|
49 | 49 | } + self.metadata.withName(name=name), |
50 | 50 | '#spec':: d.obj(help='"HCPAuthSpec defines the desired state of HCPAuth"'), |
51 | 51 | spec: { |
52 | | - '#servicePrincipal':: d.obj(help='"ServicePrincipal provides the necessary configuration for authenticating to HCP using a service principal. For security reasons, only project-level service principals should ever be used."'), |
| 52 | + '#servicePrincipal':: d.obj(help='"ServicePrincipal provides the necessary configuration for authenticating to\\nHCP using a service principal. For security reasons, only project-level\\nservice principals should ever be used."'), |
53 | 53 | servicePrincipal: { |
54 | | - '#withSecretRef':: d.fn(help="\"SecretRef is the name of a Kubernetes secret in the consumer's (VDS/VSS/PKI/HCP) namespace which provides the HCP ServicePrincipal clientID, and clientSecret. The secret data must have the following structure { \\\"clientID\\\": \\\"clientID\\\", \\\"clientSecret\\\": \\\"clientSecret\\\", }\"", args=[d.arg(name='secretRef', type=d.T.string)]), |
| 54 | + '#withSecretRef':: d.fn(help="\"SecretRef is the name of a Kubernetes secret in the consumer's\\n(VDS/VSS/PKI/HCP) namespace which provides the HCP ServicePrincipal clientID,\\nand clientSecret.\\nThe secret data must have the following structure {\\n \\\"clientID\\\": \\\"clientID\\\",\\n \\\"clientSecret\\\": \\\"clientSecret\\\",\\n}\"", args=[d.arg(name='secretRef', type=d.T.string)]), |
55 | 55 | withSecretRef(secretRef): { spec+: { servicePrincipal+: { secretRef: secretRef } } }, |
56 | 56 | }, |
57 | | - '#withAllowedNamespaces':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod. This field allows administrators to customize which Kubernetes namespaces are authorized to use with this AuthMethod. While Vault will still enforce its own rules, this has the added configurability of restricting which HCPAuthMethods can be used by which namespaces. Accepted values: []{\\\"*\\\"} - wildcard, all namespaces. []{\\\"a\\\", \\\"b\\\"} - list of namespaces. unset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this is the default behavior.\"", args=[d.arg(name='allowedNamespaces', type=d.T.array)]), |
| 57 | + '#withAllowedNamespaces':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\\nconfigurability of restricting which HCPAuthMethods can be used by which namespaces.\\nAccepted values:\\n[]{\\\"*\\\"} - wildcard, all namespaces.\\n[]{\\\"a\\\", \\\"b\\\"} - list of namespaces.\\nunset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this\\nis the default behavior.\"", args=[d.arg(name='allowedNamespaces', type=d.T.array)]), |
58 | 58 | withAllowedNamespaces(allowedNamespaces): { spec+: { allowedNamespaces: if std.isArray(v=allowedNamespaces) then allowedNamespaces else [allowedNamespaces] } }, |
59 | | - '#withAllowedNamespacesMixin':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod. This field allows administrators to customize which Kubernetes namespaces are authorized to use with this AuthMethod. While Vault will still enforce its own rules, this has the added configurability of restricting which HCPAuthMethods can be used by which namespaces. Accepted values: []{\\\"*\\\"} - wildcard, all namespaces. []{\\\"a\\\", \\\"b\\\"} - list of namespaces. unset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this is the default behavior.\"\n\n**Note:** This function appends passed data to existing values", args=[d.arg(name='allowedNamespaces', type=d.T.array)]), |
| 59 | + '#withAllowedNamespacesMixin':: d.fn(help="\"AllowedNamespaces Kubernetes Namespaces which are allow-listed for use with this AuthMethod.\\nThis field allows administrators to customize which Kubernetes namespaces are authorized to\\nuse with this AuthMethod. While Vault will still enforce its own rules, this has the added\\nconfigurability of restricting which HCPAuthMethods can be used by which namespaces.\\nAccepted values:\\n[]{\\\"*\\\"} - wildcard, all namespaces.\\n[]{\\\"a\\\", \\\"b\\\"} - list of namespaces.\\nunset - disallow all namespaces except the Operator's the HCPAuthMethod's namespace, this\\nis the default behavior.\"\n\n**Note:** This function appends passed data to existing values", args=[d.arg(name='allowedNamespaces', type=d.T.array)]), |
60 | 60 | withAllowedNamespacesMixin(allowedNamespaces): { spec+: { allowedNamespaces+: if std.isArray(v=allowedNamespaces) then allowedNamespaces else [allowedNamespaces] } }, |
61 | 61 | '#withMethod':: d.fn(help='"Method to use when authenticating to Vault."', args=[d.arg(name='method', type=d.T.string)]), |
62 | 62 | withMethod(method): { spec+: { method: method } }, |
|
0 commit comments