Skip to content

Commit a8bc1b9

Browse files
Duologicjsonnet-libs-bot
authored andcommitted
update: source github.com/jsonnet-libs/k8s@8df516dc
1 parent 7ae84b5 commit a8bc1b9

File tree

60 files changed

+288
-126
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+288
-126
lines changed

0.1.0/_gen/secrets/v1beta1/hcpVaultSecretsApp.libsonnet

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,14 @@
118118
'#withName':: d.fn(help='"Name of the resource"', args=[d.arg(name='name', type=d.T.string)]),
119119
withName(name): { name: name },
120120
},
121+
'#syncConfig':: d.obj(help='"SyncConfig configures sync behavior from HVS to VSO"'),
122+
syncConfig: {
123+
'#dynamic':: d.obj(help='"Dynamic configures sync behavior for dynamic secrets."'),
124+
dynamic: {
125+
'#withRenewalPercent':: d.fn(help="\"RenewalPercent is the percent out of 100 of a dynamic secret's TTL when\\nnew secrets are generated. Defaults to 67 percent minus jitter.\"", args=[d.arg(name='renewalPercent', type=d.T.integer)]),
126+
withRenewalPercent(renewalPercent): { spec+: { syncConfig+: { dynamic+: { renewalPercent: renewalPercent } } } },
127+
},
128+
},
121129
'#withAppName':: d.fn(help='"AppName of the Vault Secrets Application that is to be synced."', args=[d.arg(name='appName', type=d.T.string)]),
122130
withAppName(appName): { spec+: { appName: appName } },
123131
'#withHcpAuthRef':: d.fn(help="\"HCPAuthRef to the HCPAuth resource, can be prefixed with a namespace, eg:\\n`namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default\\nto the namespace of the HCPAuth CR. If no value is specified for HCPAuthRef the\\nOperator will default to the `default` HCPAuth, configured in the operator's\\nnamespace.\"", args=[d.arg(name='hcpAuthRef', type=d.T.string)]),

0.1.0/_gen/secrets/v1beta1/vaultAuth.libsonnet

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -127,12 +127,12 @@
127127
vaultAuthGlobalRef: {
128128
'#mergeStrategy':: d.obj(help='"MergeStrategy configures the merge strategy for HTTP headers and parameters\\nthat are included in all Vault authentication requests."'),
129129
mergeStrategy: {
130-
'#withHeaders':: d.fn(help='"Headers configures the merge strategy for HTTP headers that are included in\\nall Vault requests. Choices are `union`, `replace`, or `none`.\\n\\n\\nIf `union` is set, the headers from the VaultAuthGlobal and VaultAuth\\nresources are merged. The headers from the VaultAuth always take precedence.\\n\\n\\nIf `replace` is set, the first set of non-empty headers taken in order from:\\nVaultAuth, VaultAuthGlobal auth method, VaultGlobal default headers.\\n\\n\\nIf `none` is set, the headers from the\\nVaultAuthGlobal resource are ignored and only the headers from the VaultAuth\\nresource are used. The default is `none`."', args=[d.arg(name='headers', type=d.T.string)]),
130+
'#withHeaders':: d.fn(help='"Headers configures the merge strategy for HTTP headers that are included in\\nall Vault requests. Choices are `union`, `replace`, or `none`.\\n\\nIf `union` is set, the headers from the VaultAuthGlobal and VaultAuth\\nresources are merged. The headers from the VaultAuth always take precedence.\\n\\nIf `replace` is set, the first set of non-empty headers taken in order from:\\nVaultAuth, VaultAuthGlobal auth method, VaultGlobal default headers.\\n\\nIf `none` is set, the headers from the\\nVaultAuthGlobal resource are ignored and only the headers from the VaultAuth\\nresource are used. The default is `none`."', args=[d.arg(name='headers', type=d.T.string)]),
131131
withHeaders(headers): { spec+: { vaultAuthGlobalRef+: { mergeStrategy+: { headers: headers } } } },
132-
'#withParams':: d.fn(help='"Params configures the merge strategy for HTTP parameters that are included in\\nall Vault requests. Choices are `union`, `replace`, or `none`.\\n\\n\\nIf `union` is set, the parameters from the VaultAuthGlobal and VaultAuth\\nresources are merged. The parameters from the VaultAuth always take\\nprecedence.\\n\\n\\nIf `replace` is set, the first set of non-empty parameters taken in order from:\\nVaultAuth, VaultAuthGlobal auth method, VaultGlobal default parameters.\\n\\n\\nIf `none` is set, the parameters from the VaultAuthGlobal resource are ignored\\nand only the parameters from the VaultAuth resource are used. The default is\\n`none`."', args=[d.arg(name='params', type=d.T.string)]),
132+
'#withParams':: d.fn(help='"Params configures the merge strategy for HTTP parameters that are included in\\nall Vault requests. Choices are `union`, `replace`, or `none`.\\n\\nIf `union` is set, the parameters from the VaultAuthGlobal and VaultAuth\\nresources are merged. The parameters from the VaultAuth always take\\nprecedence.\\n\\nIf `replace` is set, the first set of non-empty parameters taken in order from:\\nVaultAuth, VaultAuthGlobal auth method, VaultGlobal default parameters.\\n\\nIf `none` is set, the parameters from the VaultAuthGlobal resource are ignored\\nand only the parameters from the VaultAuth resource are used. The default is\\n`none`."', args=[d.arg(name='params', type=d.T.string)]),
133133
withParams(params): { spec+: { vaultAuthGlobalRef+: { mergeStrategy+: { params: params } } } },
134134
},
135-
'#withAllowDefault':: d.fn(help="\"AllowDefault when set to true will use the default VaultAuthGlobal resource\\nas the default if Name is not set. The 'allow-default-globals' option must be\\nset on the operator's '-global-vault-auth-options' flag\\n\\n\\nThe default VaultAuthGlobal search is conditional.\\nWhen a ref Namespace is set, the search for the default\\nVaultAuthGlobal resource is constrained to that namespace.\\nOtherwise, the search order is:\\n1. The default VaultAuthGlobal resource in the referring VaultAuth resource's\\nnamespace.\\n2. The default VaultAuthGlobal resource in the Operator's namespace.\"", args=[d.arg(name='allowDefault', type=d.T.boolean)]),
135+
'#withAllowDefault':: d.fn(help="\"AllowDefault when set to true will use the default VaultAuthGlobal resource\\nas the default if Name is not set. The 'allow-default-globals' option must be\\nset on the operator's '-global-vault-auth-options' flag\\n\\nThe default VaultAuthGlobal search is conditional.\\nWhen a ref Namespace is set, the search for the default\\nVaultAuthGlobal resource is constrained to that namespace.\\nOtherwise, the search order is:\\n1. The default VaultAuthGlobal resource in the referring VaultAuth resource's\\nnamespace.\\n2. The default VaultAuthGlobal resource in the Operator's namespace.\"", args=[d.arg(name='allowDefault', type=d.T.boolean)]),
136136
withAllowDefault(allowDefault): { spec+: { vaultAuthGlobalRef+: { allowDefault: allowDefault } } },
137137
'#withName':: d.fn(help='"Name of the VaultAuthGlobal resource."', args=[d.arg(name='name', type=d.T.string)]),
138138
withName(name): { spec+: { vaultAuthGlobalRef+: { name: name } } },
@@ -157,7 +157,7 @@
157157
withParams(params): { spec+: { params: params } },
158158
'#withParamsMixin':: d.fn(help='"Params to use when authenticating to Vault"\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='params', type=d.T.object)]),
159159
withParamsMixin(params): { spec+: { params+: params } },
160-
'#withVaultConnectionRef':: d.fn(help="\"VaultConnectionRef to the VaultConnection resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultConnectionRefB`. If no namespace prefix is provided it will default to\\nnamespace of the VaultConnection CR. If no value is specified for VaultConnectionRef the\\nOperator will default to the `default` VaultConnection, configured in the operator's namespace.\"", args=[d.arg(name='vaultConnectionRef', type=d.T.string)]),
160+
'#withVaultConnectionRef':: d.fn(help="\"VaultConnectionRef to the VaultConnection resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultConnectionRefB`. If no namespace prefix is provided it will default to\\nthe namespace of the VaultConnection CR. If no value is specified for VaultConnectionRef the\\nOperator will default to the `default` VaultConnection, configured in the operator's namespace.\"", args=[d.arg(name='vaultConnectionRef', type=d.T.string)]),
161161
withVaultConnectionRef(vaultConnectionRef): { spec+: { vaultConnectionRef: vaultConnectionRef } },
162162
},
163163
'#mixin': 'ignore',

0.1.0/_gen/secrets/v1beta1/vaultDynamicSecret.libsonnet

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@
122122
withAllowStaticCreds(allowStaticCreds): { spec+: { allowStaticCreds: allowStaticCreds } },
123123
'#withMount':: d.fn(help="\"Mount path of the secret's engine in Vault.\"", args=[d.arg(name='mount', type=d.T.string)]),
124124
withMount(mount): { spec+: { mount: mount } },
125-
'#withNamespace':: d.fn(help='"Namespace where the secrets engine is mounted in Vault."', args=[d.arg(name='namespace', type=d.T.string)]),
125+
'#withNamespace':: d.fn(help="\"Namespace of the secrets engine mount in Vault. If not set, the namespace that's\\npart of VaultAuth resource will be inferred.\"", args=[d.arg(name='namespace', type=d.T.string)]),
126126
withNamespace(namespace): { spec+: { namespace: namespace } },
127127
'#withParams':: d.fn(help="\"Params that can be passed when requesting credentials/secrets.\\nWhen Params is set the configured RequestHTTPMethod will be\\nignored. See RequestHTTPMethod for more details.\\nPlease consult https://developer.hashicorp.com/vault/docs/secrets if you are\\nuncertain about what 'params' should/can be set to.\"", args=[d.arg(name='params', type=d.T.object)]),
128128
withParams(params): { spec+: { params: params } },
@@ -142,7 +142,7 @@
142142
withRolloutRestartTargets(rolloutRestartTargets): { spec+: { rolloutRestartTargets: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
143143
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
144144
withRolloutRestartTargetsMixin(rolloutRestartTargets): { spec+: { rolloutRestartTargets+: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
145-
'#withVaultAuthRef':: d.fn(help="\"VaultAuthRef to the VaultAuth resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default to\\nnamespace of the VaultAuth CR. If no value is specified for VaultAuthRef the Operator will\\ndefault to the `default` VaultAuth, configured in the operator's namespace.\"", args=[d.arg(name='vaultAuthRef', type=d.T.string)]),
145+
'#withVaultAuthRef':: d.fn(help="\"VaultAuthRef to the VaultAuth resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default to\\nthe namespace of the VaultAuth CR. If no value is specified for VaultAuthRef the Operator\\nwill default to the `default` VaultAuth, configured in the operator's namespace.\"", args=[d.arg(name='vaultAuthRef', type=d.T.string)]),
146146
withVaultAuthRef(vaultAuthRef): { spec+: { vaultAuthRef: vaultAuthRef } },
147147
},
148148
'#mixin': 'ignore',

0.1.0/_gen/secrets/v1beta1/vaultPKISecret.libsonnet

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@
140140
withIssuerRef(issuerRef): { spec+: { issuerRef: issuerRef } },
141141
'#withMount':: d.fn(help='"Mount for the secret in Vault"', args=[d.arg(name='mount', type=d.T.string)]),
142142
withMount(mount): { spec+: { mount: mount } },
143-
'#withNamespace':: d.fn(help='"Namespace to get the secret from in Vault"', args=[d.arg(name='namespace', type=d.T.string)]),
143+
'#withNamespace':: d.fn(help="\"Namespace of the secrets engine mount in Vault. If not set, the namespace that's\\npart of VaultAuth resource will be inferred.\"", args=[d.arg(name='namespace', type=d.T.string)]),
144144
withNamespace(namespace): { spec+: { namespace: namespace } },
145145
'#withNotAfter':: d.fn(help='"NotAfter field of the certificate with specified date value.\\nThe value format should be given in UTC format YYYY-MM-ddTHH:MM:SSZ"', args=[d.arg(name='notAfter', type=d.T.string)]),
146146
withNotAfter(notAfter): { spec+: { notAfter: notAfter } },
@@ -168,7 +168,7 @@
168168
withUserIDs(userIDs): { spec+: { userIDs: if std.isArray(v=userIDs) then userIDs else [userIDs] } },
169169
'#withUserIDsMixin':: d.fn(help='"User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the\\nsigned certificate."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='userIDs', type=d.T.array)]),
170170
withUserIDsMixin(userIDs): { spec+: { userIDs+: if std.isArray(v=userIDs) then userIDs else [userIDs] } },
171-
'#withVaultAuthRef':: d.fn(help="\"VaultAuthRef to the VaultAuth resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default to\\nnamespace of the VaultAuth CR. If no value is specified for VaultAuthRef the Operator will\\ndefault to the `default` VaultAuth, configured in the operator's namespace.\"", args=[d.arg(name='vaultAuthRef', type=d.T.string)]),
171+
'#withVaultAuthRef':: d.fn(help="\"VaultAuthRef to the VaultAuth resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default to\\nthe namespace of the VaultAuth CR. If no value is specified for VaultAuthRef the Operator\\nwill default to the `default` VaultAuth, configured in the operator's namespace.\"", args=[d.arg(name='vaultAuthRef', type=d.T.string)]),
172172
withVaultAuthRef(vaultAuthRef): { spec+: { vaultAuthRef: vaultAuthRef } },
173173
},
174174
'#mixin': 'ignore',

0.1.0/_gen/secrets/v1beta1/vaultStaticSecret.libsonnet

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@
127127
withHmacSecretData(hmacSecretData): { spec+: { hmacSecretData: hmacSecretData } },
128128
'#withMount':: d.fn(help='"Mount for the secret in Vault"', args=[d.arg(name='mount', type=d.T.string)]),
129129
withMount(mount): { spec+: { mount: mount } },
130-
'#withNamespace':: d.fn(help='"Namespace to get the secret from in Vault"', args=[d.arg(name='namespace', type=d.T.string)]),
130+
'#withNamespace':: d.fn(help="\"Namespace of the secrets engine mount in Vault. If not set, the namespace that's\\npart of VaultAuth resource will be inferred.\"", args=[d.arg(name='namespace', type=d.T.string)]),
131131
withNamespace(namespace): { spec+: { namespace: namespace } },
132132
'#withPath':: d.fn(help='"Path of the secret in Vault, corresponds to the `path` parameter for,\\nkv-v1: https://developer.hashicorp.com/vault/api-docs/secret/kv/kv-v1#read-secret\\nkv-v2: https://developer.hashicorp.com/vault/api-docs/secret/kv/kv-v2#read-secret-version"', args=[d.arg(name='path', type=d.T.string)]),
133133
withPath(path): { spec+: { path: path } },
@@ -139,7 +139,7 @@
139139
withRolloutRestartTargetsMixin(rolloutRestartTargets): { spec+: { rolloutRestartTargets+: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
140140
'#withType':: d.fn(help='"Type of the Vault static secret"', args=[d.arg(name='type', type=d.T.string)]),
141141
withType(type): { spec+: { type: type } },
142-
'#withVaultAuthRef':: d.fn(help="\"VaultAuthRef to the VaultAuth resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default to\\nnamespace of the VaultAuth CR. If no value is specified for VaultAuthRef the Operator will\\ndefault to the `default` VaultAuth, configured in the operator's namespace.\"", args=[d.arg(name='vaultAuthRef', type=d.T.string)]),
142+
'#withVaultAuthRef':: d.fn(help="\"VaultAuthRef to the VaultAuth resource, can be prefixed with a namespace,\\neg: `namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default to the\\nnamespace of the VaultAuth CR. If no value is specified for VaultAuthRef the Operator will\\ndefault to the `default` VaultAuth, configured in the operator's namespace.\"", args=[d.arg(name='vaultAuthRef', type=d.T.string)]),
143143
withVaultAuthRef(vaultAuthRef): { spec+: { vaultAuthRef: vaultAuthRef } },
144144
'#withVersion':: d.fn(help='"Version of the secret to fetch. Only valid for type kv-v2. Corresponds to version query parameter:\\nhttps://developer.hashicorp.com/vault/api-docs/secret/kv/kv-v2#version"', args=[d.arg(name='version', type=d.T.integer)]),
145145
withVersion(version): { spec+: { version: version } },

0.2.0/_gen/secrets/v1beta1/hcpVaultSecretsApp.libsonnet

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,14 @@
118118
'#withName':: d.fn(help='"Name of the resource"', args=[d.arg(name='name', type=d.T.string)]),
119119
withName(name): { name: name },
120120
},
121+
'#syncConfig':: d.obj(help='"SyncConfig configures sync behavior from HVS to VSO"'),
122+
syncConfig: {
123+
'#dynamic':: d.obj(help='"Dynamic configures sync behavior for dynamic secrets."'),
124+
dynamic: {
125+
'#withRenewalPercent':: d.fn(help="\"RenewalPercent is the percent out of 100 of a dynamic secret's TTL when\\nnew secrets are generated. Defaults to 67 percent minus jitter.\"", args=[d.arg(name='renewalPercent', type=d.T.integer)]),
126+
withRenewalPercent(renewalPercent): { spec+: { syncConfig+: { dynamic+: { renewalPercent: renewalPercent } } } },
127+
},
128+
},
121129
'#withAppName':: d.fn(help='"AppName of the Vault Secrets Application that is to be synced."', args=[d.arg(name='appName', type=d.T.string)]),
122130
withAppName(appName): { spec+: { appName: appName } },
123131
'#withHcpAuthRef':: d.fn(help="\"HCPAuthRef to the HCPAuth resource, can be prefixed with a namespace, eg:\\n`namespaceA/vaultAuthRefB`. If no namespace prefix is provided it will default\\nto the namespace of the HCPAuth CR. If no value is specified for HCPAuthRef the\\nOperator will default to the `default` HCPAuth, configured in the operator's\\nnamespace.\"", args=[d.arg(name='hcpAuthRef', type=d.T.string)]),

0 commit comments

Comments
 (0)