Skip to content

Commit

Permalink
update: source github.com/jsonnet-libs/k8s@93c336c0
Browse files Browse the repository at this point in the history
  • Loading branch information
bison authored and jsonnet-libs-bot committed May 14, 2024
1 parent 0f0a2fd commit 57f9d98
Show file tree
Hide file tree
Showing 36 changed files with 906 additions and 894 deletions.
8 changes: 4 additions & 4 deletions 0.1.0/_gen/secrets/v1beta1/hcpAuth.libsonnet
Original file line number Diff line number Diff line change
Expand Up @@ -49,14 +49,14 @@
} + self.metadata.withName(name=name),
'#spec':: d.obj(help='"HCPAuthSpec defines the desired state of HCPAuth"'),
spec: {
'#servicePrincipal':: d.obj(help='"ServicePrincipal provides the necessary configuration for authenticating to HCP using a service principal. For security reasons, only project-level service principals should ever be used."'),
'#servicePrincipal':: d.obj(help='"ServicePrincipal provides the necessary configuration for authenticating to\\nHCP using a service principal. For security reasons, only project-level\\nservice principals should ever be used."'),
servicePrincipal: {
'#withSecretRef':: d.fn(help="\"SecretRef is the name of a Kubernetes secret in the consumer's (VDS/VSS/PKI/HCP) namespace which provides the HCP ServicePrincipal clientID, and clientSecret. The secret data must have the following structure { \\\"clientID\\\": \\\"clientID\\\", \\\"clientSecret\\\": \\\"clientSecret\\\", }\"", args=[d.arg(name='secretRef', type=d.T.string)]),
'#withSecretRef':: d.fn(help="\"SecretRef is the name of a Kubernetes secret in the consumer's\\n(VDS/VSS/PKI/HCP) namespace which provides the HCP ServicePrincipal clientID,\\nand clientSecret.\\nThe secret data must have the following structure {\\n \\\"clientID\\\": \\\"clientID\\\",\\n \\\"clientSecret\\\": \\\"clientSecret\\\",\\n}\"", args=[d.arg(name='secretRef', type=d.T.string)]),
withSecretRef(secretRef): { spec+: { servicePrincipal+: { secretRef: secretRef } } },
},
'#withAllowedNamespaces':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod. This field allows administrators to customize which Kubernetes namespaces are authorized to use with this AuthMethod. While Vault will still enforce its own rules, this has the added configurability of restricting which HCPAuthMethods can be used by which namespaces. Accepted values: []{\\\"*\\\"} - wildcard, all namespaces. []{\\\"a\\\", \\\"b\\\"} - list of namespaces. unset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this is the default behavior.\"", args=[d.arg(name='allowedNamespaces', type=d.T.array)]),
'#withAllowedNamespaces':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\\nconfigurability of restricting which HCPAuthMethods can be used by which namespaces.\\nAccepted values:\\n[]{\\\"*\\\"} - wildcard, all namespaces.\\n[]{\\\"a\\\", \\\"b\\\"} - list of namespaces.\\nunset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this\\nis the default behavior.\"", args=[d.arg(name='allowedNamespaces', type=d.T.array)]),
withAllowedNamespaces(allowedNamespaces): { spec+: { allowedNamespaces: if std.isArray(v=allowedNamespaces) then allowedNamespaces else [allowedNamespaces] } },
'#withAllowedNamespacesMixin':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod. This field allows administrators to customize which Kubernetes namespaces are authorized to use with this AuthMethod. While Vault will still enforce its own rules, this has the added configurability of restricting which HCPAuthMethods can be used by which namespaces. Accepted values: []{\\\"*\\\"} - wildcard, all namespaces. []{\\\"a\\\", \\\"b\\\"} - list of namespaces. unset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this is the default behavior.\"\n\n**Note:** This function appends passed data to existing values", args=[d.arg(name='allowedNamespaces', type=d.T.array)]),
'#withAllowedNamespacesMixin':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\\nconfigurability of restricting which HCPAuthMethods can be used by which namespaces.\\nAccepted values:\\n[]{\\\"*\\\"} - wildcard, all namespaces.\\n[]{\\\"a\\\", \\\"b\\\"} - list of namespaces.\\nunset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this\\nis the default behavior.\"\n\n**Note:** This function appends passed data to existing values", args=[d.arg(name='allowedNamespaces', type=d.T.array)]),
withAllowedNamespacesMixin(allowedNamespaces): { spec+: { allowedNamespaces+: if std.isArray(v=allowedNamespaces) then allowedNamespaces else [allowedNamespaces] } },
'#withMethod':: d.fn(help='"Method to use when authenticating to Vault."', args=[d.arg(name='method', type=d.T.string)]),
withMethod(method): { spec+: { method: method } },
Expand Down
Loading

0 comments on commit 57f9d98

Please sign in to comment.