|
111 | 111 | '#withType':: d.fn(help='"Type of Kubernetes Secret. Requires Create to be set to true.\\nDefaults to Opaque."', args=[d.arg(name='type', type=d.T.string)]), |
112 | 112 | withType(type): { spec+: { destination+: { type: type } } }, |
113 | 113 | }, |
114 | | - '#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'), |
| 114 | + '#rolloutRestartTargets':: d.obj(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."'), |
115 | 115 | rolloutRestartTargets: { |
116 | 116 | '#withKind':: d.fn(help='"Kind of the resource"', args=[d.arg(name='kind', type=d.T.string)]), |
117 | 117 | withKind(kind): { kind: kind }, |
|
133 | 133 | withPath(path): { spec+: { path: path } }, |
134 | 134 | '#withRefreshAfter':: d.fn(help='"RefreshAfter a period of time, in duration notation e.g. 30s, 1m, 24h"', args=[d.arg(name='refreshAfter', type=d.T.string)]), |
135 | 135 | withRefreshAfter(refreshAfter): { spec+: { refreshAfter: refreshAfter } }, |
136 | | - '#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]), |
| 136 | + '#withRolloutRestartTargets':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]), |
137 | 137 | withRolloutRestartTargets(rolloutRestartTargets): { spec+: { rolloutRestartTargets: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } }, |
138 | | - '#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets wil be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]), |
| 138 | + '#withRolloutRestartTargetsMixin':: d.fn(help='"RolloutRestartTargets should be configured whenever the application(s) consuming the Vault secret does\\nnot support dynamically reloading a rotated secret.\\nIn that case one, or more RolloutRestartTarget(s) can be configured here. The Operator will\\ntrigger a \\"rollout-restart\\" for each target whenever the Vault secret changes between reconciliation events.\\nAll configured targets will be ignored if HMACSecretData is set to false.\\nSee RolloutRestartTarget for more details."\n\n**Note:** This function appends passed data to existing values', args=[d.arg(name='rolloutRestartTargets', type=d.T.array)]), |
139 | 139 | withRolloutRestartTargetsMixin(rolloutRestartTargets): { spec+: { rolloutRestartTargets+: if std.isArray(v=rolloutRestartTargets) then rolloutRestartTargets else [rolloutRestartTargets] } }, |
140 | 140 | '#withType':: d.fn(help='"Type of the Vault static secret"', args=[d.arg(name='type', type=d.T.string)]), |
141 | 141 | withType(type): { spec+: { type: type } }, |
|
0 commit comments