pulumi-kubernetes 4.23.0a1746129859__py3-none-any.whl → 4.23.0a1746138483__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-kubernetes might be problematic. Click here for more details.
- pulumi_kubernetes/__init__.py +36 -2
- pulumi_kubernetes/admissionregistration/v1alpha1/_inputs.py +30 -30
- pulumi_kubernetes/admissionregistration/v1alpha1/outputs.py +20 -20
- pulumi_kubernetes/apps/v1/ReplicaSetList.py +4 -4
- pulumi_kubernetes/apps/v1/_inputs.py +109 -56
- pulumi_kubernetes/apps/v1/outputs.py +129 -56
- pulumi_kubernetes/autoscaling/v2/_inputs.py +92 -12
- pulumi_kubernetes/autoscaling/v2/outputs.py +66 -10
- pulumi_kubernetes/batch/v1/_inputs.py +12 -42
- pulumi_kubernetes/batch/v1/outputs.py +8 -32
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundle.py +2 -0
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundlePatch.py +2 -0
- pulumi_kubernetes/certificates/v1beta1/ClusterTrustBundle.py +229 -0
- pulumi_kubernetes/certificates/v1beta1/ClusterTrustBundleList.py +219 -0
- pulumi_kubernetes/certificates/v1beta1/ClusterTrustBundlePatch.py +240 -0
- pulumi_kubernetes/certificates/v1beta1/__init__.py +3 -0
- pulumi_kubernetes/certificates/v1beta1/_inputs.py +292 -0
- pulumi_kubernetes/certificates/v1beta1/outputs.py +241 -0
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidate.py +1 -1
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidatePatch.py +1 -1
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidate.py +1 -1
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidatePatch.py +1 -1
- pulumi_kubernetes/coordination/v1alpha2/_inputs.py +6 -6
- pulumi_kubernetes/coordination/v1alpha2/outputs.py +4 -4
- pulumi_kubernetes/coordination/v1beta1/LeaseCandidate.py +220 -0
- pulumi_kubernetes/coordination/v1beta1/LeaseCandidateList.py +219 -0
- pulumi_kubernetes/coordination/v1beta1/LeaseCandidatePatch.py +232 -0
- pulumi_kubernetes/coordination/v1beta1/__init__.py +3 -0
- pulumi_kubernetes/coordination/v1beta1/_inputs.py +371 -0
- pulumi_kubernetes/coordination/v1beta1/outputs.py +292 -0
- pulumi_kubernetes/core/v1/Endpoints.py +8 -0
- pulumi_kubernetes/core/v1/EndpointsList.py +2 -2
- pulumi_kubernetes/core/v1/EndpointsPatch.py +8 -0
- pulumi_kubernetes/core/v1/_inputs.py +240 -66
- pulumi_kubernetes/core/v1/outputs.py +251 -51
- pulumi_kubernetes/discovery/v1/EndpointSlice.py +10 -10
- pulumi_kubernetes/discovery/v1/EndpointSlicePatch.py +10 -10
- pulumi_kubernetes/discovery/v1/_inputs.py +159 -44
- pulumi_kubernetes/discovery/v1/outputs.py +107 -32
- pulumi_kubernetes/networking/v1/IPAddress.py +220 -0
- pulumi_kubernetes/networking/v1/IPAddressList.py +219 -0
- pulumi_kubernetes/networking/v1/IPAddressPatch.py +232 -0
- pulumi_kubernetes/networking/v1/ServiceCIDR.py +230 -0
- pulumi_kubernetes/networking/v1/ServiceCIDRList.py +219 -0
- pulumi_kubernetes/networking/v1/ServiceCIDRPatch.py +242 -0
- pulumi_kubernetes/networking/v1/__init__.py +6 -0
- pulumi_kubernetes/networking/v1/_inputs.py +599 -0
- pulumi_kubernetes/networking/v1/outputs.py +461 -0
- pulumi_kubernetes/networking/v1alpha1/IPAddress.py +1 -1
- pulumi_kubernetes/networking/v1alpha1/IPAddressPatch.py +1 -1
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDR.py +1 -1
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDRPatch.py +1 -1
- pulumi_kubernetes/networking/v1beta1/IPAddress.py +1 -1
- pulumi_kubernetes/networking/v1beta1/IPAddressPatch.py +1 -1
- pulumi_kubernetes/networking/v1beta1/ServiceCIDR.py +1 -1
- pulumi_kubernetes/networking/v1beta1/ServiceCIDRPatch.py +1 -1
- pulumi_kubernetes/policy/v1/_inputs.py +0 -12
- pulumi_kubernetes/policy/v1/outputs.py +0 -8
- pulumi_kubernetes/pulumi-plugin.json +1 -1
- pulumi_kubernetes/resource/__init__.py +3 -0
- pulumi_kubernetes/resource/v1alpha1/ResourceClaim.py +1 -1
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimPatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplate.py +1 -1
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplatePatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha2/ResourceClaim.py +1 -1
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimPatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplate.py +1 -1
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplatePatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha2/ResourceSlice.py +1 -1
- pulumi_kubernetes/resource/v1alpha2/ResourceSlicePatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/DeviceClass.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/DeviceClassPatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/DeviceTaintRule.py +227 -0
- pulumi_kubernetes/resource/v1alpha3/DeviceTaintRuleList.py +219 -0
- pulumi_kubernetes/resource/v1alpha3/DeviceTaintRulePatch.py +238 -0
- pulumi_kubernetes/resource/v1alpha3/ResourceClaim.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimPatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplate.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplatePatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/ResourceSlice.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/ResourceSlicePatch.py +1 -1
- pulumi_kubernetes/resource/v1alpha3/__init__.py +3 -0
- pulumi_kubernetes/resource/v1alpha3/_inputs.py +2559 -213
- pulumi_kubernetes/resource/v1alpha3/outputs.py +2037 -256
- pulumi_kubernetes/resource/v1beta1/DeviceClass.py +1 -1
- pulumi_kubernetes/resource/v1beta1/DeviceClassPatch.py +1 -1
- pulumi_kubernetes/resource/v1beta1/ResourceClaim.py +1 -1
- pulumi_kubernetes/resource/v1beta1/ResourceClaimPatch.py +1 -1
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplate.py +1 -1
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplatePatch.py +1 -1
- pulumi_kubernetes/resource/v1beta1/ResourceSlice.py +1 -1
- pulumi_kubernetes/resource/v1beta1/ResourceSlicePatch.py +1 -1
- pulumi_kubernetes/resource/v1beta1/_inputs.py +2044 -176
- pulumi_kubernetes/resource/v1beta1/outputs.py +1536 -134
- pulumi_kubernetes/resource/v1beta2/DeviceClass.py +241 -0
- pulumi_kubernetes/resource/v1beta2/DeviceClassList.py +219 -0
- pulumi_kubernetes/resource/v1beta2/DeviceClassPatch.py +252 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaim.py +236 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimList.py +220 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimPatch.py +247 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimTemplate.py +233 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimTemplateList.py +219 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimTemplatePatch.py +244 -0
- pulumi_kubernetes/resource/v1beta2/ResourceSlice.py +250 -0
- pulumi_kubernetes/resource/v1beta2/ResourceSliceList.py +220 -0
- pulumi_kubernetes/resource/v1beta2/ResourceSlicePatch.py +261 -0
- pulumi_kubernetes/resource/v1beta2/__init__.py +22 -0
- pulumi_kubernetes/resource/v1beta2/_inputs.py +5681 -0
- pulumi_kubernetes/resource/v1beta2/outputs.py +4726 -0
- pulumi_kubernetes/storage/v1/_inputs.py +90 -0
- pulumi_kubernetes/storage/v1/outputs.py +110 -0
- pulumi_kubernetes/yaml/yaml.py +108 -0
- {pulumi_kubernetes-4.23.0a1746129859.dist-info → pulumi_kubernetes-4.23.0a1746138483.dist-info}/METADATA +1 -1
- {pulumi_kubernetes-4.23.0a1746129859.dist-info → pulumi_kubernetes-4.23.0a1746138483.dist-info}/RECORD +116 -86
- {pulumi_kubernetes-4.23.0a1746129859.dist-info → pulumi_kubernetes-4.23.0a1746138483.dist-info}/WHEEL +0 -0
- {pulumi_kubernetes-4.23.0a1746129859.dist-info → pulumi_kubernetes-4.23.0a1746138483.dist-info}/top_level.txt +0 -0
pulumi_kubernetes/__init__.py
CHANGED
|
@@ -364,7 +364,10 @@ _utilities.register(
|
|
|
364
364
|
"classes": {
|
|
365
365
|
"kubernetes:certificates.k8s.io/v1beta1:CertificateSigningRequest": "CertificateSigningRequest",
|
|
366
366
|
"kubernetes:certificates.k8s.io/v1beta1:CertificateSigningRequestList": "CertificateSigningRequestList",
|
|
367
|
-
"kubernetes:certificates.k8s.io/v1beta1:CertificateSigningRequestPatch": "CertificateSigningRequestPatch"
|
|
367
|
+
"kubernetes:certificates.k8s.io/v1beta1:CertificateSigningRequestPatch": "CertificateSigningRequestPatch",
|
|
368
|
+
"kubernetes:certificates.k8s.io/v1beta1:ClusterTrustBundle": "ClusterTrustBundle",
|
|
369
|
+
"kubernetes:certificates.k8s.io/v1beta1:ClusterTrustBundleList": "ClusterTrustBundleList",
|
|
370
|
+
"kubernetes:certificates.k8s.io/v1beta1:ClusterTrustBundlePatch": "ClusterTrustBundlePatch"
|
|
368
371
|
}
|
|
369
372
|
},
|
|
370
373
|
{
|
|
@@ -403,6 +406,9 @@ _utilities.register(
|
|
|
403
406
|
"fqn": "pulumi_kubernetes.coordination.v1beta1",
|
|
404
407
|
"classes": {
|
|
405
408
|
"kubernetes:coordination.k8s.io/v1beta1:Lease": "Lease",
|
|
409
|
+
"kubernetes:coordination.k8s.io/v1beta1:LeaseCandidate": "LeaseCandidate",
|
|
410
|
+
"kubernetes:coordination.k8s.io/v1beta1:LeaseCandidateList": "LeaseCandidateList",
|
|
411
|
+
"kubernetes:coordination.k8s.io/v1beta1:LeaseCandidatePatch": "LeaseCandidatePatch",
|
|
406
412
|
"kubernetes:coordination.k8s.io/v1beta1:LeaseList": "LeaseList",
|
|
407
413
|
"kubernetes:coordination.k8s.io/v1beta1:LeasePatch": "LeasePatch"
|
|
408
414
|
}
|
|
@@ -629,6 +635,9 @@ _utilities.register(
|
|
|
629
635
|
"mod": "networking.k8s.io/v1",
|
|
630
636
|
"fqn": "pulumi_kubernetes.networking.v1",
|
|
631
637
|
"classes": {
|
|
638
|
+
"kubernetes:networking.k8s.io/v1:IPAddress": "IPAddress",
|
|
639
|
+
"kubernetes:networking.k8s.io/v1:IPAddressList": "IPAddressList",
|
|
640
|
+
"kubernetes:networking.k8s.io/v1:IPAddressPatch": "IPAddressPatch",
|
|
632
641
|
"kubernetes:networking.k8s.io/v1:Ingress": "Ingress",
|
|
633
642
|
"kubernetes:networking.k8s.io/v1:IngressClass": "IngressClass",
|
|
634
643
|
"kubernetes:networking.k8s.io/v1:IngressClassList": "IngressClassList",
|
|
@@ -637,7 +646,10 @@ _utilities.register(
|
|
|
637
646
|
"kubernetes:networking.k8s.io/v1:IngressPatch": "IngressPatch",
|
|
638
647
|
"kubernetes:networking.k8s.io/v1:NetworkPolicy": "NetworkPolicy",
|
|
639
648
|
"kubernetes:networking.k8s.io/v1:NetworkPolicyList": "NetworkPolicyList",
|
|
640
|
-
"kubernetes:networking.k8s.io/v1:NetworkPolicyPatch": "NetworkPolicyPatch"
|
|
649
|
+
"kubernetes:networking.k8s.io/v1:NetworkPolicyPatch": "NetworkPolicyPatch",
|
|
650
|
+
"kubernetes:networking.k8s.io/v1:ServiceCIDR": "ServiceCIDR",
|
|
651
|
+
"kubernetes:networking.k8s.io/v1:ServiceCIDRList": "ServiceCIDRList",
|
|
652
|
+
"kubernetes:networking.k8s.io/v1:ServiceCIDRPatch": "ServiceCIDRPatch"
|
|
641
653
|
}
|
|
642
654
|
},
|
|
643
655
|
{
|
|
@@ -840,6 +852,9 @@ _utilities.register(
|
|
|
840
852
|
"kubernetes:resource.k8s.io/v1alpha3:DeviceClass": "DeviceClass",
|
|
841
853
|
"kubernetes:resource.k8s.io/v1alpha3:DeviceClassList": "DeviceClassList",
|
|
842
854
|
"kubernetes:resource.k8s.io/v1alpha3:DeviceClassPatch": "DeviceClassPatch",
|
|
855
|
+
"kubernetes:resource.k8s.io/v1alpha3:DeviceTaintRule": "DeviceTaintRule",
|
|
856
|
+
"kubernetes:resource.k8s.io/v1alpha3:DeviceTaintRuleList": "DeviceTaintRuleList",
|
|
857
|
+
"kubernetes:resource.k8s.io/v1alpha3:DeviceTaintRulePatch": "DeviceTaintRulePatch",
|
|
843
858
|
"kubernetes:resource.k8s.io/v1alpha3:PodSchedulingContext": "PodSchedulingContext",
|
|
844
859
|
"kubernetes:resource.k8s.io/v1alpha3:PodSchedulingContextList": "PodSchedulingContextList",
|
|
845
860
|
"kubernetes:resource.k8s.io/v1alpha3:PodSchedulingContextPatch": "PodSchedulingContextPatch",
|
|
@@ -873,6 +888,25 @@ _utilities.register(
|
|
|
873
888
|
"kubernetes:resource.k8s.io/v1beta1:ResourceSlicePatch": "ResourceSlicePatch"
|
|
874
889
|
}
|
|
875
890
|
},
|
|
891
|
+
{
|
|
892
|
+
"pkg": "kubernetes",
|
|
893
|
+
"mod": "resource.k8s.io/v1beta2",
|
|
894
|
+
"fqn": "pulumi_kubernetes.resource.v1beta2",
|
|
895
|
+
"classes": {
|
|
896
|
+
"kubernetes:resource.k8s.io/v1beta2:DeviceClass": "DeviceClass",
|
|
897
|
+
"kubernetes:resource.k8s.io/v1beta2:DeviceClassList": "DeviceClassList",
|
|
898
|
+
"kubernetes:resource.k8s.io/v1beta2:DeviceClassPatch": "DeviceClassPatch",
|
|
899
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceClaim": "ResourceClaim",
|
|
900
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceClaimList": "ResourceClaimList",
|
|
901
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceClaimPatch": "ResourceClaimPatch",
|
|
902
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceClaimTemplate": "ResourceClaimTemplate",
|
|
903
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceClaimTemplateList": "ResourceClaimTemplateList",
|
|
904
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceClaimTemplatePatch": "ResourceClaimTemplatePatch",
|
|
905
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceSlice": "ResourceSlice",
|
|
906
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceSliceList": "ResourceSliceList",
|
|
907
|
+
"kubernetes:resource.k8s.io/v1beta2:ResourceSlicePatch": "ResourceSlicePatch"
|
|
908
|
+
}
|
|
909
|
+
},
|
|
876
910
|
{
|
|
877
911
|
"pkg": "kubernetes",
|
|
878
912
|
"mod": "scheduling.k8s.io/v1",
|
|
@@ -1112,15 +1112,15 @@ if not MYPY:
|
|
|
1112
1112
|
"""
|
|
1113
1113
|
exclude_resource_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgsDict']]]]
|
|
1114
1114
|
"""
|
|
1115
|
-
ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1115
|
+
ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1116
1116
|
"""
|
|
1117
1117
|
match_policy: NotRequired[pulumi.Input[builtins.str]]
|
|
1118
1118
|
"""
|
|
1119
1119
|
matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1120
1120
|
|
|
1121
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1121
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1122
1122
|
|
|
1123
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1123
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1124
1124
|
|
|
1125
1125
|
Defaults to "Equivalent"
|
|
1126
1126
|
"""
|
|
@@ -1160,11 +1160,11 @@ if not MYPY:
|
|
|
1160
1160
|
"""
|
|
1161
1161
|
object_selector: NotRequired[pulumi.Input['_meta.v1.LabelSelectorPatchArgsDict']]
|
|
1162
1162
|
"""
|
|
1163
|
-
ObjectSelector decides whether to run the
|
|
1163
|
+
ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1164
1164
|
"""
|
|
1165
1165
|
resource_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgsDict']]]]
|
|
1166
1166
|
"""
|
|
1167
|
-
ResourceRules describes what operations on what resources/subresources the
|
|
1167
|
+
ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1168
1168
|
"""
|
|
1169
1169
|
elif False:
|
|
1170
1170
|
MatchResourcesPatchArgsDict: TypeAlias = Mapping[str, Any]
|
|
@@ -1179,12 +1179,12 @@ class MatchResourcesPatchArgs:
|
|
|
1179
1179
|
resource_rules: Optional[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgs']]]] = None):
|
|
1180
1180
|
"""
|
|
1181
1181
|
MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1182
|
-
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgs']]] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1182
|
+
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgs']]] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1183
1183
|
:param pulumi.Input[builtins.str] match_policy: matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1184
1184
|
|
|
1185
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1185
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1186
1186
|
|
|
1187
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1187
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1188
1188
|
|
|
1189
1189
|
Defaults to "Equivalent"
|
|
1190
1190
|
:param pulumi.Input['_meta.v1.LabelSelectorPatchArgs'] namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
@@ -1218,8 +1218,8 @@ class MatchResourcesPatchArgs:
|
|
|
1218
1218
|
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
1219
1219
|
|
|
1220
1220
|
Default to the empty LabelSelector, which matches everything.
|
|
1221
|
-
:param pulumi.Input['_meta.v1.LabelSelectorPatchArgs'] object_selector: ObjectSelector decides whether to run the
|
|
1222
|
-
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgs']]] resource_rules: ResourceRules describes what operations on what resources/subresources the
|
|
1221
|
+
:param pulumi.Input['_meta.v1.LabelSelectorPatchArgs'] object_selector: ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1222
|
+
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgs']]] resource_rules: ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1223
1223
|
"""
|
|
1224
1224
|
if exclude_resource_rules is not None:
|
|
1225
1225
|
pulumi.set(__self__, "exclude_resource_rules", exclude_resource_rules)
|
|
@@ -1236,7 +1236,7 @@ class MatchResourcesPatchArgs:
|
|
|
1236
1236
|
@pulumi.getter(name="excludeResourceRules")
|
|
1237
1237
|
def exclude_resource_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgs']]]]:
|
|
1238
1238
|
"""
|
|
1239
|
-
ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1239
|
+
ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1240
1240
|
"""
|
|
1241
1241
|
return pulumi.get(self, "exclude_resource_rules")
|
|
1242
1242
|
|
|
@@ -1250,9 +1250,9 @@ class MatchResourcesPatchArgs:
|
|
|
1250
1250
|
"""
|
|
1251
1251
|
matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1252
1252
|
|
|
1253
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1253
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1254
1254
|
|
|
1255
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1255
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1256
1256
|
|
|
1257
1257
|
Defaults to "Equivalent"
|
|
1258
1258
|
"""
|
|
@@ -1308,7 +1308,7 @@ class MatchResourcesPatchArgs:
|
|
|
1308
1308
|
@pulumi.getter(name="objectSelector")
|
|
1309
1309
|
def object_selector(self) -> Optional[pulumi.Input['_meta.v1.LabelSelectorPatchArgs']]:
|
|
1310
1310
|
"""
|
|
1311
|
-
ObjectSelector decides whether to run the
|
|
1311
|
+
ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1312
1312
|
"""
|
|
1313
1313
|
return pulumi.get(self, "object_selector")
|
|
1314
1314
|
|
|
@@ -1320,7 +1320,7 @@ class MatchResourcesPatchArgs:
|
|
|
1320
1320
|
@pulumi.getter(name="resourceRules")
|
|
1321
1321
|
def resource_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsPatchArgs']]]]:
|
|
1322
1322
|
"""
|
|
1323
|
-
ResourceRules describes what operations on what resources/subresources the
|
|
1323
|
+
ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1324
1324
|
"""
|
|
1325
1325
|
return pulumi.get(self, "resource_rules")
|
|
1326
1326
|
|
|
@@ -1336,15 +1336,15 @@ if not MYPY:
|
|
|
1336
1336
|
"""
|
|
1337
1337
|
exclude_resource_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgsDict']]]]
|
|
1338
1338
|
"""
|
|
1339
|
-
ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1339
|
+
ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1340
1340
|
"""
|
|
1341
1341
|
match_policy: NotRequired[pulumi.Input[builtins.str]]
|
|
1342
1342
|
"""
|
|
1343
1343
|
matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1344
1344
|
|
|
1345
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1345
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1346
1346
|
|
|
1347
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1347
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1348
1348
|
|
|
1349
1349
|
Defaults to "Equivalent"
|
|
1350
1350
|
"""
|
|
@@ -1384,11 +1384,11 @@ if not MYPY:
|
|
|
1384
1384
|
"""
|
|
1385
1385
|
object_selector: NotRequired[pulumi.Input['_meta.v1.LabelSelectorArgsDict']]
|
|
1386
1386
|
"""
|
|
1387
|
-
ObjectSelector decides whether to run the
|
|
1387
|
+
ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1388
1388
|
"""
|
|
1389
1389
|
resource_rules: NotRequired[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgsDict']]]]
|
|
1390
1390
|
"""
|
|
1391
|
-
ResourceRules describes what operations on what resources/subresources the
|
|
1391
|
+
ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1392
1392
|
"""
|
|
1393
1393
|
elif False:
|
|
1394
1394
|
MatchResourcesArgsDict: TypeAlias = Mapping[str, Any]
|
|
@@ -1403,12 +1403,12 @@ class MatchResourcesArgs:
|
|
|
1403
1403
|
resource_rules: Optional[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgs']]]] = None):
|
|
1404
1404
|
"""
|
|
1405
1405
|
MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1406
|
-
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgs']]] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1406
|
+
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgs']]] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1407
1407
|
:param pulumi.Input[builtins.str] match_policy: matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1408
1408
|
|
|
1409
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1409
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1410
1410
|
|
|
1411
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1411
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1412
1412
|
|
|
1413
1413
|
Defaults to "Equivalent"
|
|
1414
1414
|
:param pulumi.Input['_meta.v1.LabelSelectorArgs'] namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
@@ -1442,8 +1442,8 @@ class MatchResourcesArgs:
|
|
|
1442
1442
|
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
1443
1443
|
|
|
1444
1444
|
Default to the empty LabelSelector, which matches everything.
|
|
1445
|
-
:param pulumi.Input['_meta.v1.LabelSelectorArgs'] object_selector: ObjectSelector decides whether to run the
|
|
1446
|
-
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgs']]] resource_rules: ResourceRules describes what operations on what resources/subresources the
|
|
1445
|
+
:param pulumi.Input['_meta.v1.LabelSelectorArgs'] object_selector: ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1446
|
+
:param pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgs']]] resource_rules: ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1447
1447
|
"""
|
|
1448
1448
|
if exclude_resource_rules is not None:
|
|
1449
1449
|
pulumi.set(__self__, "exclude_resource_rules", exclude_resource_rules)
|
|
@@ -1460,7 +1460,7 @@ class MatchResourcesArgs:
|
|
|
1460
1460
|
@pulumi.getter(name="excludeResourceRules")
|
|
1461
1461
|
def exclude_resource_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgs']]]]:
|
|
1462
1462
|
"""
|
|
1463
|
-
ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1463
|
+
ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1464
1464
|
"""
|
|
1465
1465
|
return pulumi.get(self, "exclude_resource_rules")
|
|
1466
1466
|
|
|
@@ -1474,9 +1474,9 @@ class MatchResourcesArgs:
|
|
|
1474
1474
|
"""
|
|
1475
1475
|
matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1476
1476
|
|
|
1477
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1477
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1478
1478
|
|
|
1479
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1479
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1480
1480
|
|
|
1481
1481
|
Defaults to "Equivalent"
|
|
1482
1482
|
"""
|
|
@@ -1532,7 +1532,7 @@ class MatchResourcesArgs:
|
|
|
1532
1532
|
@pulumi.getter(name="objectSelector")
|
|
1533
1533
|
def object_selector(self) -> Optional[pulumi.Input['_meta.v1.LabelSelectorArgs']]:
|
|
1534
1534
|
"""
|
|
1535
|
-
ObjectSelector decides whether to run the
|
|
1535
|
+
ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1536
1536
|
"""
|
|
1537
1537
|
return pulumi.get(self, "object_selector")
|
|
1538
1538
|
|
|
@@ -1544,7 +1544,7 @@ class MatchResourcesArgs:
|
|
|
1544
1544
|
@pulumi.getter(name="resourceRules")
|
|
1545
1545
|
def resource_rules(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['NamedRuleWithOperationsArgs']]]]:
|
|
1546
1546
|
"""
|
|
1547
|
-
ResourceRules describes what operations on what resources/subresources the
|
|
1547
|
+
ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1548
1548
|
"""
|
|
1549
1549
|
return pulumi.get(self, "resource_rules")
|
|
1550
1550
|
|
|
@@ -854,12 +854,12 @@ class MatchResources(dict):
|
|
|
854
854
|
resource_rules: Optional[Sequence['outputs.NamedRuleWithOperations']] = None):
|
|
855
855
|
"""
|
|
856
856
|
MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
857
|
-
:param Sequence['NamedRuleWithOperationsArgs'] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the
|
|
857
|
+
:param Sequence['NamedRuleWithOperationsArgs'] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
858
858
|
:param builtins.str match_policy: matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
859
859
|
|
|
860
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
860
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
861
861
|
|
|
862
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
862
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
863
863
|
|
|
864
864
|
Defaults to "Equivalent"
|
|
865
865
|
:param '_meta.v1.LabelSelectorArgs' namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
@@ -893,8 +893,8 @@ class MatchResources(dict):
|
|
|
893
893
|
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
894
894
|
|
|
895
895
|
Default to the empty LabelSelector, which matches everything.
|
|
896
|
-
:param '_meta.v1.LabelSelectorArgs' object_selector: ObjectSelector decides whether to run the
|
|
897
|
-
:param Sequence['NamedRuleWithOperationsArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the
|
|
896
|
+
:param '_meta.v1.LabelSelectorArgs' object_selector: ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
897
|
+
:param Sequence['NamedRuleWithOperationsArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
898
898
|
"""
|
|
899
899
|
if exclude_resource_rules is not None:
|
|
900
900
|
pulumi.set(__self__, "exclude_resource_rules", exclude_resource_rules)
|
|
@@ -911,7 +911,7 @@ class MatchResources(dict):
|
|
|
911
911
|
@pulumi.getter(name="excludeResourceRules")
|
|
912
912
|
def exclude_resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperations']]:
|
|
913
913
|
"""
|
|
914
|
-
ExcludeResourceRules describes what operations on what resources/subresources the
|
|
914
|
+
ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
915
915
|
"""
|
|
916
916
|
return pulumi.get(self, "exclude_resource_rules")
|
|
917
917
|
|
|
@@ -921,9 +921,9 @@ class MatchResources(dict):
|
|
|
921
921
|
"""
|
|
922
922
|
matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
923
923
|
|
|
924
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
924
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
925
925
|
|
|
926
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
926
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
927
927
|
|
|
928
928
|
Defaults to "Equivalent"
|
|
929
929
|
"""
|
|
@@ -971,7 +971,7 @@ class MatchResources(dict):
|
|
|
971
971
|
@pulumi.getter(name="objectSelector")
|
|
972
972
|
def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelector']:
|
|
973
973
|
"""
|
|
974
|
-
ObjectSelector decides whether to run the
|
|
974
|
+
ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
975
975
|
"""
|
|
976
976
|
return pulumi.get(self, "object_selector")
|
|
977
977
|
|
|
@@ -979,7 +979,7 @@ class MatchResources(dict):
|
|
|
979
979
|
@pulumi.getter(name="resourceRules")
|
|
980
980
|
def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperations']]:
|
|
981
981
|
"""
|
|
982
|
-
ResourceRules describes what operations on what resources/subresources the
|
|
982
|
+
ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
983
983
|
"""
|
|
984
984
|
return pulumi.get(self, "resource_rules")
|
|
985
985
|
|
|
@@ -1022,12 +1022,12 @@ class MatchResourcesPatch(dict):
|
|
|
1022
1022
|
resource_rules: Optional[Sequence['outputs.NamedRuleWithOperationsPatch']] = None):
|
|
1023
1023
|
"""
|
|
1024
1024
|
MatchResources decides whether to run the admission control policy on an object based on whether it meets the match criteria. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1025
|
-
:param Sequence['NamedRuleWithOperationsPatchArgs'] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1025
|
+
:param Sequence['NamedRuleWithOperationsPatchArgs'] exclude_resource_rules: ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1026
1026
|
:param builtins.str match_policy: matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1027
1027
|
|
|
1028
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1028
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1029
1029
|
|
|
1030
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1030
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1031
1031
|
|
|
1032
1032
|
Defaults to "Equivalent"
|
|
1033
1033
|
:param '_meta.v1.LabelSelectorPatchArgs' namespace_selector: NamespaceSelector decides whether to run the admission control policy on an object based on whether the namespace for that object matches the selector. If the object itself is a namespace, the matching is performed on object.metadata.labels. If the object is another cluster scoped resource, it never skips the policy.
|
|
@@ -1061,8 +1061,8 @@ class MatchResourcesPatch(dict):
|
|
|
1061
1061
|
See https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ for more examples of label selectors.
|
|
1062
1062
|
|
|
1063
1063
|
Default to the empty LabelSelector, which matches everything.
|
|
1064
|
-
:param '_meta.v1.LabelSelectorPatchArgs' object_selector: ObjectSelector decides whether to run the
|
|
1065
|
-
:param Sequence['NamedRuleWithOperationsPatchArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the
|
|
1064
|
+
:param '_meta.v1.LabelSelectorPatchArgs' object_selector: ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1065
|
+
:param Sequence['NamedRuleWithOperationsPatchArgs'] resource_rules: ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1066
1066
|
"""
|
|
1067
1067
|
if exclude_resource_rules is not None:
|
|
1068
1068
|
pulumi.set(__self__, "exclude_resource_rules", exclude_resource_rules)
|
|
@@ -1079,7 +1079,7 @@ class MatchResourcesPatch(dict):
|
|
|
1079
1079
|
@pulumi.getter(name="excludeResourceRules")
|
|
1080
1080
|
def exclude_resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
|
|
1081
1081
|
"""
|
|
1082
|
-
ExcludeResourceRules describes what operations on what resources/subresources the
|
|
1082
|
+
ExcludeResourceRules describes what operations on what resources/subresources the policy should not care about. The exclude rules take precedence over include rules (if a resource matches both, it is excluded)
|
|
1083
1083
|
"""
|
|
1084
1084
|
return pulumi.get(self, "exclude_resource_rules")
|
|
1085
1085
|
|
|
@@ -1089,9 +1089,9 @@ class MatchResourcesPatch(dict):
|
|
|
1089
1089
|
"""
|
|
1090
1090
|
matchPolicy defines how the "MatchResources" list is used to match incoming requests. Allowed values are "Exact" or "Equivalent".
|
|
1091
1091
|
|
|
1092
|
-
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1092
|
+
- Exact: match a request only if it exactly matches a specified rule. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, but "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy does not consider requests to apps/v1beta1 or extensions/v1beta1 API groups.
|
|
1093
1093
|
|
|
1094
|
-
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`,
|
|
1094
|
+
- Equivalent: match a request if modifies a resource listed in rules, even via another API group or version. For example, if deployments can be modified via apps/v1, apps/v1beta1, and extensions/v1beta1, and "rules" only included `apiGroups:["apps"], apiVersions:["v1"], resources: ["deployments"]`, the admission policy **does** consider requests made to apps/v1beta1 or extensions/v1beta1 API groups. The API server translates the request to a matched resource API if necessary.
|
|
1095
1095
|
|
|
1096
1096
|
Defaults to "Equivalent"
|
|
1097
1097
|
"""
|
|
@@ -1139,7 +1139,7 @@ class MatchResourcesPatch(dict):
|
|
|
1139
1139
|
@pulumi.getter(name="objectSelector")
|
|
1140
1140
|
def object_selector(self) -> Optional['_meta.v1.outputs.LabelSelectorPatch']:
|
|
1141
1141
|
"""
|
|
1142
|
-
ObjectSelector decides whether to run the
|
|
1142
|
+
ObjectSelector decides whether to run the policy based on if the object has matching labels. objectSelector is evaluated against both the oldObject and newObject that would be sent to the policy's expression (CEL), and is considered to match if either object matches the selector. A null object (oldObject in the case of create, or newObject in the case of delete) or an object that cannot have labels (like a DeploymentRollback or a PodProxyOptions object) is not considered to match. Use the object selector only if the webhook is opt-in, because end users may skip the admission webhook by setting the labels. Default to the empty LabelSelector, which matches everything.
|
|
1143
1143
|
"""
|
|
1144
1144
|
return pulumi.get(self, "object_selector")
|
|
1145
1145
|
|
|
@@ -1147,7 +1147,7 @@ class MatchResourcesPatch(dict):
|
|
|
1147
1147
|
@pulumi.getter(name="resourceRules")
|
|
1148
1148
|
def resource_rules(self) -> Optional[Sequence['outputs.NamedRuleWithOperationsPatch']]:
|
|
1149
1149
|
"""
|
|
1150
|
-
ResourceRules describes what operations on what resources/subresources the
|
|
1150
|
+
ResourceRules describes what operations on what resources/subresources the admission policy matches. The policy cares about an operation if it matches _any_ Rule.
|
|
1151
1151
|
"""
|
|
1152
1152
|
return pulumi.get(self, "resource_rules")
|
|
1153
1153
|
|
|
@@ -30,7 +30,7 @@ class ReplicaSetListArgs:
|
|
|
30
30
|
metadata: Optional[pulumi.Input['_meta.v1.ListMetaArgs']] = None):
|
|
31
31
|
"""
|
|
32
32
|
The set of arguments for constructing a ReplicaSetList resource.
|
|
33
|
-
:param pulumi.Input[Sequence[pulumi.Input['ReplicaSetArgs']]] items: List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/
|
|
33
|
+
:param pulumi.Input[Sequence[pulumi.Input['ReplicaSetArgs']]] items: List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicaset
|
|
34
34
|
:param pulumi.Input[builtins.str] api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
35
35
|
:param pulumi.Input[builtins.str] kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
36
36
|
:param pulumi.Input['_meta.v1.ListMetaArgs'] metadata: Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
@@ -47,7 +47,7 @@ class ReplicaSetListArgs:
|
|
|
47
47
|
@pulumi.getter
|
|
48
48
|
def items(self) -> pulumi.Input[Sequence[pulumi.Input['ReplicaSetArgs']]]:
|
|
49
49
|
"""
|
|
50
|
-
List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/
|
|
50
|
+
List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicaset
|
|
51
51
|
"""
|
|
52
52
|
return pulumi.get(self, "items")
|
|
53
53
|
|
|
@@ -111,7 +111,7 @@ class ReplicaSetList(pulumi.CustomResource):
|
|
|
111
111
|
:param str resource_name: The name of the resource.
|
|
112
112
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
113
113
|
:param pulumi.Input[builtins.str] api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
114
|
-
:param pulumi.Input[Sequence[pulumi.Input[Union['ReplicaSetArgs', 'ReplicaSetArgsDict']]]] items: List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/
|
|
114
|
+
:param pulumi.Input[Sequence[pulumi.Input[Union['ReplicaSetArgs', 'ReplicaSetArgsDict']]]] items: List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicaset
|
|
115
115
|
:param pulumi.Input[builtins.str] kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
116
116
|
:param pulumi.Input[Union['_meta.v1.ListMetaArgs', '_meta.v1.ListMetaArgsDict']] metadata: Standard list metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
117
117
|
"""
|
|
@@ -198,7 +198,7 @@ class ReplicaSetList(pulumi.CustomResource):
|
|
|
198
198
|
@pulumi.getter
|
|
199
199
|
def items(self) -> pulumi.Output[Sequence['outputs.ReplicaSet']]:
|
|
200
200
|
"""
|
|
201
|
-
List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/
|
|
201
|
+
List of ReplicaSets. More info: https://kubernetes.io/docs/concepts/workloads/controllers/replicaset
|
|
202
202
|
"""
|
|
203
203
|
return pulumi.get(self, "items")
|
|
204
204
|
|