14 -9
  249. pulumi_kubernetes/discovery/v1beta1/EndpointSliceList.py +11 -6
  250. pulumi_kubernetes/discovery/v1beta1/EndpointSlicePatch.py +14 -9
  251. pulumi_kubernetes/discovery/v1beta1/_inputs.py +210 -0
  252. pulumi_kubernetes/discovery/v1beta1/outputs.py +5 -0
  253. pulumi_kubernetes/events/v1/Event.py +20 -15
  254. pulumi_kubernetes/events/v1/EventList.py +11 -6
  255. pulumi_kubernetes/events/v1/EventPatch.py +20 -15
  256. pulumi_kubernetes/events/v1/_inputs.py +118 -0
  257. pulumi_kubernetes/events/v1/outputs.py +5 -0
  258. pulumi_kubernetes/events/v1beta1/Event.py +19 -14
  259. pulumi_kubernetes/events/v1beta1/EventList.py +11 -6
  260. pulumi_kubernetes/events/v1beta1/EventPatch.py +19 -14
  261. pulumi_kubernetes/events/v1beta1/_inputs.py +123 -0
  262. pulumi_kubernetes/events/v1beta1/outputs.py +5 -0
  263. pulumi_kubernetes/extensions/v1beta1/DaemonSet.py +11 -6
  264. pulumi_kubernetes/extensions/v1beta1/DaemonSetList.py +11 -6
  265. pulumi_kubernetes/extensions/v1beta1/DaemonSetPatch.py +11 -6
  266. pulumi_kubernetes/extensions/v1beta1/Deployment.py +11 -6
  267. pulumi_kubernetes/extensions/v1beta1/DeploymentList.py +11 -6
  268. pulumi_kubernetes/extensions/v1beta1/DeploymentPatch.py +11 -6
  269. pulumi_kubernetes/extensions/v1beta1/Ingress.py +11 -6
  270. pulumi_kubernetes/extensions/v1beta1/IngressList.py +11 -6
  271. pulumi_kubernetes/extensions/v1beta1/IngressPatch.py +11 -6
  272. pulumi_kubernetes/extensions/v1beta1/NetworkPolicy.py +11 -6
  273. pulumi_kubernetes/extensions/v1beta1/NetworkPolicyList.py +11 -6
  274. pulumi_kubernetes/extensions/v1beta1/NetworkPolicyPatch.py +11 -6
  275. pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicy.py +11 -6
  276. pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicyList.py +11 -6
  277. pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicyPatch.py +11 -6
  278. pulumi_kubernetes/extensions/v1beta1/ReplicaSet.py +11 -6
  279. pulumi_kubernetes/extensions/v1beta1/ReplicaSetList.py +11 -6
  280. pulumi_kubernetes/extensions/v1beta1/ReplicaSetPatch.py +11 -6
  281. pulumi_kubernetes/extensions/v1beta1/_inputs.py +1884 -26
  282. pulumi_kubernetes/extensions/v1beta1/outputs.py +5 -0
  283. pulumi_kubernetes/flowcontrol/v1/FlowSchema.py +11 -6
  284. pulumi_kubernetes/flowcontrol/v1/FlowSchemaList.py +11 -6
  285. pulumi_kubernetes/flowcontrol/v1/FlowSchemaPatch.py +11 -6
  286. pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfiguration.py +11 -6
  287. pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfigurationList.py +11 -6
  288. pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfigurationPatch.py +11 -6
  289. pulumi_kubernetes/flowcontrol/v1/_inputs.py +779 -0
  290. pulumi_kubernetes/flowcontrol/v1/outputs.py +5 -0
  291. pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchema.py +11 -6
  292. pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchemaList.py +11 -6
  293. pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchemaPatch.py +11 -6
  294. pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfiguration.py +11 -6
  295. pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfigurationList.py +11 -6
  296. pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfigurationPatch.py +11 -6
  297. pulumi_kubernetes/flowcontrol/v1alpha1/_inputs.py +671 -0
  298. pulumi_kubernetes/flowcontrol/v1alpha1/outputs.py +5 -0
  299. pulumi_kubernetes/flowcontrol/v1beta1/FlowSchema.py +11 -6
  300. pulumi_kubernetes/flowcontrol/v1beta1/FlowSchemaList.py +11 -6
  301. pulumi_kubernetes/flowcontrol/v1beta1/FlowSchemaPatch.py +11 -6
  302. pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfiguration.py +11 -6
  303. pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfigurationList.py +11 -6
  304. pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfigurationPatch.py +11 -6
  305. pulumi_kubernetes/flowcontrol/v1beta1/_inputs.py +671 -0
  306. pulumi_kubernetes/flowcontrol/v1beta1/outputs.py +5 -0
  307. pulumi_kubernetes/flowcontrol/v1beta2/FlowSchema.py +11 -6
  308. pulumi_kubernetes/flowcontrol/v1beta2/FlowSchemaList.py +11 -6
  309. pulumi_kubernetes/flowcontrol/v1beta2/FlowSchemaPatch.py +11 -6
  310. pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfiguration.py +11 -6
  311. pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfigurationList.py +11 -6
  312. pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfigurationPatch.py +11 -6
  313. pulumi_kubernetes/flowcontrol/v1beta2/_inputs.py +771 -0
  314. pulumi_kubernetes/flowcontrol/v1beta2/outputs.py +5 -0
  315. pulumi_kubernetes/flowcontrol/v1beta3/FlowSchema.py +11 -6
  316. pulumi_kubernetes/flowcontrol/v1beta3/FlowSchemaList.py +11 -6
  317. pulumi_kubernetes/flowcontrol/v1beta3/FlowSchemaPatch.py +11 -6
  318. pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfiguration.py +11 -6
  319. pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfigurationList.py +11 -6
  320. pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfigurationPatch.py +11 -6
  321. pulumi_kubernetes/flowcontrol/v1beta3/_inputs.py +779 -8
  322. pulumi_kubernetes/flowcontrol/v1beta3/outputs.py +13 -8
  323. pulumi_kubernetes/helm/__init__.py +3 -0
  324. pulumi_kubernetes/helm/v3/Release.py +8 -3
  325. pulumi_kubernetes/helm/v3/_inputs.py +42 -2
  326. pulumi_kubernetes/helm/v3/outputs.py +7 -2
  327. pulumi_kubernetes/helm/v4/Chart.py +721 -0
  328. pulumi_kubernetes/helm/v4/__init__.py +9 -0
  329. pulumi_kubernetes/helm/v4/_inputs.py +216 -0
  330. pulumi_kubernetes/kustomize/__init__.py +8 -0
  331. pulumi_kubernetes/kustomize/v2/Directory.py +219 -0
  332. pulumi_kubernetes/kustomize/v2/__init__.py +8 -0
  333. pulumi_kubernetes/meta/v1/Status.py +11 -6
  334. pulumi_kubernetes/meta/v1/StatusPatch.py +11 -6
  335. pulumi_kubernetes/meta/v1/_inputs.py +596 -0
  336. pulumi_kubernetes/meta/v1/outputs.py +5 -0
  337. pulumi_kubernetes/networking/v1/Ingress.py +11 -6
  338. pulumi_kubernetes/networking/v1/IngressClass.py +11 -6
  339. pulumi_kubernetes/networking/v1/IngressClassList.py +11 -6
  340. pulumi_kubernetes/networking/v1/IngressClassPatch.py +11 -6
  341. pulumi_kubernetes/networking/v1/IngressList.py +11 -6
  342. pulumi_kubernetes/networking/v1/IngressPatch.py +11 -6
  343. pulumi_kubernetes/networking/v1/NetworkPolicy.py +11 -6
  344. pulumi_kubernetes/networking/v1/NetworkPolicyList.py +11 -6
  345. pulumi_kubernetes/networking/v1/NetworkPolicyPatch.py +11 -6
  346. pulumi_kubernetes/networking/v1/_inputs.py +840 -0
  347. pulumi_kubernetes/networking/v1/outputs.py +5 -0
  348. pulumi_kubernetes/networking/v1alpha1/ClusterCIDR.py +11 -6
  349. pulumi_kubernetes/networking/v1alpha1/ClusterCIDRList.py +11 -6
  350. pulumi_kubernetes/networking/v1alpha1/ClusterCIDRPatch.py +11 -6
  351. pulumi_kubernetes/networking/v1alpha1/IPAddress.py +13 -6
  352. pulumi_kubernetes/networking/v1alpha1/IPAddressList.py +11 -6
  353. pulumi_kubernetes/networking/v1alpha1/IPAddressPatch.py +13 -6
  354. pulumi_kubernetes/networking/v1alpha1/ServiceCIDR.py +13 -6
  355. pulumi_kubernetes/networking/v1alpha1/ServiceCIDRList.py +11 -6
  356. pulumi_kubernetes/networking/v1alpha1/ServiceCIDRPatch.py +13 -6
  357. pulumi_kubernetes/networking/v1alpha1/_inputs.py +293 -37
  358. pulumi_kubernetes/networking/v1alpha1/outputs.py +26 -24
  359. pulumi_kubernetes/networking/v1beta1/IPAddress.py +216 -0
  360. pulumi_kubernetes/networking/v1beta1/IPAddressList.py +215 -0
  361. pulumi_kubernetes/networking/v1beta1/IPAddressPatch.py +228 -0
  362. pulumi_kubernetes/networking/v1beta1/Ingress.py +11 -6
  363. pulumi_kubernetes/networking/v1beta1/IngressClass.py +11 -6
  364. pulumi_kubernetes/networking/v1beta1/IngressClassList.py +11 -6
  365. pulumi_kubernetes/networking/v1beta1/IngressClassPatch.py +11 -6
  366. pulumi_kubernetes/networking/v1beta1/IngressList.py +11 -6
  367. pulumi_kubernetes/networking/v1beta1/IngressPatch.py +11 -6
  368. pulumi_kubernetes/networking/v1beta1/ServiceCIDR.py +226 -0
  369. pulumi_kubernetes/networking/v1beta1/ServiceCIDRList.py +215 -0
  370. pulumi_kubernetes/networking/v1beta1/ServiceCIDRPatch.py +238 -0
  371. pulumi_kubernetes/networking/v1beta1/__init__.py +6 -0
  372. pulumi_kubernetes/networking/v1beta1/_inputs.py +984 -11
  373. pulumi_kubernetes/networking/v1beta1/outputs.py +466 -0
  374. pulumi_kubernetes/node/v1/RuntimeClass.py +14 -9
  375. pulumi_kubernetes/node/v1/RuntimeClassList.py +11 -6
  376. pulumi_kubernetes/node/v1/RuntimeClassPatch.py +14 -9
  377. pulumi_kubernetes/node/v1/_inputs.py +101 -0
  378. pulumi_kubernetes/node/v1/outputs.py +5 -0
  379. pulumi_kubernetes/node/v1alpha1/RuntimeClass.py +11 -6
  380. pulumi_kubernetes/node/v1alpha1/RuntimeClassList.py +11 -6
  381. pulumi_kubernetes/node/v1alpha1/RuntimeClassPatch.py +11 -6
  382. pulumi_kubernetes/node/v1alpha1/_inputs.py +134 -0
  383. pulumi_kubernetes/node/v1alpha1/outputs.py +5 -0
  384. pulumi_kubernetes/node/v1beta1/RuntimeClass.py +14 -9
  385. pulumi_kubernetes/node/v1beta1/RuntimeClassList.py +11 -6
  386. pulumi_kubernetes/node/v1beta1/RuntimeClassPatch.py +14 -9
  387. pulumi_kubernetes/node/v1beta1/_inputs.py +100 -0
  388. pulumi_kubernetes/node/v1beta1/outputs.py +5 -0
  389. pulumi_kubernetes/policy/v1/PodDisruptionBudget.py +11 -6
  390. pulumi_kubernetes/policy/v1/PodDisruptionBudgetList.py +11 -6
  391. pulumi_kubernetes/policy/v1/PodDisruptionBudgetPatch.py +11 -6
  392. pulumi_kubernetes/policy/v1/_inputs.py +151 -0
  393. pulumi_kubernetes/policy/v1/outputs.py +5 -0
  394. pulumi_kubernetes/policy/v1beta1/PodDisruptionBudget.py +10 -5
  395. pulumi_kubernetes/policy/v1beta1/PodDisruptionBudgetList.py +9 -4
  396. pulumi_kubernetes/policy/v1beta1/PodDisruptionBudgetPatch.py +10 -5
  397. pulumi_kubernetes/policy/v1beta1/PodSecurityPolicy.py +11 -6
  398. pulumi_kubernetes/policy/v1beta1/PodSecurityPolicyList.py +11 -6
  399. pulumi_kubernetes/policy/v1beta1/PodSecurityPolicyPatch.py +11 -6
  400. pulumi_kubernetes/policy/v1beta1/_inputs.py +713 -0
  401. pulumi_kubernetes/policy/v1beta1/outputs.py +5 -0
  402. pulumi_kubernetes/provider.py +82 -6
  403. pulumi_kubernetes/pulumi-plugin.json +2 -1
  404. pulumi_kubernetes/rbac/v1/ClusterRole.py +14 -9
  405. pulumi_kubernetes/rbac/v1/ClusterRoleBinding.py +14 -9
  406. pulumi_kubernetes/rbac/v1/ClusterRoleBindingList.py +11 -6
  407. pulumi_kubernetes/rbac/v1/ClusterRoleBindingPatch.py +14 -9
  408. pulumi_kubernetes/rbac/v1/ClusterRoleList.py +11 -6
  409. pulumi_kubernetes/rbac/v1/ClusterRolePatch.py +14 -9
  410. pulumi_kubernetes/rbac/v1/Role.py +11 -6
  411. pulumi_kubernetes/rbac/v1/RoleBinding.py +14 -9
  412. pulumi_kubernetes/rbac/v1/RoleBindingList.py +11 -6
  413. pulumi_kubernetes/rbac/v1/RoleBindingPatch.py +14 -9
  414. pulumi_kubernetes/rbac/v1/RoleList.py +11 -6
  415. pulumi_kubernetes/rbac/v1/RolePatch.py +11 -6
  416. pulumi_kubernetes/rbac/v1/_inputs.py +295 -0
  417. pulumi_kubernetes/rbac/v1/outputs.py +5 -0
  418. pulumi_kubernetes/rbac/v1alpha1/ClusterRole.py +14 -9
  419. pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBinding.py +14 -9
  420. pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBindingList.py +11 -6
  421. pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBindingPatch.py +14 -9
  422. pulumi_kubernetes/rbac/v1alpha1/ClusterRoleList.py +11 -6
  423. pulumi_kubernetes/rbac/v1alpha1/ClusterRolePatch.py +14 -9
  424. pulumi_kubernetes/rbac/v1alpha1/Role.py +11 -6
  425. pulumi_kubernetes/rbac/v1alpha1/RoleBinding.py +14 -9
  426. pulumi_kubernetes/rbac/v1alpha1/RoleBindingList.py +11 -6
  427. pulumi_kubernetes/rbac/v1alpha1/RoleBindingPatch.py +14 -9
  428. pulumi_kubernetes/rbac/v1alpha1/RoleList.py +11 -6
  429. pulumi_kubernetes/rbac/v1alpha1/RolePatch.py +11 -6
  430. pulumi_kubernetes/rbac/v1alpha1/_inputs.py +295 -0
  431. pulumi_kubernetes/rbac/v1alpha1/outputs.py +5 -0
  432. pulumi_kubernetes/rbac/v1beta1/ClusterRole.py +14 -9
  433. pulumi_kubernetes/rbac/v1beta1/ClusterRoleBinding.py +14 -9
  434. pulumi_kubernetes/rbac/v1beta1/ClusterRoleBindingList.py +11 -6
  435. pulumi_kubernetes/rbac/v1beta1/ClusterRoleBindingPatch.py +14 -9
  436. pulumi_kubernetes/rbac/v1beta1/ClusterRoleList.py +11 -6
  437. pulumi_kubernetes/rbac/v1beta1/ClusterRolePatch.py +14 -9
  438. pulumi_kubernetes/rbac/v1beta1/Role.py +11 -6
  439. pulumi_kubernetes/rbac/v1beta1/RoleBinding.py +14 -9
  440. pulumi_kubernetes/rbac/v1beta1/RoleBindingList.py +11 -6
  441. pulumi_kubernetes/rbac/v1beta1/RoleBindingPatch.py +14 -9
  442. pulumi_kubernetes/rbac/v1beta1/RoleList.py +11 -6
  443. pulumi_kubernetes/rbac/v1beta1/RolePatch.py +11 -6
  444. pulumi_kubernetes/rbac/v1beta1/_inputs.py +295 -0
  445. pulumi_kubernetes/rbac/v1beta1/outputs.py +5 -0
  446. pulumi_kubernetes/resource/__init__.py +6 -0
  447. pulumi_kubernetes/resource/v1alpha1/PodScheduling.py +11 -6
  448. pulumi_kubernetes/resource/v1alpha1/PodSchedulingList.py +11 -6
  449. pulumi_kubernetes/resource/v1alpha1/PodSchedulingPatch.py +11 -6
  450. pulumi_kubernetes/resource/v1alpha1/ResourceClaim.py +12 -7
  451. pulumi_kubernetes/resource/v1alpha1/ResourceClaimList.py +11 -6
  452. pulumi_kubernetes/resource/v1alpha1/ResourceClaimPatch.py +12 -7
  453. pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplate.py +12 -7
  454. pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplateList.py +11 -6
  455. pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplatePatch.py +12 -7
  456. pulumi_kubernetes/resource/v1alpha1/ResourceClass.py +14 -9
  457. pulumi_kubernetes/resource/v1alpha1/ResourceClassList.py +11 -6
  458. pulumi_kubernetes/resource/v1alpha1/ResourceClassPatch.py +14 -9
  459. pulumi_kubernetes/resource/v1alpha1/_inputs.py +458 -0
  460. pulumi_kubernetes/resource/v1alpha1/outputs.py +5 -0
  461. pulumi_kubernetes/resource/v1alpha2/PodSchedulingContext.py +13 -6
  462. pulumi_kubernetes/resource/v1alpha2/PodSchedulingContextList.py +11 -6
  463. pulumi_kubernetes/resource/v1alpha2/PodSchedulingContextPatch.py +13 -6
  464. pulumi_kubernetes/resource/v1alpha2/ResourceClaim.py +12 -7
  465. pulumi_kubernetes/resource/v1alpha2/ResourceClaimList.py +11 -6
  466. pulumi_kubernetes/resource/v1alpha2/ResourceClaimParameters.py +280 -0
  467. pulumi_kubernetes/resource/v1alpha2/ResourceClaimParametersList.py +215 -0
  468. pulumi_kubernetes/resource/v1alpha2/ResourceClaimParametersPatch.py +292 -0
  469. pulumi_kubernetes/resource/v1alpha2/ResourceClaimPatch.py +12 -7
  470. pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplate.py +12 -7
  471. pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplateList.py +11 -6
  472. pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplatePatch.py +12 -7
  473. pulumi_kubernetes/resource/v1alpha2/ResourceClass.py +43 -9
  474. pulumi_kubernetes/resource/v1alpha2/ResourceClassList.py +11 -6
  475. pulumi_kubernetes/resource/v1alpha2/ResourceClassParameters.py +272 -0
  476. pulumi_kubernetes/resource/v1alpha2/ResourceClassParametersList.py +215 -0
  477. pulumi_kubernetes/resource/v1alpha2/ResourceClassParametersPatch.py +284 -0
  478. pulumi_kubernetes/resource/v1alpha2/ResourceClassPatch.py +43 -9
  479. pulumi_kubernetes/resource/v1alpha2/ResourceSlice.py +283 -0
  480. pulumi_kubernetes/resource/v1alpha2/ResourceSliceList.py +215 -0
  481. pulumi_kubernetes/resource/v1alpha2/ResourceSlicePatch.py +294 -0
  482. pulumi_kubernetes/resource/v1alpha2/__init__.py +9 -0
  483. pulumi_kubernetes/resource/v1alpha2/_inputs.py +3177 -634
  484. pulumi_kubernetes/resource/v1alpha2/outputs.py +2628 -880
  485. pulumi_kubernetes/resource/v1alpha3/DeviceClass.py +238 -0
  486. pulumi_kubernetes/resource/v1alpha3/DeviceClassList.py +216 -0
  487. pulumi_kubernetes/resource/v1alpha3/DeviceClassPatch.py +249 -0
  488. pulumi_kubernetes/resource/v1alpha3/PodSchedulingContext.py +231 -0
  489. pulumi_kubernetes/resource/v1alpha3/PodSchedulingContextList.py +215 -0
  490. pulumi_kubernetes/resource/v1alpha3/PodSchedulingContextPatch.py +242 -0
  491. pulumi_kubernetes/resource/v1alpha3/ResourceClaim.py +232 -0
  492. pulumi_kubernetes/resource/v1alpha3/ResourceClaimList.py +216 -0
  493. pulumi_kubernetes/resource/v1alpha3/ResourceClaimPatch.py +243 -0
  494. pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplate.py +229 -0
  495. pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplateList.py +215 -0
  496. pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplatePatch.py +240 -0
  497. pulumi_kubernetes/resource/v1alpha3/ResourceSlice.py +246 -0
  498. pulumi_kubernetes/resource/v1alpha3/ResourceSliceList.py +245 -0
  499. pulumi_kubernetes/resource/v1alpha3/ResourceSlicePatch.py +257 -0
  500. pulumi_kubernetes/resource/v1alpha3/__init__.py +24 -0
  501. pulumi_kubernetes/resource/v1alpha3/_inputs.py +4372 -0
  502. pulumi_kubernetes/resource/v1alpha3/outputs.py +3914 -0
  503. pulumi_kubernetes/resource/v1beta1/DeviceClass.py +237 -0
  504. pulumi_kubernetes/resource/v1beta1/DeviceClassList.py +215 -0
  505. pulumi_kubernetes/resource/v1beta1/DeviceClassPatch.py +248 -0
  506. pulumi_kubernetes/resource/v1beta1/ResourceClaim.py +232 -0
  507. pulumi_kubernetes/resource/v1beta1/ResourceClaimList.py +216 -0
  508. pulumi_kubernetes/resource/v1beta1/ResourceClaimPatch.py +243 -0
  509. pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplate.py +229 -0
  510. pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplateList.py +215 -0
  511. pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplatePatch.py +240 -0
  512. pulumi_kubernetes/resource/v1beta1/ResourceSlice.py +246 -0
  513. pulumi_kubernetes/resource/v1beta1/ResourceSliceList.py +216 -0
  514. pulumi_kubernetes/resource/v1beta1/ResourceSlicePatch.py +257 -0
  515. pulumi_kubernetes/resource/v1beta1/__init__.py +21 -0
  516. pulumi_kubernetes/resource/v1beta1/_inputs.py +3867 -0
  517. pulumi_kubernetes/resource/v1beta1/outputs.py +3334 -0
  518. pulumi_kubernetes/scheduling/v1/PriorityClass.py +8 -3
  519. pulumi_kubernetes/scheduling/v1/PriorityClassList.py +11 -6
  520. pulumi_kubernetes/scheduling/v1/PriorityClassPatch.py +8 -3
  521. pulumi_kubernetes/scheduling/v1/_inputs.py +44 -0
  522. pulumi_kubernetes/scheduling/v1/outputs.py +5 -0
  523. pulumi_kubernetes/scheduling/v1alpha1/PriorityClass.py +8 -3
  524. pulumi_kubernetes/scheduling/v1alpha1/PriorityClassList.py +11 -6
  525. pulumi_kubernetes/scheduling/v1alpha1/PriorityClassPatch.py +8 -3
  526. pulumi_kubernetes/scheduling/v1alpha1/_inputs.py +44 -0
  527. pulumi_kubernetes/scheduling/v1alpha1/outputs.py +5 -0
  528. pulumi_kubernetes/scheduling/v1beta1/PriorityClass.py +8 -3
  529. pulumi_kubernetes/scheduling/v1beta1/PriorityClassList.py +11 -6
  530. pulumi_kubernetes/scheduling/v1beta1/PriorityClassPatch.py +8 -3
  531. pulumi_kubernetes/scheduling/v1beta1/_inputs.py +44 -0
  532. pulumi_kubernetes/scheduling/v1beta1/outputs.py +5 -0
  533. pulumi_kubernetes/settings/v1alpha1/PodPreset.py +9 -4
  534. pulumi_kubernetes/settings/v1alpha1/PodPresetList.py +11 -6
  535. pulumi_kubernetes/settings/v1alpha1/PodPresetPatch.py +9 -4
  536. pulumi_kubernetes/settings/v1alpha1/_inputs.py +84 -0
  537. pulumi_kubernetes/settings/v1alpha1/outputs.py +5 -0
  538. pulumi_kubernetes/storage/v1/CSIDriver.py +11 -6
  539. pulumi_kubernetes/storage/v1/CSIDriverList.py +11 -6
  540. pulumi_kubernetes/storage/v1/CSIDriverPatch.py +11 -6
  541. pulumi_kubernetes/storage/v1/CSINode.py +11 -6
  542. pulumi_kubernetes/storage/v1/CSINodeList.py +11 -6
  543. pulumi_kubernetes/storage/v1/CSINodePatch.py +11 -6
  544. pulumi_kubernetes/storage/v1/CSIStorageCapacity.py +11 -6
  545. pulumi_kubernetes/storage/v1/CSIStorageCapacityList.py +11 -6
  546. pulumi_kubernetes/storage/v1/CSIStorageCapacityPatch.py +11 -6
  547. pulumi_kubernetes/storage/v1/StorageClass.py +11 -6
  548. pulumi_kubernetes/storage/v1/StorageClassList.py +11 -6
  549. pulumi_kubernetes/storage/v1/StorageClassPatch.py +11 -6
  550. pulumi_kubernetes/storage/v1/VolumeAttachment.py +11 -6
  551. pulumi_kubernetes/storage/v1/VolumeAttachmentList.py +11 -6
  552. pulumi_kubernetes/storage/v1/VolumeAttachmentPatch.py +11 -6
  553. pulumi_kubernetes/storage/v1/_inputs.py +624 -10
  554. pulumi_kubernetes/storage/v1/outputs.py +17 -12
  555. pulumi_kubernetes/storage/v1alpha1/VolumeAttachment.py +11 -6
  556. pulumi_kubernetes/storage/v1alpha1/VolumeAttachmentList.py +11 -6
  557. pulumi_kubernetes/storage/v1alpha1/VolumeAttachmentPatch.py +11 -6
  558. pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClass.py +10 -3
  559. pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClassList.py +11 -6
  560. pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClassPatch.py +10 -3
  561. pulumi_kubernetes/storage/v1alpha1/_inputs.py +187 -0
  562. pulumi_kubernetes/storage/v1alpha1/outputs.py +5 -0
  563. pulumi_kubernetes/storage/v1beta1/CSIDriver.py +11 -6
  564. pulumi_kubernetes/storage/v1beta1/CSIDriverList.py +11 -6
  565. pulumi_kubernetes/storage/v1beta1/CSIDriverPatch.py +11 -6
  566. pulumi_kubernetes/storage/v1beta1/CSINode.py +11 -6
  567. pulumi_kubernetes/storage/v1beta1/CSINodeList.py +11 -6
  568. pulumi_kubernetes/storage/v1beta1/CSINodePatch.py +11 -6
  569. pulumi_kubernetes/storage/v1beta1/CSIStorageCapacity.py +11 -6
  570. pulumi_kubernetes/storage/v1beta1/CSIStorageCapacityList.py +11 -6
  571. pulumi_kubernetes/storage/v1beta1/CSIStorageCapacityPatch.py +11 -6
  572. pulumi_kubernetes/storage/v1beta1/StorageClass.py +11 -6
  573. pulumi_kubernetes/storage/v1beta1/StorageClassList.py +11 -6
  574. pulumi_kubernetes/storage/v1beta1/StorageClassPatch.py +11 -6
  575. pulumi_kubernetes/storage/v1beta1/VolumeAttachment.py +11 -6
  576. pulumi_kubernetes/storage/v1beta1/VolumeAttachmentList.py +11 -6
  577. pulumi_kubernetes/storage/v1beta1/VolumeAttachmentPatch.py +11 -6
  578. pulumi_kubernetes/storage/v1beta1/VolumeAttributesClass.py +252 -0
  579. pulumi_kubernetes/storage/v1beta1/VolumeAttributesClassList.py +215 -0
  580. pulumi_kubernetes/storage/v1beta1/VolumeAttributesClassPatch.py +263 -0
  581. pulumi_kubernetes/storage/v1beta1/__init__.py +3 -0
  582. pulumi_kubernetes/storage/v1beta1/_inputs.py +689 -0
  583. pulumi_kubernetes/storage/v1beta1/outputs.py +99 -0
  584. pulumi_kubernetes/storagemigration/__init__.py +14 -0
  585. pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigration.py +224 -0
  586. pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigrationList.py +215 -0
  587. pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigrationPatch.py +236 -0
  588. pulumi_kubernetes/storagemigration/v1alpha1/__init__.py +12 -0
  589. pulumi_kubernetes/storagemigration/v1alpha1/_inputs.py +585 -0
  590. pulumi_kubernetes/storagemigration/v1alpha1/outputs.py +593 -0
  591. pulumi_kubernetes/yaml/v2/ConfigFile.py +81 -4
  592. pulumi_kubernetes/yaml/v2/ConfigGroup.py +123 -42
  593. pulumi_kubernetes/yaml/yaml.py +264 -0
  594. {pulumi_kubernetes-4.10.0a1710355461.dist-info → pulumi_kubernetes-4.20.0.dist-info}/METADATA +8 -7
  595. pulumi_kubernetes-4.20.0.dist-info/RECORD +679 -0
  596. {pulumi_kubernetes-4.10.0a1710355461.dist-info → pulumi_kubernetes-4.20.0.dist-info}/WHEEL +1 -1
  597. pulumi_kubernetes-4.10.0a1710355461.dist-info/RECORD +0 -592
  598. {pulumi_kubernetes-4.10.0a1710355461.dist-info → pulumi_kubernetes-4.20.0.dist-info}/top_level.txt +0 -0
@@ -4,22 +4,39 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from ... import _utilities
11
16
  from . import outputs
12
17
  from ... import meta as _meta
13
18
 
14
19
  __all__ = [
20
+ 'ApplyConfiguration',
21
+ 'ApplyConfigurationPatch',
15
22
  'AuditAnnotation',
16
23
  'AuditAnnotationPatch',
17
24
  'ExpressionWarning',
18
25
  'ExpressionWarningPatch',
26
+ 'JSONPatch',
27
+ 'JSONPatchPatch',
19
28
  'MatchCondition',
20
29
  'MatchConditionPatch',
21
30
  'MatchResources',
22
31
  'MatchResourcesPatch',
32
+ 'MutatingAdmissionPolicy',
33
+ 'MutatingAdmissionPolicyBinding',
34
+ 'MutatingAdmissionPolicyBindingSpec',
35
+ 'MutatingAdmissionPolicyBindingSpecPatch',
36
+ 'MutatingAdmissionPolicySpec',
37
+ 'MutatingAdmissionPolicySpecPatch',
38
+ 'Mutation',
39
+ 'MutationPatch',
23
40
  'NamedRuleWithOperations',
24
41
  'NamedRuleWithOperationsPatch',
25
42
  'ParamKind',
@@ -42,6 +59,160 @@ __all__ = [
42
59
  'VariablePatch',
43
60
  ]
44
61
 
62
+ @pulumi.output_type
63
+ class ApplyConfiguration(dict):
64
+ """
65
+ ApplyConfiguration defines the desired configuration values of an object.
66
+ """
67
+ def __init__(__self__, *,
68
+ expression: Optional[str] = None):
69
+ """
70
+ ApplyConfiguration defines the desired configuration values of an object.
71
+ :param str expression: expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
72
+
73
+ Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
74
+
75
+ Object{
76
+ spec: Object.spec{
77
+ serviceAccountName: "example"
78
+ }
79
+ }
80
+
81
+ Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
82
+
83
+ CEL expressions have access to the object types needed to create apply configurations:
84
+
85
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
86
+
87
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
88
+
89
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
90
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
91
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
92
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
93
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
94
+ request resource.
95
+
96
+ The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
97
+
98
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
99
+ """
100
+ if expression is not None:
101
+ pulumi.set(__self__, "expression", expression)
102
+
103
+ @property
104
+ @pulumi.getter
105
+ def expression(self) -> Optional[str]:
106
+ """
107
+ expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
108
+
109
+ Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
110
+
111
+ Object{
112
+ spec: Object.spec{
113
+ serviceAccountName: "example"
114
+ }
115
+ }
116
+
117
+ Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
118
+
119
+ CEL expressions have access to the object types needed to create apply configurations:
120
+
121
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
122
+
123
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
124
+
125
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
126
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
127
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
128
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
129
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
130
+ request resource.
131
+
132
+ The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
133
+
134
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
135
+ """
136
+ return pulumi.get(self, "expression")
137
+
138
+
139
+ @pulumi.output_type
140
+ class ApplyConfigurationPatch(dict):
141
+ """
142
+ ApplyConfiguration defines the desired configuration values of an object.
143
+ """
144
+ def __init__(__self__, *,
145
+ expression: Optional[str] = None):
146
+ """
147
+ ApplyConfiguration defines the desired configuration values of an object.
148
+ :param str expression: expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
149
+
150
+ Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
151
+
152
+ Object{
153
+ spec: Object.spec{
154
+ serviceAccountName: "example"
155
+ }
156
+ }
157
+
158
+ Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
159
+
160
+ CEL expressions have access to the object types needed to create apply configurations:
161
+
162
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
163
+
164
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
165
+
166
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
167
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
168
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
169
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
170
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
171
+ request resource.
172
+
173
+ The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
174
+
175
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
176
+ """
177
+ if expression is not None:
178
+ pulumi.set(__self__, "expression", expression)
179
+
180
+ @property
181
+ @pulumi.getter
182
+ def expression(self) -> Optional[str]:
183
+ """
184
+ expression will be evaluated by CEL to create an apply configuration. ref: https://github.com/google/cel-spec
185
+
186
+ Apply configurations are declared in CEL using object initialization. For example, this CEL expression returns an apply configuration to set a single field:
187
+
188
+ Object{
189
+ spec: Object.spec{
190
+ serviceAccountName: "example"
191
+ }
192
+ }
193
+
194
+ Apply configurations may not modify atomic structs, maps or arrays due to the risk of accidental deletion of values not included in the apply configuration.
195
+
196
+ CEL expressions have access to the object types needed to create apply configurations:
197
+
198
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
199
+
200
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
201
+
202
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
203
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
204
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
205
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
206
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
207
+ request resource.
208
+
209
+ The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
210
+
211
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
212
+ """
213
+ return pulumi.get(self, "expression")
214
+
215
+
45
216
  @pulumi.output_type
46
217
  class AuditAnnotation(dict):
47
218
  """
@@ -286,6 +457,264 @@ class ExpressionWarningPatch(dict):
286
457
  return pulumi.get(self, "warning")
287
458
 
288
459
 
460
+ @pulumi.output_type
461
+ class JSONPatch(dict):
462
+ """
463
+ JSONPatch defines a JSON Patch.
464
+ """
465
+ def __init__(__self__, *,
466
+ expression: Optional[str] = None):
467
+ """
468
+ JSONPatch defines a JSON Patch.
469
+ :param str expression: expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
470
+
471
+ expression must return an array of JSONPatch values.
472
+
473
+ For example, this CEL expression returns a JSON patch to conditionally modify a value:
474
+
475
+ [
476
+ JSONPatch{op: "test", path: "/spec/example", value: "Red"},
477
+ JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
478
+ ]
479
+
480
+ To define an object for the patch value, use Object types. For example:
481
+
482
+ [
483
+ JSONPatch{
484
+ op: "add",
485
+ path: "/spec/selector",
486
+ value: Object.spec.selector{matchLabels: {"environment": "test"}}
487
+ }
488
+ ]
489
+
490
+ To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
491
+
492
+ [
493
+ JSONPatch{
494
+ op: "add",
495
+ path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
496
+ value: "test"
497
+ },
498
+ ]
499
+
500
+ CEL expressions have access to the types needed to create JSON patches and objects:
501
+
502
+ - 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
503
+ See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
504
+ integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
505
+ [JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
506
+ function may be used to escape path keys containing '/' and '~'.
507
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
508
+
509
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
510
+
511
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
512
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
513
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
514
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
515
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
516
+ request resource.
517
+
518
+ CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
519
+
520
+ - 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
521
+
522
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
523
+ """
524
+ if expression is not None:
525
+ pulumi.set(__self__, "expression", expression)
526
+
527
+ @property
528
+ @pulumi.getter
529
+ def expression(self) -> Optional[str]:
530
+ """
531
+ expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
532
+
533
+ expression must return an array of JSONPatch values.
534
+
535
+ For example, this CEL expression returns a JSON patch to conditionally modify a value:
536
+
537
+ [
538
+ JSONPatch{op: "test", path: "/spec/example", value: "Red"},
539
+ JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
540
+ ]
541
+
542
+ To define an object for the patch value, use Object types. For example:
543
+
544
+ [
545
+ JSONPatch{
546
+ op: "add",
547
+ path: "/spec/selector",
548
+ value: Object.spec.selector{matchLabels: {"environment": "test"}}
549
+ }
550
+ ]
551
+
552
+ To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
553
+
554
+ [
555
+ JSONPatch{
556
+ op: "add",
557
+ path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
558
+ value: "test"
559
+ },
560
+ ]
561
+
562
+ CEL expressions have access to the types needed to create JSON patches and objects:
563
+
564
+ - 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
565
+ See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
566
+ integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
567
+ [JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
568
+ function may be used to escape path keys containing '/' and '~'.
569
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
570
+
571
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
572
+
573
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
574
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
575
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
576
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
577
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
578
+ request resource.
579
+
580
+ CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
581
+
582
+ - 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
583
+
584
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
585
+ """
586
+ return pulumi.get(self, "expression")
587
+
588
+
589
+ @pulumi.output_type
590
+ class JSONPatchPatch(dict):
591
+ """
592
+ JSONPatch defines a JSON Patch.
593
+ """
594
+ def __init__(__self__, *,
595
+ expression: Optional[str] = None):
596
+ """
597
+ JSONPatch defines a JSON Patch.
598
+ :param str expression: expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
599
+
600
+ expression must return an array of JSONPatch values.
601
+
602
+ For example, this CEL expression returns a JSON patch to conditionally modify a value:
603
+
604
+ [
605
+ JSONPatch{op: "test", path: "/spec/example", value: "Red"},
606
+ JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
607
+ ]
608
+
609
+ To define an object for the patch value, use Object types. For example:
610
+
611
+ [
612
+ JSONPatch{
613
+ op: "add",
614
+ path: "/spec/selector",
615
+ value: Object.spec.selector{matchLabels: {"environment": "test"}}
616
+ }
617
+ ]
618
+
619
+ To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
620
+
621
+ [
622
+ JSONPatch{
623
+ op: "add",
624
+ path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
625
+ value: "test"
626
+ },
627
+ ]
628
+
629
+ CEL expressions have access to the types needed to create JSON patches and objects:
630
+
631
+ - 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
632
+ See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
633
+ integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
634
+ [JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
635
+ function may be used to escape path keys containing '/' and '~'.
636
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
637
+
638
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
639
+
640
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
641
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
642
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
643
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
644
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
645
+ request resource.
646
+
647
+ CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
648
+
649
+ - 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
650
+
651
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
652
+ """
653
+ if expression is not None:
654
+ pulumi.set(__self__, "expression", expression)
655
+
656
+ @property
657
+ @pulumi.getter
658
+ def expression(self) -> Optional[str]:
659
+ """
660
+ expression will be evaluated by CEL to create a [JSON patch](https://jsonpatch.com/). ref: https://github.com/google/cel-spec
661
+
662
+ expression must return an array of JSONPatch values.
663
+
664
+ For example, this CEL expression returns a JSON patch to conditionally modify a value:
665
+
666
+ [
667
+ JSONPatch{op: "test", path: "/spec/example", value: "Red"},
668
+ JSONPatch{op: "replace", path: "/spec/example", value: "Green"}
669
+ ]
670
+
671
+ To define an object for the patch value, use Object types. For example:
672
+
673
+ [
674
+ JSONPatch{
675
+ op: "add",
676
+ path: "/spec/selector",
677
+ value: Object.spec.selector{matchLabels: {"environment": "test"}}
678
+ }
679
+ ]
680
+
681
+ To use strings containing '/' and '~' as JSONPatch path keys, use "jsonpatch.escapeKey". For example:
682
+
683
+ [
684
+ JSONPatch{
685
+ op: "add",
686
+ path: "/metadata/labels/" + jsonpatch.escapeKey("example.com/environment"),
687
+ value: "test"
688
+ },
689
+ ]
690
+
691
+ CEL expressions have access to the types needed to create JSON patches and objects:
692
+
693
+ - 'JSONPatch' - CEL type of JSON Patch operations. JSONPatch has the fields 'op', 'from', 'path' and 'value'.
694
+ See [JSON patch](https://jsonpatch.com/) for more details. The 'value' field may be set to any of: string,
695
+ integer, array, map or object. If set, the 'path' and 'from' fields must be set to a
696
+ [JSON pointer](https://datatracker.ietf.org/doc/html/rfc6901/) string, where the 'jsonpatch.escapeKey()' CEL
697
+ function may be used to escape path keys containing '/' and '~'.
698
+ - 'Object' - CEL type of the resource object. - 'Object.<fieldName>' - CEL type of object field (such as 'Object.spec') - 'Object.<fieldName1>.<fieldName2>...<fieldNameN>` - CEL type of nested field (such as 'Object.spec.containers')
699
+
700
+ CEL expressions have access to the contents of the API request, organized into CEL variables as well as some other useful variables:
701
+
702
+ - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
703
+ For example, a variable named 'foo' can be accessed as 'variables.foo'.
704
+ - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
705
+ See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
706
+ - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
707
+ request resource.
708
+
709
+ CEL expressions have access to [Kubernetes CEL function libraries](https://kubernetes.io/docs/reference/using-api/cel/#cel-options-language-features-and-libraries) as well as:
710
+
711
+ - 'jsonpatch.escapeKey' - Performs JSONPatch key escaping. '~' and '/' are escaped as '~0' and `~1' respectively).
712
+
713
+ Only property names of the form `[a-zA-Z_.-/][a-zA-Z0-9_.-/]*` are accessible. Required.
714
+ """
715
+ return pulumi.get(self, "expression")
716
+
717
+
289
718
  @pulumi.output_type
290
719
  class MatchCondition(dict):
291
720
  def __init__(__self__, *,
@@ -497,229 +926,984 @@ class MatchResources(dict):
497
926
 
498
927
  Defaults to "Equivalent"
499
928
  """
500
- return pulumi.get(self, "match_policy")
929
+ return pulumi.get(self, "match_policy")
930
+
931
+ @property
932
+ @pulumi.getter(name="namespaceSelector")
933
+ def namespace_selector(self) -> Optional['_meta.v1.outputs.LabelSelector']:
934
+ """
935
+ NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
936
+
937
+ For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
938
+ "matchExpressions": [
939
+ {
940
+ "key": "runlevel",
941
+ "operator": "NotIn",
942
+ "values": [
943
+ "0",
944
+ "1"
945
+ ]
946
+ }
947
+ ]
948
+ }
949
+
950
+ If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
951
+ "matchExpressions": [
952
+ {
953
+ "key": "environment",
954
+ "operator": "In",
955
+ "values": [
956
+ "prod",
957
+ "staging"
958
+ ]
959
+ }
960
+ ]
961
+ }
962
+
963
+ See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
964
+
965
+ Default to the empty LabelSelector, which matches everything.
966
+ """
967
+ return pulumi.get(self, "namespace_selector")
968
+
969
+ @property
970
+ @pulumi.getter(name="objectSelector")
971
+ def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelector']:
972
+ """
973
+ ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
974
+ """
975
+ return pulumi.get(self, "object_selector")
976
+
977
+ @property
978
+ @pulumi.getter(name="resourceRules")
979
+ def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperations']]:
980
+ """
981
+ ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
982
+ """
983
+ return pulumi.get(self, "resource_rules")
984
+
985
+
986
+ @pulumi.output_type
987
+ class MatchResourcesPatch(dict):
988
+ """
989
+ MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
990
+ """
991
+ @staticmethod
992
+ def __key_warning(key: str):
993
+ suggest = None
994
+ if key == "excludeResourceRules":
995
+ suggest = "exclude_resource_rules"
996
+ elif key == "matchPolicy":
997
+ suggest = "match_policy"
998
+ elif key == "namespaceSelector":
999
+ suggest = "namespace_selector"
1000
+ elif key == "objectSelector":
1001
+ suggest = "object_selector"
1002
+ elif key == "resourceRules":
1003
+ suggest = "resource_rules"
1004
+
1005
+ if suggest:
1006
+ pulumi.log.warn(f"Key '{key}' not found in MatchResourcesPatch. Access the value via the '{suggest}' property getter instead.")
1007
+
1008
+ def __getitem__(self, key: str) -> Any:
1009
+ MatchResourcesPatch.__key_warning(key)
1010
+ return super().__getitem__(key)
1011
+
1012
+ def get(self, key: str, default = None) -> Any:
1013
+ MatchResourcesPatch.__key_warning(key)
1014
+ return super().get(key, default)
1015
+
1016
+ def __init__(__self__, *,
1017
+ exclude_resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None,
1018
+ match_policy: Optional[str] = None,
1019
+ namespace_selector: Optional['_meta.v1.outputs.LabelSelectorPatch'] = None,
1020
+ object_selector: Optional['_meta.v1.outputs.LabelSelectorPatch'] = None,
1021
+ resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None):
1022
+ """
1023
+ MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
1024
+ :param Sequence['NamedRuleWithOperationsPatchArgs'] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
1025
+ :param str match_policy: matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
1026
+
1027
+ - Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
1028
+
1029
+ - Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
1030
+
1031
+ Defaults to "Equivalent"
1032
+ :param '_meta.v1.LabelSelectorPatchArgs' namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
1033
+
1034
+ For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
1035
+ "matchExpressions": [
1036
+ {
1037
+ "key": "runlevel",
1038
+ "operator": "NotIn",
1039
+ "values": [
1040
+ "0",
1041
+ "1"
1042
+ ]
1043
+ }
1044
+ ]
1045
+ }
1046
+
1047
+ If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
1048
+ "matchExpressions": [
1049
+ {
1050
+ "key": "environment",
1051
+ "operator": "In",
1052
+ "values": [
1053
+ "prod",
1054
+ "staging"
1055
+ ]
1056
+ }
1057
+ ]
1058
+ }
1059
+
1060
+ See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
1061
+
1062
+ Default to the empty LabelSelector, which matches everything.
1063
+ :param '_meta.v1.LabelSelectorPatchArgs' object_selector: ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
1064
+ :param Sequence['NamedRuleWithOperationsPatchArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
1065
+ """
1066
+ if exclude_resource_rules is not None:
1067
+ pulumi.set(__self__, "exclude_resource_rules", exclude_resource_rules)
1068
+ if match_policy is not None:
1069
+ pulumi.set(__self__, "match_policy", match_policy)
1070
+ if namespace_selector is not None:
1071
+ pulumi.set(__self__, "namespace_selector", namespace_selector)
1072
+ if object_selector is not None:
1073
+ pulumi.set(__self__, "object_selector", object_selector)
1074
+ if resource_rules is not None:
1075
+ pulumi.set(__self__, "resource_rules", resource_rules)
1076
+
1077
+ @property
1078
+ @pulumi.getter(name="excludeResourceRules")
1079
+ def exclude_resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
1080
+ """
1081
+ ExcludeResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
1082
+ """
1083
+ return pulumi.get(self, "exclude_resource_rules")
1084
+
1085
+ @property
1086
+ @pulumi.getter(name="matchPolicy")
1087
+ def match_policy(self) -> Optional[str]:
1088
+ """
1089
+ matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
1090
+
1091
+ - Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
1092
+
1093
+ - Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
1094
+
1095
+ Defaults to "Equivalent"
1096
+ """
1097
+ return pulumi.get(self, "match_policy")
1098
+
1099
+ @property
1100
+ @pulumi.getter(name="namespaceSelector")
1101
+ def namespace_selector(self) -> Optional['_meta.v1.outputs.LabelSelectorPatch']:
1102
+ """
1103
+ NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
1104
+
1105
+ For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
1106
+ "matchExpressions": [
1107
+ {
1108
+ "key": "runlevel",
1109
+ "operator": "NotIn",
1110
+ "values": [
1111
+ "0",
1112
+ "1"
1113
+ ]
1114
+ }
1115
+ ]
1116
+ }
1117
+
1118
+ If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
1119
+ "matchExpressions": [
1120
+ {
1121
+ "key": "environment",
1122
+ "operator": "In",
1123
+ "values": [
1124
+ "prod",
1125
+ "staging"
1126
+ ]
1127
+ }
1128
+ ]
1129
+ }
1130
+
1131
+ See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
1132
+
1133
+ Default to the empty LabelSelector, which matches everything.
1134
+ """
1135
+ return pulumi.get(self, "namespace_selector")
1136
+
1137
+ @property
1138
+ @pulumi.getter(name="objectSelector")
1139
+ def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelectorPatch']:
1140
+ """
1141
+ ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
1142
+ """
1143
+ return pulumi.get(self, "object_selector")
1144
+
1145
+ @property
1146
+ @pulumi.getter(name="resourceRules")
1147
+ def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
1148
+ """
1149
+ ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
1150
+ """
1151
+ return pulumi.get(self, "resource_rules")
1152
+
1153
+
1154
+ @pulumi.output_type
1155
+ class MutatingAdmissionPolicy(dict):
1156
+ """
1157
+ MutatingAdmissionPolicy describes the definition of an admission mutation policy that mutates the object coming into admission chain.
1158
+ """
1159
+ @staticmethod
1160
+ def __key_warning(key: str):
1161
+ suggest = None
1162
+ if key == "apiVersion":
1163
+ suggest = "api_version"
1164
+
1165
+ if suggest:
1166
+ pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicy. Access the value via the '{suggest}' property getter instead.")
1167
+
1168
+ def __getitem__(self, key: str) -> Any:
1169
+ MutatingAdmissionPolicy.__key_warning(key)
1170
+ return super().__getitem__(key)
1171
+
1172
+ def get(self, key: str, default = None) -> Any:
1173
+ MutatingAdmissionPolicy.__key_warning(key)
1174
+ return super().get(key, default)
1175
+
1176
+ def __init__(__self__, *,
1177
+ api_version: Optional[str] = None,
1178
+ kind: Optional[str] = None,
1179
+ metadata: Optional['_meta.v1.outputs.ObjectMeta'] = None,
1180
+ spec: Optional['outputs.MutatingAdmissionPolicySpec'] = None):
1181
+ """
1182
+ MutatingAdmissionPolicy describes the definition of an admission mutation policy that mutates the object coming into admission chain.
1183
+ :param str api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
1184
+ :param str kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
1185
+ :param '_meta.v1.ObjectMetaArgs' metadata: Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
1186
+ :param 'MutatingAdmissionPolicySpecArgs' spec: Specification of the desired behavior of the MutatingAdmissionPolicy.
1187
+ """
1188
+ if api_version is not None:
1189
+ pulumi.set(__self__, "api_version", 'admissionregistration.k8s.io/v1alpha1')
1190
+ if kind is not None:
1191
+ pulumi.set(__self__, "kind", 'MutatingAdmissionPolicy')
1192
+ if metadata is not None:
1193
+ pulumi.set(__self__, "metadata", metadata)
1194
+ if spec is not None:
1195
+ pulumi.set(__self__, "spec", spec)
1196
+
1197
+ @property
1198
+ @pulumi.getter(name="apiVersion")
1199
+ def api_version(self) -> Optional[str]:
1200
+ """
1201
+ APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
1202
+ """
1203
+ return pulumi.get(self, "api_version")
1204
+
1205
+ @property
1206
+ @pulumi.getter
1207
+ def kind(self) -> Optional[str]:
1208
+ """
1209
+ Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
1210
+ """
1211
+ return pulumi.get(self, "kind")
1212
+
1213
+ @property
1214
+ @pulumi.getter
1215
+ def metadata(self) -> Optional['_meta.v1.outputs.ObjectMeta']:
1216
+ """
1217
+ Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
1218
+ """
1219
+ return pulumi.get(self, "metadata")
1220
+
1221
+ @property
1222
+ @pulumi.getter
1223
+ def spec(self) -> Optional['outputs.MutatingAdmissionPolicySpec']:
1224
+ """
1225
+ Specification of the desired behavior of the MutatingAdmissionPolicy.
1226
+ """
1227
+ return pulumi.get(self, "spec")
1228
+
1229
+
1230
+ @pulumi.output_type
1231
+ class MutatingAdmissionPolicyBinding(dict):
1232
+ """
1233
+ MutatingAdmissionPolicyBinding binds the MutatingAdmissionPolicy with parametrized resources. MutatingAdmissionPolicyBinding and the optional parameter resource together define how cluster administrators configure policies for clusters.
1234
+
1235
+ For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding. Each evaluation is constrained by a [runtime cost budget](https://kubernetes.io/docs/reference/using-api/cel/#runtime-cost-budget).
1236
+
1237
+ Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
1238
+ """
1239
+ @staticmethod
1240
+ def __key_warning(key: str):
1241
+ suggest = None
1242
+ if key == "apiVersion":
1243
+ suggest = "api_version"
1244
+
1245
+ if suggest:
1246
+ pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicyBinding. Access the value via the '{suggest}' property getter instead.")
1247
+
1248
+ def __getitem__(self, key: str) -> Any:
1249
+ MutatingAdmissionPolicyBinding.__key_warning(key)
1250
+ return super().__getitem__(key)
1251
+
1252
+ def get(self, key: str, default = None) -> Any:
1253
+ MutatingAdmissionPolicyBinding.__key_warning(key)
1254
+ return super().get(key, default)
1255
+
1256
+ def __init__(__self__, *,
1257
+ api_version: Optional[str] = None,
1258
+ kind: Optional[str] = None,
1259
+ metadata: Optional['_meta.v1.outputs.ObjectMeta'] = None,
1260
+ spec: Optional['outputs.MutatingAdmissionPolicyBindingSpec'] = None):
1261
+ """
1262
+ MutatingAdmissionPolicyBinding binds the MutatingAdmissionPolicy with parametrized resources. MutatingAdmissionPolicyBinding and the optional parameter resource together define how cluster administrators configure policies for clusters.
1263
+
1264
+ For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding. Each evaluation is constrained by a [runtime cost budget](https://kubernetes.io/docs/reference/using-api/cel/#runtime-cost-budget).
1265
+
1266
+ Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
1267
+ :param str api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
1268
+ :param str kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
1269
+ :param '_meta.v1.ObjectMetaArgs' metadata: Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
1270
+ :param 'MutatingAdmissionPolicyBindingSpecArgs' spec: Specification of the desired behavior of the MutatingAdmissionPolicyBinding.
1271
+ """
1272
+ if api_version is not None:
1273
+ pulumi.set(__self__, "api_version", 'admissionregistration.k8s.io/v1alpha1')
1274
+ if kind is not None:
1275
+ pulumi.set(__self__, "kind", 'MutatingAdmissionPolicyBinding')
1276
+ if metadata is not None:
1277
+ pulumi.set(__self__, "metadata", metadata)
1278
+ if spec is not None:
1279
+ pulumi.set(__self__, "spec", spec)
1280
+
1281
+ @property
1282
+ @pulumi.getter(name="apiVersion")
1283
+ def api_version(self) -> Optional[str]:
1284
+ """
1285
+ APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
1286
+ """
1287
+ return pulumi.get(self, "api_version")
1288
+
1289
+ @property
1290
+ @pulumi.getter
1291
+ def kind(self) -> Optional[str]:
1292
+ """
1293
+ Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
1294
+ """
1295
+ return pulumi.get(self, "kind")
1296
+
1297
+ @property
1298
+ @pulumi.getter
1299
+ def metadata(self) -> Optional['_meta.v1.outputs.ObjectMeta']:
1300
+ """
1301
+ Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
1302
+ """
1303
+ return pulumi.get(self, "metadata")
1304
+
1305
+ @property
1306
+ @pulumi.getter
1307
+ def spec(self) -> Optional['outputs.MutatingAdmissionPolicyBindingSpec']:
1308
+ """
1309
+ Specification of the desired behavior of the MutatingAdmissionPolicyBinding.
1310
+ """
1311
+ return pulumi.get(self, "spec")
1312
+
1313
+
1314
+ @pulumi.output_type
1315
+ class MutatingAdmissionPolicyBindingSpec(dict):
1316
+ """
1317
+ MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
1318
+ """
1319
+ @staticmethod
1320
+ def __key_warning(key: str):
1321
+ suggest = None
1322
+ if key == "matchResources":
1323
+ suggest = "match_resources"
1324
+ elif key == "paramRef":
1325
+ suggest = "param_ref"
1326
+ elif key == "policyName":
1327
+ suggest = "policy_name"
1328
+
1329
+ if suggest:
1330
+ pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicyBindingSpec. Access the value via the '{suggest}' property getter instead.")
1331
+
1332
+ def __getitem__(self, key: str) -> Any:
1333
+ MutatingAdmissionPolicyBindingSpec.__key_warning(key)
1334
+ return super().__getitem__(key)
1335
+
1336
+ def get(self, key: str, default = None) -> Any:
1337
+ MutatingAdmissionPolicyBindingSpec.__key_warning(key)
1338
+ return super().get(key, default)
1339
+
1340
+ def __init__(__self__, *,
1341
+ match_resources: Optional['outputs.MatchResources'] = None,
1342
+ param_ref: Optional['outputs.ParamRef'] = None,
1343
+ policy_name: Optional[str] = None):
1344
+ """
1345
+ MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
1346
+ :param 'MatchResourcesArgs' match_resources: matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
1347
+ :param 'ParamRefArgs' param_ref: paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
1348
+ :param str policy_name: policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
1349
+ """
1350
+ if match_resources is not None:
1351
+ pulumi.set(__self__, "match_resources", match_resources)
1352
+ if param_ref is not None:
1353
+ pulumi.set(__self__, "param_ref", param_ref)
1354
+ if policy_name is not None:
1355
+ pulumi.set(__self__, "policy_name", policy_name)
1356
+
1357
+ @property
1358
+ @pulumi.getter(name="matchResources")
1359
+ def match_resources(self) -> Optional['outputs.MatchResources']:
1360
+ """
1361
+ matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
1362
+ """
1363
+ return pulumi.get(self, "match_resources")
1364
+
1365
+ @property
1366
+ @pulumi.getter(name="paramRef")
1367
+ def param_ref(self) -> Optional['outputs.ParamRef']:
1368
+ """
1369
+ paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
1370
+ """
1371
+ return pulumi.get(self, "param_ref")
1372
+
1373
+ @property
1374
+ @pulumi.getter(name="policyName")
1375
+ def policy_name(self) -> Optional[str]:
1376
+ """
1377
+ policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
1378
+ """
1379
+ return pulumi.get(self, "policy_name")
1380
+
1381
+
1382
+ @pulumi.output_type
1383
+ class MutatingAdmissionPolicyBindingSpecPatch(dict):
1384
+ """
1385
+ MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
1386
+ """
1387
+ @staticmethod
1388
+ def __key_warning(key: str):
1389
+ suggest = None
1390
+ if key == "matchResources":
1391
+ suggest = "match_resources"
1392
+ elif key == "paramRef":
1393
+ suggest = "param_ref"
1394
+ elif key == "policyName":
1395
+ suggest = "policy_name"
1396
+
1397
+ if suggest:
1398
+ pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicyBindingSpecPatch. Access the value via the '{suggest}' property getter instead.")
1399
+
1400
+ def __getitem__(self, key: str) -> Any:
1401
+ MutatingAdmissionPolicyBindingSpecPatch.__key_warning(key)
1402
+ return super().__getitem__(key)
1403
+
1404
+ def get(self, key: str, default = None) -> Any:
1405
+ MutatingAdmissionPolicyBindingSpecPatch.__key_warning(key)
1406
+ return super().get(key, default)
1407
+
1408
+ def __init__(__self__, *,
1409
+ match_resources: Optional['outputs.MatchResourcesPatch'] = None,
1410
+ param_ref: Optional['outputs.ParamRefPatch'] = None,
1411
+ policy_name: Optional[str] = None):
1412
+ """
1413
+ MutatingAdmissionPolicyBindingSpec is the specification of the MutatingAdmissionPolicyBinding.
1414
+ :param 'MatchResourcesPatchArgs' match_resources: matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
1415
+ :param 'ParamRefPatchArgs' param_ref: paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
1416
+ :param str policy_name: policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
1417
+ """
1418
+ if match_resources is not None:
1419
+ pulumi.set(__self__, "match_resources", match_resources)
1420
+ if param_ref is not None:
1421
+ pulumi.set(__self__, "param_ref", param_ref)
1422
+ if policy_name is not None:
1423
+ pulumi.set(__self__, "policy_name", policy_name)
1424
+
1425
+ @property
1426
+ @pulumi.getter(name="matchResources")
1427
+ def match_resources(self) -> Optional['outputs.MatchResourcesPatch']:
1428
+ """
1429
+ matchResources limits what resources match this binding and may be mutated by it. Note that if matchResources matches a resource, the resource must also match a policy's matchConstraints and matchConditions before the resource may be mutated. When matchResources is unset, it does not constrain resource matching, and only the policy's matchConstraints and matchConditions must match for the resource to be mutated. Additionally, matchResources.resourceRules are optional and do not constraint matching when unset. Note that this is differs from MutatingAdmissionPolicy matchConstraints, where resourceRules are required. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT.
1430
+ """
1431
+ return pulumi.get(self, "match_resources")
1432
+
1433
+ @property
1434
+ @pulumi.getter(name="paramRef")
1435
+ def param_ref(self) -> Optional['outputs.ParamRefPatch']:
1436
+ """
1437
+ paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in spec.ParamKind of the bound MutatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the MutatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
1438
+ """
1439
+ return pulumi.get(self, "param_ref")
1440
+
1441
+ @property
1442
+ @pulumi.getter(name="policyName")
1443
+ def policy_name(self) -> Optional[str]:
1444
+ """
1445
+ policyName references a MutatingAdmissionPolicy name which the MutatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
1446
+ """
1447
+ return pulumi.get(self, "policy_name")
1448
+
1449
+
1450
+ @pulumi.output_type
1451
+ class MutatingAdmissionPolicySpec(dict):
1452
+ """
1453
+ MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
1454
+ """
1455
+ @staticmethod
1456
+ def __key_warning(key: str):
1457
+ suggest = None
1458
+ if key == "failurePolicy":
1459
+ suggest = "failure_policy"
1460
+ elif key == "matchConditions":
1461
+ suggest = "match_conditions"
1462
+ elif key == "matchConstraints":
1463
+ suggest = "match_constraints"
1464
+ elif key == "paramKind":
1465
+ suggest = "param_kind"
1466
+ elif key == "reinvocationPolicy":
1467
+ suggest = "reinvocation_policy"
1468
+
1469
+ if suggest:
1470
+ pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicySpec. Access the value via the '{suggest}' property getter instead.")
1471
+
1472
+ def __getitem__(self, key: str) -> Any:
1473
+ MutatingAdmissionPolicySpec.__key_warning(key)
1474
+ return super().__getitem__(key)
1475
+
1476
+ def get(self, key: str, default = None) -> Any:
1477
+ MutatingAdmissionPolicySpec.__key_warning(key)
1478
+ return super().get(key, default)
1479
+
1480
+ def __init__(__self__, *,
1481
+ failure_policy: Optional[str] = None,
1482
+ match_conditions: Optional[Sequence['outputs.MatchCondition']] = None,
1483
+ match_constraints: Optional['outputs.MatchResources'] = None,
1484
+ mutations: Optional[Sequence['outputs.Mutation']] = None,
1485
+ param_kind: Optional['outputs.ParamKind'] = None,
1486
+ reinvocation_policy: Optional[str] = None,
1487
+ variables: Optional[Sequence['outputs.Variable']] = None):
1488
+ """
1489
+ MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
1490
+ :param str failure_policy: failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
1491
+
1492
+ A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
1493
+
1494
+ failurePolicy does not define how validations that evaluate to false are handled.
1495
+
1496
+ Allowed values are Ignore or Fail. Defaults to Fail.
1497
+ :param Sequence['MatchConditionArgs'] match_conditions: matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
1498
+
1499
+ If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
1500
+
1501
+ The exact matching logic is (in order):
1502
+ 1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
1503
+ 2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
1504
+ 3. If any matchCondition evaluates to an error (but none are FALSE):
1505
+ - If failurePolicy=Fail, reject the request
1506
+ - If failurePolicy=Ignore, the policy is skipped
1507
+ :param 'MatchResourcesArgs' match_constraints: matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
1508
+ :param Sequence['MutationArgs'] mutations: mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
1509
+ :param 'ParamKindArgs' param_kind: paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
1510
+ :param str reinvocation_policy: reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
1511
+
1512
+ Never: These mutations will not be called more than once per binding in a single admission evaluation.
1513
+
1514
+ IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
1515
+ :param Sequence['VariableArgs'] variables: variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
1516
+
1517
+ The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
1518
+ """
1519
+ if failure_policy is not None:
1520
+ pulumi.set(__self__, "failure_policy", failure_policy)
1521
+ if match_conditions is not None:
1522
+ pulumi.set(__self__, "match_conditions", match_conditions)
1523
+ if match_constraints is not None:
1524
+ pulumi.set(__self__, "match_constraints", match_constraints)
1525
+ if mutations is not None:
1526
+ pulumi.set(__self__, "mutations", mutations)
1527
+ if param_kind is not None:
1528
+ pulumi.set(__self__, "param_kind", param_kind)
1529
+ if reinvocation_policy is not None:
1530
+ pulumi.set(__self__, "reinvocation_policy", reinvocation_policy)
1531
+ if variables is not None:
1532
+ pulumi.set(__self__, "variables", variables)
1533
+
1534
+ @property
1535
+ @pulumi.getter(name="failurePolicy")
1536
+ def failure_policy(self) -> Optional[str]:
1537
+ """
1538
+ failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
1539
+
1540
+ A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
1541
+
1542
+ failurePolicy does not define how validations that evaluate to false are handled.
1543
+
1544
+ Allowed values are Ignore or Fail. Defaults to Fail.
1545
+ """
1546
+ return pulumi.get(self, "failure_policy")
1547
+
1548
+ @property
1549
+ @pulumi.getter(name="matchConditions")
1550
+ def match_conditions(self) -> Optional[Sequence['outputs.MatchCondition']]:
1551
+ """
1552
+ matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
1553
+
1554
+ If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
1555
+
1556
+ The exact matching logic is (in order):
1557
+ 1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
1558
+ 2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
1559
+ 3. If any matchCondition evaluates to an error (but none are FALSE):
1560
+ - If failurePolicy=Fail, reject the request
1561
+ - If failurePolicy=Ignore, the policy is skipped
1562
+ """
1563
+ return pulumi.get(self, "match_conditions")
1564
+
1565
+ @property
1566
+ @pulumi.getter(name="matchConstraints")
1567
+ def match_constraints(self) -> Optional['outputs.MatchResources']:
1568
+ """
1569
+ matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
1570
+ """
1571
+ return pulumi.get(self, "match_constraints")
1572
+
1573
+ @property
1574
+ @pulumi.getter
1575
+ def mutations(self) -> Optional[Sequence['outputs.Mutation']]:
1576
+ """
1577
+ mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
1578
+ """
1579
+ return pulumi.get(self, "mutations")
1580
+
1581
+ @property
1582
+ @pulumi.getter(name="paramKind")
1583
+ def param_kind(self) -> Optional['outputs.ParamKind']:
1584
+ """
1585
+ paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
1586
+ """
1587
+ return pulumi.get(self, "param_kind")
1588
+
1589
+ @property
1590
+ @pulumi.getter(name="reinvocationPolicy")
1591
+ def reinvocation_policy(self) -> Optional[str]:
1592
+ """
1593
+ reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
1594
+
1595
+ Never: These mutations will not be called more than once per binding in a single admission evaluation.
1596
+
1597
+ IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
1598
+ """
1599
+ return pulumi.get(self, "reinvocation_policy")
1600
+
1601
+ @property
1602
+ @pulumi.getter
1603
+ def variables(self) -> Optional[Sequence['outputs.Variable']]:
1604
+ """
1605
+ variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
1606
+
1607
+ The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
1608
+ """
1609
+ return pulumi.get(self, "variables")
1610
+
1611
+
1612
+ @pulumi.output_type
1613
+ class MutatingAdmissionPolicySpecPatch(dict):
1614
+ """
1615
+ MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
1616
+ """
1617
+ @staticmethod
1618
+ def __key_warning(key: str):
1619
+ suggest = None
1620
+ if key == "failurePolicy":
1621
+ suggest = "failure_policy"
1622
+ elif key == "matchConditions":
1623
+ suggest = "match_conditions"
1624
+ elif key == "matchConstraints":
1625
+ suggest = "match_constraints"
1626
+ elif key == "paramKind":
1627
+ suggest = "param_kind"
1628
+ elif key == "reinvocationPolicy":
1629
+ suggest = "reinvocation_policy"
1630
+
1631
+ if suggest:
1632
+ pulumi.log.warn(f"Key '{key}' not found in MutatingAdmissionPolicySpecPatch. Access the value via the '{suggest}' property getter instead.")
1633
+
1634
+ def __getitem__(self, key: str) -> Any:
1635
+ MutatingAdmissionPolicySpecPatch.__key_warning(key)
1636
+ return super().__getitem__(key)
1637
+
1638
+ def get(self, key: str, default = None) -> Any:
1639
+ MutatingAdmissionPolicySpecPatch.__key_warning(key)
1640
+ return super().get(key, default)
1641
+
1642
+ def __init__(__self__, *,
1643
+ failure_policy: Optional[str] = None,
1644
+ match_conditions: Optional[Sequence['outputs.MatchConditionPatch']] = None,
1645
+ match_constraints: Optional['outputs.MatchResourcesPatch'] = None,
1646
+ mutations: Optional[Sequence['outputs.MutationPatch']] = None,
1647
+ param_kind: Optional['outputs.ParamKindPatch'] = None,
1648
+ reinvocation_policy: Optional[str] = None,
1649
+ variables: Optional[Sequence['outputs.VariablePatch']] = None):
1650
+ """
1651
+ MutatingAdmissionPolicySpec is the specification of the desired behavior of the admission policy.
1652
+ :param str failure_policy: failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
1653
+
1654
+ A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
1655
+
1656
+ failurePolicy does not define how validations that evaluate to false are handled.
1657
+
1658
+ Allowed values are Ignore or Fail. Defaults to Fail.
1659
+ :param Sequence['MatchConditionPatchArgs'] match_conditions: matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
1660
+
1661
+ If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
1662
+
1663
+ The exact matching logic is (in order):
1664
+ 1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
1665
+ 2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
1666
+ 3. If any matchCondition evaluates to an error (but none are FALSE):
1667
+ - If failurePolicy=Fail, reject the request
1668
+ - If failurePolicy=Ignore, the policy is skipped
1669
+ :param 'MatchResourcesPatchArgs' match_constraints: matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
1670
+ :param Sequence['MutationPatchArgs'] mutations: mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
1671
+ :param 'ParamKindPatchArgs' param_kind: paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
1672
+ :param str reinvocation_policy: reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
1673
+
1674
+ Never: These mutations will not be called more than once per binding in a single admission evaluation.
1675
+
1676
+ IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
1677
+ :param Sequence['VariablePatchArgs'] variables: variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
1678
+
1679
+ The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
1680
+ """
1681
+ if failure_policy is not None:
1682
+ pulumi.set(__self__, "failure_policy", failure_policy)
1683
+ if match_conditions is not None:
1684
+ pulumi.set(__self__, "match_conditions", match_conditions)
1685
+ if match_constraints is not None:
1686
+ pulumi.set(__self__, "match_constraints", match_constraints)
1687
+ if mutations is not None:
1688
+ pulumi.set(__self__, "mutations", mutations)
1689
+ if param_kind is not None:
1690
+ pulumi.set(__self__, "param_kind", param_kind)
1691
+ if reinvocation_policy is not None:
1692
+ pulumi.set(__self__, "reinvocation_policy", reinvocation_policy)
1693
+ if variables is not None:
1694
+ pulumi.set(__self__, "variables", variables)
1695
+
1696
+ @property
1697
+ @pulumi.getter(name="failurePolicy")
1698
+ def failure_policy(self) -> Optional[str]:
1699
+ """
1700
+ failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
1701
+
1702
+ A policy is invalid if paramKind refers to a non-existent Kind. A binding is invalid if paramRef.name refers to a non-existent resource.
1703
+
1704
+ failurePolicy does not define how validations that evaluate to false are handled.
1705
+
1706
+ Allowed values are Ignore or Fail. Defaults to Fail.
1707
+ """
1708
+ return pulumi.get(self, "failure_policy")
1709
+
1710
+ @property
1711
+ @pulumi.getter(name="matchConditions")
1712
+ def match_conditions(self) -> Optional[Sequence['outputs.MatchConditionPatch']]:
1713
+ """
1714
+ matchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the matchConstraints. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
1715
+
1716
+ If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
1717
+
1718
+ The exact matching logic is (in order):
1719
+ 1. If ANY matchCondition evaluates to FALSE, the policy is skipped.
1720
+ 2. If ALL matchConditions evaluate to TRUE, the policy is evaluated.
1721
+ 3. If any matchCondition evaluates to an error (but none are FALSE):
1722
+ - If failurePolicy=Fail, reject the request
1723
+ - If failurePolicy=Ignore, the policy is skipped
1724
+ """
1725
+ return pulumi.get(self, "match_conditions")
1726
+
1727
+ @property
1728
+ @pulumi.getter(name="matchConstraints")
1729
+ def match_constraints(self) -> Optional['outputs.MatchResourcesPatch']:
1730
+ """
1731
+ matchConstraints specifies what resources this policy is designed to validate. The MutatingAdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API MutatingAdmissionPolicy cannot match MutatingAdmissionPolicy and MutatingAdmissionPolicyBinding. The CREATE, UPDATE and CONNECT operations are allowed. The DELETE operation may not be matched. '*' matches CREATE, UPDATE and CONNECT. Required.
1732
+ """
1733
+ return pulumi.get(self, "match_constraints")
501
1734
 
502
1735
  @property
503
- @pulumi.getter(name="namespaceSelector")
504
- def namespace_selector(self) -> Optional['_meta.v1.outputs.LabelSelector']:
1736
+ @pulumi.getter
1737
+ def mutations(self) -> Optional[Sequence['outputs.MutationPatch']]:
505
1738
  """
506
- NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
507
-
508
- For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
509
- "matchExpressions": [
510
- {
511
- "key": "runlevel",
512
- "operator": "NotIn",
513
- "values": [
514
- "0",
515
- "1"
516
- ]
517
- }
518
- ]
519
- }
520
-
521
- If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
522
- "matchExpressions": [
523
- {
524
- "key": "environment",
525
- "operator": "In",
526
- "values": [
527
- "prod",
528
- "staging"
529
- ]
530
- }
531
- ]
532
- }
533
-
534
- See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
1739
+ mutations contain operations to perform on matching objects. mutations may not be empty; a minimum of one mutation is required. mutations are evaluated in order, and are reinvoked according to the reinvocationPolicy. The mutations of a policy are invoked for each binding of this policy and reinvocation of mutations occurs on a per binding basis.
1740
+ """
1741
+ return pulumi.get(self, "mutations")
535
1742
 
536
- Default to the empty LabelSelector, which matches everything.
1743
+ @property
1744
+ @pulumi.getter(name="paramKind")
1745
+ def param_kind(self) -> Optional['outputs.ParamKindPatch']:
537
1746
  """
538
- return pulumi.get(self, "namespace_selector")
1747
+ paramKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If paramKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in MutatingAdmissionPolicyBinding, the params variable will be null.
1748
+ """
1749
+ return pulumi.get(self, "param_kind")
539
1750
 
540
1751
  @property
541
- @pulumi.getter(name="objectSelector")
542
- def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelector']:
1752
+ @pulumi.getter(name="reinvocationPolicy")
1753
+ def reinvocation_policy(self) -> Optional[str]:
543
1754
  """
544
- ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
1755
+ reinvocationPolicy indicates whether mutations may be called multiple times per MutatingAdmissionPolicyBinding as part of a single admission evaluation. Allowed values are "Never" and "IfNeeded".
1756
+
1757
+ Never: These mutations will not be called more than once per binding in a single admission evaluation.
1758
+
1759
+ IfNeeded: These mutations may be invoked more than once per binding for a single admission request and there is no guarantee of order with respect to other admission plugins, admission webhooks, bindings of this policy and admission policies. Mutations are only reinvoked when mutations change the object after this mutation is invoked. Required.
545
1760
  """
546
- return pulumi.get(self, "object_selector")
1761
+ return pulumi.get(self, "reinvocation_policy")
547
1762
 
548
1763
  @property
549
- @pulumi.getter(name="resourceRules")
550
- def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperations']]:
1764
+ @pulumi.getter
1765
+ def variables(self) -> Optional[Sequence['outputs.VariablePatch']]:
551
1766
  """
552
- ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
1767
+ variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except matchConditions because matchConditions are evaluated before the rest of the policy.
1768
+
1769
+ The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, variables must be sorted by the order of first appearance and acyclic.
553
1770
  """
554
- return pulumi.get(self, "resource_rules")
1771
+ return pulumi.get(self, "variables")
555
1772
 
556
1773
 
557
1774
  @pulumi.output_type
558
- class MatchResourcesPatch(dict):
1775
+ class Mutation(dict):
559
1776
  """
560
- MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
1777
+ Mutation specifies the CEL expression which is used to apply the Mutation.
561
1778
  """
562
1779
  @staticmethod
563
1780
  def __key_warning(key: str):
564
1781
  suggest = None
565
- if key == "excludeResourceRules":
566
- suggest = "exclude_resource_rules"
567
- elif key == "matchPolicy":
568
- suggest = "match_policy"
569
- elif key == "namespaceSelector":
570
- suggest = "namespace_selector"
571
- elif key == "objectSelector":
572
- suggest = "object_selector"
573
- elif key == "resourceRules":
574
- suggest = "resource_rules"
1782
+ if key == "patchType":
1783
+ suggest = "patch_type"
1784
+ elif key == "applyConfiguration":
1785
+ suggest = "apply_configuration"
1786
+ elif key == "jsonPatch":
1787
+ suggest = "json_patch"
575
1788
 
576
1789
  if suggest:
577
- pulumi.log.warn(f"Key '{key}' not found in MatchResourcesPatch. Access the value via the '{suggest}' property getter instead.")
1790
+ pulumi.log.warn(f"Key '{key}' not found in Mutation. Access the value via the '{suggest}' property getter instead.")
578
1791
 
579
1792
  def __getitem__(self, key: str) -> Any:
580
- MatchResourcesPatch.__key_warning(key)
1793
+ Mutation.__key_warning(key)
581
1794
  return super().__getitem__(key)
582
1795
 
583
1796
  def get(self, key: str, default = None) -> Any:
584
- MatchResourcesPatch.__key_warning(key)
1797
+ Mutation.__key_warning(key)
585
1798
  return super().get(key, default)
586
1799
 
587
1800
  def __init__(__self__, *,
588
- exclude_resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None,
589
- match_policy: Optional[str] = None,
590
- namespace_selector: Optional['_meta.v1.outputs.LabelSelectorPatch'] = None,
591
- object_selector: Optional['_meta.v1.outputs.LabelSelectorPatch'] = None,
592
- resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None):
1801
+ patch_type: str,
1802
+ apply_configuration: Optional['outputs.ApplyConfiguration'] = None,
1803
+ json_patch: Optional['outputs.JSONPatch'] = None):
593
1804
  """
594
- MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
595
- :param Sequence['NamedRuleWithOperationsPatchArgs'] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
596
- :param str match_policy: matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
597
-
598
- - Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
599
-
600
- - Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
601
-
602
- Defaults to "Equivalent"
603
- :param '_meta.v1.LabelSelectorPatchArgs' namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
604
-
605
- For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
606
- "matchExpressions": [
607
- {
608
- "key": "runlevel",
609
- "operator": "NotIn",
610
- "values": [
611
- "0",
612
- "1"
613
- ]
614
- }
615
- ]
616
- }
617
-
618
- If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
619
- "matchExpressions": [
620
- {
621
- "key": "environment",
622
- "operator": "In",
623
- "values": [
624
- "prod",
625
- "staging"
626
- ]
627
- }
628
- ]
629
- }
630
-
631
- See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
632
-
633
- Default to the empty LabelSelector, which matches everything.
634
- :param '_meta.v1.LabelSelectorPatchArgs' object_selector: ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
635
- :param Sequence['NamedRuleWithOperationsPatchArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
1805
+ Mutation specifies the CEL expression which is used to apply the Mutation.
1806
+ :param str patch_type: patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
1807
+ :param 'ApplyConfigurationArgs' apply_configuration: applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
1808
+ :param 'JSONPatchArgs' json_patch: jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
636
1809
  """
637
- if exclude_resource_rules is not None:
638
- pulumi.set(__self__, "exclude_resource_rules", exclude_resource_rules)
639
- if match_policy is not None:
640
- pulumi.set(__self__, "match_policy", match_policy)
641
- if namespace_selector is not None:
642
- pulumi.set(__self__, "namespace_selector", namespace_selector)
643
- if object_selector is not None:
644
- pulumi.set(__self__, "object_selector", object_selector)
645
- if resource_rules is not None:
646
- pulumi.set(__self__, "resource_rules", resource_rules)
1810
+ pulumi.set(__self__, "patch_type", patch_type)
1811
+ if apply_configuration is not None:
1812
+ pulumi.set(__self__, "apply_configuration", apply_configuration)
1813
+ if json_patch is not None:
1814
+ pulumi.set(__self__, "json_patch", json_patch)
647
1815
 
648
1816
  @property
649
- @pulumi.getter(name="excludeResourceRules")
650
- def exclude_resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
1817
+ @pulumi.getter(name="patchType")
1818
+ def patch_type(self) -> str:
651
1819
  """
652
- ExcludeResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
1820
+ patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
653
1821
  """
654
- return pulumi.get(self, "exclude_resource_rules")
1822
+ return pulumi.get(self, "patch_type")
655
1823
 
656
1824
  @property
657
- @pulumi.getter(name="matchPolicy")
658
- def match_policy(self) -> Optional[str]:
1825
+ @pulumi.getter(name="applyConfiguration")
1826
+ def apply_configuration(self) -> Optional['outputs.ApplyConfiguration']:
659
1827
  """
660
- matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
661
-
662
- - Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would not be sent to the ValidatingAdmissionPolicy.
663
-
664
- - Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, a request to apps/v1beta1 or extensions/v1beta1 would be converted to apps/v1 and sent to the ValidatingAdmissionPolicy.
665
-
666
- Defaults to "Equivalent"
1828
+ applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
667
1829
  """
668
- return pulumi.get(self, "match_policy")
1830
+ return pulumi.get(self, "apply_configuration")
669
1831
 
670
1832
  @property
671
- @pulumi.getter(name="namespaceSelector")
672
- def namespace_selector(self) -> Optional['_meta.v1.outputs.LabelSelectorPatch']:
1833
+ @pulumi.getter(name="jsonPatch")
1834
+ def json_patch(self) -> Optional['outputs.JSONPatch']:
673
1835
  """
674
- NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
1836
+ jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
1837
+ """
1838
+ return pulumi.get(self, "json_patch")
675
1839
 
676
- For example, to run the webhook on any objects whose namespace is not associated with "runlevel" of "0" or "1"; you will set the selector as follows: "namespaceSelector": {
677
- "matchExpressions": [
678
- {
679
- "key": "runlevel",
680
- "operator": "NotIn",
681
- "values": [
682
- "0",
683
- "1"
684
- ]
685
- }
686
- ]
687
- }
688
1840
 
689
- If instead you want to only run the policy on any objects whose namespace is associated with the "environment" of "prod" or "staging"; you will set the selector as follows: "namespaceSelector": {
690
- "matchExpressions": [
691
- {
692
- "key": "environment",
693
- "operator": "In",
694
- "values": [
695
- "prod",
696
- "staging"
697
- ]
698
- }
699
- ]
700
- }
1841
+ @pulumi.output_type
1842
+ class MutationPatch(dict):
1843
+ """
1844
+ Mutation specifies the CEL expression which is used to apply the Mutation.
1845
+ """
1846
+ @staticmethod
1847
+ def __key_warning(key: str):
1848
+ suggest = None
1849
+ if key == "applyConfiguration":
1850
+ suggest = "apply_configuration"
1851
+ elif key == "jsonPatch":
1852
+ suggest = "json_patch"
1853
+ elif key == "patchType":
1854
+ suggest = "patch_type"
701
1855
 
702
- See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
1856
+ if suggest:
1857
+ pulumi.log.warn(f"Key '{key}' not found in MutationPatch. Access the value via the '{suggest}' property getter instead.")
703
1858
 
704
- Default to the empty LabelSelector, which matches everything.
1859
+ def __getitem__(self, key: str) -> Any:
1860
+ MutationPatch.__key_warning(key)
1861
+ return super().__getitem__(key)
1862
+
1863
+ def get(self, key: str, default = None) -> Any:
1864
+ MutationPatch.__key_warning(key)
1865
+ return super().get(key, default)
1866
+
1867
+ def __init__(__self__, *,
1868
+ apply_configuration: Optional['outputs.ApplyConfigurationPatch'] = None,
1869
+ json_patch: Optional['outputs.JSONPatchPatch'] = None,
1870
+ patch_type: Optional[str] = None):
705
1871
  """
706
- return pulumi.get(self, "namespace_selector")
1872
+ Mutation specifies the CEL expression which is used to apply the Mutation.
1873
+ :param 'ApplyConfigurationPatchArgs' apply_configuration: applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
1874
+ :param 'JSONPatchPatchArgs' json_patch: jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
1875
+ :param str patch_type: patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
1876
+ """
1877
+ if apply_configuration is not None:
1878
+ pulumi.set(__self__, "apply_configuration", apply_configuration)
1879
+ if json_patch is not None:
1880
+ pulumi.set(__self__, "json_patch", json_patch)
1881
+ if patch_type is not None:
1882
+ pulumi.set(__self__, "patch_type", patch_type)
707
1883
 
708
1884
  @property
709
- @pulumi.getter(name="objectSelector")
710
- def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelectorPatch']:
1885
+ @pulumi.getter(name="applyConfiguration")
1886
+ def apply_configuration(self) -> Optional['outputs.ApplyConfigurationPatch']:
711
1887
  """
712
- ObjectSelector decides whether to run the validation based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the cel validation, and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
1888
+ applyConfiguration defines the desired configuration values of an object. The configuration is applied to the admission object using [structured merge diff](https://github.com/kubernetes-sigs/structured-merge-diff). A CEL expression is used to create apply configuration.
713
1889
  """
714
- return pulumi.get(self, "object_selector")
1890
+ return pulumi.get(self, "apply_configuration")
715
1891
 
716
1892
  @property
717
- @pulumi.getter(name="resourceRules")
718
- def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
1893
+ @pulumi.getter(name="jsonPatch")
1894
+ def json_patch(self) -> Optional['outputs.JSONPatchPatch']:
719
1895
  """
720
- ResourceRules describes what operations on what resources/subresources the ValidatingAdmissionPolicy matches. The policy cares about an operation if it matches _any_ Rule.
1896
+ jsonPatch defines a [JSON patch](https://jsonpatch.com/) operation to perform a mutation to the object. A CEL expression is used to create the JSON patch.
721
1897
  """
722
- return pulumi.get(self, "resource_rules")
1898
+ return pulumi.get(self, "json_patch")
1899
+
1900
+ @property
1901
+ @pulumi.getter(name="patchType")
1902
+ def patch_type(self) -> Optional[str]:
1903
+ """
1904
+ patchType indicates the patch strategy used. Allowed values are "ApplyConfiguration" and "JSONPatch". Required.
1905
+ """
1906
+ return pulumi.get(self, "patch_type")
723
1907
 
724
1908
 
725
1909
  @pulumi.output_type
@@ -1438,10 +2622,6 @@ class ValidatingAdmissionPolicy(dict):
1438
2622
  class ValidatingAdmissionPolicyBinding(dict):
1439
2623
  """
1440
2624
  ValidatingAdmissionPolicyBinding binds the ValidatingAdmissionPolicy with paramerized resources. ValidatingAdmissionPolicyBinding and parameter CRDs together define how cluster administrators configure policies for clusters.
1441
-
1442
- For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding.
1443
-
1444
- The CEL expressions of a policy must have a computed CEL cost below the maximum CEL budget. Each evaluation of the policy is given an independent CEL cost budget. Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
1445
2625
  """
1446
2626
  @staticmethod
1447
2627
  def __key_warning(key: str):
@@ -1467,10 +2647,6 @@ class ValidatingAdmissionPolicyBinding(dict):
1467
2647
  spec: Optional['outputs.ValidatingAdmissionPolicyBindingSpec'] = None):
1468
2648
  """
1469
2649
  ValidatingAdmissionPolicyBinding binds the ValidatingAdmissionPolicy with paramerized resources. ValidatingAdmissionPolicyBinding and parameter CRDs together define how cluster administrators configure policies for clusters.
1470
-
1471
- For a given admission request, each binding will cause its policy to be evaluated N times, where N is 1 for policies/bindings that don't use params, otherwise N is the number of parameters selected by the binding.
1472
-
1473
- The CEL expressions of a policy must have a computed CEL cost below the maximum CEL budget. Each evaluation of the policy is given an independent CEL cost budget. Adding/removing policies, bindings, or params can not affect whether a given (policy, binding, param) combination is within its own CEL budget.
1474
2650
  :param str api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
1475
2651
  :param str kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
1476
2652
  :param '_meta.v1.ObjectMetaArgs' metadata: Standard object metadata; More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata.
@@ -1554,7 +2730,7 @@ class ValidatingAdmissionPolicyBindingSpec(dict):
1554
2730
  """
1555
2731
  ValidatingAdmissionPolicyBindingSpec is the specification of the ValidatingAdmissionPolicyBinding.
1556
2732
  :param 'MatchResourcesArgs' match_resources: MatchResources declares what resources match this binding and will be validated by it. Note that this is intersected with the policy's matchConstraints, so only requests that are matched by the policy can be selected by this. If this is unset, all resources matched by the policy are validated by this binding When resourceRules is unset, it does not constrain resource matching. If a resource is matched by the other fields of this object, it will be validated. Note that this is differs from ValidatingAdmissionPolicy matchConstraints, where resourceRules are required.
1557
- :param 'ParamRefArgs' param_ref: paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
2733
+ :param 'ParamRefArgs' param_ref: ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
1558
2734
  :param str policy_name: PolicyName references a ValidatingAdmissionPolicy name which the ValidatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
1559
2735
  :param Sequence[str] validation_actions: validationActions declares how Validations of the referenced ValidatingAdmissionPolicy are enforced. If a validation evaluates to false it is always enforced according to these actions.
1560
2736
 
@@ -1597,7 +2773,7 @@ class ValidatingAdmissionPolicyBindingSpec(dict):
1597
2773
  @pulumi.getter(name="paramRef")
1598
2774
  def param_ref(self) -> Optional['outputs.ParamRef']:
1599
2775
  """
1600
- paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
2776
+ ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
1601
2777
  """
1602
2778
  return pulumi.get(self, "param_ref")
1603
2779
 
@@ -1672,7 +2848,7 @@ class ValidatingAdmissionPolicyBindingSpecPatch(dict):
1672
2848
  """
1673
2849
  ValidatingAdmissionPolicyBindingSpec is the specification of the ValidatingAdmissionPolicyBinding.
1674
2850
  :param 'MatchResourcesPatchArgs' match_resources: MatchResources declares what resources match this binding and will be validated by it. Note that this is intersected with the policy's matchConstraints, so only requests that are matched by the policy can be selected by this. If this is unset, all resources matched by the policy are validated by this binding When resourceRules is unset, it does not constrain resource matching. If a resource is matched by the other fields of this object, it will be validated. Note that this is differs from ValidatingAdmissionPolicy matchConstraints, where resourceRules are required.
1675
- :param 'ParamRefPatchArgs' param_ref: paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
2851
+ :param 'ParamRefPatchArgs' param_ref: ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
1676
2852
  :param str policy_name: PolicyName references a ValidatingAdmissionPolicy name which the ValidatingAdmissionPolicyBinding binds to. If the referenced resource does not exist, this binding is considered invalid and will be ignored Required.
1677
2853
  :param Sequence[str] validation_actions: validationActions declares how Validations of the referenced ValidatingAdmissionPolicy are enforced. If a validation evaluates to false it is always enforced according to these actions.
1678
2854
 
@@ -1715,7 +2891,7 @@ class ValidatingAdmissionPolicyBindingSpecPatch(dict):
1715
2891
  @pulumi.getter(name="paramRef")
1716
2892
  def param_ref(self) -> Optional['outputs.ParamRefPatch']:
1717
2893
  """
1718
- paramRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied. If the policy does not specify a ParamKind then this field is ignored, and the rules are evaluated without a param.
2894
+ ParamRef specifies the parameter resource used to configure the admission control policy. It should point to a resource of the type specified in ParamKind of the bound ValidatingAdmissionPolicy. If the policy specifies a ParamKind and the resource referred to by ParamRef does not exist, this binding is considered mis-configured and the FailurePolicy of the ValidatingAdmissionPolicy applied.
1719
2895
  """
1720
2896
  return pulumi.get(self, "param_ref")
1721
2897
 
@@ -1794,17 +2970,9 @@ class ValidatingAdmissionPolicySpec(dict):
1794
2970
  variables: Optional[Sequence['outputs.Variable']] = None):
1795
2971
  """
1796
2972
  ValidatingAdmissionPolicySpec is the specification of the desired behavior of the AdmissionPolicy.
1797
- :param Sequence['ValidationArgs'] validations: Validations contain CEL expressions which is used to apply the validation. Validations and AuditAnnotations may not both be empty; a minimum of one Validations or AuditAnnotations is required.
2973
+ :param Sequence['ValidationArgs'] validations: Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
1798
2974
  :param Sequence['AuditAnnotationArgs'] audit_annotations: auditAnnotations contains CEL expressions which are used to produce audit annotations for the audit event of the API request. validations and auditAnnotations may not both be empty; a least one of validations or auditAnnotations is required.
1799
- :param str failure_policy: failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
1800
-
1801
- A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
1802
-
1803
- failurePolicy does not define how validations that evaluate to false are handled.
1804
-
1805
- When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
1806
-
1807
- Allowed values are Ignore or Fail. Defaults to Fail.
2975
+ :param str failure_policy: FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
1808
2976
  :param Sequence['MatchConditionArgs'] match_conditions: MatchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the rules, namespaceSelector, and objectSelector. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
1809
2977
 
1810
2978
  If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
@@ -1839,7 +3007,7 @@ class ValidatingAdmissionPolicySpec(dict):
1839
3007
  @pulumi.getter
1840
3008
  def validations(self) -> Sequence['outputs.Validation']:
1841
3009
  """
1842
- Validations contain CEL expressions which is used to apply the validation. Validations and AuditAnnotations may not both be empty; a minimum of one Validations or AuditAnnotations is required.
3010
+ Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
1843
3011
  """
1844
3012
  return pulumi.get(self, "validations")
1845
3013
 
@@ -1855,15 +3023,7 @@ class ValidatingAdmissionPolicySpec(dict):
1855
3023
  @pulumi.getter(name="failurePolicy")
1856
3024
  def failure_policy(self) -> Optional[str]:
1857
3025
  """
1858
- failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
1859
-
1860
- A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
1861
-
1862
- failurePolicy does not define how validations that evaluate to false are handled.
1863
-
1864
- When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
1865
-
1866
- Allowed values are Ignore or Fail. Defaults to Fail.
3026
+ FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
1867
3027
  """
1868
3028
  return pulumi.get(self, "failure_policy")
1869
3029
 
@@ -1952,15 +3112,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
1952
3112
  """
1953
3113
  ValidatingAdmissionPolicySpec is the specification of the desired behavior of the AdmissionPolicy.
1954
3114
  :param Sequence['AuditAnnotationPatchArgs'] audit_annotations: auditAnnotations contains CEL expressions which are used to produce audit annotations for the audit event of the API request. validations and auditAnnotations may not both be empty; a least one of validations or auditAnnotations is required.
1955
- :param str failure_policy: failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
1956
-
1957
- A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
1958
-
1959
- failurePolicy does not define how validations that evaluate to false are handled.
1960
-
1961
- When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
1962
-
1963
- Allowed values are Ignore or Fail. Defaults to Fail.
3115
+ :param str failure_policy: FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
1964
3116
  :param Sequence['MatchConditionPatchArgs'] match_conditions: MatchConditions is a list of conditions that must be met for a request to be validated. Match conditions filter requests that have already been matched by the rules, namespaceSelector, and objectSelector. An empty list of matchConditions matches all requests. There are a maximum of 64 match conditions allowed.
1965
3117
 
1966
3118
  If a parameter object is provided, it can be accessed via the `params` handle in the same manner as validation expressions.
@@ -1973,7 +3125,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
1973
3125
  - If failurePolicy=Ignore, the policy is skipped
1974
3126
  :param 'MatchResourcesPatchArgs' match_constraints: MatchConstraints specifies what resources this policy is designed to validate. The AdmissionPolicy cares about a request if it matches _all_ Constraints. However, in order to prevent clusters from being put into an unstable state that cannot be recovered from via the API ValidatingAdmissionPolicy cannot match ValidatingAdmissionPolicy and ValidatingAdmissionPolicyBinding. Required.
1975
3127
  :param 'ParamKindPatchArgs' param_kind: ParamKind specifies the kind of resources used to parameterize this policy. If absent, there are no parameters for this policy and the param CEL variable will not be provided to validation expressions. If ParamKind refers to a non-existent kind, this policy definition is mis-configured and the FailurePolicy is applied. If paramKind is specified but paramRef is unset in ValidatingAdmissionPolicyBinding, the params variable will be null.
1976
- :param Sequence['ValidationPatchArgs'] validations: Validations contain CEL expressions which is used to apply the validation. Validations and AuditAnnotations may not both be empty; a minimum of one Validations or AuditAnnotations is required.
3128
+ :param Sequence['ValidationPatchArgs'] validations: Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
1977
3129
  :param Sequence['VariablePatchArgs'] variables: Variables contain definitions of variables that can be used in composition of other expressions. Each variable is defined as a named CEL expression. The variables defined here will be available under `variables` in other expressions of the policy except MatchConditions because MatchConditions are evaluated before the rest of the policy.
1978
3130
 
1979
3131
  The expression of a variable can refer to other variables defined earlier in the list but not those after. Thus, Variables must be sorted by the order of first appearance and acyclic.
@@ -2005,15 +3157,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
2005
3157
  @pulumi.getter(name="failurePolicy")
2006
3158
  def failure_policy(self) -> Optional[str]:
2007
3159
  """
2008
- failurePolicy defines how to handle failures for the admission policy. Failures can occur from CEL expression parse errors, type check errors, runtime errors and invalid or mis-configured policy definitions or bindings.
2009
-
2010
- A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource.
2011
-
2012
- failurePolicy does not define how validations that evaluate to false are handled.
2013
-
2014
- When failurePolicy is set to Fail, ValidatingAdmissionPolicyBinding validationActions define how failures are enforced.
2015
-
2016
- Allowed values are Ignore or Fail. Defaults to Fail.
3160
+ FailurePolicy defines how to handle failures for the admission policy. Failures can occur from invalid or mis-configured policy definitions or bindings. A policy is invalid if spec.paramKind refers to a non-existent Kind. A binding is invalid if spec.paramRef.name refers to a non-existent resource. Allowed values are Ignore or Fail. Defaults to Fail.
2017
3161
  """
2018
3162
  return pulumi.get(self, "failure_policy")
2019
3163
 
@@ -2054,7 +3198,7 @@ class ValidatingAdmissionPolicySpecPatch(dict):
2054
3198
  @pulumi.getter
2055
3199
  def validations(self) -> Optional[Sequence['outputs.ValidationPatch']]:
2056
3200
  """
2057
- Validations contain CEL expressions which is used to apply the validation. Validations and AuditAnnotations may not both be empty; a minimum of one Validations or AuditAnnotations is required.
3201
+ Validations contain CEL expressions which is used to apply the validation. A minimum of one validation is required for a policy definition. Required.
2058
3202
  """
2059
3203
  return pulumi.get(self, "validations")
2060
3204
 
@@ -2230,14 +3374,9 @@ class Validation(dict):
2230
3374
  reason: Optional[str] = None):
2231
3375
  """
2232
3376
  Validation specifies the CEL expression which is used to apply the validation.
2233
- :param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the API request/response, organized into CEL variables as well as some other useful variables:
3377
+ :param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
2234
3378
 
2235
- - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
2236
- For example, a variable named 'foo' can be accessed as 'variables.foo'.
2237
- - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
2238
- See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
2239
- - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
2240
- request resource.
3379
+ 'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
2241
3380
 
2242
3381
  The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
2243
3382
 
@@ -2272,14 +3411,9 @@ class Validation(dict):
2272
3411
  @pulumi.getter
2273
3412
  def expression(self) -> str:
2274
3413
  """
2275
- Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the API request/response, organized into CEL variables as well as some other useful variables:
3414
+ Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
2276
3415
 
2277
- - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
2278
- For example, a variable named 'foo' can be accessed as 'variables.foo'.
2279
- - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
2280
- See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
2281
- - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
2282
- request resource.
3416
+ 'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
2283
3417
 
2284
3418
  The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
2285
3419
 
@@ -2355,14 +3489,9 @@ class ValidationPatch(dict):
2355
3489
  reason: Optional[str] = None):
2356
3490
  """
2357
3491
  Validation specifies the CEL expression which is used to apply the validation.
2358
- :param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the API request/response, organized into CEL variables as well as some other useful variables:
3492
+ :param str expression: Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
2359
3493
 
2360
- - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
2361
- For example, a variable named 'foo' can be accessed as 'variables.foo'.
2362
- - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
2363
- See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
2364
- - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
2365
- request resource.
3494
+ 'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
2366
3495
 
2367
3496
  The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
2368
3497
 
@@ -2398,14 +3527,9 @@ class ValidationPatch(dict):
2398
3527
  @pulumi.getter
2399
3528
  def expression(self) -> Optional[str]:
2400
3529
  """
2401
- Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the API request/response, organized into CEL variables as well as some other useful variables:
3530
+ Expression represents the expression which will be evaluated by CEL. ref: https://github.com/google/cel-spec CEL expressions have access to the contents of the Admission request/response, organized into CEL variables as well as some other useful variables:
2402
3531
 
2403
- - 'object' - The object from the incoming request. The value is null for DELETE requests. - 'oldObject' - The existing object. The value is null for CREATE requests. - 'request' - Attributes of the API request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). - 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind. - 'namespaceObject' - The namespace object that the incoming object belongs to. The value is null for cluster-scoped resources. - 'variables' - Map of composited variables, from its name to its lazily evaluated value.
2404
- For example, a variable named 'foo' can be accessed as 'variables.foo'.
2405
- - 'authorizer' - A CEL Authorizer. May be used to perform authorization checks for the principal (user or service account) of the request.
2406
- See https://pkg.go.dev/k8s.io/apiserver/pkg/cel/library#Authz
2407
- - 'authorizer.requestResource' - A CEL ResourceCheck constructed from the 'authorizer' and configured with the
2408
- request resource.
3532
+ 'object' - The object from the incoming request. The value is null for DELETE requests. 'oldObject' - The existing object. The value is null for CREATE requests. 'request' - Attributes of the admission request([ref](/pkg/apis/admission/types.go#AdmissionRequest)). 'params' - Parameter resource referred to by the policy binding being evaluated. Only populated if the policy has a ParamKind.
2409
3533
 
2410
3534
  The `apiVersion`, `kind`, `metadata.name` and `metadata.generateName` are always accessible from the root of the object. No other metadata properties are accessible.
2411
3535