Package-level declarations

Types

Link copied to clipboard
class CertificateSigningRequest : KotlinCustomResource

Describes a certificate signing request

Link copied to clipboard
data class CertificateSigningRequestArgs(val apiVersion: Output<String>? = null, val kind: Output<String>? = null, val metadata: Output<ObjectMetaArgs>? = null, val spec: Output<CertificateSigningRequestSpecArgs>? = null) : ConvertibleToJava<CertificateSigningRequestArgs>

Describes a certificate signing request

Link copied to clipboard
class CertificateSigningRequestList : KotlinCustomResource
Link copied to clipboard
data class CertificateSigningRequestListArgs(val apiVersion: Output<String>? = null, val items: Output<List<CertificateSigningRequestArgs>>? = null, val kind: Output<String>? = null, val metadata: Output<ListMetaArgs>? = null) : ConvertibleToJava<CertificateSigningRequestListArgs>
Link copied to clipboard
class CertificateSigningRequestPatch : KotlinCustomResource

Patch resources are used to modify existing Kubernetes resources by using Server-Side Apply updates. The name of the resource must be specified, but all other properties are optional. More than one patch may be applied to the same resource, and a random FieldManager name will be used for each Patch resource. Conflicts will result in an error by default, but can be forced using the "pulumi.com/patchForce" annotation. See the Server-Side Apply Docs for additional information about using Server-Side Apply to manage Kubernetes resources with Pulumi. Describes a certificate signing request

Link copied to clipboard
data class CertificateSigningRequestPatchArgs(val apiVersion: Output<String>? = null, val kind: Output<String>? = null, val metadata: Output<ObjectMetaPatchArgs>? = null, val spec: Output<CertificateSigningRequestSpecPatchArgs>? = null) : ConvertibleToJava<CertificateSigningRequestPatchArgs>

Patch resources are used to modify existing Kubernetes resources by using Server-Side Apply updates. The name of the resource must be specified, but all other properties are optional. More than one patch may be applied to the same resource, and a random FieldManager name will be used for each Patch resource. Conflicts will result in an error by default, but can be forced using the "pulumi.com/patchForce" annotation. See the Server-Side Apply Docs for additional information about using Server-Side Apply to manage Kubernetes resources with Pulumi. Describes a certificate signing request

Link copied to clipboard
class ClusterTrustBundle : KotlinCustomResource

ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates). ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the clusterTrustBundle projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to. It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.

Link copied to clipboard
data class ClusterTrustBundleArgs(val apiVersion: Output<String>? = null, val kind: Output<String>? = null, val metadata: Output<ObjectMetaArgs>? = null, val spec: Output<ClusterTrustBundleSpecArgs>? = null) : ConvertibleToJava<ClusterTrustBundleArgs>

ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates). ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the clusterTrustBundle projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to. It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.

Link copied to clipboard
class ClusterTrustBundleList : KotlinCustomResource

ClusterTrustBundleList is a collection of ClusterTrustBundle objects

Link copied to clipboard
data class ClusterTrustBundleListArgs(val apiVersion: Output<String>? = null, val items: Output<List<ClusterTrustBundleArgs>>? = null, val kind: Output<String>? = null, val metadata: Output<ListMetaArgs>? = null) : ConvertibleToJava<ClusterTrustBundleListArgs>

ClusterTrustBundleList is a collection of ClusterTrustBundle objects

Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
class ClusterTrustBundlePatch : KotlinCustomResource

Patch resources are used to modify existing Kubernetes resources by using Server-Side Apply updates. The name of the resource must be specified, but all other properties are optional. More than one patch may be applied to the same resource, and a random FieldManager name will be used for each Patch resource. Conflicts will result in an error by default, but can be forced using the "pulumi.com/patchForce" annotation. See the Server-Side Apply Docs for additional information about using Server-Side Apply to manage Kubernetes resources with Pulumi. ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates). ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the clusterTrustBundle projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to. It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.

Link copied to clipboard
data class ClusterTrustBundlePatchArgs(val apiVersion: Output<String>? = null, val kind: Output<String>? = null, val metadata: Output<ObjectMetaPatchArgs>? = null, val spec: Output<ClusterTrustBundleSpecPatchArgs>? = null) : ConvertibleToJava<ClusterTrustBundlePatchArgs>

Patch resources are used to modify existing Kubernetes resources by using Server-Side Apply updates. The name of the resource must be specified, but all other properties are optional. More than one patch may be applied to the same resource, and a random FieldManager name will be used for each Patch resource. Conflicts will result in an error by default, but can be forced using the "pulumi.com/patchForce" annotation. See the Server-Side Apply Docs for additional information about using Server-Side Apply to manage Kubernetes resources with Pulumi. ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates). ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the clusterTrustBundle projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to. It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.

Link copied to clipboard

Functions