UNPKG

@pulumi/kubernetes

Version:

[![Actions Status](https://github.com/pulumi/pulumi-kubernetes/workflows/main/badge.svg)](https://github.com/pulumi/pulumi-kubernetes/actions) [![Slack](http://www.pulumi.com/images/docs/badges/slack.svg)](https://slack.pulumi.com) [![NPM version](https:/

74 lines 4.45 kB
"use strict"; // *** WARNING: this file was generated by pulumigen. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.ClusterTrustBundlePatch = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("../../utilities"); /** * Patch resources are used to modify existing Kubernetes resources by using * Server-Side Apply updates. The name of the resource must be specified, but all other properties are optional. More than * one patch may be applied to the same resource, and a random FieldManager name will be used for each Patch resource. * Conflicts will result in an error by default, but can be forced using the "pulumi.com/patchForce" annotation. See the * [Server-Side Apply Docs](https://www.pulumi.com/registry/packages/kubernetes/how-to-guides/managing-resources-with-server-side-apply/) for * additional information about using Server-Side Apply to manage Kubernetes resources with Pulumi. * ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates). * * ClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the `clusterTrustBundle` projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to. * * It can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle. */ class ClusterTrustBundlePatch extends pulumi.CustomResource { /** * Get an existing ClusterTrustBundlePatch resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, opts) { return new ClusterTrustBundlePatch(name, undefined, { ...opts, id: id }); } /** * Returns true if the given object is an instance of ClusterTrustBundlePatch. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === ClusterTrustBundlePatch.__pulumiType; } /** * Create a ClusterTrustBundlePatch resource with the given unique name, arguments, and options. * * @param name The _unique_ name of the resource. * @param args The arguments to use to populate this resource's properties. * @param opts A bag of options that control this resource's behavior. */ constructor(name, args, opts) { let resourceInputs = {}; opts = opts || {}; if (!opts.id) { resourceInputs["apiVersion"] = "certificates.k8s.io/v1alpha1"; resourceInputs["kind"] = "ClusterTrustBundle"; resourceInputs["metadata"] = args?.metadata; resourceInputs["spec"] = args?.spec; } else { resourceInputs["apiVersion"] = undefined /*out*/; resourceInputs["kind"] = undefined /*out*/; resourceInputs["metadata"] = undefined /*out*/; resourceInputs["spec"] = undefined /*out*/; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); const aliasOpts = { aliases: [{ type: "kubernetes:certificates.k8s.io/v1beta1:ClusterTrustBundlePatch" }] }; opts = pulumi.mergeOptions(opts, aliasOpts); super(ClusterTrustBundlePatch.__pulumiType, name, resourceInputs, opts); } } exports.ClusterTrustBundlePatch = ClusterTrustBundlePatch; /** @internal */ ClusterTrustBundlePatch.__pulumiType = 'kubernetes:certificates.k8s.io/v1alpha1:ClusterTrustBundlePatch'; //# sourceMappingURL=clusterTrustBundlePatch.js.map