pulumi-kubernetes 4.23.0a1746131759__py3-none-any.whl → 4.23.0a1746153578__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-kubernetes might be problematic. Click here for more details.
- pulumi_kubernetes/__init__.py +36 -2
- pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfiguration.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfigurationList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/MutatingWebhookConfigurationPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicy.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBinding.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBindingList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyBindingPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingAdmissionPolicyPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfiguration.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfigurationList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1/ValidatingWebhookConfigurationPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicy.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBinding.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBindingList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyBindingPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/MutatingAdmissionPolicyPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicy.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBinding.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBindingList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyBindingPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/ValidatingAdmissionPolicyPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1alpha1/_inputs.py +30 -30
- pulumi_kubernetes/admissionregistration/v1alpha1/outputs.py +20 -20
- pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfiguration.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfigurationList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/MutatingWebhookConfigurationPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicy.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBinding.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBindingList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyBindingPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingAdmissionPolicyPatch.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfiguration.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfigurationList.py +1 -3
- pulumi_kubernetes/admissionregistration/v1beta1/ValidatingWebhookConfigurationPatch.py +1 -3
- pulumi_kubernetes/apiextensions/v1/CustomResourceDefinition.py +1 -3
- pulumi_kubernetes/apiextensions/v1/CustomResourceDefinitionList.py +1 -3
- pulumi_kubernetes/apiextensions/v1/CustomResourceDefinitionPatch.py +1 -3
- pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinition.py +1 -3
- pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinitionList.py +1 -3
- pulumi_kubernetes/apiextensions/v1beta1/CustomResourceDefinitionPatch.py +1 -3
- pulumi_kubernetes/apiregistration/v1/APIService.py +1 -3
- pulumi_kubernetes/apiregistration/v1/APIServiceList.py +1 -3
- pulumi_kubernetes/apiregistration/v1/APIServicePatch.py +1 -3
- pulumi_kubernetes/apiregistration/v1beta1/APIService.py +1 -3
- pulumi_kubernetes/apiregistration/v1beta1/APIServiceList.py +1 -3
- pulumi_kubernetes/apiregistration/v1beta1/APIServicePatch.py +1 -3
- pulumi_kubernetes/apps/v1/ControllerRevision.py +1 -3
- pulumi_kubernetes/apps/v1/ControllerRevisionList.py +1 -3
- pulumi_kubernetes/apps/v1/ControllerRevisionPatch.py +1 -3
- pulumi_kubernetes/apps/v1/DaemonSet.py +1 -3
- pulumi_kubernetes/apps/v1/DaemonSetList.py +1 -3
- pulumi_kubernetes/apps/v1/DaemonSetPatch.py +1 -3
- pulumi_kubernetes/apps/v1/Deployment.py +1 -3
- pulumi_kubernetes/apps/v1/DeploymentList.py +1 -3
- pulumi_kubernetes/apps/v1/DeploymentPatch.py +1 -3
- pulumi_kubernetes/apps/v1/ReplicaSet.py +1 -3
- pulumi_kubernetes/apps/v1/ReplicaSetList.py +5 -7
- pulumi_kubernetes/apps/v1/ReplicaSetPatch.py +1 -3
- pulumi_kubernetes/apps/v1/StatefulSet.py +1 -3
- pulumi_kubernetes/apps/v1/StatefulSetList.py +1 -3
- pulumi_kubernetes/apps/v1/StatefulSetPatch.py +1 -3
- pulumi_kubernetes/apps/v1/_inputs.py +109 -56
- pulumi_kubernetes/apps/v1/outputs.py +129 -56
- pulumi_kubernetes/apps/v1beta1/ControllerRevision.py +1 -3
- pulumi_kubernetes/apps/v1beta1/ControllerRevisionList.py +1 -3
- pulumi_kubernetes/apps/v1beta1/ControllerRevisionPatch.py +1 -3
- pulumi_kubernetes/apps/v1beta1/Deployment.py +1 -3
- pulumi_kubernetes/apps/v1beta1/DeploymentList.py +1 -3
- pulumi_kubernetes/apps/v1beta1/DeploymentPatch.py +1 -3
- pulumi_kubernetes/apps/v1beta1/StatefulSet.py +1 -3
- pulumi_kubernetes/apps/v1beta1/StatefulSetList.py +1 -3
- pulumi_kubernetes/apps/v1beta1/StatefulSetPatch.py +1 -3
- pulumi_kubernetes/apps/v1beta2/ControllerRevision.py +1 -3
- pulumi_kubernetes/apps/v1beta2/ControllerRevisionList.py +1 -3
- pulumi_kubernetes/apps/v1beta2/ControllerRevisionPatch.py +1 -3
- pulumi_kubernetes/apps/v1beta2/DaemonSet.py +1 -3
- pulumi_kubernetes/apps/v1beta2/DaemonSetList.py +1 -3
- pulumi_kubernetes/apps/v1beta2/DaemonSetPatch.py +1 -3
- pulumi_kubernetes/apps/v1beta2/Deployment.py +1 -3
- pulumi_kubernetes/apps/v1beta2/DeploymentList.py +1 -3
- pulumi_kubernetes/apps/v1beta2/DeploymentPatch.py +1 -3
- pulumi_kubernetes/apps/v1beta2/ReplicaSet.py +1 -3
- pulumi_kubernetes/apps/v1beta2/ReplicaSetList.py +1 -3
- pulumi_kubernetes/apps/v1beta2/ReplicaSetPatch.py +1 -3
- pulumi_kubernetes/apps/v1beta2/StatefulSet.py +1 -3
- pulumi_kubernetes/apps/v1beta2/StatefulSetList.py +1 -3
- pulumi_kubernetes/apps/v1beta2/StatefulSetPatch.py +1 -3
- pulumi_kubernetes/auditregistration/v1alpha1/AuditSink.py +1 -3
- pulumi_kubernetes/auditregistration/v1alpha1/AuditSinkList.py +1 -3
- pulumi_kubernetes/auditregistration/v1alpha1/AuditSinkPatch.py +1 -3
- pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscaler.py +1 -3
- pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscalerList.py +1 -3
- pulumi_kubernetes/autoscaling/v1/HorizontalPodAutoscalerPatch.py +1 -3
- pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscaler.py +1 -3
- pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscalerList.py +1 -3
- pulumi_kubernetes/autoscaling/v2/HorizontalPodAutoscalerPatch.py +1 -3
- pulumi_kubernetes/autoscaling/v2/_inputs.py +92 -12
- pulumi_kubernetes/autoscaling/v2/outputs.py +66 -10
- pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscaler.py +1 -3
- pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscalerList.py +1 -3
- pulumi_kubernetes/autoscaling/v2beta1/HorizontalPodAutoscalerPatch.py +1 -3
- pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscaler.py +1 -3
- pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscalerList.py +1 -3
- pulumi_kubernetes/autoscaling/v2beta2/HorizontalPodAutoscalerPatch.py +1 -3
- pulumi_kubernetes/batch/v1/CronJob.py +1 -3
- pulumi_kubernetes/batch/v1/CronJobList.py +1 -3
- pulumi_kubernetes/batch/v1/CronJobPatch.py +1 -3
- pulumi_kubernetes/batch/v1/Job.py +1 -3
- pulumi_kubernetes/batch/v1/JobList.py +1 -3
- pulumi_kubernetes/batch/v1/JobPatch.py +1 -3
- pulumi_kubernetes/batch/v1/_inputs.py +12 -42
- pulumi_kubernetes/batch/v1/outputs.py +8 -32
- pulumi_kubernetes/batch/v1beta1/CronJob.py +1 -3
- pulumi_kubernetes/batch/v1beta1/CronJobList.py +1 -3
- pulumi_kubernetes/batch/v1beta1/CronJobPatch.py +1 -3
- pulumi_kubernetes/batch/v2alpha1/CronJob.py +1 -3
- pulumi_kubernetes/batch/v2alpha1/CronJobList.py +1 -3
- pulumi_kubernetes/batch/v2alpha1/CronJobPatch.py +1 -3
- pulumi_kubernetes/certificates/v1/CertificateSigningRequest.py +1 -3
- pulumi_kubernetes/certificates/v1/CertificateSigningRequestList.py +1 -3
- pulumi_kubernetes/certificates/v1/CertificateSigningRequestPatch.py +1 -3
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundle.py +3 -3
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundleList.py +1 -3
- pulumi_kubernetes/certificates/v1alpha1/ClusterTrustBundlePatch.py +3 -3
- pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequest.py +1 -3
- pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequestList.py +1 -3
- pulumi_kubernetes/certificates/v1beta1/CertificateSigningRequestPatch.py +1 -3
- pulumi_kubernetes/certificates/v1beta1/ClusterTrustBundle.py +227 -0
- pulumi_kubernetes/certificates/v1beta1/ClusterTrustBundleList.py +217 -0
- pulumi_kubernetes/certificates/v1beta1/ClusterTrustBundlePatch.py +238 -0
- pulumi_kubernetes/certificates/v1beta1/__init__.py +3 -0
- pulumi_kubernetes/certificates/v1beta1/_inputs.py +292 -0
- pulumi_kubernetes/certificates/v1beta1/outputs.py +241 -0
- pulumi_kubernetes/coordination/v1/Lease.py +1 -3
- pulumi_kubernetes/coordination/v1/LeaseList.py +1 -3
- pulumi_kubernetes/coordination/v1/LeasePatch.py +1 -3
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidate.py +2 -4
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidateList.py +1 -3
- pulumi_kubernetes/coordination/v1alpha1/LeaseCandidatePatch.py +2 -4
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidate.py +2 -4
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidateList.py +1 -3
- pulumi_kubernetes/coordination/v1alpha2/LeaseCandidatePatch.py +2 -4
- pulumi_kubernetes/coordination/v1alpha2/_inputs.py +6 -6
- pulumi_kubernetes/coordination/v1alpha2/outputs.py +4 -4
- pulumi_kubernetes/coordination/v1beta1/Lease.py +1 -3
- pulumi_kubernetes/coordination/v1beta1/LeaseCandidate.py +218 -0
- pulumi_kubernetes/coordination/v1beta1/LeaseCandidateList.py +217 -0
- pulumi_kubernetes/coordination/v1beta1/LeaseCandidatePatch.py +230 -0
- pulumi_kubernetes/coordination/v1beta1/LeaseList.py +1 -3
- pulumi_kubernetes/coordination/v1beta1/LeasePatch.py +1 -3
- pulumi_kubernetes/coordination/v1beta1/__init__.py +3 -0
- pulumi_kubernetes/coordination/v1beta1/_inputs.py +371 -0
- pulumi_kubernetes/coordination/v1beta1/outputs.py +292 -0
- pulumi_kubernetes/core/v1/Binding.py +1 -3
- pulumi_kubernetes/core/v1/BindingPatch.py +1 -3
- pulumi_kubernetes/core/v1/ConfigMap.py +1 -3
- pulumi_kubernetes/core/v1/ConfigMapList.py +1 -3
- pulumi_kubernetes/core/v1/ConfigMapPatch.py +1 -3
- pulumi_kubernetes/core/v1/Endpoints.py +9 -3
- pulumi_kubernetes/core/v1/EndpointsList.py +3 -5
- pulumi_kubernetes/core/v1/EndpointsPatch.py +9 -3
- pulumi_kubernetes/core/v1/Event.py +1 -3
- pulumi_kubernetes/core/v1/EventList.py +1 -3
- pulumi_kubernetes/core/v1/EventPatch.py +1 -3
- pulumi_kubernetes/core/v1/LimitRange.py +1 -3
- pulumi_kubernetes/core/v1/LimitRangeList.py +1 -3
- pulumi_kubernetes/core/v1/LimitRangePatch.py +1 -3
- pulumi_kubernetes/core/v1/Namespace.py +1 -3
- pulumi_kubernetes/core/v1/NamespaceList.py +1 -3
- pulumi_kubernetes/core/v1/NamespacePatch.py +1 -3
- pulumi_kubernetes/core/v1/Node.py +1 -3
- pulumi_kubernetes/core/v1/NodeList.py +1 -3
- pulumi_kubernetes/core/v1/NodePatch.py +1 -3
- pulumi_kubernetes/core/v1/PersistentVolume.py +1 -3
- pulumi_kubernetes/core/v1/PersistentVolumeClaim.py +1 -3
- pulumi_kubernetes/core/v1/PersistentVolumeClaimList.py +1 -3
- pulumi_kubernetes/core/v1/PersistentVolumeClaimPatch.py +1 -3
- pulumi_kubernetes/core/v1/PersistentVolumeList.py +1 -3
- pulumi_kubernetes/core/v1/PersistentVolumePatch.py +1 -3
- pulumi_kubernetes/core/v1/Pod.py +1 -3
- pulumi_kubernetes/core/v1/PodList.py +1 -3
- pulumi_kubernetes/core/v1/PodPatch.py +1 -3
- pulumi_kubernetes/core/v1/PodTemplate.py +1 -3
- pulumi_kubernetes/core/v1/PodTemplateList.py +1 -3
- pulumi_kubernetes/core/v1/PodTemplatePatch.py +1 -3
- pulumi_kubernetes/core/v1/ReplicationController.py +1 -3
- pulumi_kubernetes/core/v1/ReplicationControllerList.py +1 -3
- pulumi_kubernetes/core/v1/ReplicationControllerPatch.py +1 -3
- pulumi_kubernetes/core/v1/ResourceQuota.py +1 -3
- pulumi_kubernetes/core/v1/ResourceQuotaList.py +1 -3
- pulumi_kubernetes/core/v1/ResourceQuotaPatch.py +1 -3
- pulumi_kubernetes/core/v1/Secret.py +1 -3
- pulumi_kubernetes/core/v1/SecretList.py +1 -3
- pulumi_kubernetes/core/v1/SecretPatch.py +1 -3
- pulumi_kubernetes/core/v1/Service.py +1 -3
- pulumi_kubernetes/core/v1/ServiceAccount.py +1 -3
- pulumi_kubernetes/core/v1/ServiceAccountList.py +1 -3
- pulumi_kubernetes/core/v1/ServiceAccountPatch.py +1 -3
- pulumi_kubernetes/core/v1/ServiceList.py +1 -3
- pulumi_kubernetes/core/v1/ServicePatch.py +1 -3
- pulumi_kubernetes/core/v1/_enums.py +2 -1
- pulumi_kubernetes/core/v1/_inputs.py +240 -66
- pulumi_kubernetes/core/v1/outputs.py +251 -51
- pulumi_kubernetes/discovery/v1/EndpointSlice.py +11 -13
- pulumi_kubernetes/discovery/v1/EndpointSliceList.py +1 -3
- pulumi_kubernetes/discovery/v1/EndpointSlicePatch.py +11 -13
- pulumi_kubernetes/discovery/v1/_inputs.py +159 -44
- pulumi_kubernetes/discovery/v1/outputs.py +107 -32
- pulumi_kubernetes/discovery/v1beta1/EndpointSlice.py +1 -3
- pulumi_kubernetes/discovery/v1beta1/EndpointSliceList.py +1 -3
- pulumi_kubernetes/discovery/v1beta1/EndpointSlicePatch.py +1 -3
- pulumi_kubernetes/events/v1/Event.py +1 -3
- pulumi_kubernetes/events/v1/EventList.py +1 -3
- pulumi_kubernetes/events/v1/EventPatch.py +1 -3
- pulumi_kubernetes/events/v1beta1/Event.py +1 -3
- pulumi_kubernetes/events/v1beta1/EventList.py +1 -3
- pulumi_kubernetes/events/v1beta1/EventPatch.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/DaemonSet.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/DaemonSetList.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/DaemonSetPatch.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/Deployment.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/DeploymentList.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/DeploymentPatch.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/Ingress.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/IngressList.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/IngressPatch.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/NetworkPolicy.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/NetworkPolicyList.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/NetworkPolicyPatch.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicy.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicyList.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/PodSecurityPolicyPatch.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/ReplicaSet.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/ReplicaSetList.py +1 -3
- pulumi_kubernetes/extensions/v1beta1/ReplicaSetPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1/FlowSchema.py +1 -3
- pulumi_kubernetes/flowcontrol/v1/FlowSchemaList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1/FlowSchemaPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfiguration.py +1 -3
- pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfigurationList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1/PriorityLevelConfigurationPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchema.py +1 -3
- pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchemaList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1alpha1/FlowSchemaPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfiguration.py +1 -3
- pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfigurationList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1alpha1/PriorityLevelConfigurationPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta1/FlowSchema.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta1/FlowSchemaList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta1/FlowSchemaPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfiguration.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfigurationList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta1/PriorityLevelConfigurationPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta2/FlowSchema.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta2/FlowSchemaList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta2/FlowSchemaPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfiguration.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfigurationList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta2/PriorityLevelConfigurationPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta3/FlowSchema.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta3/FlowSchemaList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta3/FlowSchemaPatch.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfiguration.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfigurationList.py +1 -3
- pulumi_kubernetes/flowcontrol/v1beta3/PriorityLevelConfigurationPatch.py +1 -3
- pulumi_kubernetes/helm/v3/Release.py +1 -3
- pulumi_kubernetes/helm/v4/Chart.py +1 -3
- pulumi_kubernetes/kustomize/v2/Directory.py +1 -3
- pulumi_kubernetes/meta/v1/Status.py +1 -3
- pulumi_kubernetes/meta/v1/StatusPatch.py +1 -3
- pulumi_kubernetes/networking/v1/IPAddress.py +218 -0
- pulumi_kubernetes/networking/v1/IPAddressList.py +217 -0
- pulumi_kubernetes/networking/v1/IPAddressPatch.py +230 -0
- pulumi_kubernetes/networking/v1/Ingress.py +1 -3
- pulumi_kubernetes/networking/v1/IngressClass.py +1 -3
- pulumi_kubernetes/networking/v1/IngressClassList.py +1 -3
- pulumi_kubernetes/networking/v1/IngressClassPatch.py +1 -3
- pulumi_kubernetes/networking/v1/IngressList.py +1 -3
- pulumi_kubernetes/networking/v1/IngressPatch.py +1 -3
- pulumi_kubernetes/networking/v1/NetworkPolicy.py +1 -3
- pulumi_kubernetes/networking/v1/NetworkPolicyList.py +1 -3
- pulumi_kubernetes/networking/v1/NetworkPolicyPatch.py +1 -3
- pulumi_kubernetes/networking/v1/ServiceCIDR.py +228 -0
- pulumi_kubernetes/networking/v1/ServiceCIDRList.py +217 -0
- pulumi_kubernetes/networking/v1/ServiceCIDRPatch.py +240 -0
- pulumi_kubernetes/networking/v1/__init__.py +6 -0
- pulumi_kubernetes/networking/v1/_inputs.py +599 -0
- pulumi_kubernetes/networking/v1/outputs.py +461 -0
- pulumi_kubernetes/networking/v1alpha1/ClusterCIDR.py +1 -3
- pulumi_kubernetes/networking/v1alpha1/ClusterCIDRList.py +1 -3
- pulumi_kubernetes/networking/v1alpha1/ClusterCIDRPatch.py +1 -3
- pulumi_kubernetes/networking/v1alpha1/IPAddress.py +2 -4
- pulumi_kubernetes/networking/v1alpha1/IPAddressList.py +1 -3
- pulumi_kubernetes/networking/v1alpha1/IPAddressPatch.py +2 -4
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDR.py +2 -4
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDRList.py +1 -3
- pulumi_kubernetes/networking/v1alpha1/ServiceCIDRPatch.py +2 -4
- pulumi_kubernetes/networking/v1beta1/IPAddress.py +2 -4
- pulumi_kubernetes/networking/v1beta1/IPAddressList.py +1 -3
- pulumi_kubernetes/networking/v1beta1/IPAddressPatch.py +2 -4
- pulumi_kubernetes/networking/v1beta1/Ingress.py +1 -3
- pulumi_kubernetes/networking/v1beta1/IngressClass.py +1 -3
- pulumi_kubernetes/networking/v1beta1/IngressClassList.py +1 -3
- pulumi_kubernetes/networking/v1beta1/IngressClassPatch.py +1 -3
- pulumi_kubernetes/networking/v1beta1/IngressList.py +1 -3
- pulumi_kubernetes/networking/v1beta1/IngressPatch.py +1 -3
- pulumi_kubernetes/networking/v1beta1/ServiceCIDR.py +2 -4
- pulumi_kubernetes/networking/v1beta1/ServiceCIDRList.py +1 -3
- pulumi_kubernetes/networking/v1beta1/ServiceCIDRPatch.py +2 -4
- pulumi_kubernetes/node/v1/RuntimeClass.py +1 -3
- pulumi_kubernetes/node/v1/RuntimeClassList.py +1 -3
- pulumi_kubernetes/node/v1/RuntimeClassPatch.py +1 -3
- pulumi_kubernetes/node/v1alpha1/RuntimeClass.py +1 -3
- pulumi_kubernetes/node/v1alpha1/RuntimeClassList.py +1 -3
- pulumi_kubernetes/node/v1alpha1/RuntimeClassPatch.py +1 -3
- pulumi_kubernetes/node/v1beta1/RuntimeClass.py +1 -3
- pulumi_kubernetes/node/v1beta1/RuntimeClassList.py +1 -3
- pulumi_kubernetes/node/v1beta1/RuntimeClassPatch.py +1 -3
- pulumi_kubernetes/policy/v1/PodDisruptionBudget.py +1 -3
- pulumi_kubernetes/policy/v1/PodDisruptionBudgetList.py +1 -3
- pulumi_kubernetes/policy/v1/PodDisruptionBudgetPatch.py +1 -3
- pulumi_kubernetes/policy/v1/_inputs.py +0 -12
- pulumi_kubernetes/policy/v1/outputs.py +0 -8
- pulumi_kubernetes/policy/v1beta1/PodDisruptionBudget.py +1 -3
- pulumi_kubernetes/policy/v1beta1/PodDisruptionBudgetList.py +1 -3
- pulumi_kubernetes/policy/v1beta1/PodDisruptionBudgetPatch.py +1 -3
- pulumi_kubernetes/policy/v1beta1/PodSecurityPolicy.py +1 -3
- pulumi_kubernetes/policy/v1beta1/PodSecurityPolicyList.py +1 -3
- pulumi_kubernetes/policy/v1beta1/PodSecurityPolicyPatch.py +1 -3
- pulumi_kubernetes/provider.py +1 -3
- pulumi_kubernetes/pulumi-plugin.json +1 -1
- pulumi_kubernetes/rbac/v1/ClusterRole.py +1 -3
- pulumi_kubernetes/rbac/v1/ClusterRoleBinding.py +1 -3
- pulumi_kubernetes/rbac/v1/ClusterRoleBindingList.py +1 -3
- pulumi_kubernetes/rbac/v1/ClusterRoleBindingPatch.py +1 -3
- pulumi_kubernetes/rbac/v1/ClusterRoleList.py +1 -3
- pulumi_kubernetes/rbac/v1/ClusterRolePatch.py +1 -3
- pulumi_kubernetes/rbac/v1/Role.py +1 -3
- pulumi_kubernetes/rbac/v1/RoleBinding.py +1 -3
- pulumi_kubernetes/rbac/v1/RoleBindingList.py +1 -3
- pulumi_kubernetes/rbac/v1/RoleBindingPatch.py +1 -3
- pulumi_kubernetes/rbac/v1/RoleList.py +1 -3
- pulumi_kubernetes/rbac/v1/RolePatch.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/ClusterRole.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBinding.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBindingList.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleBindingPatch.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/ClusterRoleList.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/ClusterRolePatch.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/Role.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/RoleBinding.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/RoleBindingList.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/RoleBindingPatch.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/RoleList.py +1 -3
- pulumi_kubernetes/rbac/v1alpha1/RolePatch.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/ClusterRole.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleBinding.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleBindingList.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleBindingPatch.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/ClusterRoleList.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/ClusterRolePatch.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/Role.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/RoleBinding.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/RoleBindingList.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/RoleBindingPatch.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/RoleList.py +1 -3
- pulumi_kubernetes/rbac/v1beta1/RolePatch.py +1 -3
- pulumi_kubernetes/resource/__init__.py +3 -0
- pulumi_kubernetes/resource/v1alpha1/PodScheduling.py +1 -3
- pulumi_kubernetes/resource/v1alpha1/PodSchedulingList.py +1 -3
- pulumi_kubernetes/resource/v1alpha1/PodSchedulingPatch.py +1 -3
- pulumi_kubernetes/resource/v1alpha1/ResourceClaim.py +2 -4
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimList.py +1 -3
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimPatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplate.py +2 -4
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplateList.py +1 -3
- pulumi_kubernetes/resource/v1alpha1/ResourceClaimTemplatePatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha1/ResourceClass.py +1 -3
- pulumi_kubernetes/resource/v1alpha1/ResourceClassList.py +1 -3
- pulumi_kubernetes/resource/v1alpha1/ResourceClassPatch.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/PodSchedulingContext.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/PodSchedulingContextList.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/PodSchedulingContextPatch.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClaim.py +2 -4
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimList.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimParameters.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimParametersList.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimParametersPatch.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimPatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplate.py +2 -4
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplateList.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClaimTemplatePatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha2/ResourceClass.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClassList.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClassParameters.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClassParametersList.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClassParametersPatch.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceClassPatch.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceSlice.py +2 -4
- pulumi_kubernetes/resource/v1alpha2/ResourceSliceList.py +1 -3
- pulumi_kubernetes/resource/v1alpha2/ResourceSlicePatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/DeviceClass.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/DeviceClassList.py +1 -3
- pulumi_kubernetes/resource/v1alpha3/DeviceClassPatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/DeviceTaintRule.py +225 -0
- pulumi_kubernetes/resource/v1alpha3/DeviceTaintRuleList.py +217 -0
- pulumi_kubernetes/resource/v1alpha3/DeviceTaintRulePatch.py +236 -0
- pulumi_kubernetes/resource/v1alpha3/PodSchedulingContext.py +1 -3
- pulumi_kubernetes/resource/v1alpha3/PodSchedulingContextList.py +1 -3
- pulumi_kubernetes/resource/v1alpha3/PodSchedulingContextPatch.py +1 -3
- pulumi_kubernetes/resource/v1alpha3/ResourceClaim.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimList.py +1 -3
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimPatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplate.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplateList.py +1 -3
- pulumi_kubernetes/resource/v1alpha3/ResourceClaimTemplatePatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/ResourceSlice.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/ResourceSliceList.py +1 -3
- pulumi_kubernetes/resource/v1alpha3/ResourceSlicePatch.py +2 -4
- pulumi_kubernetes/resource/v1alpha3/__init__.py +3 -0
- pulumi_kubernetes/resource/v1alpha3/_inputs.py +2559 -213
- pulumi_kubernetes/resource/v1alpha3/outputs.py +2037 -256
- pulumi_kubernetes/resource/v1beta1/DeviceClass.py +2 -4
- pulumi_kubernetes/resource/v1beta1/DeviceClassList.py +1 -3
- pulumi_kubernetes/resource/v1beta1/DeviceClassPatch.py +2 -4
- pulumi_kubernetes/resource/v1beta1/ResourceClaim.py +2 -4
- pulumi_kubernetes/resource/v1beta1/ResourceClaimList.py +1 -3
- pulumi_kubernetes/resource/v1beta1/ResourceClaimPatch.py +2 -4
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplate.py +2 -4
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplateList.py +1 -3
- pulumi_kubernetes/resource/v1beta1/ResourceClaimTemplatePatch.py +2 -4
- pulumi_kubernetes/resource/v1beta1/ResourceSlice.py +2 -4
- pulumi_kubernetes/resource/v1beta1/ResourceSliceList.py +1 -3
- pulumi_kubernetes/resource/v1beta1/ResourceSlicePatch.py +2 -4
- pulumi_kubernetes/resource/v1beta1/_inputs.py +2044 -176
- pulumi_kubernetes/resource/v1beta1/outputs.py +1536 -134
- pulumi_kubernetes/resource/v1beta2/DeviceClass.py +239 -0
- pulumi_kubernetes/resource/v1beta2/DeviceClassList.py +217 -0
- pulumi_kubernetes/resource/v1beta2/DeviceClassPatch.py +250 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaim.py +234 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimList.py +218 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimPatch.py +245 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimTemplate.py +231 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimTemplateList.py +217 -0
- pulumi_kubernetes/resource/v1beta2/ResourceClaimTemplatePatch.py +242 -0
- pulumi_kubernetes/resource/v1beta2/ResourceSlice.py +248 -0
- pulumi_kubernetes/resource/v1beta2/ResourceSliceList.py +218 -0
- pulumi_kubernetes/resource/v1beta2/ResourceSlicePatch.py +259 -0
- pulumi_kubernetes/resource/v1beta2/__init__.py +22 -0
- pulumi_kubernetes/resource/v1beta2/_inputs.py +5681 -0
- pulumi_kubernetes/resource/v1beta2/outputs.py +4726 -0
- pulumi_kubernetes/scheduling/v1/PriorityClass.py +1 -3
- pulumi_kubernetes/scheduling/v1/PriorityClassList.py +1 -3
- pulumi_kubernetes/scheduling/v1/PriorityClassPatch.py +1 -3
- pulumi_kubernetes/scheduling/v1alpha1/PriorityClass.py +1 -3
- pulumi_kubernetes/scheduling/v1alpha1/PriorityClassList.py +1 -3
- pulumi_kubernetes/scheduling/v1alpha1/PriorityClassPatch.py +1 -3
- pulumi_kubernetes/scheduling/v1beta1/PriorityClass.py +1 -3
- pulumi_kubernetes/scheduling/v1beta1/PriorityClassList.py +1 -3
- pulumi_kubernetes/scheduling/v1beta1/PriorityClassPatch.py +1 -3
- pulumi_kubernetes/settings/v1alpha1/PodPreset.py +1 -3
- pulumi_kubernetes/settings/v1alpha1/PodPresetList.py +1 -3
- pulumi_kubernetes/settings/v1alpha1/PodPresetPatch.py +1 -3
- pulumi_kubernetes/storage/v1/CSIDriver.py +1 -3
- pulumi_kubernetes/storage/v1/CSIDriverList.py +1 -3
- pulumi_kubernetes/storage/v1/CSIDriverPatch.py +1 -3
- pulumi_kubernetes/storage/v1/CSINode.py +1 -3
- pulumi_kubernetes/storage/v1/CSINodeList.py +1 -3
- pulumi_kubernetes/storage/v1/CSINodePatch.py +1 -3
- pulumi_kubernetes/storage/v1/CSIStorageCapacity.py +1 -3
- pulumi_kubernetes/storage/v1/CSIStorageCapacityList.py +1 -3
- pulumi_kubernetes/storage/v1/CSIStorageCapacityPatch.py +1 -3
- pulumi_kubernetes/storage/v1/StorageClass.py +1 -3
- pulumi_kubernetes/storage/v1/StorageClassList.py +1 -3
- pulumi_kubernetes/storage/v1/StorageClassPatch.py +1 -3
- pulumi_kubernetes/storage/v1/VolumeAttachment.py +1 -3
- pulumi_kubernetes/storage/v1/VolumeAttachmentList.py +1 -3
- pulumi_kubernetes/storage/v1/VolumeAttachmentPatch.py +1 -3
- pulumi_kubernetes/storage/v1/_inputs.py +90 -0
- pulumi_kubernetes/storage/v1/outputs.py +110 -0
- pulumi_kubernetes/storage/v1alpha1/VolumeAttachment.py +1 -3
- pulumi_kubernetes/storage/v1alpha1/VolumeAttachmentList.py +1 -3
- pulumi_kubernetes/storage/v1alpha1/VolumeAttachmentPatch.py +1 -3
- pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClass.py +1 -3
- pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClassList.py +1 -3
- pulumi_kubernetes/storage/v1alpha1/VolumeAttributesClassPatch.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSIDriver.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSIDriverList.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSIDriverPatch.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSINode.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSINodeList.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSINodePatch.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSIStorageCapacity.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSIStorageCapacityList.py +1 -3
- pulumi_kubernetes/storage/v1beta1/CSIStorageCapacityPatch.py +1 -3
- pulumi_kubernetes/storage/v1beta1/StorageClass.py +1 -3
- pulumi_kubernetes/storage/v1beta1/StorageClassList.py +1 -3
- pulumi_kubernetes/storage/v1beta1/StorageClassPatch.py +1 -3
- pulumi_kubernetes/storage/v1beta1/VolumeAttachment.py +1 -3
- pulumi_kubernetes/storage/v1beta1/VolumeAttachmentList.py +1 -3
- pulumi_kubernetes/storage/v1beta1/VolumeAttachmentPatch.py +1 -3
- pulumi_kubernetes/storage/v1beta1/VolumeAttributesClass.py +1 -3
- pulumi_kubernetes/storage/v1beta1/VolumeAttributesClassList.py +1 -3
- pulumi_kubernetes/storage/v1beta1/VolumeAttributesClassPatch.py +1 -3
- pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigration.py +1 -3
- pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigrationList.py +1 -3
- pulumi_kubernetes/storagemigration/v1alpha1/StorageVersionMigrationPatch.py +1 -3
- pulumi_kubernetes/yaml/v2/ConfigFile.py +1 -3
- pulumi_kubernetes/yaml/v2/ConfigGroup.py +1 -3
- pulumi_kubernetes/yaml/yaml.py +108 -0
- {pulumi_kubernetes-4.23.0a1746131759.dist-info → pulumi_kubernetes-4.23.0a1746153578.dist-info}/METADATA +2 -2
- pulumi_kubernetes-4.23.0a1746153578.dist-info/RECORD +709 -0
- pulumi_kubernetes-4.23.0a1746131759.dist-info/RECORD +0 -679
- {pulumi_kubernetes-4.23.0a1746131759.dist-info → pulumi_kubernetes-4.23.0a1746153578.dist-info}/WHEEL +0 -0
- {pulumi_kubernetes-4.23.0a1746131759.dist-info → pulumi_kubernetes-4.23.0a1746153578.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,238 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumigen. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins
|
|
6
|
+
import copy
|
|
7
|
+
import warnings
|
|
8
|
+
import sys
|
|
9
|
+
import pulumi
|
|
10
|
+
import pulumi.runtime
|
|
11
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
12
|
+
if sys.version_info >= (3, 11):
|
|
13
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
14
|
+
else:
|
|
15
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
16
|
+
from ... import _utilities
|
|
17
|
+
from . import outputs
|
|
18
|
+
from ... import meta as _meta
|
|
19
|
+
from ._inputs import *
|
|
20
|
+
|
|
21
|
+
__all__ = ['ClusterTrustBundlePatchArgs', 'ClusterTrustBundlePatch']
|
|
22
|
+
|
|
23
|
+
@pulumi.input_type
|
|
24
|
+
class ClusterTrustBundlePatchArgs:
|
|
25
|
+
def __init__(__self__, *,
|
|
26
|
+
api_version: Optional[pulumi.Input[builtins.str]] = None,
|
|
27
|
+
kind: Optional[pulumi.Input[builtins.str]] = None,
|
|
28
|
+
metadata: Optional[pulumi.Input['_meta.v1.ObjectMetaPatchArgs']] = None,
|
|
29
|
+
spec: Optional[pulumi.Input['ClusterTrustBundleSpecPatchArgs']] = None):
|
|
30
|
+
"""
|
|
31
|
+
The set of arguments for constructing a ClusterTrustBundlePatch resource.
|
|
32
|
+
:param pulumi.Input[builtins.str] api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
33
|
+
:param pulumi.Input[builtins.str] kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
34
|
+
:param pulumi.Input['_meta.v1.ObjectMetaPatchArgs'] metadata: metadata contains the object metadata.
|
|
35
|
+
:param pulumi.Input['ClusterTrustBundleSpecPatchArgs'] spec: spec contains the signer (if any) and trust anchors.
|
|
36
|
+
"""
|
|
37
|
+
if api_version is not None:
|
|
38
|
+
pulumi.set(__self__, "api_version", 'certificates.k8s.io/v1beta1')
|
|
39
|
+
if kind is not None:
|
|
40
|
+
pulumi.set(__self__, "kind", 'ClusterTrustBundle')
|
|
41
|
+
if metadata is not None:
|
|
42
|
+
pulumi.set(__self__, "metadata", metadata)
|
|
43
|
+
if spec is not None:
|
|
44
|
+
pulumi.set(__self__, "spec", spec)
|
|
45
|
+
|
|
46
|
+
@property
|
|
47
|
+
@pulumi.getter(name="apiVersion")
|
|
48
|
+
def api_version(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
49
|
+
"""
|
|
50
|
+
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
51
|
+
"""
|
|
52
|
+
return pulumi.get(self, "api_version")
|
|
53
|
+
|
|
54
|
+
@api_version.setter
|
|
55
|
+
def api_version(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
56
|
+
pulumi.set(self, "api_version", value)
|
|
57
|
+
|
|
58
|
+
@property
|
|
59
|
+
@pulumi.getter
|
|
60
|
+
def kind(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
61
|
+
"""
|
|
62
|
+
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
63
|
+
"""
|
|
64
|
+
return pulumi.get(self, "kind")
|
|
65
|
+
|
|
66
|
+
@kind.setter
|
|
67
|
+
def kind(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
68
|
+
pulumi.set(self, "kind", value)
|
|
69
|
+
|
|
70
|
+
@property
|
|
71
|
+
@pulumi.getter
|
|
72
|
+
def metadata(self) -> Optional[pulumi.Input['_meta.v1.ObjectMetaPatchArgs']]:
|
|
73
|
+
"""
|
|
74
|
+
metadata contains the object metadata.
|
|
75
|
+
"""
|
|
76
|
+
return pulumi.get(self, "metadata")
|
|
77
|
+
|
|
78
|
+
@metadata.setter
|
|
79
|
+
def metadata(self, value: Optional[pulumi.Input['_meta.v1.ObjectMetaPatchArgs']]):
|
|
80
|
+
pulumi.set(self, "metadata", value)
|
|
81
|
+
|
|
82
|
+
@property
|
|
83
|
+
@pulumi.getter
|
|
84
|
+
def spec(self) -> Optional[pulumi.Input['ClusterTrustBundleSpecPatchArgs']]:
|
|
85
|
+
"""
|
|
86
|
+
spec contains the signer (if any) and trust anchors.
|
|
87
|
+
"""
|
|
88
|
+
return pulumi.get(self, "spec")
|
|
89
|
+
|
|
90
|
+
@spec.setter
|
|
91
|
+
def spec(self, value: Optional[pulumi.Input['ClusterTrustBundleSpecPatchArgs']]):
|
|
92
|
+
pulumi.set(self, "spec", value)
|
|
93
|
+
|
|
94
|
+
|
|
95
|
+
@pulumi.type_token("kubernetes:certificates.k8s.io/v1beta1:ClusterTrustBundlePatch")
|
|
96
|
+
class ClusterTrustBundlePatch(pulumi.CustomResource):
|
|
97
|
+
@overload
|
|
98
|
+
def __init__(__self__,
|
|
99
|
+
resource_name: str,
|
|
100
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
101
|
+
api_version: Optional[pulumi.Input[builtins.str]] = None,
|
|
102
|
+
kind: Optional[pulumi.Input[builtins.str]] = None,
|
|
103
|
+
metadata: Optional[pulumi.Input[Union['_meta.v1.ObjectMetaPatchArgs', '_meta.v1.ObjectMetaPatchArgsDict']]] = None,
|
|
104
|
+
spec: Optional[pulumi.Input[Union['ClusterTrustBundleSpecPatchArgs', 'ClusterTrustBundleSpecPatchArgsDict']]] = None,
|
|
105
|
+
__props__=None):
|
|
106
|
+
"""
|
|
107
|
+
Patch resources are used to modify existing Kubernetes resources by using
|
|
108
|
+
Server-Side Apply updates. The name of the resource must be specified, but all other properties are optional. More than
|
|
109
|
+
one patch may be applied to the same resource, and a random FieldManager name will be used for each Patch resource.
|
|
110
|
+
Conflicts will result in an error by default, but can be forced using the "pulumi.com/patchForce" annotation. See the
|
|
111
|
+
[Server-Side Apply Docs](https://www.pulumi.com/registry/packages/kubernetes/how-to-guides/managing-resources-with-server-side-apply/) for
|
|
112
|
+
additional information about using Server-Side Apply to manage Kubernetes resources with Pulumi.
|
|
113
|
+
ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates).
|
|
114
|
+
|
|
115
|
+
ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the `clusterTrustBundle` projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to.
|
|
116
|
+
|
|
117
|
+
It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.
|
|
118
|
+
|
|
119
|
+
:param str resource_name: The name of the resource.
|
|
120
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
121
|
+
:param pulumi.Input[builtins.str] api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
122
|
+
:param pulumi.Input[builtins.str] kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
123
|
+
:param pulumi.Input[Union['_meta.v1.ObjectMetaPatchArgs', '_meta.v1.ObjectMetaPatchArgsDict']] metadata: metadata contains the object metadata.
|
|
124
|
+
:param pulumi.Input[Union['ClusterTrustBundleSpecPatchArgs', 'ClusterTrustBundleSpecPatchArgsDict']] spec: spec contains the signer (if any) and trust anchors.
|
|
125
|
+
"""
|
|
126
|
+
...
|
|
127
|
+
@overload
|
|
128
|
+
def __init__(__self__,
|
|
129
|
+
resource_name: str,
|
|
130
|
+
args: Optional[ClusterTrustBundlePatchArgs] = None,
|
|
131
|
+
opts: Optional[pulumi.ResourceOptions] = None):
|
|
132
|
+
"""
|
|
133
|
+
Patch resources are used to modify existing Kubernetes resources by using
|
|
134
|
+
Server-Side Apply updates. The name of the resource must be specified, but all other properties are optional. More than
|
|
135
|
+
one patch may be applied to the same resource, and a random FieldManager name will be used for each Patch resource.
|
|
136
|
+
Conflicts will result in an error by default, but can be forced using the "pulumi.com/patchForce" annotation. See the
|
|
137
|
+
[Server-Side Apply Docs](https://www.pulumi.com/registry/packages/kubernetes/how-to-guides/managing-resources-with-server-side-apply/) for
|
|
138
|
+
additional information about using Server-Side Apply to manage Kubernetes resources with Pulumi.
|
|
139
|
+
ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates).
|
|
140
|
+
|
|
141
|
+
ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the `clusterTrustBundle` projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to.
|
|
142
|
+
|
|
143
|
+
It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.
|
|
144
|
+
|
|
145
|
+
:param str resource_name: The name of the resource.
|
|
146
|
+
:param ClusterTrustBundlePatchArgs args: The arguments to use to populate this resource's properties.
|
|
147
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
148
|
+
"""
|
|
149
|
+
...
|
|
150
|
+
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
151
|
+
resource_args, opts = _utilities.get_resource_args_opts(ClusterTrustBundlePatchArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
152
|
+
if resource_args is not None:
|
|
153
|
+
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
154
|
+
else:
|
|
155
|
+
__self__._internal_init(resource_name, *args, **kwargs)
|
|
156
|
+
|
|
157
|
+
def _internal_init(__self__,
|
|
158
|
+
resource_name: str,
|
|
159
|
+
opts: Optional[pulumi.ResourceOptions] = None,
|
|
160
|
+
api_version: Optional[pulumi.Input[builtins.str]] = None,
|
|
161
|
+
kind: Optional[pulumi.Input[builtins.str]] = None,
|
|
162
|
+
metadata: Optional[pulumi.Input[Union['_meta.v1.ObjectMetaPatchArgs', '_meta.v1.ObjectMetaPatchArgsDict']]] = None,
|
|
163
|
+
spec: Optional[pulumi.Input[Union['ClusterTrustBundleSpecPatchArgs', 'ClusterTrustBundleSpecPatchArgsDict']]] = None,
|
|
164
|
+
__props__=None):
|
|
165
|
+
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
166
|
+
if not isinstance(opts, pulumi.ResourceOptions):
|
|
167
|
+
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
168
|
+
if opts.id is None:
|
|
169
|
+
if __props__ is not None:
|
|
170
|
+
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
171
|
+
__props__ = ClusterTrustBundlePatchArgs.__new__(ClusterTrustBundlePatchArgs)
|
|
172
|
+
|
|
173
|
+
__props__.__dict__["api_version"] = 'certificates.k8s.io/v1beta1'
|
|
174
|
+
__props__.__dict__["kind"] = 'ClusterTrustBundle'
|
|
175
|
+
__props__.__dict__["metadata"] = metadata
|
|
176
|
+
__props__.__dict__["spec"] = spec
|
|
177
|
+
alias_opts = pulumi.ResourceOptions(aliases=[pulumi.Alias(type_="kubernetes:certificates.k8s.io/v1alpha1:ClusterTrustBundlePatch")])
|
|
178
|
+
opts = pulumi.ResourceOptions.merge(opts, alias_opts)
|
|
179
|
+
super(ClusterTrustBundlePatch, __self__).__init__(
|
|
180
|
+
'kubernetes:certificates.k8s.io/v1beta1:ClusterTrustBundlePatch',
|
|
181
|
+
resource_name,
|
|
182
|
+
__props__,
|
|
183
|
+
opts)
|
|
184
|
+
|
|
185
|
+
@staticmethod
|
|
186
|
+
def get(resource_name: str,
|
|
187
|
+
id: pulumi.Input[str],
|
|
188
|
+
opts: Optional[pulumi.ResourceOptions] = None) -> 'ClusterTrustBundlePatch':
|
|
189
|
+
"""
|
|
190
|
+
Get an existing ClusterTrustBundlePatch resource's state with the given name, id, and optional extra
|
|
191
|
+
properties used to qualify the lookup.
|
|
192
|
+
|
|
193
|
+
:param str resource_name: The unique name of the resulting resource.
|
|
194
|
+
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
195
|
+
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
196
|
+
"""
|
|
197
|
+
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
198
|
+
|
|
199
|
+
__props__ = ClusterTrustBundlePatchArgs.__new__(ClusterTrustBundlePatchArgs)
|
|
200
|
+
|
|
201
|
+
__props__.__dict__["api_version"] = None
|
|
202
|
+
__props__.__dict__["kind"] = None
|
|
203
|
+
__props__.__dict__["metadata"] = None
|
|
204
|
+
__props__.__dict__["spec"] = None
|
|
205
|
+
return ClusterTrustBundlePatch(resource_name, opts=opts, __props__=__props__)
|
|
206
|
+
|
|
207
|
+
@property
|
|
208
|
+
@pulumi.getter(name="apiVersion")
|
|
209
|
+
def api_version(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
210
|
+
"""
|
|
211
|
+
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
212
|
+
"""
|
|
213
|
+
return pulumi.get(self, "api_version")
|
|
214
|
+
|
|
215
|
+
@property
|
|
216
|
+
@pulumi.getter
|
|
217
|
+
def kind(self) -> pulumi.Output[Optional[builtins.str]]:
|
|
218
|
+
"""
|
|
219
|
+
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
220
|
+
"""
|
|
221
|
+
return pulumi.get(self, "kind")
|
|
222
|
+
|
|
223
|
+
@property
|
|
224
|
+
@pulumi.getter
|
|
225
|
+
def metadata(self) -> pulumi.Output[Optional['_meta.v1.outputs.ObjectMetaPatch']]:
|
|
226
|
+
"""
|
|
227
|
+
metadata contains the object metadata.
|
|
228
|
+
"""
|
|
229
|
+
return pulumi.get(self, "metadata")
|
|
230
|
+
|
|
231
|
+
@property
|
|
232
|
+
@pulumi.getter
|
|
233
|
+
def spec(self) -> pulumi.Output[Optional['outputs.ClusterTrustBundleSpecPatch']]:
|
|
234
|
+
"""
|
|
235
|
+
spec contains the signer (if any) and trust anchors.
|
|
236
|
+
"""
|
|
237
|
+
return pulumi.get(self, "spec")
|
|
238
|
+
|
|
@@ -9,5 +9,8 @@ import typing
|
|
|
9
9
|
from .CertificateSigningRequest import *
|
|
10
10
|
from .CertificateSigningRequestList import *
|
|
11
11
|
from .CertificateSigningRequestPatch import *
|
|
12
|
+
from .ClusterTrustBundle import *
|
|
13
|
+
from .ClusterTrustBundleList import *
|
|
14
|
+
from .ClusterTrustBundlePatch import *
|
|
12
15
|
from ._inputs import *
|
|
13
16
|
from . import outputs
|
|
@@ -27,6 +27,12 @@ __all__ = [
|
|
|
27
27
|
'CertificateSigningRequestStatusArgsDict',
|
|
28
28
|
'CertificateSigningRequestArgs',
|
|
29
29
|
'CertificateSigningRequestArgsDict',
|
|
30
|
+
'ClusterTrustBundleSpecPatchArgs',
|
|
31
|
+
'ClusterTrustBundleSpecPatchArgsDict',
|
|
32
|
+
'ClusterTrustBundleSpecArgs',
|
|
33
|
+
'ClusterTrustBundleSpecArgsDict',
|
|
34
|
+
'ClusterTrustBundleArgs',
|
|
35
|
+
'ClusterTrustBundleArgsDict',
|
|
30
36
|
]
|
|
31
37
|
|
|
32
38
|
MYPY = False
|
|
@@ -676,3 +682,289 @@ class CertificateSigningRequestArgs:
|
|
|
676
682
|
pulumi.set(self, "status", value)
|
|
677
683
|
|
|
678
684
|
|
|
685
|
+
if not MYPY:
|
|
686
|
+
class ClusterTrustBundleSpecPatchArgsDict(TypedDict):
|
|
687
|
+
"""
|
|
688
|
+
ClusterTrustBundleSpec contains the signer and trust anchors.
|
|
689
|
+
"""
|
|
690
|
+
signer_name: NotRequired[pulumi.Input[builtins.str]]
|
|
691
|
+
"""
|
|
692
|
+
signerName indicates the associated signer, if any.
|
|
693
|
+
|
|
694
|
+
In order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.
|
|
695
|
+
|
|
696
|
+
If signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.
|
|
697
|
+
|
|
698
|
+
If signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.
|
|
699
|
+
|
|
700
|
+
List/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.
|
|
701
|
+
"""
|
|
702
|
+
trust_bundle: NotRequired[pulumi.Input[builtins.str]]
|
|
703
|
+
"""
|
|
704
|
+
trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.
|
|
705
|
+
|
|
706
|
+
The data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.
|
|
707
|
+
|
|
708
|
+
Users of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.
|
|
709
|
+
"""
|
|
710
|
+
elif False:
|
|
711
|
+
ClusterTrustBundleSpecPatchArgsDict: TypeAlias = Mapping[str, Any]
|
|
712
|
+
|
|
713
|
+
@pulumi.input_type
|
|
714
|
+
class ClusterTrustBundleSpecPatchArgs:
|
|
715
|
+
def __init__(__self__, *,
|
|
716
|
+
signer_name: Optional[pulumi.Input[builtins.str]] = None,
|
|
717
|
+
trust_bundle: Optional[pulumi.Input[builtins.str]] = None):
|
|
718
|
+
"""
|
|
719
|
+
ClusterTrustBundleSpec contains the signer and trust anchors.
|
|
720
|
+
:param pulumi.Input[builtins.str] signer_name: signerName indicates the associated signer, if any.
|
|
721
|
+
|
|
722
|
+
In order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.
|
|
723
|
+
|
|
724
|
+
If signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.
|
|
725
|
+
|
|
726
|
+
If signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.
|
|
727
|
+
|
|
728
|
+
List/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.
|
|
729
|
+
:param pulumi.Input[builtins.str] trust_bundle: trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.
|
|
730
|
+
|
|
731
|
+
The data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.
|
|
732
|
+
|
|
733
|
+
Users of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.
|
|
734
|
+
"""
|
|
735
|
+
if signer_name is not None:
|
|
736
|
+
pulumi.set(__self__, "signer_name", signer_name)
|
|
737
|
+
if trust_bundle is not None:
|
|
738
|
+
pulumi.set(__self__, "trust_bundle", trust_bundle)
|
|
739
|
+
|
|
740
|
+
@property
|
|
741
|
+
@pulumi.getter(name="signerName")
|
|
742
|
+
def signer_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
743
|
+
"""
|
|
744
|
+
signerName indicates the associated signer, if any.
|
|
745
|
+
|
|
746
|
+
In order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.
|
|
747
|
+
|
|
748
|
+
If signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.
|
|
749
|
+
|
|
750
|
+
If signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.
|
|
751
|
+
|
|
752
|
+
List/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.
|
|
753
|
+
"""
|
|
754
|
+
return pulumi.get(self, "signer_name")
|
|
755
|
+
|
|
756
|
+
@signer_name.setter
|
|
757
|
+
def signer_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
758
|
+
pulumi.set(self, "signer_name", value)
|
|
759
|
+
|
|
760
|
+
@property
|
|
761
|
+
@pulumi.getter(name="trustBundle")
|
|
762
|
+
def trust_bundle(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
763
|
+
"""
|
|
764
|
+
trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.
|
|
765
|
+
|
|
766
|
+
The data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.
|
|
767
|
+
|
|
768
|
+
Users of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.
|
|
769
|
+
"""
|
|
770
|
+
return pulumi.get(self, "trust_bundle")
|
|
771
|
+
|
|
772
|
+
@trust_bundle.setter
|
|
773
|
+
def trust_bundle(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
774
|
+
pulumi.set(self, "trust_bundle", value)
|
|
775
|
+
|
|
776
|
+
|
|
777
|
+
if not MYPY:
|
|
778
|
+
class ClusterTrustBundleSpecArgsDict(TypedDict):
|
|
779
|
+
"""
|
|
780
|
+
ClusterTrustBundleSpec contains the signer and trust anchors.
|
|
781
|
+
"""
|
|
782
|
+
trust_bundle: pulumi.Input[builtins.str]
|
|
783
|
+
"""
|
|
784
|
+
trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.
|
|
785
|
+
|
|
786
|
+
The data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.
|
|
787
|
+
|
|
788
|
+
Users of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.
|
|
789
|
+
"""
|
|
790
|
+
signer_name: NotRequired[pulumi.Input[builtins.str]]
|
|
791
|
+
"""
|
|
792
|
+
signerName indicates the associated signer, if any.
|
|
793
|
+
|
|
794
|
+
In order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.
|
|
795
|
+
|
|
796
|
+
If signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.
|
|
797
|
+
|
|
798
|
+
If signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.
|
|
799
|
+
|
|
800
|
+
List/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.
|
|
801
|
+
"""
|
|
802
|
+
elif False:
|
|
803
|
+
ClusterTrustBundleSpecArgsDict: TypeAlias = Mapping[str, Any]
|
|
804
|
+
|
|
805
|
+
@pulumi.input_type
|
|
806
|
+
class ClusterTrustBundleSpecArgs:
|
|
807
|
+
def __init__(__self__, *,
|
|
808
|
+
trust_bundle: pulumi.Input[builtins.str],
|
|
809
|
+
signer_name: Optional[pulumi.Input[builtins.str]] = None):
|
|
810
|
+
"""
|
|
811
|
+
ClusterTrustBundleSpec contains the signer and trust anchors.
|
|
812
|
+
:param pulumi.Input[builtins.str] trust_bundle: trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.
|
|
813
|
+
|
|
814
|
+
The data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.
|
|
815
|
+
|
|
816
|
+
Users of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.
|
|
817
|
+
:param pulumi.Input[builtins.str] signer_name: signerName indicates the associated signer, if any.
|
|
818
|
+
|
|
819
|
+
In order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.
|
|
820
|
+
|
|
821
|
+
If signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.
|
|
822
|
+
|
|
823
|
+
If signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.
|
|
824
|
+
|
|
825
|
+
List/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.
|
|
826
|
+
"""
|
|
827
|
+
pulumi.set(__self__, "trust_bundle", trust_bundle)
|
|
828
|
+
if signer_name is not None:
|
|
829
|
+
pulumi.set(__self__, "signer_name", signer_name)
|
|
830
|
+
|
|
831
|
+
@property
|
|
832
|
+
@pulumi.getter(name="trustBundle")
|
|
833
|
+
def trust_bundle(self) -> pulumi.Input[builtins.str]:
|
|
834
|
+
"""
|
|
835
|
+
trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.
|
|
836
|
+
|
|
837
|
+
The data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.
|
|
838
|
+
|
|
839
|
+
Users of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.
|
|
840
|
+
"""
|
|
841
|
+
return pulumi.get(self, "trust_bundle")
|
|
842
|
+
|
|
843
|
+
@trust_bundle.setter
|
|
844
|
+
def trust_bundle(self, value: pulumi.Input[builtins.str]):
|
|
845
|
+
pulumi.set(self, "trust_bundle", value)
|
|
846
|
+
|
|
847
|
+
@property
|
|
848
|
+
@pulumi.getter(name="signerName")
|
|
849
|
+
def signer_name(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
850
|
+
"""
|
|
851
|
+
signerName indicates the associated signer, if any.
|
|
852
|
+
|
|
853
|
+
In order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.
|
|
854
|
+
|
|
855
|
+
If signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.
|
|
856
|
+
|
|
857
|
+
If signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.
|
|
858
|
+
|
|
859
|
+
List/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.
|
|
860
|
+
"""
|
|
861
|
+
return pulumi.get(self, "signer_name")
|
|
862
|
+
|
|
863
|
+
@signer_name.setter
|
|
864
|
+
def signer_name(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
865
|
+
pulumi.set(self, "signer_name", value)
|
|
866
|
+
|
|
867
|
+
|
|
868
|
+
if not MYPY:
|
|
869
|
+
class ClusterTrustBundleArgsDict(TypedDict):
|
|
870
|
+
"""
|
|
871
|
+
ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates).
|
|
872
|
+
|
|
873
|
+
ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the `clusterTrustBundle` projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to.
|
|
874
|
+
|
|
875
|
+
It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.
|
|
876
|
+
"""
|
|
877
|
+
spec: pulumi.Input['ClusterTrustBundleSpecArgsDict']
|
|
878
|
+
"""
|
|
879
|
+
spec contains the signer (if any) and trust anchors.
|
|
880
|
+
"""
|
|
881
|
+
api_version: NotRequired[pulumi.Input[builtins.str]]
|
|
882
|
+
"""
|
|
883
|
+
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
884
|
+
"""
|
|
885
|
+
kind: NotRequired[pulumi.Input[builtins.str]]
|
|
886
|
+
"""
|
|
887
|
+
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
888
|
+
"""
|
|
889
|
+
metadata: NotRequired[pulumi.Input['_meta.v1.ObjectMetaArgsDict']]
|
|
890
|
+
"""
|
|
891
|
+
metadata contains the object metadata.
|
|
892
|
+
"""
|
|
893
|
+
elif False:
|
|
894
|
+
ClusterTrustBundleArgsDict: TypeAlias = Mapping[str, Any]
|
|
895
|
+
|
|
896
|
+
@pulumi.input_type
|
|
897
|
+
class ClusterTrustBundleArgs:
|
|
898
|
+
def __init__(__self__, *,
|
|
899
|
+
spec: pulumi.Input['ClusterTrustBundleSpecArgs'],
|
|
900
|
+
api_version: Optional[pulumi.Input[builtins.str]] = None,
|
|
901
|
+
kind: Optional[pulumi.Input[builtins.str]] = None,
|
|
902
|
+
metadata: Optional[pulumi.Input['_meta.v1.ObjectMetaArgs']] = None):
|
|
903
|
+
"""
|
|
904
|
+
ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates).
|
|
905
|
+
|
|
906
|
+
ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the `clusterTrustBundle` projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to.
|
|
907
|
+
|
|
908
|
+
It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.
|
|
909
|
+
:param pulumi.Input['ClusterTrustBundleSpecArgs'] spec: spec contains the signer (if any) and trust anchors.
|
|
910
|
+
:param pulumi.Input[builtins.str] api_version: APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
911
|
+
:param pulumi.Input[builtins.str] kind: Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
912
|
+
:param pulumi.Input['_meta.v1.ObjectMetaArgs'] metadata: metadata contains the object metadata.
|
|
913
|
+
"""
|
|
914
|
+
pulumi.set(__self__, "spec", spec)
|
|
915
|
+
if api_version is not None:
|
|
916
|
+
pulumi.set(__self__, "api_version", 'certificates.k8s.io/v1beta1')
|
|
917
|
+
if kind is not None:
|
|
918
|
+
pulumi.set(__self__, "kind", 'ClusterTrustBundle')
|
|
919
|
+
if metadata is not None:
|
|
920
|
+
pulumi.set(__self__, "metadata", metadata)
|
|
921
|
+
|
|
922
|
+
@property
|
|
923
|
+
@pulumi.getter
|
|
924
|
+
def spec(self) -> pulumi.Input['ClusterTrustBundleSpecArgs']:
|
|
925
|
+
"""
|
|
926
|
+
spec contains the signer (if any) and trust anchors.
|
|
927
|
+
"""
|
|
928
|
+
return pulumi.get(self, "spec")
|
|
929
|
+
|
|
930
|
+
@spec.setter
|
|
931
|
+
def spec(self, value: pulumi.Input['ClusterTrustBundleSpecArgs']):
|
|
932
|
+
pulumi.set(self, "spec", value)
|
|
933
|
+
|
|
934
|
+
@property
|
|
935
|
+
@pulumi.getter(name="apiVersion")
|
|
936
|
+
def api_version(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
937
|
+
"""
|
|
938
|
+
APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
939
|
+
"""
|
|
940
|
+
return pulumi.get(self, "api_version")
|
|
941
|
+
|
|
942
|
+
@api_version.setter
|
|
943
|
+
def api_version(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
944
|
+
pulumi.set(self, "api_version", value)
|
|
945
|
+
|
|
946
|
+
@property
|
|
947
|
+
@pulumi.getter
|
|
948
|
+
def kind(self) -> Optional[pulumi.Input[builtins.str]]:
|
|
949
|
+
"""
|
|
950
|
+
Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
951
|
+
"""
|
|
952
|
+
return pulumi.get(self, "kind")
|
|
953
|
+
|
|
954
|
+
@kind.setter
|
|
955
|
+
def kind(self, value: Optional[pulumi.Input[builtins.str]]):
|
|
956
|
+
pulumi.set(self, "kind", value)
|
|
957
|
+
|
|
958
|
+
@property
|
|
959
|
+
@pulumi.getter
|
|
960
|
+
def metadata(self) -> Optional[pulumi.Input['_meta.v1.ObjectMetaArgs']]:
|
|
961
|
+
"""
|
|
962
|
+
metadata contains the object metadata.
|
|
963
|
+
"""
|
|
964
|
+
return pulumi.get(self, "metadata")
|
|
965
|
+
|
|
966
|
+
@metadata.setter
|
|
967
|
+
def metadata(self, value: Optional[pulumi.Input['_meta.v1.ObjectMetaArgs']]):
|
|
968
|
+
pulumi.set(self, "metadata", value)
|
|
969
|
+
|
|
970
|
+
|