Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add table kubernetes_custom_resource_definition #84

Merged
merged 2 commits into from
Oct 12, 2022
Merged

Conversation

bigdatasourav
Copy link
Contributor

Example query results

Results
> select name,spec from kubernetes_custom_resource_definition
+------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
| name                         | spec                                                                                                                                                                                 
+------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
| ironmans.avengers.marvel     | {"conversion":{"strategy":"None"},"group":"avengers.marvel","names":{"kind":"Ironman","listKind":"IronmanList","plural":"ironmans","shortNames":["im"],"singular":"ironman"},"scope":
| certificates.cert-manager.io | {"conversion":{"strategy":"None"},"group":"cert-manager.io","names":{"categories":["cert-manager"],"kind":"Certificate","listKind":"CertificateList","plural":"certificates","shortNa
|                              | description":"A Certificate resource should be created to ensure an up to date and signed x509 certificate is stored in the Kubernetes Secret resource named in `spec.secretName`. \n
|                              | ate of the Certificate resource.","properties":{"additionalOutputFormats":{"description":"AdditionalOutputFormats defines extra output formats of the private key and signed certific
|                              | rating invalid CSRs. This value is ignored by TLS clients when any subject alt name is set. This is x509 behaviour: https://tools.ietf.org/html/rfc6125#section-6.4.4","type":"string
|                              | y usages should be present in the CertificateRequest","type":"boolean"},"ipAddresses":{"description":"IPAddresses is a list of IP address subjectAltNames to be set on the Certificat
|                              | e being referred to.","type":"string"}},"required":["name"],"type":"object"},"keystores":{"description":"Keystores configures additional keystore output formats stored in the `secre
|                              | ption":"The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be defaulted, in others it may be required.","type":"string"},"name":
|                              | issuing Certificate Authority","type":"boolean"},"passwordSecretRef":{"description":"PasswordSecretRef is a reference to a key in a Secret resource containing the password used to e
|                              | hentication. See https://github.com/cert-manager/cert-manager/issues/3203, https://github.com/cert-manager/cert-manager/issues/4424. This field is alpha level and is only supported 
|                              | encoded in. If provided, allowed values are `PKCS1` and `PKCS8` standing for PKCS#1 and PKCS#8, respectively. Defaults to `PKCS1` if not specified.","enum":["PKCS1","PKCS8"],"type":
|                              | ECDSA`, valid values are `256`, `384` or `521`, and will default to `256` if not specified. If `algorithm` is set to `Ed25519`, Size is ignored. No other values are allowed.","type"
|                              | `nil`), revisions will not be garbage collected. Default value is `nil`.","format":"int32","type":"integer"},"secretName":{"description":"SecretName is the name of the secret resour
|                              | map to be copied to the target Kubernetes Secret.","type":"object"}},"type":"object"},"subject":{"description":"Full X509 name specification (https://golang.org/pkg/crypto/x509/pkix
|                              | s":{"description":"Street addresses to be used on the Certificate.","items":{"type":"string"},"type":"array"}},"type":"object"},"uris":{"description":"URIs is a list of URI subjectA
|                              | p signing\", \"microsoft sgc\", \"netscape sgc\"","enum":["signing","digital signature","content commitment","key encipherment","key agreement","data encipherment","cert sign","crl 
|                              | "},"message":{"description":"Message is a human readable description of the details of the last transition, complementing reason.","type":"string"},"observedGeneration":{"descriptio
|                              | s":{"description":"The number of continuous failed issuance attempts up till now. This field gets removed (if set) on a successful issuance and gets set to 1 if unset and an issuanc
|                              | alse.","type":"string"},"notAfter":{"description":"The expiration time of the certificate stored in the secret named by this resource in `spec.secretName`.","format":"date-time","ty
|                              | ntroller to know whether a request is part of an old issuance or if it is part of the ongoing revision's issuance by checking if the revision value in the annotation is greater than
+------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

@bigdatasourav bigdatasourav self-assigned this Oct 12, 2022
@bigdatasourav bigdatasourav requested a review from ParthaI October 12, 2022 13:59
Copy link
Contributor

@ParthaI ParthaI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@bigdatasourav bigdatasourav merged commit 65b99e5 into main Oct 12, 2022
@bigdatasourav bigdatasourav deleted the crd-def branch October 12, 2022 14:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants