Skip to content

Commit 25b7466

Browse files
committed
chore(k8s/amour/cert-manager): v1.15.3
1 parent 3b50e54 commit 25b7466

File tree

75 files changed

+14136
-4145
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+14136
-4145
lines changed
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
load("@com_github_tnarg_rules_cue//cue:cue.bzl", "cue_library")
2+
3+
cue_library(
4+
name = "cue_acme_library",
5+
srcs = ["doc_go_gen.cue"],
6+
importpath = "github.com/cert-manager/cert-manager/pkg/apis/acme",
7+
visibility = ["//visibility:public"],
8+
)
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
// Code generated by cue get go. DO NOT EDIT.
2+
3+
//cue:generate cue get go github.com/cert-manager/cert-manager/pkg/apis/acme
4+
5+
// Package acme contains types in the acme cert-manager API group
6+
package acme
7+
8+
#GroupName: "acme.cert-manager.io"

cue.mod/gen/github.com/cert-manager/cert-manager/pkg/apis/acme/v1/BUILD.bazel

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,6 @@ cue_library(
1717
"//cue.mod/gen/k8s.io/api/core/v1:cue_v1_library",
1818
"//cue.mod/gen/k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1:cue_v1_library",
1919
"//cue.mod/gen/k8s.io/apimachinery/pkg/apis/meta/v1:cue_v1_library",
20-
"//cue.mod/gen/sigs.k8s.io/gateway-api/apis/v1beta1:cue_v1beta1_library",
20+
"//cue.mod/gen/sigs.k8s.io/gateway-api/apis/v1:cue_v1_library",
2121
],
2222
)

cue.mod/gen/github.com/cert-manager/cert-manager/pkg/apis/acme/v1/types_challenge_go_gen.cue

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ import (
2323
spec: #ChallengeSpec @go(Spec)
2424

2525
// +optional
26-
status: #ChallengeStatus @go(Status)
26+
status?: #ChallengeStatus @go(Status)
2727
}
2828

2929
// ChallengeList is a list of Challenges
@@ -50,7 +50,7 @@ import (
5050
// wildcard will be true if this challenge is for a wildcard identifier,
5151
// for example '*.example.com'.
5252
// +optional
53-
wildcard: bool @go(Wildcard)
53+
wildcard?: bool @go(Wildcard)
5454

5555
// The type of ACME challenge this resource represents.
5656
// One of "HTTP-01" or "DNS-01".
@@ -105,7 +105,7 @@ import (
105105
// If this field is set to false, the challenge controller will not take
106106
// any more action.
107107
// +optional
108-
processing: bool @go(Processing)
108+
processing?: bool @go(Processing)
109109

110110
// presented will be set to true if the challenge values for this challenge
111111
// are currently 'presented'.
@@ -114,7 +114,7 @@ import (
114114
// DNS01 TXT record has been presented, or the HTTP01 configuration has been
115115
// configured).
116116
// +optional
117-
presented: bool @go(Presented)
117+
presented?: bool @go(Presented)
118118

119119
// Contains human readable information on why the Challenge is in the
120120
// current state.

cue.mod/gen/github.com/cert-manager/cert-manager/pkg/apis/acme/v1/types_issuer_go_gen.cue

Lines changed: 60 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ package v1
77
import (
88
cmmeta "github.com/cert-manager/cert-manager/pkg/apis/meta/v1"
99
corev1 "k8s.io/api/core/v1"
10-
gwapi "sigs.k8s.io/gateway-api/apis/v1beta1"
10+
gwapi "sigs.k8s.io/gateway-api/apis/v1"
1111
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
1212
)
1313

@@ -35,11 +35,12 @@ import (
3535
// endpoint.
3636
// For example, for Let's Encrypt's DST crosssign you would use:
3737
// "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA.
38-
// This value picks the first certificate bundle in the ACME alternative
39-
// chains that has a certificate with this value as its issuer's CN
38+
// This value picks the first certificate bundle in the combined set of
39+
// ACME default and alternative chains that has a root-most certificate with
40+
// this value as its issuer's commonname.
4041
// +optional
4142
// +kubebuilder:validation:MaxLength=64
42-
preferredChain: string @go(PreferredChain)
43+
preferredChain?: string @go(PreferredChain)
4344

4445
// Base64-encoded bundle of PEM CAs which can be used to validate the certificate
4546
// chain presented by the ACME server.
@@ -96,7 +97,7 @@ import (
9697
// Enables requesting a Not After date on certificates that matches the
9798
// duration of the certificate. This is not supported by all ACME servers
9899
// like Let's Encrypt. If set to true when the ACME server does not support
99-
// it it will create an error on the Order.
100+
// it, it will create an error on the Order.
100101
// Defaults to false.
101102
// +optional
102103
enableDurationFeature?: bool @go(EnableDurationFeature)
@@ -283,13 +284,13 @@ import (
283284
// If labels or annotations overlap with in-built values, the values here
284285
// will override the in-built values.
285286
// +optional
286-
metadata: #ACMEChallengeSolverHTTP01IngressPodObjectMeta @go(ACMEChallengeSolverHTTP01IngressPodObjectMeta)
287+
metadata?: #ACMEChallengeSolverHTTP01IngressPodObjectMeta @go(ACMEChallengeSolverHTTP01IngressPodObjectMeta)
287288

288289
// PodSpec defines overrides for the HTTP01 challenge solver pod.
289290
// Check ACMEChallengeSolverHTTP01IngressPodSpec to find out currently supported fields.
290291
// All other fields will be ignored.
291292
// +optional
292-
spec: #ACMEChallengeSolverHTTP01IngressPodSpec @go(Spec)
293+
spec?: #ACMEChallengeSolverHTTP01IngressPodSpec @go(Spec)
293294
}
294295

295296
#ACMEChallengeSolverHTTP01IngressPodObjectMeta: {
@@ -336,7 +337,7 @@ import (
336337
// If labels or annotations overlap with in-built values, the values here
337338
// will override the in-built values.
338339
// +optional
339-
metadata: #ACMEChallengeSolverHTTP01IngressObjectMeta @go(ACMEChallengeSolverHTTP01IngressObjectMeta)
340+
metadata?: #ACMEChallengeSolverHTTP01IngressObjectMeta @go(ACMEChallengeSolverHTTP01IngressObjectMeta)
340341
}
341342

342343
#ACMEChallengeSolverHTTP01IngressObjectMeta: {
@@ -466,6 +467,10 @@ import (
466467
// ACMEIssuerDNS01ProviderRoute53 is a structure containing the Route 53
467468
// configuration for AWS
468469
#ACMEIssuerDNS01ProviderRoute53: {
470+
// Auth configures how cert-manager authenticates.
471+
// +optional
472+
auth?: null | #Route53Auth @go(Auth,*Route53Auth)
473+
469474
// The AccessKeyID is used for authentication.
470475
// Cannot be set when SecretAccessKeyID is set.
471476
// If neither the Access Key nor Key ID are set, we fall-back to using env
@@ -488,7 +493,7 @@ import (
488493
// vars, shared credentials file or AWS Instance metadata,
489494
// see: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html#specifying-credentials
490495
// +optional
491-
secretAccessKeySecretRef: cmmeta.#SecretKeySelector @go(SecretAccessKey)
496+
secretAccessKeySecretRef?: cmmeta.#SecretKeySelector @go(SecretAccessKey)
492497

493498
// Role is a Role ARN which the Route53 provider will assume using either the explicit credentials AccessKeyID/SecretAccessKey
494499
// or the inferred credentials from environment variables, shared credentials file or AWS Instance metadata
@@ -503,21 +508,57 @@ import (
503508
region: string @go(Region)
504509
}
505510

511+
// Route53Auth is configuration used to authenticate with a Route53.
512+
#Route53Auth: {
513+
// Kubernetes authenticates with Route53 using AssumeRoleWithWebIdentity
514+
// by passing a bound ServiceAccount token.
515+
kubernetes?: null | #Route53KubernetesAuth @go(Kubernetes,*Route53KubernetesAuth)
516+
}
517+
518+
// Route53KubernetesAuth is a configuration to authenticate against Route53
519+
// using a bound Kubernetes ServiceAccount token.
520+
#Route53KubernetesAuth: {
521+
// A reference to a service account that will be used to request a bound
522+
// token (also known as "projected token"). To use this field, you must
523+
// configure an RBAC rule to let cert-manager request a token.
524+
serviceAccountRef?: null | #ServiceAccountRef @go(ServiceAccountRef,*ServiceAccountRef)
525+
}
526+
527+
// ServiceAccountRef is a service account used by cert-manager to request a
528+
// token. The expiration of the token is also set by cert-manager to 10 minutes.
529+
#ServiceAccountRef: {
530+
// Name of the ServiceAccount used to request a token.
531+
name: string @go(Name)
532+
533+
// TokenAudiences is an optional list of audiences to include in the
534+
// token passed to AWS. The default token consisting of the issuer's namespace
535+
// and name is always included.
536+
// If unset the audience defaults to `sts.amazonaws.com`.
537+
// +optional
538+
audiences?: [...string] @go(TokenAudiences,[]string)
539+
}
540+
506541
// ACMEIssuerDNS01ProviderAzureDNS is a structure containing the
507542
// configuration for Azure DNS
508543
#ACMEIssuerDNS01ProviderAzureDNS: {
509-
// if both this and ClientSecret are left unset MSI will be used
544+
// Auth: Azure Service Principal:
545+
// The ClientID of the Azure Service Principal used to authenticate with Azure DNS.
546+
// If set, ClientSecret and TenantID must also be set.
510547
// +optional
511548
clientID?: string @go(ClientID)
512549

513-
// if both this and ClientID are left unset MSI will be used
550+
// Auth: Azure Service Principal:
551+
// A reference to a Secret containing the password associated with the Service Principal.
552+
// If set, ClientID and TenantID must also be set.
514553
// +optional
515554
clientSecretSecretRef?: null | cmmeta.#SecretKeySelector @go(ClientSecret,*cmmeta.SecretKeySelector)
516555

517556
// ID of the Azure subscription
518557
subscriptionID: string @go(SubscriptionID)
519558

520-
// when specifying ClientID and ClientSecret then this field is also needed
559+
// Auth: Azure Service Principal:
560+
// The TenantID of the Azure Service Principal used to authenticate with Azure DNS.
561+
// If set, ClientID and ClientSecret must also be set.
521562
// +optional
522563
tenantID?: string @go(TenantID)
523564

@@ -532,17 +573,23 @@ import (
532573
// +optional
533574
environment?: #AzureDNSEnvironment @go(Environment)
534575

535-
// managed identity configuration, can not be used at the same time as clientID, clientSecretSecretRef or tenantID
576+
// Auth: Azure Workload Identity or Azure Managed Service Identity:
577+
// Settings to enable Azure Workload Identity or Azure Managed Service Identity
578+
// If set, ClientID, ClientSecret and TenantID must not be set.
536579
// +optional
537580
managedIdentity?: null | #AzureManagedIdentity @go(ManagedIdentity,*AzureManagedIdentity)
538581
}
539582

583+
// AzureManagedIdentity contains the configuration for Azure Workload Identity or Azure Managed Service Identity
584+
// If the AZURE_FEDERATED_TOKEN_FILE environment variable is set, the Azure Workload Identity will be used.
585+
// Otherwise, we fall-back to using Azure Managed Service Identity.
540586
#AzureManagedIdentity: {
541587
// client ID of the managed identity, can not be used at the same time as resourceID
542588
// +optional
543589
clientID?: string @go(ClientID)
544590

545591
// resource ID of the managed identity, can not be used at the same time as clientID
592+
// Cannot be used for Azure Managed Service Identity
546593
// +optional
547594
resourceID?: string @go(ResourceID)
548595
}

cue.mod/gen/github.com/cert-manager/cert-manager/pkg/apis/acme/v1/types_order_go_gen.cue

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ import (
1717
spec: #OrderSpec @go(Spec)
1818

1919
// +optional
20-
status: #OrderStatus @go(Status)
20+
status?: #OrderStatus @go(Status)
2121
}
2222

2323
// OrderList is a list of Orders
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
load("@com_github_tnarg_rules_cue//cue:cue.bzl", "cue_library")
2+
3+
cue_library(
4+
name = "cue_certmanager_library",
5+
srcs = ["doc_go_gen.cue"],
6+
importpath = "github.com/cert-manager/cert-manager/pkg/apis/certmanager",
7+
visibility = ["//visibility:public"],
8+
)
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
// Code generated by cue get go. DO NOT EDIT.
2+
3+
//cue:generate cue get go github.com/cert-manager/cert-manager/pkg/apis/certmanager
4+
5+
// Package certmanager is the internal version of the API.
6+
package certmanager
7+
8+
#GroupName: "cert-manager.io"

cue.mod/gen/github.com/cert-manager/cert-manager/pkg/apis/certmanager/v1/const_go_gen.cue

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,17 @@
44

55
package v1
66

7-
import "time"
8-
97
// minimum permitted certificate duration by cert-manager
10-
#MinimumCertificateDuration: time.#Duration & 3600000000000
8+
#MinimumCertificateDuration: int & 3600000000000
119

1210
// default certificate duration if Issuer.spec.duration is not set
13-
#DefaultCertificateDuration: time.#Duration & 7776000000000000
11+
#DefaultCertificateDuration: int & 7776000000000000
1412

1513
// minimum certificate duration before certificate expiration
16-
#MinimumRenewBefore: time.#Duration & 300000000000
14+
#MinimumRenewBefore: int & 300000000000
1715

1816
// Deprecated: the default is now 2/3 of Certificate's duration
19-
#DefaultRenewBefore: time.#Duration & 2592000000000000
17+
#DefaultRenewBefore: int & 2592000000000000
2018

2119
// Default index key for the Secret reference for Token authentication
2220
#DefaultVaultTokenAuthSecretKey: "token"

0 commit comments

Comments
 (0)