Skip to content

Commit 8bb5401

Browse files
walnuss0815jsonnet-libs-bot
authored andcommitted
update: source github.com/jsonnet-libs/k8s@a11f5034
1 parent b9ab087 commit 8bb5401

File tree

14 files changed

+42
-42
lines changed

14 files changed

+42
-42
lines changed

0.1.0/_gen/secrets/v1beta1/vaultStaticSecret.libsonnet

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@
111111
'#withType':: d.fn(help='"Type of Kubernetes Secret. Requires Create to be set to true.\\nDefaults to Opaque."', args=[d.arg(name='type', type=d.T.string)]),
112112
withType(type): { spec+: { destination+: { type: type } } },
113113
},
114-
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
114+
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
115115
rolloutRestartTargets: {
116116
'#withKind':: d.fn(help='"Kind of the resource"', args=[d.arg(name='kind', type=d.T.string)]),
117117
withKind(kind): { kind: kind },
@@ -133,9 +133,9 @@
133133
withPath(path): { spec+: { path: path } },
134134
'#withRefreshAfter':: d.fn(help='"RefreshAfter a period of time, in duration notation e.g. 30s, 1m, 24h"', args=[d.arg(name='refreshAfter', type=d.T.string)]),
135135
withRefreshAfter(refreshAfter): { spec+: { refreshAfter: refreshAfter } },
136-
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
136+
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
137137
withRolloutRestartTargets(rolloutRestartTargets): { spec+: { rolloutRestartTargets: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
138-
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
138+
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
139139
withRolloutRestartTargetsMixin(rolloutRestartTargets): { spec+: { rolloutRestartTargets+: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
140140
'#withType':: d.fn(help='"Type of the Vault static secret"', args=[d.arg(name='type', type=d.T.string)]),
141141
withType(type): { spec+: { type: type } },

0.2.0/_gen/secrets/v1beta1/vaultStaticSecret.libsonnet

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@
111111
'#withType':: d.fn(help='"Type of Kubernetes Secret. Requires Create to be set to true.\\nDefaults to Opaque."', args=[d.arg(name='type', type=d.T.string)]),
112112
withType(type): { spec+: { destination+: { type: type } } },
113113
},
114-
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
114+
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
115115
rolloutRestartTargets: {
116116
'#withKind':: d.fn(help='"Kind of the resource"', args=[d.arg(name='kind', type=d.T.string)]),
117117
withKind(kind): { kind: kind },
@@ -133,9 +133,9 @@
133133
withPath(path): { spec+: { path: path } },
134134
'#withRefreshAfter':: d.fn(help='"RefreshAfter a period of time, in duration notation e.g. 30s, 1m, 24h"', args=[d.arg(name='refreshAfter', type=d.T.string)]),
135135
withRefreshAfter(refreshAfter): { spec+: { refreshAfter: refreshAfter } },
136-
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
136+
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
137137
withRolloutRestartTargets(rolloutRestartTargets): { spec+: { rolloutRestartTargets: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
138-
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
138+
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
139139
withRolloutRestartTargetsMixin(rolloutRestartTargets): { spec+: { rolloutRestartTargets+: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
140140
'#withType':: d.fn(help='"Type of the Vault static secret"', args=[d.arg(name='type', type=d.T.string)]),
141141
withType(type): { spec+: { type: type } },

0.4.0/_gen/secrets/v1beta1/vaultStaticSecret.libsonnet

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@
111111
'#withType':: d.fn(help='"Type of Kubernetes Secret. Requires Create to be set to true.\\nDefaults to Opaque."', args=[d.arg(name='type', type=d.T.string)]),
112112
withType(type): { spec+: { destination+: { type: type } } },
113113
},
114-
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
114+
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
115115
rolloutRestartTargets: {
116116
'#withKind':: d.fn(help='"Kind of the resource"', args=[d.arg(name='kind', type=d.T.string)]),
117117
withKind(kind): { kind: kind },
@@ -133,9 +133,9 @@
133133
withPath(path): { spec+: { path: path } },
134134
'#withRefreshAfter':: d.fn(help='"RefreshAfter a period of time, in duration notation e.g. 30s, 1m, 24h"', args=[d.arg(name='refreshAfter', type=d.T.string)]),
135135
withRefreshAfter(refreshAfter): { spec+: { refreshAfter: refreshAfter } },
136-
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
136+
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
137137
withRolloutRestartTargets(rolloutRestartTargets): { spec+: { rolloutRestartTargets: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
138-
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
138+
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
139139
withRolloutRestartTargetsMixin(rolloutRestartTargets): { spec+: { rolloutRestartTargets+: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
140140
'#withType':: d.fn(help='"Type of the Vault static secret"', args=[d.arg(name='type', type=d.T.string)]),
141141
withType(type): { spec+: { type: type } },

0.5.0/_gen/secrets/v1beta1/vaultStaticSecret.libsonnet

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@
111111
'#withType':: d.fn(help='"Type of Kubernetes Secret. Requires Create to be set to true.\\nDefaults to Opaque."', args=[d.arg(name='type', type=d.T.string)]),
112112
withType(type): { spec+: { destination+: { type: type } } },
113113
},
114-
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
114+
'#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'),
115115
rolloutRestartTargets: {
116116
'#withKind':: d.fn(help='"Kind of the resource"', args=[d.arg(name='kind', type=d.T.string)]),
117117
withKind(kind): { kind: kind },
@@ -133,9 +133,9 @@
133133
withPath(path): { spec+: { path: path } },
134134
'#withRefreshAfter':: d.fn(help='"RefreshAfter a period of time, in duration notation e.g. 30s, 1m, 24h"', args=[d.arg(name='refreshAfter', type=d.T.string)]),
135135
withRefreshAfter(refreshAfter): { spec+: { refreshAfter: refreshAfter } },
136-
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
136+
'#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
137137
withRolloutRestartTargets(rolloutRestartTargets): { spec+: { rolloutRestartTargets: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
138-
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
138+
'#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]),
139139
withRolloutRestartTargetsMixin(rolloutRestartTargets): { spec+: { rolloutRestartTargets+: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } },
140140
'#withType':: d.fn(help='"Type of the Vault static secret"', args=[d.arg(name='type', type=d.T.string)]),
141141
withType(type): { spec+: { type: type } },

0 commit comments

Comments
 (0)