Skip to content

Commit

Permalink
update: source github.com/jsonnet-libs/k8s@1cfedc49
Browse files Browse the repository at this point in the history
  • Loading branch information
vtomasr5 authored and jsonnet-libs-bot committed Jul 11, 2024
1 parent 9720a7a commit 8a39436
Show file tree
Hide file tree
Showing 89 changed files with 13,969 additions and 16 deletions.
5 changes: 5 additions & 0 deletions 0.1.0/_gen/secrets/v1beta1/vaultStaticSecret.libsonnet
Original file line number Diff line number Diff line change
Expand Up @@ -118,6 +118,11 @@
'#withName':: d.fn(help='"Name of the resource"', args=[d.arg(name='name', type=d.T.string)]),
withName(name): { name: name },
},
'#syncConfig':: d.obj(help='"SyncConfig configures sync behavior from Vault to VSO"'),
syncConfig: {
'#withInstantUpdates':: d.fn(help='"InstantUpdates is a flag to indicate that event-driven updates are\\nenabled for this VaultStaticSecret"', args=[d.arg(name='instantUpdates', type=d.T.boolean)]),
withInstantUpdates(instantUpdates): { spec+: { syncConfig+: { instantUpdates: instantUpdates } } },
},
'#withHmacSecretData':: d.fn(help="\"HMACSecretData determines whether the Operator computes the\\nHMAC of the Secret's data. The MAC value will be stored in\\nthe resource's Status.SecretMac field, and will be used for drift detection\\nand during incoming Vault secret comparison.\\nEnabling this feature is recommended to ensure that Secret's data stays consistent with Vault.\"", args=[d.arg(name='hmacSecretData', type=d.T.boolean)]),
withHmacSecretData(hmacSecretData): { spec+: { hmacSecretData: hmacSecretData } },
'#withMount':: d.fn(help='"Mount for the secret in Vault"', args=[d.arg(name='mount', type=d.T.string)]),
Expand Down
5 changes: 5 additions & 0 deletions 0.2.0/_gen/secrets/v1beta1/vaultStaticSecret.libsonnet
Original file line number Diff line number Diff line change
Expand Up @@ -118,6 +118,11 @@
'#withName':: d.fn(help='"Name of the resource"', args=[d.arg(name='name', type=d.T.string)]),
withName(name): { name: name },
},
'#syncConfig':: d.obj(help='"SyncConfig configures sync behavior from Vault to VSO"'),
syncConfig: {
'#withInstantUpdates':: d.fn(help='"InstantUpdates is a flag to indicate that event-driven updates are\\nenabled for this VaultStaticSecret"', args=[d.arg(name='instantUpdates', type=d.T.boolean)]),
withInstantUpdates(instantUpdates): { spec+: { syncConfig+: { instantUpdates: instantUpdates } } },
},
'#withHmacSecretData':: d.fn(help="\"HMACSecretData determines whether the Operator computes the\\nHMAC of the Secret's data. The MAC value will be stored in\\nthe resource's Status.SecretMac field, and will be used for drift detection\\nand during incoming Vault secret comparison.\\nEnabling this feature is recommended to ensure that Secret's data stays consistent with Vault.\"", args=[d.arg(name='hmacSecretData', type=d.T.boolean)]),
withHmacSecretData(hmacSecretData): { spec+: { hmacSecretData: hmacSecretData } },
'#withMount':: d.fn(help='"Mount for the secret in Vault"', args=[d.arg(name='mount', type=d.T.string)]),
Expand Down
File renamed without changes.
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -118,6 +118,11 @@
'#withName':: d.fn(help='"Name of the resource"', args=[d.arg(name='name', type=d.T.string)]),
withName(name): { name: name },
},
'#syncConfig':: d.obj(help='"SyncConfig configures sync behavior from Vault to VSO"'),
syncConfig: {
'#withInstantUpdates':: d.fn(help='"InstantUpdates is a flag to indicate that event-driven updates are\\nenabled for this VaultStaticSecret"', args=[d.arg(name='instantUpdates', type=d.T.boolean)]),
withInstantUpdates(instantUpdates): { spec+: { syncConfig+: { instantUpdates: instantUpdates } } },
},
'#withHmacSecretData':: d.fn(help="\"HMACSecretData determines whether the Operator computes the\\nHMAC of the Secret's data. The MAC value will be stored in\\nthe resource's Status.SecretMac field, and will be used for drift detection\\nand during incoming Vault secret comparison.\\nEnabling this feature is recommended to ensure that Secret's data stays consistent with Vault.\"", args=[d.arg(name='hmacSecretData', type=d.T.boolean)]),
withHmacSecretData(hmacSecretData): { spec+: { hmacSecretData: hmacSecretData } },
'#withMount':: d.fn(help='"Mount for the secret in Vault"', args=[d.arg(name='mount', type=d.T.string)]),
Expand Down
2 changes: 1 addition & 1 deletion 0.3.0/gen.libsonnet → 0.4.0/gen.libsonnet
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
local d = (import 'doc-util/main.libsonnet'),
'#':: d.pkg(name='vault-secrets-operator', url='github.com/jsonnet-libs/vault-secrets-operator-libsonnet/0.3.0/main.libsonnet', help=''),
'#':: d.pkg(name='vault-secrets-operator', url='github.com/jsonnet-libs/vault-secrets-operator-libsonnet/0.4.0/main.libsonnet', help=''),
secrets:: (import '_gen/secrets/main.libsonnet'),
}
File renamed without changes.
5 changes: 5 additions & 0 deletions 0.5.0/_gen/secrets/main.libsonnet
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
{
local d = (import 'doc-util/main.libsonnet'),
'#':: d.pkg(name='secrets', url='', help=''),
v1beta1: (import 'v1beta1/main.libsonnet'),
}
70 changes: 70 additions & 0 deletions 0.5.0/_gen/secrets/v1beta1/hcpAuth.libsonnet
Original file line number Diff line number Diff line change
@@ -0,0 +1,70 @@
{
local d = (import 'doc-util/main.libsonnet'),
'#':: d.pkg(name='hcpAuth', url='', help='"HCPAuth is the Schema for the hcpauths API"'),
'#metadata':: d.obj(help='"ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create."'),
metadata: {
'#withAnnotations':: d.fn(help='"Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations"', args=[d.arg(name='annotations', type=d.T.object)]),
withAnnotations(annotations): { metadata+: { annotations: annotations } },
'#withAnnotationsMixin':: d.fn(help='"Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations"\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='annotations', type=d.T.object)]),
withAnnotationsMixin(annotations): { metadata+: { annotations+: annotations } },
'#withClusterName':: d.fn(help='"The name of the cluster which the object belongs to. This is used to distinguish resources with same name and namespace in different clusters. This field is not set anywhere right now and apiserver is going to ignore it if set in create or update request."', args=[d.arg(name='clusterName', type=d.T.string)]),
withClusterName(clusterName): { metadata+: { clusterName: clusterName } },
'#withCreationTimestamp':: d.fn(help='"Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers."', args=[d.arg(name='creationTimestamp', type=d.T.string)]),
withCreationTimestamp(creationTimestamp): { metadata+: { creationTimestamp: creationTimestamp } },
'#withDeletionGracePeriodSeconds':: d.fn(help='"Number of seconds allowed for this object to gracefully terminate before it will be removed from the system. Only set when deletionTimestamp is also set. May only be shortened. Read-only."', args=[d.arg(name='deletionGracePeriodSeconds', type=d.T.integer)]),
withDeletionGracePeriodSeconds(deletionGracePeriodSeconds): { metadata+: { deletionGracePeriodSeconds: deletionGracePeriodSeconds } },
'#withDeletionTimestamp':: d.fn(help='"Time is a wrapper around time.Time which supports correct marshaling to YAML and JSON. Wrappers are provided for many of the factory methods that the time package offers."', args=[d.arg(name='deletionTimestamp', type=d.T.string)]),
withDeletionTimestamp(deletionTimestamp): { metadata+: { deletionTimestamp: deletionTimestamp } },
'#withFinalizers':: d.fn(help='"Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list."', args=[d.arg(name='finalizers', type=d.T.array)]),
withFinalizers(finalizers): { metadata+: { finalizers: if std.isArray(v=finalizers) then finalizers else [finalizers] } },
'#withFinalizersMixin':: d.fn(help='"Must be empty before the object is deleted from the registry. Each entry is an identifier for the responsible component that will remove the entry from the list. If the deletionTimestamp of the object is non-nil, entries in this list can only be removed. Finalizers may be processed and removed in any order. Order is NOT enforced because it introduces significant risk of stuck finalizers. finalizers is a shared field, any actor with permission can reorder it. If the finalizer list is processed in order, then this can lead to a situation in which the component responsible for the first finalizer in the list is waiting for a signal (field value, external system, or other) produced by a component responsible for a finalizer later in the list, resulting in a deadlock. Without enforced ordering finalizers are free to order amongst themselves and are not vulnerable to ordering changes in the list."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='finalizers', type=d.T.array)]),
withFinalizersMixin(finalizers): { metadata+: { finalizers+: if std.isArray(v=finalizers) then finalizers else [finalizers] } },
'#withGenerateName':: d.fn(help='"GenerateName is an optional prefix, used by the server, to generate a unique name ONLY IF the Name field has not been provided. If this field is used, the name returned to the client will be different than the name passed. This value will also be combined with a unique suffix. The provided value has the same validation rules as the Name field, and may be truncated by the length of the suffix required to make the value unique on the server.\\n\\nIf this field is specified and the generated name exists, the server will NOT return a 409 - instead, it will either return 201 Created or 500 with Reason ServerTimeout indicating a unique name could not be found in the time allotted, and the client should retry (optionally after the time indicated in the Retry-After header).\\n\\nApplied only if Name is not specified. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#idempotency"', args=[d.arg(name='generateName', type=d.T.string)]),
withGenerateName(generateName): { metadata+: { generateName: generateName } },
'#withGeneration':: d.fn(help='"A sequence number representing a specific generation of the desired state. Populated by the system. Read-only."', args=[d.arg(name='generation', type=d.T.integer)]),
withGeneration(generation): { metadata+: { generation: generation } },
'#withLabels':: d.fn(help='"Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels"', args=[d.arg(name='labels', type=d.T.object)]),
withLabels(labels): { metadata+: { labels: labels } },
'#withLabelsMixin':: d.fn(help='"Map of string keys and values that can be used to organize and categorize (scope and select) objects. May match selectors of replication controllers and services. More info: http://kubernetes.io/docs/user-guide/labels"\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='labels', type=d.T.object)]),
withLabelsMixin(labels): { metadata+: { labels+: labels } },
'#withName':: d.fn(help='"Name must be unique within a namespace. Is required when creating resources, although some resources may allow a client to request the generation of an appropriate name automatically. Name is primarily intended for creation idempotence and configuration definition. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/identifiers#names"', args=[d.arg(name='name', type=d.T.string)]),
withName(name): { metadata+: { name: name } },
'#withNamespace':: d.fn(help='"Namespace defines the space within which each name must be unique. An empty namespace is equivalent to the \\"default\\" namespace, but \\"default\\" is the canonical representation. Not all objects are required to be scoped to a namespace - the value of this field for those objects will be empty.\\n\\nMust be a DNS_LABEL. Cannot be updated. More info: http://kubernetes.io/docs/user-guide/namespaces"', args=[d.arg(name='namespace', type=d.T.string)]),
withNamespace(namespace): { metadata+: { namespace: namespace } },
'#withOwnerReferences':: d.fn(help='"List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller."', args=[d.arg(name='ownerReferences', type=d.T.array)]),
withOwnerReferences(ownerReferences): { metadata+: { ownerReferences: if std.isArray(v=ownerReferences) then ownerReferences else [ownerReferences] } },
'#withOwnerReferencesMixin':: d.fn(help='"List of objects depended by this object. If ALL objects in the list have been deleted, this object will be garbage collected. If this object is managed by a controller, then an entry in this list will point to this controller, with the controller field set to true. There cannot be more than one managing controller."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='ownerReferences', type=d.T.array)]),
withOwnerReferencesMixin(ownerReferences): { metadata+: { ownerReferences+: if std.isArray(v=ownerReferences) then ownerReferences else [ownerReferences] } },
'#withResourceVersion':: d.fn(help='"An opaque value that represents the internal version of this object that can be used by clients to determine when objects have changed. May be used for optimistic concurrency, change detection, and the watch operation on a resource or set of resources. Clients must treat these values as opaque and passed unmodified back to the server. They may only be valid for a particular resource or set of resources.\\n\\nPopulated by the system. Read-only. Value must be treated as opaque by clients and . More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency"', args=[d.arg(name='resourceVersion', type=d.T.string)]),
withResourceVersion(resourceVersion): { metadata+: { resourceVersion: resourceVersion } },
'#withSelfLink':: d.fn(help='"SelfLink is a URL representing this object. Populated by the system. Read-only.\\n\\nDEPRECATED Kubernetes will stop propagating this field in 1.20 release and the field is planned to be removed in 1.21 release."', args=[d.arg(name='selfLink', type=d.T.string)]),
withSelfLink(selfLink): { metadata+: { selfLink: selfLink } },
'#withUid':: d.fn(help='"UID is the unique in time and space value for this object. It is typically generated by the server on successful creation of a resource and is not allowed to change on PUT operations.\\n\\nPopulated by the system. Read-only. More info: http://kubernetes.io/docs/user-guide/identifiers#uids"', args=[d.arg(name='uid', type=d.T.string)]),
withUid(uid): { metadata+: { uid: uid } },
},
'#new':: d.fn(help='new returns an instance of HCPAuth', args=[d.arg(name='name', type=d.T.string)]),
new(name): {
apiVersion: 'secrets.hashicorp.com/v1beta1',
kind: 'HCPAuth',
} + self.metadata.withName(name=name),
'#spec':: d.obj(help='"HCPAuthSpec defines the desired state of HCPAuth"'),
spec: {
'#servicePrincipal':: d.obj(help='"ServicePrincipal provides the necessary configuration for authenticating to\\nHCP using a service principal. For security reasons, only project-level\\nservice principals should ever be used."'),
servicePrincipal: {
'#withSecretRef':: d.fn(help="\"SecretRef is the name of a Kubernetes secret in the consumer's\\n(VDS/VSS/PKI/HCP) namespace which provides the HCP ServicePrincipal clientID,\\nand clientSecret.\\nThe secret data must have the following structure {\\n \\\"clientID\\\": \\\"clientID\\\",\\n \\\"clientSecret\\\": \\\"clientSecret\\\",\\n}\"", args=[d.arg(name='secretRef', type=d.T.string)]),
withSecretRef(secretRef): { spec+: { servicePrincipal+: { secretRef: secretRef } } },
},
'#withAllowedNamespaces':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\\nconfigurability of restricting which HCPAuthMethods can be used by which namespaces.\\nAccepted values:\\n[]{\\\"*\\\"} - wildcard, all namespaces.\\n[]{\\\"a\\\", \\\"b\\\"} - list of namespaces.\\nunset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this\\nis the default behavior.\"", args=[d.arg(name='allowedNamespaces', type=d.T.array)]),
withAllowedNamespaces(allowedNamespaces): { spec+: { allowedNamespaces: if std.isArray(v=allowedNamespaces) then allowedNamespaces else [allowedNamespaces] } },
'#withAllowedNamespacesMixin':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\\nconfigurability of restricting which HCPAuthMethods can be used by which namespaces.\\nAccepted values:\\n[]{\\\"*\\\"} - wildcard, all namespaces.\\n[]{\\\"a\\\", \\\"b\\\"} - list of namespaces.\\nunset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this\\nis the default behavior.\"\n\n**Note:** This function appends passed data to existing values", args=[d.arg(name='allowedNamespaces', type=d.T.array)]),
withAllowedNamespacesMixin(allowedNamespaces): { spec+: { allowedNamespaces+: if std.isArray(v=allowedNamespaces) then allowedNamespaces else [allowedNamespaces] } },
'#withMethod':: d.fn(help='"Method to use when authenticating to Vault."', args=[d.arg(name='method', type=d.T.string)]),
withMethod(method): { spec+: { method: method } },
'#withOrganizationID':: d.fn(help='"OrganizationID of the HCP organization."', args=[d.arg(name='organizationID', type=d.T.string)]),
withOrganizationID(organizationID): { spec+: { organizationID: organizationID } },
'#withProjectID':: d.fn(help='"ProjectID of the HCP project."', args=[d.arg(name='projectID', type=d.T.string)]),
withProjectID(projectID): { spec+: { projectID: projectID } },
},
'#mixin': 'ignore',
mixin: self,
}
Loading

0 comments on commit 8a39436

Please sign in to comment.