From 6f9b40bc9c4501e91228a08c4da22baf6eb686f9 Mon Sep 17 00:00:00 2001 From: Pulumi Bot <30351955+pulumi-bot@users.noreply.github.com> Date: Sat, 28 Oct 2023 00:53:15 -0700 Subject: [PATCH] Upgrade pulumi-terraform-bridge to v3.63.2 (#177) This PR was generated via `$ upgrade-provider pulumi/pulumi-rke --kind=bridge --pr-reviewers=t0yv0`. --- - Upgrading pulumi-terraform-bridge from v3.63.1 to v3.63.2. --- examples/go.mod | 4 +- examples/go.sum | 8 +- .../cmd/pulumi-resource-rke/schema-embed.json | 2 +- provider/go.mod | 6 +- provider/go.sum | 12 +- sdk/go.mod | 2 +- sdk/go.sum | 4 +- sdk/python/pulumi_rke/_inputs.py | 4050 +++-------------- sdk/python/pulumi_rke/_utilities.py | 19 - sdk/python/pulumi_rke/cluster.py | 609 +-- sdk/python/pulumi_rke/config/__init__.pyi | 2 +- sdk/python/pulumi_rke/config/vars.py | 2 +- sdk/python/pulumi_rke/outputs.py | 4050 +++-------------- sdk/python/pulumi_rke/provider.py | 25 +- 14 files changed, 1303 insertions(+), 7492 deletions(-) diff --git a/examples/go.mod b/examples/go.mod index 8e7485af..643cbd70 100644 --- a/examples/go.mod +++ b/examples/go.mod @@ -2,7 +2,7 @@ module github.com/pulumi/pulumi-rke/examples/v3 go 1.21 -require github.com/pulumi/pulumi/pkg/v3 v3.90.1 +require github.com/pulumi/pulumi/pkg/v3 v3.91.1 require ( cloud.google.com/go v0.110.4 // indirect @@ -135,7 +135,7 @@ require ( github.com/pkg/term v1.1.0 // indirect github.com/pmezard/go-difflib v1.0.0 // indirect github.com/pulumi/esc v0.5.6 // indirect - github.com/pulumi/pulumi/sdk/v3 v3.90.1 // indirect + github.com/pulumi/pulumi/sdk/v3 v3.91.1 // indirect github.com/rivo/uniseg v0.4.4 // indirect github.com/rogpeppe/go-internal v1.11.0 // indirect github.com/ryanuber/go-glob v1.0.0 // indirect diff --git a/examples/go.sum b/examples/go.sum index 350f37bf..525c6c32 100644 --- a/examples/go.sum +++ b/examples/go.sum @@ -1436,10 +1436,10 @@ github.com/prometheus/prometheus v0.37.0/go.mod h1:egARUgz+K93zwqsVIAneFlLZefyGO github.com/prometheus/tsdb v0.7.1/go.mod h1:qhTCs0VvXwvX/y3TZrWD7rabWM+ijKTux40TwIPHuXU= github.com/pulumi/esc v0.5.6 h1:4WV3X7OEVcChIwbSG+JxhZDdmq/q7lFPaSjHRYlPwmI= github.com/pulumi/esc v0.5.6/go.mod h1:wpwNfVS5fV7Kd51j4dJ6FWYlKfxdqyppgp0gtkzqH04= -github.com/pulumi/pulumi/pkg/v3 v3.90.1 h1:RFC/eqTbDfIvfeVQL8WaPmyQr1KzZhAGIIDGr9jj9y8= -github.com/pulumi/pulumi/pkg/v3 v3.90.1/go.mod h1:J+WbfN30g3FfQifpLjQPI0UhPsC9ASEePLK8Nix06A8= -github.com/pulumi/pulumi/sdk/v3 v3.90.1 h1:iT4t57N92WGhEQtg+KVDEmYzgfEyri39eihQzcNmtrM= -github.com/pulumi/pulumi/sdk/v3 v3.90.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= +github.com/pulumi/pulumi/pkg/v3 v3.91.1 h1:xHnyEwJO9we2zCiM9gHTkJxjZ6a6yi5vYCwWHCYRj9Y= +github.com/pulumi/pulumi/pkg/v3 v3.91.1/go.mod h1:dzBQDJyCOEhtBVN5INA5/i9yG9DZlsStl/mAkrhs9II= +github.com/pulumi/pulumi/sdk/v3 v3.91.1 h1:6I9GMmHv23X+G6hoduU1XE6hBWSNtB+zcb1MX17YvlA= +github.com/pulumi/pulumi/sdk/v3 v3.91.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= github.com/rakyll/embedmd v0.0.0-20171029212350-c8060a0752a2/go.mod h1:7jOTMgqac46PZcF54q6l2hkLEG8op93fZu61KmxWDV4= github.com/rcrowley/go-metrics v0.0.0-20181016184325-3113b8401b8a/go.mod h1:bCqnVzQkZxMG4s8nGwiZ5l3QUCyqpo9Y+/ZMZ9VjZe4= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= diff --git a/provider/cmd/pulumi-resource-rke/schema-embed.json b/provider/cmd/pulumi-resource-rke/schema-embed.json index e7aaa88e..fcf18287 100644 --- a/provider/cmd/pulumi-resource-rke/schema-embed.json +++ b/provider/cmd/pulumi-resource-rke/schema-embed.json @@ -1 +1 @@ -{"name":"rke","displayName":"Rancher Kubernetes Engine (RKE)","version":"3.4.0-alpha.1698214998+3ae31d80.dirty","description":"A Pulumi package for creating and managing rke cloud resources.","keywords":["pulumi","rke"],"homepage":"https://pulumi.io","license":"Apache-2.0","attribution":"This Pulumi package is based on the [`rke` Terraform Provider](https://github.com/rancher/terraform-provider-rke).","repository":"https://github.com/pulumi/pulumi-rke","meta":{"moduleFormat":"(.*)(?:/[^/]*)"},"language":{"csharp":{"packageReferences":{"Pulumi":"3.*"},"namespaces":{"index":"index","rke":"Rke"},"compatibility":"tfbridge20"},"go":{"importBasePath":"github.com/pulumi/pulumi-rke/sdk/v3/go/rke","generateResourceContainerTypes":true,"generateExtraInputTypes":true},"nodejs":{"packageDescription":"A Pulumi package for creating and managing rke cloud resources.","readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/rancher/terraform-provider-rke)\n\u003e distributed under [MIT](https://mit-license.org/). If you encounter a bug or missing feature,\n\u003e first check the [`pulumi-rke` repo](https://github.com/pulumi/pulumi-rke/issues); however, if that doesn't turn up anything,\n\u003e please consult the source [`terraform-provider-rke` repo](https://github.com/rancher/terraform-provider-rke/issues).","dependencies":{"@pulumi/pulumi":"^3.0.0"},"devDependencies":{"@types/mime":"^2.0.0","@types/node":"^10.0.0"},"compatibility":"tfbridge20","disableUnionOutputTypes":true},"python":{"requires":{"pulumi":"\u003e=3.0.0,\u003c4.0.0"},"readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/rancher/terraform-provider-rke)\n\u003e distributed under [MIT](https://mit-license.org/). If you encounter a bug or missing feature,\n\u003e first check the [`pulumi-rke` repo](https://github.com/pulumi/pulumi-rke/issues); however, if that doesn't turn up anything,\n\u003e please consult the source [`terraform-provider-rke` repo](https://github.com/rancher/terraform-provider-rke/issues).","compatibility":"tfbridge20","pyproject":{"enabled":true}}},"config":{"variables":{"debug":{"type":"boolean","default":false,"defaultInfo":{"environment":["RKE_DEBUG"]}},"logFile":{"type":"string","defaultInfo":{"environment":["RKE_LOG_FILE"]}}}},"types":{"rke:index/ClusterAuthentication:ClusterAuthentication":{"properties":{"sans":{"type":"array","items":{"type":"string"},"description":"List of additional hostnames and IPs to include in the api server PKI cert (list)\n"},"strategy":{"type":"string","description":"Authentication strategy that will be used in RKE k8s cluster. Default: `x509` (string)\n"},"webhook":{"$ref":"#/types/rke:index/ClusterAuthenticationWebhook:ClusterAuthenticationWebhook","description":"Webhook configuration options (list maxitem: 1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["sans","webhook"]}}},"rke:index/ClusterAuthenticationWebhook:ClusterAuthenticationWebhook":{"properties":{"cacheTimeout":{"type":"string","description":"Controls how long to cache authentication decisions (string)\n"},"configFile":{"type":"string","description":"Multiline string that represent a custom webhook config file (string)\n"}},"type":"object"},"rke:index/ClusterAuthorization:ClusterAuthorization":{"properties":{"mode":{"type":"string","description":"RKE mode for authorization. `rbac` and `none` modes are available. Default `rbac` (string)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"}},"type":"object"},"rke:index/ClusterBastionHost:ClusterBastionHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"ignoreProxyEnvVars":{"type":"boolean","description":"Ignore proxy env vars at Bastion Host? Default: `false` (bool)\n"},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCert":{"type":"string","description":"SSH Certificate (string)\n","secret":true},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKey":{"type":"string","description":"SSH Private Key (string)\n","secret":true},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"user":{"type":"string","description":"Registry user (string)\n"}},"type":"object","required":["address","user"],"language":{"nodejs":{"requiredOutputs":["address","sshAgentAuth","sshCertPath","sshKeyPath","user"]}}},"rke:index/ClusterCertificate:ClusterCertificate":{"properties":{"certificate":{"type":"string","secret":true},"commonName":{"type":"string"},"config":{"type":"string","secret":true},"configEnvName":{"type":"string"},"configPath":{"type":"string"},"envName":{"type":"string"},"id":{"type":"string","description":"(Computed) The ID of the resource (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n","secret":true},"keyEnvName":{"type":"string"},"keyPath":{"type":"string"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"ouName":{"type":"string"},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["certificate","commonName","config","configEnvName","configPath","envName","id","key","keyEnvName","keyPath","name","ouName","path"]}}},"rke:index/ClusterCloudProvider:ClusterCloudProvider":{"properties":{"awsCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudConfig:ClusterCloudProviderAwsCloudConfig","description":"Use aws_cloud_provider instead\n","deprecationMessage":"Use aws_cloud_provider instead"},"awsCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudProvider:ClusterCloudProviderAwsCloudProvider","description":"AWS Cloud Provider config [rke-aws-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/aws/) (list maxitems:1)\n"},"azureCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderAzureCloudConfig:ClusterCloudProviderAzureCloudConfig","description":"Use azure_cloud_provider instead\n","deprecationMessage":"Use azure_cloud_provider instead"},"azureCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderAzureCloudProvider:ClusterCloudProviderAzureCloudProvider","description":"Azure Cloud Provider config [rke-azure-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/azure/) (list maxitems:1)\n"},"customCloudConfig":{"type":"string","description":"Use custom_cloud_provider instead\n","deprecationMessage":"Use custom_cloud_provider instead"},"customCloudProvider":{"type":"string","description":"Custom Cloud Provider config (string)\n"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"openstackCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfig:ClusterCloudProviderOpenstackCloudConfig","description":"Use openstack_cloud_provider instead\n","deprecationMessage":"Use openstack_cloud_provider instead"},"openstackCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProvider:ClusterCloudProviderOpenstackCloudProvider","description":"Openstack Cloud Provider config [rke-openstack-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/openstack/) (list maxitems:1)\n"},"vsphereCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfig:ClusterCloudProviderVsphereCloudConfig","description":"Use vsphere_cloud_provider instead\n","deprecationMessage":"Use vsphere_cloud_provider instead"},"vsphereCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProvider:ClusterCloudProviderVsphereCloudProvider","description":"Vsphere Cloud Provider config [rke-vsphere-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/vsphere/) Extra argument `name` is required on `virtual_center` configuration. (list maxitems:1)\n"}},"type":"object","required":["name"]},"rke:index/ClusterCloudProviderAwsCloudConfig:ClusterCloudProviderAwsCloudConfig":{"properties":{"global":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudConfigGlobal:ClusterCloudProviderAwsCloudConfigGlobal","description":"(list maxitems:1)\n"},"serviceOverrides":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudConfigServiceOverride:ClusterCloudProviderAwsCloudConfigServiceOverride"},"description":"(list)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudConfigGlobal:ClusterCloudProviderAwsCloudConfigGlobal":{"properties":{"disableSecurityGroupIngress":{"type":"boolean","description":"Disables the automatic ingress creation. Default `false` (bool)\n"},"disableStrictZoneCheck":{"type":"boolean","description":"Setting this to true will disable the check and provide a warning that the check was skipped. Default `false` (bool)\n"},"elbSecurityGroup":{"type":"string","description":"Use these ELB security groups instead create new (string)\n"},"kubernetesClusterId":{"type":"string","description":"The cluster id we'll use to identify our cluster resources (string)\n"},"kubernetesClusterTag":{"type":"string","description":"Legacy cluster id we'll use to identify our cluster resources (string)\n"},"roleArn":{"type":"string","description":"IAM role to assume when interaction with AWS APIs (string)\n"},"routeTableId":{"type":"string","description":"Enables using a specific RouteTable (string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"vpc":{"type":"string","description":"The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string)\n"},"zone":{"type":"string","description":"The AWS zone (string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudConfigServiceOverride:ClusterCloudProviderAwsCloudConfigServiceOverride":{"properties":{"key":{"type":"string","description":"TLS key for etcd service (string)\n","deprecationMessage":"Use service instead"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"service":{"type":"string","description":"(string)\n"},"signingMethod":{"type":"string","description":"(string)\n"},"signingName":{"type":"string","description":"(string)\n"},"signingRegion":{"type":"string","description":"(string)\n"},"url":{"type":"string","description":"Registry URL (string)\n"}},"type":"object","required":["service"],"language":{"nodejs":{"requiredOutputs":["service","signingMethod"]}}},"rke:index/ClusterCloudProviderAwsCloudProvider:ClusterCloudProviderAwsCloudProvider":{"properties":{"global":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudProviderGlobal:ClusterCloudProviderAwsCloudProviderGlobal","description":"(list maxitems:1)\n"},"serviceOverrides":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudProviderServiceOverride:ClusterCloudProviderAwsCloudProviderServiceOverride"},"description":"(list)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudProviderGlobal:ClusterCloudProviderAwsCloudProviderGlobal":{"properties":{"disableSecurityGroupIngress":{"type":"boolean","description":"Disables the automatic ingress creation. Default `false` (bool)\n"},"disableStrictZoneCheck":{"type":"boolean","description":"Setting this to true will disable the check and provide a warning that the check was skipped. Default `false` (bool)\n"},"elbSecurityGroup":{"type":"string","description":"Use these ELB security groups instead create new (string)\n"},"kubernetesClusterId":{"type":"string","description":"The cluster id we'll use to identify our cluster resources (string)\n"},"kubernetesClusterTag":{"type":"string","description":"Legacy cluster id we'll use to identify our cluster resources (string)\n"},"roleArn":{"type":"string","description":"IAM role to assume when interaction with AWS APIs (string)\n"},"routeTableId":{"type":"string","description":"Enables using a specific RouteTable (string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"vpc":{"type":"string","description":"The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string)\n"},"zone":{"type":"string","description":"The AWS zone (string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudProviderServiceOverride:ClusterCloudProviderAwsCloudProviderServiceOverride":{"properties":{"key":{"type":"string","description":"TLS key for etcd service (string)\n","deprecationMessage":"Use service instead"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"service":{"type":"string","description":"(string)\n"},"signingMethod":{"type":"string","description":"(string)\n"},"signingName":{"type":"string","description":"(string)\n"},"signingRegion":{"type":"string","description":"(string)\n"},"url":{"type":"string","description":"Registry URL (string)\n"}},"type":"object","required":["service"],"language":{"nodejs":{"requiredOutputs":["service","signingMethod"]}}},"rke:index/ClusterCloudProviderAzureCloudConfig:ClusterCloudProviderAzureCloudConfig":{"properties":{"aadClientCertPassword":{"type":"string","description":"(string)\n","secret":true},"aadClientCertPath":{"type":"string","description":"(string)\n"},"aadClientId":{"type":"string","description":"(string)\n","secret":true},"aadClientSecret":{"type":"string","description":"(string)\n","secret":true},"cloud":{"type":"string","description":"(string)\n"},"cloudProviderBackoff":{"type":"boolean","description":"(bool)\n"},"cloudProviderBackoffDuration":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffExponent":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffJitter":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffRetries":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimit":{"type":"boolean","description":"(bool)\n"},"cloudProviderRateLimitBucket":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimitQps":{"type":"integer","description":"(int)\n"},"loadBalancerSku":{"type":"string"},"location":{"type":"string","description":"(string)\n"},"maximumLoadBalancerRuleCount":{"type":"integer","description":"(int)\n"},"primaryAvailabilitySetName":{"type":"string","description":"(string)\n"},"primaryScaleSetName":{"type":"string","description":"(string)\n"},"resourceGroup":{"type":"string","description":"(string)\n"},"routeTableName":{"type":"string","description":"(string)\n"},"securityGroupName":{"type":"string","description":"(string)\n"},"subnetName":{"type":"string","description":"(string)\n"},"subscriptionId":{"type":"string","description":"(string)\n","secret":true},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"useInstanceMetadata":{"type":"boolean","description":"(bool)\n"},"useManagedIdentityExtension":{"type":"boolean","description":"(bool)\n"},"vmType":{"type":"string","description":"(string)\n"},"vnetName":{"type":"string","description":"(string)\n"},"vnetResourceGroup":{"type":"string","description":"(string)\n"}},"type":"object","required":["aadClientId","aadClientSecret","subscriptionId","tenantId"],"language":{"nodejs":{"requiredOutputs":["aadClientId","aadClientSecret","cloudProviderRateLimitBucket","subscriptionId","tenantId"]}}},"rke:index/ClusterCloudProviderAzureCloudProvider:ClusterCloudProviderAzureCloudProvider":{"properties":{"aadClientCertPassword":{"type":"string","description":"(string)\n","secret":true},"aadClientCertPath":{"type":"string","description":"(string)\n"},"aadClientId":{"type":"string","description":"(string)\n","secret":true},"aadClientSecret":{"type":"string","description":"(string)\n","secret":true},"cloud":{"type":"string","description":"(string)\n"},"cloudProviderBackoff":{"type":"boolean","description":"(bool)\n"},"cloudProviderBackoffDuration":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffExponent":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffJitter":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffRetries":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimit":{"type":"boolean","description":"(bool)\n"},"cloudProviderRateLimitBucket":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimitQps":{"type":"integer","description":"(int)\n"},"loadBalancerSku":{"type":"string"},"location":{"type":"string","description":"(string)\n"},"maximumLoadBalancerRuleCount":{"type":"integer","description":"(int)\n"},"primaryAvailabilitySetName":{"type":"string","description":"(string)\n"},"primaryScaleSetName":{"type":"string","description":"(string)\n"},"resourceGroup":{"type":"string","description":"(string)\n"},"routeTableName":{"type":"string","description":"(string)\n"},"securityGroupName":{"type":"string","description":"(string)\n"},"subnetName":{"type":"string","description":"(string)\n"},"subscriptionId":{"type":"string","description":"(string)\n","secret":true},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"useInstanceMetadata":{"type":"boolean","description":"(bool)\n"},"useManagedIdentityExtension":{"type":"boolean","description":"(bool)\n"},"vmType":{"type":"string","description":"(string)\n"},"vnetName":{"type":"string","description":"(string)\n"},"vnetResourceGroup":{"type":"string","description":"(string)\n"}},"type":"object","required":["aadClientId","aadClientSecret","subscriptionId","tenantId"],"language":{"nodejs":{"requiredOutputs":["aadClientId","aadClientSecret","cloudProviderRateLimitBucket","subscriptionId","tenantId"]}}},"rke:index/ClusterCloudProviderOpenstackCloudConfig:ClusterCloudProviderOpenstackCloudConfig":{"properties":{"blockStorage":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigBlockStorage:ClusterCloudProviderOpenstackCloudConfigBlockStorage","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigGlobal:ClusterCloudProviderOpenstackCloudConfigGlobal","description":"(list maxitems:1)\n"},"loadBalancer":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigLoadBalancer:ClusterCloudProviderOpenstackCloudConfigLoadBalancer","description":"(list maxitems:1)\n"},"metadata":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigMetadata:ClusterCloudProviderOpenstackCloudConfigMetadata","description":"(list maxitems:1)\n"},"route":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigRoute:ClusterCloudProviderOpenstackCloudConfigRoute","description":"(list maxitems:1)\n"}},"type":"object","required":["global"],"language":{"nodejs":{"requiredOutputs":["blockStorage","global","loadBalancer","metadata","route"]}}},"rke:index/ClusterCloudProviderOpenstackCloudConfigBlockStorage:ClusterCloudProviderOpenstackCloudConfigBlockStorage":{"properties":{"bsVersion":{"type":"string","description":"(string)\n"},"ignoreVolumeAz":{"type":"boolean","description":"(string)\n"},"trustDevicePath":{"type":"boolean","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudConfigGlobal:ClusterCloudProviderOpenstackCloudConfigGlobal":{"properties":{"authUrl":{"type":"string","description":"(string)\n"},"caFile":{"type":"string","description":"(string)\n"},"domainId":{"type":"string","description":"Required if `domain_name` not provided. (string)\n","secret":true},"domainName":{"type":"string","description":"Required if `domain_id` not provided. (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"region":{"type":"string","description":"Region for S3 service (string)\n"},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"tenantName":{"type":"string","description":"Required if `tenant_id` not provided. (string)\n"},"trustId":{"type":"string","description":"(string)\n","secret":true},"userId":{"type":"string","description":"Required if `username` not provided. (string)\n","secret":true},"username":{"type":"string","description":"Required if `user_id` not provided. (string)\n"}},"type":"object","required":["authUrl","password"]},"rke:index/ClusterCloudProviderOpenstackCloudConfigLoadBalancer:ClusterCloudProviderOpenstackCloudConfigLoadBalancer":{"properties":{"createMonitor":{"type":"boolean","description":"(bool)\n"},"floatingNetworkId":{"type":"string","description":"(string)\n"},"lbMethod":{"type":"string","description":"(string)\n"},"lbProvider":{"type":"string","description":"(string)\n"},"lbVersion":{"type":"string","description":"(string)\n"},"manageSecurityGroups":{"type":"boolean","description":"(bool)\n"},"monitorDelay":{"type":"string","description":"(string)\n"},"monitorMaxRetries":{"type":"integer","description":"(int)\n"},"monitorTimeout":{"type":"string","description":"(string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"useOctavia":{"type":"boolean","description":"(bool)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudConfigMetadata:ClusterCloudProviderOpenstackCloudConfigMetadata":{"properties":{"requestTimeout":{"type":"integer","description":"(int)\n"},"searchOrder":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudConfigRoute:ClusterCloudProviderOpenstackCloudConfigRoute":{"properties":{"routerId":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProvider:ClusterCloudProviderOpenstackCloudProvider":{"properties":{"blockStorage":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderBlockStorage:ClusterCloudProviderOpenstackCloudProviderBlockStorage","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderGlobal:ClusterCloudProviderOpenstackCloudProviderGlobal","description":"(list maxitems:1)\n"},"loadBalancer":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderLoadBalancer:ClusterCloudProviderOpenstackCloudProviderLoadBalancer","description":"(list maxitems:1)\n"},"metadata":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderMetadata:ClusterCloudProviderOpenstackCloudProviderMetadata","description":"(list maxitems:1)\n"},"route":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderRoute:ClusterCloudProviderOpenstackCloudProviderRoute","description":"(list maxitems:1)\n"}},"type":"object","required":["global"],"language":{"nodejs":{"requiredOutputs":["blockStorage","global","loadBalancer","metadata","route"]}}},"rke:index/ClusterCloudProviderOpenstackCloudProviderBlockStorage:ClusterCloudProviderOpenstackCloudProviderBlockStorage":{"properties":{"bsVersion":{"type":"string","description":"(string)\n"},"ignoreVolumeAz":{"type":"boolean","description":"(string)\n"},"trustDevicePath":{"type":"boolean","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProviderGlobal:ClusterCloudProviderOpenstackCloudProviderGlobal":{"properties":{"authUrl":{"type":"string","description":"(string)\n"},"caFile":{"type":"string","description":"(string)\n"},"domainId":{"type":"string","description":"Required if `domain_name` not provided. (string)\n","secret":true},"domainName":{"type":"string","description":"Required if `domain_id` not provided. (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"region":{"type":"string","description":"Region for S3 service (string)\n"},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"tenantName":{"type":"string","description":"Required if `tenant_id` not provided. (string)\n"},"trustId":{"type":"string","description":"(string)\n","secret":true},"userId":{"type":"string","description":"Required if `username` not provided. (string)\n","secret":true},"username":{"type":"string","description":"Required if `user_id` not provided. (string)\n"}},"type":"object","required":["authUrl","password"]},"rke:index/ClusterCloudProviderOpenstackCloudProviderLoadBalancer:ClusterCloudProviderOpenstackCloudProviderLoadBalancer":{"properties":{"createMonitor":{"type":"boolean","description":"(bool)\n"},"floatingNetworkId":{"type":"string","description":"(string)\n"},"lbMethod":{"type":"string","description":"(string)\n"},"lbProvider":{"type":"string","description":"(string)\n"},"lbVersion":{"type":"string","description":"(string)\n"},"manageSecurityGroups":{"type":"boolean","description":"(bool)\n"},"monitorDelay":{"type":"string","description":"(string)\n"},"monitorMaxRetries":{"type":"integer","description":"(int)\n"},"monitorTimeout":{"type":"string","description":"(string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"useOctavia":{"type":"boolean","description":"(bool)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProviderMetadata:ClusterCloudProviderOpenstackCloudProviderMetadata":{"properties":{"requestTimeout":{"type":"integer","description":"(int)\n"},"searchOrder":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProviderRoute:ClusterCloudProviderOpenstackCloudProviderRoute":{"properties":{"routerId":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudConfig:ClusterCloudProviderVsphereCloudConfig":{"properties":{"disk":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigDisk:ClusterCloudProviderVsphereCloudConfigDisk","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigGlobal:ClusterCloudProviderVsphereCloudConfigGlobal","description":"(list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigNetwork:ClusterCloudProviderVsphereCloudConfigNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"virtualCenters":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigVirtualCenter:ClusterCloudProviderVsphereCloudConfigVirtualCenter"},"description":"(List)\n"},"workspace":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigWorkspace:ClusterCloudProviderVsphereCloudConfigWorkspace","description":"(list maxitems:1)\n"}},"type":"object","required":["virtualCenters","workspace"],"language":{"nodejs":{"requiredOutputs":["disk","global","network","virtualCenters","workspace"]}}},"rke:index/ClusterCloudProviderVsphereCloudConfigDisk:ClusterCloudProviderVsphereCloudConfigDisk":{"properties":{"scsiControllerType":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudConfigGlobal:ClusterCloudProviderVsphereCloudConfigGlobal":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"datacenters":{"type":"string","description":"(string)\n"},"datastore":{"type":"string","description":"(string)\n"},"insecureFlag":{"type":"boolean","description":"(bool)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true},"vmName":{"type":"string","description":"(string)\n"},"vmUuid":{"type":"string","description":"(string)\n"},"workingDir":{"type":"string","description":"(string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["datacenters"]}}},"rke:index/ClusterCloudProviderVsphereCloudConfigNetwork:ClusterCloudProviderVsphereCloudConfigNetwork":{"properties":{"publicNetwork":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudConfigVirtualCenter:ClusterCloudProviderVsphereCloudConfigVirtualCenter":{"properties":{"datacenters":{"type":"string","description":"(string)\n"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["datacenters","name","password","user"]},"rke:index/ClusterCloudProviderVsphereCloudConfigWorkspace:ClusterCloudProviderVsphereCloudConfigWorkspace":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"defaultDatastore":{"type":"string","description":"(string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"resourcepoolPath":{"type":"string","description":"(string)\n"},"server":{"type":"string","description":"(string)\n"}},"type":"object","required":["datacenter","server"]},"rke:index/ClusterCloudProviderVsphereCloudProvider:ClusterCloudProviderVsphereCloudProvider":{"properties":{"disk":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderDisk:ClusterCloudProviderVsphereCloudProviderDisk","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderGlobal:ClusterCloudProviderVsphereCloudProviderGlobal","description":"(list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderNetwork:ClusterCloudProviderVsphereCloudProviderNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"virtualCenters":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderVirtualCenter:ClusterCloudProviderVsphereCloudProviderVirtualCenter"},"description":"(List)\n"},"workspace":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderWorkspace:ClusterCloudProviderVsphereCloudProviderWorkspace","description":"(list maxitems:1)\n"}},"type":"object","required":["virtualCenters","workspace"],"language":{"nodejs":{"requiredOutputs":["disk","global","network","virtualCenters","workspace"]}}},"rke:index/ClusterCloudProviderVsphereCloudProviderDisk:ClusterCloudProviderVsphereCloudProviderDisk":{"properties":{"scsiControllerType":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudProviderGlobal:ClusterCloudProviderVsphereCloudProviderGlobal":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"datacenters":{"type":"string","description":"(string)\n"},"datastore":{"type":"string","description":"(string)\n"},"insecureFlag":{"type":"boolean","description":"(bool)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true},"vmName":{"type":"string","description":"(string)\n"},"vmUuid":{"type":"string","description":"(string)\n"},"workingDir":{"type":"string","description":"(string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["datacenters"]}}},"rke:index/ClusterCloudProviderVsphereCloudProviderNetwork:ClusterCloudProviderVsphereCloudProviderNetwork":{"properties":{"publicNetwork":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudProviderVirtualCenter:ClusterCloudProviderVsphereCloudProviderVirtualCenter":{"properties":{"datacenters":{"type":"string","description":"(string)\n"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["datacenters","name","password","user"]},"rke:index/ClusterCloudProviderVsphereCloudProviderWorkspace:ClusterCloudProviderVsphereCloudProviderWorkspace":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"defaultDatastore":{"type":"string","description":"(string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"resourcepoolPath":{"type":"string","description":"(string)\n"},"server":{"type":"string","description":"(string)\n"}},"type":"object","required":["datacenter","server"]},"rke:index/ClusterControlPlaneHost:ClusterControlPlaneHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}},"rke:index/ClusterDns:ClusterDns":{"properties":{"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"},"nodelocal":{"$ref":"#/types/rke:index/ClusterDnsNodelocal:ClusterDnsNodelocal","description":"Docker image for nodelocal (string)\n"},"provider":{"type":"string","description":"Monitoring provider (string)\n"},"reverseCidrs":{"type":"array","items":{"type":"string"},"description":"Reverse CIDRs (list)\n"},"upstreamNameservers":{"type":"array","items":{"type":"string"},"description":"Upstream nameservers (list)\n"}},"type":"object"},"rke:index/ClusterDnsNodelocal:ClusterDnsNodelocal":{"properties":{"ipAddress":{"type":"string","description":"Nodelocal dns ip address (string)\n"},"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"}},"type":"object"},"rke:index/ClusterEtcdHost:ClusterEtcdHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}},"rke:index/ClusterInactiveHost:ClusterInactiveHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}},"rke:index/ClusterIngress:ClusterIngress":{"properties":{"defaultBackend":{"type":"boolean"},"dnsPolicy":{"type":"string","description":"Ingress controller DNS policy. `ClusterFirstWithHostNet`, `ClusterFirst`, `Default`, and `None` are supported. [K8S dns Policy](https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy) (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"httpPort":{"type":"integer","description":"Ingress controller http port (int)\n"},"httpsPort":{"type":"integer","description":"Ingress controller https port (int)\n"},"networkMode":{"type":"string","description":"Networt mode for the ingress controller. `hostNetwork`, `hostPort` and `none` are supported (string)\n"},"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"},"provider":{"type":"string","description":"Monitoring provider (string)\n"}},"type":"object"},"rke:index/ClusterMonitoring:ClusterMonitoring":{"properties":{"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"},"provider":{"type":"string","description":"Monitoring provider (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["provider"]}}},"rke:index/ClusterNetwork:ClusterNetwork":{"properties":{"aciNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkAciNetworkProvider:ClusterNetworkAciNetworkProvider","description":"Aci network provider config (list maxitems:1)\n"},"calicoNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkCalicoNetworkProvider:ClusterNetworkCalicoNetworkProvider","description":"Calico network provider config (list maxitems:1)\n"},"canalNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkCanalNetworkProvider:ClusterNetworkCanalNetworkProvider","description":"Canal network provider config (list maxitems:1)\n"},"flannelNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkFlannelNetworkProvider:ClusterNetworkFlannelNetworkProvider","description":"Flannel network provider config (list maxitems:1)\n"},"mtu":{"type":"integer","description":"Network provider MTU. Default `0` (int)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"},"plugin":{"type":"string","description":"Network provider plugin. `calico`, `canal` (default), `flannel`, `none` and `weave` are supported. (string)\n"},"weaveNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkWeaveNetworkProvider:ClusterNetworkWeaveNetworkProvider","description":"Weave network provider config (list maxitems:1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["options"]}}},"rke:index/ClusterNetworkAciNetworkProvider:ClusterNetworkAciNetworkProvider":{"properties":{"aep":{"type":"string","description":"Attachment entity profile name on aci (string)\n"},"apicHosts":{"type":"array","items":{"type":"string"},"description":"Ip address for apic hosts (list)\n"},"apicUserCrt":{"type":"string","description":"Base64 encoded certificate for aci apic user (string)\n","secret":true},"apicUserKey":{"type":"string","description":"Base64 encoded private key for aci apic user (string)\n","secret":true},"apicUserName":{"type":"string","description":"User name for aci apic (string)\n"},"encapType":{"type":"string","description":"One of the supported encap types for aci(vlan/vxlan) (string)\n"},"externDynamic":{"type":"string","description":"Subnet to use for dynamic external IPs on aci (string)\n* `extern_static\"` - (Required) Subnet to use for static external IPs on aci (string)\n"},"externStatic":{"type":"string"},"infraVlan":{"type":"string","description":"Vlan for infra network on aci (string)\n"},"kubeApiVlan":{"type":"string","description":"Vlan for node network on aci (string)\n"},"l3out":{"type":"string","description":"L3Out on aci (string)\n"},"l3outExternalNetworks":{"type":"array","items":{"type":"string"},"description":"L3out external networks on aci (list)\n"},"mcastRangeEnd":{"type":"string","description":"Mcast range end address for endpoint groups on aci (string)\n"},"mcastRangeStart":{"type":"string","description":"Mcast range start address for endpoint groups on aci (string)\n"},"nodeSubnet":{"type":"string","description":"Kubernetes node address subnet (string)\n"},"nodeSvcSubnet":{"type":"string","description":"Subnet to use for service graph endpoints on aci (string)\n"},"serviceVlan":{"type":"string","description":"Vlan for service graph nodes on aci (string)\n"},"snatPortRangeEnd":{"type":"string","description":"Port end range for Source Network Address Translation on aci (string)\n"},"snatPortRangeStart":{"type":"string","description":"Port start range for Source Network Address Translation on aci (string)\n"},"snatPortsPerNode":{"type":"string","description":"Ports per node for Source Network Address Translation on aci (string)\n"},"systemId":{"type":"string","description":"Unique suffix for all cluster related objects in aci (string)\n"},"token":{"type":"string","description":"UUID for this version of the input configuration (string)\n","secret":true},"vrfName":{"type":"string","description":"VRF Name on aci (string)\n"},"vrfTenant":{"type":"string","description":"Tenant for VRF on aci (string)\n"}},"type":"object","required":["aep","apicHosts","apicUserCrt","apicUserKey","apicUserName","encapType","externDynamic","externStatic","infraVlan","kubeApiVlan","l3out","l3outExternalNetworks","mcastRangeEnd","mcastRangeStart","nodeSubnet","nodeSvcSubnet","serviceVlan","systemId","token","vrfName","vrfTenant"]},"rke:index/ClusterNetworkCalicoNetworkProvider:ClusterNetworkCalicoNetworkProvider":{"properties":{"cloudProvider":{"type":"string","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["cloudProvider"]}}},"rke:index/ClusterNetworkCanalNetworkProvider:ClusterNetworkCanalNetworkProvider":{"properties":{"iface":{"type":"string","description":"Flannel network interface (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["iface"]}}},"rke:index/ClusterNetworkFlannelNetworkProvider:ClusterNetworkFlannelNetworkProvider":{"properties":{"iface":{"type":"string","description":"Flannel network interface (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["iface"]}}},"rke:index/ClusterNetworkWeaveNetworkProvider:ClusterNetworkWeaveNetworkProvider":{"properties":{"password":{"type":"string","description":"Registry password (string)\n"}},"type":"object","required":["password"]},"rke:index/ClusterNode:ClusterNode":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"dockerSocket":{"type":"string","description":"Docker socket on the node that will be used in tunneling (string)\n"},"hostnameOverride":{"type":"string","description":"Hostname override for node (string)\n"},"internalAddress":{"type":"string","description":"Internal address that will be used for components communication (string)\n"},"labels":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node labels (map)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"roles":{"type":"array","items":{"type":"string"},"description":"Node roles in k8s cluster. `controlplane`, `etcd` and `worker` are supported. (list)\n"},"rolesDeprecated":{"type":"string","deprecationMessage":"Use role instead","language":{"csharp":{"name":"RolesDeprecated"}}},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCert":{"type":"string","description":"SSH Certificate (string)\n","secret":true},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKey":{"type":"string","description":"SSH Private Key (string)\n","secret":true},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"taints":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNodeTaint:ClusterNodeTaint"},"description":"Node taints (list)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["address","roles","user"],"language":{"nodejs":{"requiredOutputs":["address","roles","sshAgentAuth","user"]}}},"rke:index/ClusterNodeTaint:ClusterNodeTaint":{"properties":{"effect":{"type":"string","description":"Taint effect. `NoExecute`, `NoSchedule` (default) and `PreferNoSchedule` are supported (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n"},"value":{"type":"string","description":"Taint value (string)\n"}},"type":"object","required":["key","value"]},"rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry":{"properties":{"isDefault":{"type":"boolean","description":"Set as default registry. Default `false` (bool)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"url":{"type":"string","description":"Registry URL (string)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["url"]},"rke:index/ClusterRestore:ClusterRestore":{"properties":{"restore":{"type":"boolean","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"snapshotName":{"type":"string","description":"Snapshot name (string)\n"}},"type":"object"},"rke:index/ClusterRotateCertificates:ClusterRotateCertificates":{"properties":{"caCertificates":{"type":"boolean","description":"Rotate CA Certificates. Default `false` (bool)\n"},"services":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster services (list maxitems:1)\n"}},"type":"object"},"rke:index/ClusterRunningSystemImage:ClusterRunningSystemImage":{"properties":{"aciCniDeployContainer":{"type":"string","description":"Docker image for aci_cni_deploy_container (string)\n"},"aciControllerContainer":{"type":"string","description":"Docker image for aci_controller_container (string)\n"},"aciHostContainer":{"type":"string","description":"Docker image for aci_host_container (string)\n"},"aciMcastContainer":{"type":"string","description":"Docker image for aci_mcast_container (string)\n"},"aciOpflexContainer":{"type":"string","description":"Docker image for aci_opflex_container (string)\n"},"aciOvsContainer":{"type":"string","description":"Docker image for aci_ovs_container (string)\n"},"alpine":{"type":"string","description":"Docker image for alpine (string)\n"},"calicoCni":{"type":"string","description":"Docker image for calico_cni (string)\n"},"calicoControllers":{"type":"string","description":"Docker image for calico_controllers (string)\n"},"calicoCtl":{"type":"string","description":"Docker image for calico_ctl (string)\n"},"calicoFlexVol":{"type":"string","description":"Docker image for calico_flex_vol (string)\n"},"calicoNode":{"type":"string","description":"Docker image for calico_node (string)\n"},"canalCni":{"type":"string","description":"Docker image for canal_cni (string)\n"},"canalFlannel":{"type":"string","description":"Docker image for canal_flannel (string)\n"},"canalFlexVol":{"type":"string","description":"Docker image for canal_flex_vol (string)\n"},"canalNode":{"type":"string","description":"Docker image for canal_node (string)\n"},"certDownloader":{"type":"string","description":"Docker image for cert_downloader (string)\n"},"coredns":{"type":"string","description":"Docker image for coredns (string)\n"},"corednsAutoscaler":{"type":"string","description":"Docker image for coredns_autoscaler (string)\n"},"dnsmasq":{"type":"string","description":"Docker image for dnsmasq (string)\n"},"etcd":{"type":"string","description":"Docker image for etcd (string)\n"},"flannel":{"type":"string","description":"Docker image for flannel (string)\n"},"flannelCni":{"type":"string","description":"Docker image for flannel_cni (string)\n"},"ingress":{"type":"string","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"ingressBackend":{"type":"string","description":"Docker image for ingress_backend (string)\n"},"kubeDns":{"type":"string","description":"Docker image for kube_dns (string)\n"},"kubeDnsAutoscaler":{"type":"string","description":"Docker image for kube_dns_autoscaler (string)\n"},"kubeDnsSidecar":{"type":"string","description":"Docker image for kube_dns_sidecar (string)\n"},"kubernetes":{"type":"string","description":"Docker image for kubernetes (string)\n"},"kubernetesServicesSidecar":{"type":"string","description":"Docker image for kubernetes_services_sidecar (string)\n"},"metricsServer":{"type":"string","description":"Docker image for metrics_server (string)\n"},"nginxProxy":{"type":"string","description":"Docker image for nginx_proxy (string)\n"},"nodelocal":{"type":"string","description":"Docker image for nodelocal (string)\n"},"podInfraContainer":{"type":"string","description":"Docker image for pod_infra_container (string)\n"},"weaveCni":{"type":"string","description":"Docker image for weave_cni (string)\n"},"weaveNode":{"type":"string","description":"Docker image for weave_node (string)\n"},"windowsPodInfraContainer":{"type":"string","description":"Docker image for windows_pod_infra_container (string)\n"}},"type":"object"},"rke:index/ClusterServices:ClusterServices":{"properties":{"etcd":{"$ref":"#/types/rke:index/ClusterServicesEtcd:ClusterServicesEtcd","description":"Docker image for etcd (string)\n"},"kubeApi":{"$ref":"#/types/rke:index/ClusterServicesKubeApi:ClusterServicesKubeApi","description":"Kube API options for RKE services (list maxitems:1)\n"},"kubeController":{"$ref":"#/types/rke:index/ClusterServicesKubeController:ClusterServicesKubeController","description":"Kube Controller options for RKE services (list maxitems:1)\n"},"kubelet":{"$ref":"#/types/rke:index/ClusterServicesKubelet:ClusterServicesKubelet","description":"Kubelet options for RKE services (list maxitems:1)\n"},"kubeproxy":{"$ref":"#/types/rke:index/ClusterServicesKubeproxy:ClusterServicesKubeproxy","description":"Kubeproxy options for RKE services (list maxitems:1)\n"},"scheduler":{"$ref":"#/types/rke:index/ClusterServicesScheduler:ClusterServicesScheduler","description":"Scheduler options for RKE services (list maxitems:1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["etcd","kubeApi","kubeController","kubelet","kubeproxy","scheduler"]}}},"rke:index/ClusterServicesEtcd:ClusterServicesEtcd":{"properties":{"backupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdBackupConfig:ClusterServicesEtcdBackupConfig","description":"Backup options for etcd service. Just for Rancher v2.2.x (list maxitems:1)\n"},"caCert":{"type":"string","description":"TLS CA certificate for etcd service (string)\n","secret":true},"cert":{"type":"string","description":"TLS certificate for etcd service (string)\n","secret":true},"creation":{"type":"string","description":"Creation option for etcd service (string)\n"},"externalUrls":{"type":"array","items":{"type":"string"},"description":"External urls for etcd service (list)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"gid":{"type":"integer","description":"Etcd service GID. Default: `0`. For Rancher v2.3.x or above (int)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n","secret":true},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"retention":{"type":"string","description":"Retention for etcd backup. Default `6` (int)\n"},"snapshot":{"type":"boolean","description":"Snapshot option for etcd service. Default `true` (bool)\n"},"uid":{"type":"integer","description":"Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["backupConfig","caCert","cert","creation","externalUrls","extraArgs","extraBinds","extraEnvs","image","key","path","retention"]}}},"rke:index/ClusterServicesEtcdBackupConfig:ClusterServicesEtcdBackupConfig":{"properties":{"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"},"intervalHours":{"type":"integer","description":"Interval hours for etcd backup. Default `12` (int)\n"},"retention":{"type":"integer","description":"Retention for etcd backup. Default `6` (int)\n"},"s3BackupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdBackupConfigS3BackupConfig:ClusterServicesEtcdBackupConfigS3BackupConfig","description":"S3 config options for etcd backup (list maxitems:1)\n"},"safeTimestamp":{"type":"boolean","description":"Safe timestamp for etcd backup. Default: `false` (bool)\n"},"timeout":{"type":"integer","description":"RKE node drain timeout (int)\n"}},"type":"object"},"rke:index/ClusterServicesEtcdBackupConfigS3BackupConfig:ClusterServicesEtcdBackupConfigS3BackupConfig":{"properties":{"accessKey":{"type":"string","description":"Access key for S3 service (string)\n","secret":true},"bucketName":{"type":"string","description":"Bucket name for S3 service (string)\n"},"customCa":{"type":"string","description":"Base64 encoded custom CA for S3 service. Use filebase64(\u003cFILE\u003e) for encoding file. Available from Rancher v2.2.5 (string)\n"},"endpoint":{"type":"string","description":"Endpoint for S3 service (string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"secretKey":{"type":"string","description":"Secret key for S3 service (string)\n","secret":true}},"type":"object"},"rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated":{"properties":{"backupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecatedBackupConfig:ClusterServicesEtcdDeprecatedBackupConfig","description":"Backup options for etcd service. Just for Rancher v2.2.x (list maxitems:1)\n"},"caCert":{"type":"string","description":"TLS CA certificate for etcd service (string)\n","secret":true},"cert":{"type":"string","description":"TLS certificate for etcd service (string)\n","secret":true},"creation":{"type":"string","description":"Creation option for etcd service (string)\n"},"externalUrls":{"type":"array","items":{"type":"string"},"description":"External urls for etcd service (list)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"gid":{"type":"integer","description":"Etcd service GID. Default: `0`. For Rancher v2.3.x or above (int)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n","secret":true},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"retention":{"type":"string","description":"Retention for etcd backup. Default `6` (int)\n"},"snapshot":{"type":"boolean","description":"Snapshot option for etcd service. Default `true` (bool)\n"},"uid":{"type":"integer","description":"Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["backupConfig","caCert","cert","creation","externalUrls","extraArgs","extraBinds","extraEnvs","image","key","path","retention"]}}},"rke:index/ClusterServicesEtcdDeprecatedBackupConfig:ClusterServicesEtcdDeprecatedBackupConfig":{"properties":{"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"},"intervalHours":{"type":"integer","description":"Interval hours for etcd backup. Default `12` (int)\n"},"retention":{"type":"integer","description":"Retention for etcd backup. Default `6` (int)\n"},"s3BackupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig:ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig","description":"S3 config options for etcd backup (list maxitems:1)\n"},"safeTimestamp":{"type":"boolean","description":"Safe timestamp for etcd backup. Default: `false` (bool)\n"},"timeout":{"type":"integer","description":"RKE node drain timeout (int)\n"}},"type":"object"},"rke:index/ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig:ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig":{"properties":{"accessKey":{"type":"string","description":"Access key for S3 service (string)\n","secret":true},"bucketName":{"type":"string","description":"Bucket name for S3 service (string)\n"},"customCa":{"type":"string","description":"Base64 encoded custom CA for S3 service. Use filebase64(\u003cFILE\u003e) for encoding file. Available from Rancher v2.2.5 (string)\n"},"endpoint":{"type":"string","description":"Endpoint for S3 service (string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"secretKey":{"type":"string","description":"Secret key for S3 service (string)\n","secret":true}},"type":"object"},"rke:index/ClusterServicesKubeApi:ClusterServicesKubeApi":{"properties":{"alwaysPullImages":{"type":"boolean","description":"Enable [AlwaysPullImages](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#alwayspullimages) Admission controller plugin. [Rancher docs](https://rancher.com/docs/rke/latest/en/config-options/services/#kubernetes-api-server-options) (bool)\n"},"auditLog":{"$ref":"#/types/rke:index/ClusterServicesKubeApiAuditLog:ClusterServicesKubeApiAuditLog","description":"K8s audit log configuration. (list maxitem: 1)\n"},"eventRateLimit":{"$ref":"#/types/rke:index/ClusterServicesKubeApiEventRateLimit:ClusterServicesKubeApiEventRateLimit","description":"K8s event rate limit configuration. (list maxitem: 1)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"podSecurityPolicy":{"type":"boolean","description":"Pod Security Policy option for kube API service (bool)\n"},"secretsEncryptionConfig":{"$ref":"#/types/rke:index/ClusterServicesKubeApiSecretsEncryptionConfig:ClusterServicesKubeApiSecretsEncryptionConfig","description":"[Encrypt k8s secret data configration](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/). (list maxitem: 1)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"},"serviceNodePortRange":{"type":"string","description":"Service Node Port Range option for kube API service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["alwaysPullImages","auditLog","extraArgs","extraBinds","extraEnvs","image","podSecurityPolicy","serviceClusterIpRange","serviceNodePortRange"]}}},"rke:index/ClusterServicesKubeApiAuditLog:ClusterServicesKubeApiAuditLog":{"properties":{"configuration":{"$ref":"#/types/rke:index/ClusterServicesKubeApiAuditLogConfiguration:ClusterServicesKubeApiAuditLogConfiguration","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiAuditLogConfiguration:ClusterServicesKubeApiAuditLogConfiguration":{"properties":{"format":{"type":"string","description":"Audit log format (string)\n"},"maxAge":{"type":"integer","description":"Audit log max age (int)\n"},"maxBackup":{"type":"integer","description":"Audit log max backup. Default: `10` (int)\n"},"maxSize":{"type":"integer","description":"Audit log max size. Default: `100` (int)\n"},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"policy":{"type":"string","description":"Audit policy json encoded definition. `\"apiVersion\"` and `\"kind\":\"Policy\",\"rules\"` fields are required in the json. Ex. `jsonencode({\"apiVersion\":\"audit.k8s.io/v1\",\"kind\":\"Policy\",\"rules\":[{\"level\":\"RequestResponse\",\"resources\":[{\"group\":\"\",\"resources\":[\"pods\"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["format","maxAge","maxBackup","maxSize","path","policy"]}}},"rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated":{"properties":{"alwaysPullImages":{"type":"boolean","description":"Enable [AlwaysPullImages](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#alwayspullimages) Admission controller plugin. [Rancher docs](https://rancher.com/docs/rke/latest/en/config-options/services/#kubernetes-api-server-options) (bool)\n"},"auditLog":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedAuditLog:ClusterServicesKubeApiDeprecatedAuditLog","description":"K8s audit log configuration. (list maxitem: 1)\n"},"eventRateLimit":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedEventRateLimit:ClusterServicesKubeApiDeprecatedEventRateLimit","description":"K8s event rate limit configuration. (list maxitem: 1)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"podSecurityPolicy":{"type":"boolean","description":"Pod Security Policy option for kube API service (bool)\n"},"secretsEncryptionConfig":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig:ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig","description":"[Encrypt k8s secret data configration](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/). (list maxitem: 1)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"},"serviceNodePortRange":{"type":"string","description":"Service Node Port Range option for kube API service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["alwaysPullImages","auditLog","extraArgs","extraBinds","extraEnvs","image","podSecurityPolicy","serviceClusterIpRange","serviceNodePortRange"]}}},"rke:index/ClusterServicesKubeApiDeprecatedAuditLog:ClusterServicesKubeApiDeprecatedAuditLog":{"properties":{"configuration":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedAuditLogConfiguration:ClusterServicesKubeApiDeprecatedAuditLogConfiguration","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiDeprecatedAuditLogConfiguration:ClusterServicesKubeApiDeprecatedAuditLogConfiguration":{"properties":{"format":{"type":"string","description":"Audit log format (string)\n"},"maxAge":{"type":"integer","description":"Audit log max age (int)\n"},"maxBackup":{"type":"integer","description":"Audit log max backup. Default: `10` (int)\n"},"maxSize":{"type":"integer","description":"Audit log max size. Default: `100` (int)\n"},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"policy":{"type":"string","description":"Audit policy json encoded definition. `\"apiVersion\"` and `\"kind\":\"Policy\",\"rules\"` fields are required in the json. Ex. `jsonencode({\"apiVersion\":\"audit.k8s.io/v1\",\"kind\":\"Policy\",\"rules\":[{\"level\":\"RequestResponse\",\"resources\":[{\"group\":\"\",\"resources\":[\"pods\"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["format","maxAge","maxBackup","maxSize","path","policy"]}}},"rke:index/ClusterServicesKubeApiDeprecatedEventRateLimit:ClusterServicesKubeApiDeprecatedEventRateLimit":{"properties":{"configuration":{"type":"string","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig:ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig":{"properties":{"customConfig":{"type":"string","description":"Secrets encryption yaml encoded custom configuration. `\"apiVersion\"` and `\"kind\":\"EncryptionConfiguration\"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["customConfig","enabled"]}}},"rke:index/ClusterServicesKubeApiEventRateLimit:ClusterServicesKubeApiEventRateLimit":{"properties":{"configuration":{"type":"string","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiSecretsEncryptionConfig:ClusterServicesKubeApiSecretsEncryptionConfig":{"properties":{"customConfig":{"type":"string","description":"Secrets encryption yaml encoded custom configuration. `\"apiVersion\"` and `\"kind\":\"EncryptionConfiguration\"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["customConfig","enabled"]}}},"rke:index/ClusterServicesKubeController:ClusterServicesKubeController":{"properties":{"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterCidr","extraArgs","extraBinds","extraEnvs","image","serviceClusterIpRange"]}}},"rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated":{"properties":{"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterCidr","extraArgs","extraBinds","extraEnvs","image","serviceClusterIpRange"]}}},"rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterServicesKubelet:ClusterServicesKubelet":{"properties":{"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"failSwapOn":{"type":"boolean","description":"Enable or disable failing when swap on is not supported (bool)\n"},"generateServingCertificate":{"type":"boolean","description":"[Generate a certificate signed by the kube-ca](https://rancher.com/docs/rke/latest/en/config-options/services/#kubelet-serving-certificate-requirements). Default `false` (bool)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"infraContainerImage":{"type":"string","description":"Infra container image for kubelet service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterDnsServer","extraArgs","extraBinds","extraEnvs","failSwapOn","image","infraContainerImage"]}}},"rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated":{"properties":{"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"failSwapOn":{"type":"boolean","description":"Enable or disable failing when swap on is not supported (bool)\n"},"generateServingCertificate":{"type":"boolean","description":"[Generate a certificate signed by the kube-ca](https://rancher.com/docs/rke/latest/en/config-options/services/#kubelet-serving-certificate-requirements). Default `false` (bool)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"infraContainerImage":{"type":"string","description":"Infra container image for kubelet service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterDnsServer","extraArgs","extraBinds","extraEnvs","failSwapOn","image","infraContainerImage"]}}},"rke:index/ClusterServicesKubeproxy:ClusterServicesKubeproxy":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterServicesScheduler:ClusterServicesScheduler":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterSystemImages:ClusterSystemImages":{"properties":{"aciCniDeployContainer":{"type":"string","description":"Docker image for aci_cni_deploy_container (string)\n"},"aciControllerContainer":{"type":"string","description":"Docker image for aci_controller_container (string)\n"},"aciHostContainer":{"type":"string","description":"Docker image for aci_host_container (string)\n"},"aciMcastContainer":{"type":"string","description":"Docker image for aci_mcast_container (string)\n"},"aciOpflexContainer":{"type":"string","description":"Docker image for aci_opflex_container (string)\n"},"aciOvsContainer":{"type":"string","description":"Docker image for aci_ovs_container (string)\n"},"alpine":{"type":"string","description":"Docker image for alpine (string)\n"},"calicoCni":{"type":"string","description":"Docker image for calico_cni (string)\n"},"calicoControllers":{"type":"string","description":"Docker image for calico_controllers (string)\n"},"calicoCtl":{"type":"string","description":"Docker image for calico_ctl (string)\n"},"calicoFlexVol":{"type":"string","description":"Docker image for calico_flex_vol (string)\n"},"calicoNode":{"type":"string","description":"Docker image for calico_node (string)\n"},"canalCni":{"type":"string","description":"Docker image for canal_cni (string)\n"},"canalFlannel":{"type":"string","description":"Docker image for canal_flannel (string)\n"},"canalFlexVol":{"type":"string","description":"Docker image for canal_flex_vol (string)\n"},"canalNode":{"type":"string","description":"Docker image for canal_node (string)\n"},"certDownloader":{"type":"string","description":"Docker image for cert_downloader (string)\n"},"coredns":{"type":"string","description":"Docker image for coredns (string)\n"},"corednsAutoscaler":{"type":"string","description":"Docker image for coredns_autoscaler (string)\n"},"dnsmasq":{"type":"string","description":"Docker image for dnsmasq (string)\n"},"etcd":{"type":"string","description":"Docker image for etcd (string)\n"},"flannel":{"type":"string","description":"Docker image for flannel (string)\n"},"flannelCni":{"type":"string","description":"Docker image for flannel_cni (string)\n"},"ingress":{"type":"string","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"ingressBackend":{"type":"string","description":"Docker image for ingress_backend (string)\n"},"kubeDns":{"type":"string","description":"Docker image for kube_dns (string)\n"},"kubeDnsAutoscaler":{"type":"string","description":"Docker image for kube_dns_autoscaler (string)\n"},"kubeDnsSidecar":{"type":"string","description":"Docker image for kube_dns_sidecar (string)\n"},"kubernetes":{"type":"string","description":"Docker image for kubernetes (string)\n"},"kubernetesServicesSidecar":{"type":"string","description":"Docker image for kubernetes_services_sidecar (string)\n"},"metricsServer":{"type":"string","description":"Docker image for metrics_server (string)\n"},"nginxProxy":{"type":"string","description":"Docker image for nginx_proxy (string)\n"},"nodelocal":{"type":"string","description":"Docker image for nodelocal (string)\n"},"podInfraContainer":{"type":"string","description":"Docker image for pod_infra_container (string)\n"},"weaveCni":{"type":"string","description":"Docker image for weave_cni (string)\n"},"weaveNode":{"type":"string","description":"Docker image for weave_node (string)\n"},"windowsPodInfraContainer":{"type":"string","description":"Docker image for windows_pod_infra_container (string)\n"}},"type":"object"},"rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy":{"properties":{"drain":{"type":"boolean","description":"RKE drain nodes (bool)\n"},"drainInput":{"$ref":"#/types/rke:index/ClusterUpgradeStrategyDrainInput:ClusterUpgradeStrategyDrainInput","description":"RKE drain node input (list Maxitems: 1)\n"},"maxUnavailableControlplane":{"type":"string","description":"RKE max unavailable controlplane nodes (string)\n"},"maxUnavailableWorker":{"type":"string","description":"RKE max unavailable worker nodes (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["drain","drainInput","maxUnavailableControlplane","maxUnavailableWorker"]}}},"rke:index/ClusterUpgradeStrategyDrainInput:ClusterUpgradeStrategyDrainInput":{"properties":{"deleteLocalData":{"type":"boolean","description":"Delete RKE node local data (bool)\n"},"force":{"type":"boolean","description":"Force RKE node drain (bool)\n"},"gracePeriod":{"type":"integer","description":"RKE node drain grace period (int)\n"},"ignoreDaemonSets":{"type":"boolean","description":"Ignore RKE daemon sets (bool)\n"},"timeout":{"type":"integer","description":"RKE node drain timeout (int)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["deleteLocalData","force","gracePeriod","ignoreDaemonSets","timeout"]}}},"rke:index/ClusterWorkerHost:ClusterWorkerHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}}},"provider":{"description":"The provider type for the rke package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n","properties":{"debug":{"type":"boolean"},"logFile":{"type":"string"}},"inputProperties":{"debug":{"type":"boolean","default":false,"defaultInfo":{"environment":["RKE_DEBUG"]}},"logFile":{"type":"string","defaultInfo":{"environment":["RKE_LOG_FILE"]}}}},"resources":{"rke:index/cluster:Cluster":{"description":"\n\n\n## Import\n\nrke_cluster can be imported using the RKE cluster config and state files as ID in the format `\u003ccluster_config_file\u003e:\u003crke_state_file\u003e`\n\n```sh\n $ pulumi import rke:index/cluster:Cluster foo \u0026lt;cluster_config_file\u0026gt;:\u0026lt;rke_state_file\u0026gt;\n```\n As experimental feature, dind rke_cluster can be also imported adding `dind` as 3rd import parameter `\u003ccluster_config_file\u003e:\u003crke_state_file\u003e:dind`\n\n```sh\n $ pulumi import rke:index/cluster:Cluster foo \u0026lt;cluster_config_file\u0026gt;:\u0026lt;rke_state_file\u0026gt;:dind\n```\n ","properties":{"addonJobTimeout":{"type":"integer","description":"RKE k8s cluster addon deployment timeout in seconds for status check (int)\n"},"addons":{"type":"string","description":"RKE k8s cluster user addons YAML manifest to be deployed (string)\n"},"addonsIncludes":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster user addons YAML manifest urls or paths to be deployed (list)\n"},"apiServerUrl":{"type":"string","description":"(Computed) RKE k8s cluster api server url (string)\n"},"authentication":{"$ref":"#/types/rke:index/ClusterAuthentication:ClusterAuthentication","description":"RKE k8s cluster authentication configuration (list maxitems:1)\n"},"authorization":{"$ref":"#/types/rke:index/ClusterAuthorization:ClusterAuthorization","description":"RKE k8s cluster authorization mode configuration (list maxitems:1)\n"},"bastionHost":{"$ref":"#/types/rke:index/ClusterBastionHost:ClusterBastionHost","description":"RKE k8s cluster bastion Host configuration (list maxitems:1)\n"},"caCrt":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster CA certificate (string)\n","secret":true},"certDir":{"type":"string","description":"Specify a certificate dir path (string)\n"},"certificates":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCertificate:ClusterCertificate"},"description":"(Computed/Sensitive) RKE k8s cluster certificates (string)\n","secret":true},"clientCert":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client certificate (string)\n","secret":true},"clientKey":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client key (string)\n","secret":true},"cloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProvider:ClusterCloudProvider","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"},"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"clusterName":{"type":"string","description":"RKE k8s cluster name used in the kube config (string)\n"},"clusterYaml":{"type":"string","description":"RKE k8s cluster config yaml encoded. Provider arguments take precedence over this one (string)\n","secret":true},"controlPlaneHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterControlPlaneHost:ClusterControlPlaneHost"},"description":"(Computed) RKE k8s cluster control plane nodes (list)\n"},"customCerts":{"type":"boolean","description":"Use custom certificates from a cert dir (string)\n"},"delayOnCreation":{"type":"integer","description":"RKE k8s cluster delay on creation (int)\n"},"dind":{"type":"boolean","description":"Deploy RKE cluster on a dind environment. Default: `false` (bool)\n"},"dindDnsServer":{"type":"string","description":"DinD RKE cluster dns (string)\n"},"dindStorageDriver":{"type":"string","description":"DinD RKE cluster storage driver (string)\n"},"disablePortCheck":{"type":"boolean","description":"Enable/Disable RKE k8s cluster port checking. Default `false` (bool)\n"},"dns":{"$ref":"#/types/rke:index/ClusterDns:ClusterDns","description":"RKE k8s cluster DNS Config (list maxitems:1)\n"},"enableCriDockerd":{"type":"boolean","description":"Enable/Disable CRI dockerd for kubelet. Default `false` (bool)\n"},"etcdHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterEtcdHost:ClusterEtcdHost"},"description":"(Computed) RKE k8s cluster etcd nodes (list)\n"},"ignoreDockerVersion":{"type":"boolean","description":"Enable/Disable RKE k8s cluster strict docker version checking. Default `false` (bool)\n"},"inactiveHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterInactiveHost:ClusterInactiveHost"},"description":"(Computed) RKE k8s cluster inactive nodes (list)\n"},"ingress":{"$ref":"#/types/rke:index/ClusterIngress:ClusterIngress","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"internalKubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster internal kube config yaml (string)\n","deprecationMessage":"Use kube_config_yaml instead","secret":true},"kubeAdminUser":{"type":"string","description":"(Computed) RKE k8s cluster admin user (string)\n"},"kubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster kube config yaml (string)\n","secret":true},"kubernetesVersion":{"type":"string","description":"K8s version to deploy. If kubernetes image is specified, image version takes precedence. Default: `rke default` (string)\n"},"monitoring":{"$ref":"#/types/rke:index/ClusterMonitoring:ClusterMonitoring","description":"RKE k8s cluster monitoring Config (list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterNetwork:ClusterNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"nodes":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNode:ClusterNode"},"description":"RKE k8s cluster nodes (list)\n"},"nodesConfs":{"type":"array","items":{"type":"string"},"deprecationMessage":"Use cluster_yaml instead"},"prefixPath":{"type":"string","description":"RKE k8s directory path (string)\n"},"privateRegistries":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry"},"description":"RKE k8s cluster private docker registries (list)\n"},"restore":{"$ref":"#/types/rke:index/ClusterRestore:ClusterRestore","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"rkeClusterYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster config yaml (string)\n","secret":true},"rkeState":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster state (string)\n","secret":true},"rotateCertificates":{"$ref":"#/types/rke:index/ClusterRotateCertificates:ClusterRotateCertificates","description":"RKE k8s cluster rotate certificates configuration (list maxitems:1)\n"},"runningSystemImages":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterRunningSystemImage:ClusterRunningSystemImage"},"description":"(Computed) RKE k8s cluster running system images list (list)\n"},"services":{"$ref":"#/types/rke:index/ClusterServices:ClusterServices","description":"RKE k8s cluster services (list maxitems:1)\n"},"servicesEtcdDeprecated":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated","description":"Use services.etcd instead (list maxitems:1)\n","deprecationMessage":"Use services.etcd instead"},"servicesKubeApiDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated","description":"Use services.kube_api instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_api instead"},"servicesKubeControllerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated","description":"Use services.kube_controller instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_controller instead"},"servicesKubeProxyDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated","description":"Use services.kubeproxy instead (list maxitems:1)\n","deprecationMessage":"Use services.kubeproxy instead"},"servicesKubeSchedulerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated","description":"Use services.scheduler instead (list maxitems:1)\n","deprecationMessage":"Use services.scheduler instead"},"servicesKubeletDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated","description":"Use services.kubelet instead (list maxitems:1)\n","deprecationMessage":"Use services.kubelet instead"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"systemImages":{"$ref":"#/types/rke:index/ClusterSystemImages:ClusterSystemImages","description":"RKE k8s cluster system images list (list maxitems:1)\n"},"updateOnly":{"type":"boolean","description":"Skip idempotent deployment of control and etcd plane. Default `false` (bool)\n"},"upgradeStrategy":{"$ref":"#/types/rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy","description":"RKE k8s cluster upgrade strategy (list maxitems:1)\n"},"workerHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterWorkerHost:ClusterWorkerHost"},"description":"(Computed) RKE k8s cluster worker nodes (list)\n"}},"required":["apiServerUrl","caCrt","certificates","clientCert","clientKey","clusterCidr","clusterDnsServer","clusterDomain","controlPlaneHosts","etcdHosts","inactiveHosts","internalKubeConfigYaml","kubeAdminUser","kubeConfigYaml","rkeClusterYaml","rkeState","runningSystemImages","sshAgentAuth","workerHosts"],"inputProperties":{"addonJobTimeout":{"type":"integer","description":"RKE k8s cluster addon deployment timeout in seconds for status check (int)\n"},"addons":{"type":"string","description":"RKE k8s cluster user addons YAML manifest to be deployed (string)\n"},"addonsIncludes":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster user addons YAML manifest urls or paths to be deployed (list)\n"},"authentication":{"$ref":"#/types/rke:index/ClusterAuthentication:ClusterAuthentication","description":"RKE k8s cluster authentication configuration (list maxitems:1)\n"},"authorization":{"$ref":"#/types/rke:index/ClusterAuthorization:ClusterAuthorization","description":"RKE k8s cluster authorization mode configuration (list maxitems:1)\n"},"bastionHost":{"$ref":"#/types/rke:index/ClusterBastionHost:ClusterBastionHost","description":"RKE k8s cluster bastion Host configuration (list maxitems:1)\n"},"certDir":{"type":"string","description":"Specify a certificate dir path (string)\n"},"cloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProvider:ClusterCloudProvider","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"},"clusterName":{"type":"string","description":"RKE k8s cluster name used in the kube config (string)\n"},"clusterYaml":{"type":"string","description":"RKE k8s cluster config yaml encoded. Provider arguments take precedence over this one (string)\n","secret":true},"customCerts":{"type":"boolean","description":"Use custom certificates from a cert dir (string)\n"},"delayOnCreation":{"type":"integer","description":"RKE k8s cluster delay on creation (int)\n"},"dind":{"type":"boolean","description":"Deploy RKE cluster on a dind environment. Default: `false` (bool)\n"},"dindDnsServer":{"type":"string","description":"DinD RKE cluster dns (string)\n"},"dindStorageDriver":{"type":"string","description":"DinD RKE cluster storage driver (string)\n"},"disablePortCheck":{"type":"boolean","description":"Enable/Disable RKE k8s cluster port checking. Default `false` (bool)\n"},"dns":{"$ref":"#/types/rke:index/ClusterDns:ClusterDns","description":"RKE k8s cluster DNS Config (list maxitems:1)\n"},"enableCriDockerd":{"type":"boolean","description":"Enable/Disable CRI dockerd for kubelet. Default `false` (bool)\n"},"ignoreDockerVersion":{"type":"boolean","description":"Enable/Disable RKE k8s cluster strict docker version checking. Default `false` (bool)\n"},"ingress":{"$ref":"#/types/rke:index/ClusterIngress:ClusterIngress","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"kubernetesVersion":{"type":"string","description":"K8s version to deploy. If kubernetes image is specified, image version takes precedence. Default: `rke default` (string)\n"},"monitoring":{"$ref":"#/types/rke:index/ClusterMonitoring:ClusterMonitoring","description":"RKE k8s cluster monitoring Config (list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterNetwork:ClusterNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"nodes":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNode:ClusterNode"},"description":"RKE k8s cluster nodes (list)\n"},"nodesConfs":{"type":"array","items":{"type":"string"},"deprecationMessage":"Use cluster_yaml instead"},"prefixPath":{"type":"string","description":"RKE k8s directory path (string)\n"},"privateRegistries":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry"},"description":"RKE k8s cluster private docker registries (list)\n"},"restore":{"$ref":"#/types/rke:index/ClusterRestore:ClusterRestore","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"rotateCertificates":{"$ref":"#/types/rke:index/ClusterRotateCertificates:ClusterRotateCertificates","description":"RKE k8s cluster rotate certificates configuration (list maxitems:1)\n"},"services":{"$ref":"#/types/rke:index/ClusterServices:ClusterServices","description":"RKE k8s cluster services (list maxitems:1)\n"},"servicesEtcdDeprecated":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated","description":"Use services.etcd instead (list maxitems:1)\n","deprecationMessage":"Use services.etcd instead"},"servicesKubeApiDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated","description":"Use services.kube_api instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_api instead"},"servicesKubeControllerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated","description":"Use services.kube_controller instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_controller instead"},"servicesKubeProxyDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated","description":"Use services.kubeproxy instead (list maxitems:1)\n","deprecationMessage":"Use services.kubeproxy instead"},"servicesKubeSchedulerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated","description":"Use services.scheduler instead (list maxitems:1)\n","deprecationMessage":"Use services.scheduler instead"},"servicesKubeletDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated","description":"Use services.kubelet instead (list maxitems:1)\n","deprecationMessage":"Use services.kubelet instead"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"systemImages":{"$ref":"#/types/rke:index/ClusterSystemImages:ClusterSystemImages","description":"RKE k8s cluster system images list (list maxitems:1)\n"},"updateOnly":{"type":"boolean","description":"Skip idempotent deployment of control and etcd plane. Default `false` (bool)\n"},"upgradeStrategy":{"$ref":"#/types/rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy","description":"RKE k8s cluster upgrade strategy (list maxitems:1)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering Cluster resources.\n","properties":{"addonJobTimeout":{"type":"integer","description":"RKE k8s cluster addon deployment timeout in seconds for status check (int)\n"},"addons":{"type":"string","description":"RKE k8s cluster user addons YAML manifest to be deployed (string)\n"},"addonsIncludes":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster user addons YAML manifest urls or paths to be deployed (list)\n"},"apiServerUrl":{"type":"string","description":"(Computed) RKE k8s cluster api server url (string)\n"},"authentication":{"$ref":"#/types/rke:index/ClusterAuthentication:ClusterAuthentication","description":"RKE k8s cluster authentication configuration (list maxitems:1)\n"},"authorization":{"$ref":"#/types/rke:index/ClusterAuthorization:ClusterAuthorization","description":"RKE k8s cluster authorization mode configuration (list maxitems:1)\n"},"bastionHost":{"$ref":"#/types/rke:index/ClusterBastionHost:ClusterBastionHost","description":"RKE k8s cluster bastion Host configuration (list maxitems:1)\n"},"caCrt":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster CA certificate (string)\n","secret":true},"certDir":{"type":"string","description":"Specify a certificate dir path (string)\n"},"certificates":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCertificate:ClusterCertificate"},"description":"(Computed/Sensitive) RKE k8s cluster certificates (string)\n","secret":true},"clientCert":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client certificate (string)\n","secret":true},"clientKey":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client key (string)\n","secret":true},"cloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProvider:ClusterCloudProvider","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"},"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"clusterName":{"type":"string","description":"RKE k8s cluster name used in the kube config (string)\n"},"clusterYaml":{"type":"string","description":"RKE k8s cluster config yaml encoded. Provider arguments take precedence over this one (string)\n","secret":true},"controlPlaneHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterControlPlaneHost:ClusterControlPlaneHost"},"description":"(Computed) RKE k8s cluster control plane nodes (list)\n"},"customCerts":{"type":"boolean","description":"Use custom certificates from a cert dir (string)\n"},"delayOnCreation":{"type":"integer","description":"RKE k8s cluster delay on creation (int)\n"},"dind":{"type":"boolean","description":"Deploy RKE cluster on a dind environment. Default: `false` (bool)\n"},"dindDnsServer":{"type":"string","description":"DinD RKE cluster dns (string)\n"},"dindStorageDriver":{"type":"string","description":"DinD RKE cluster storage driver (string)\n"},"disablePortCheck":{"type":"boolean","description":"Enable/Disable RKE k8s cluster port checking. Default `false` (bool)\n"},"dns":{"$ref":"#/types/rke:index/ClusterDns:ClusterDns","description":"RKE k8s cluster DNS Config (list maxitems:1)\n"},"enableCriDockerd":{"type":"boolean","description":"Enable/Disable CRI dockerd for kubelet. Default `false` (bool)\n"},"etcdHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterEtcdHost:ClusterEtcdHost"},"description":"(Computed) RKE k8s cluster etcd nodes (list)\n"},"ignoreDockerVersion":{"type":"boolean","description":"Enable/Disable RKE k8s cluster strict docker version checking. Default `false` (bool)\n"},"inactiveHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterInactiveHost:ClusterInactiveHost"},"description":"(Computed) RKE k8s cluster inactive nodes (list)\n"},"ingress":{"$ref":"#/types/rke:index/ClusterIngress:ClusterIngress","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"internalKubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster internal kube config yaml (string)\n","deprecationMessage":"Use kube_config_yaml instead","secret":true},"kubeAdminUser":{"type":"string","description":"(Computed) RKE k8s cluster admin user (string)\n"},"kubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster kube config yaml (string)\n","secret":true},"kubernetesVersion":{"type":"string","description":"K8s version to deploy. If kubernetes image is specified, image version takes precedence. Default: `rke default` (string)\n"},"monitoring":{"$ref":"#/types/rke:index/ClusterMonitoring:ClusterMonitoring","description":"RKE k8s cluster monitoring Config (list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterNetwork:ClusterNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"nodes":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNode:ClusterNode"},"description":"RKE k8s cluster nodes (list)\n"},"nodesConfs":{"type":"array","items":{"type":"string"},"deprecationMessage":"Use cluster_yaml instead"},"prefixPath":{"type":"string","description":"RKE k8s directory path (string)\n"},"privateRegistries":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry"},"description":"RKE k8s cluster private docker registries (list)\n"},"restore":{"$ref":"#/types/rke:index/ClusterRestore:ClusterRestore","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"rkeClusterYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster config yaml (string)\n","secret":true},"rkeState":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster state (string)\n","secret":true},"rotateCertificates":{"$ref":"#/types/rke:index/ClusterRotateCertificates:ClusterRotateCertificates","description":"RKE k8s cluster rotate certificates configuration (list maxitems:1)\n"},"runningSystemImages":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterRunningSystemImage:ClusterRunningSystemImage"},"description":"(Computed) RKE k8s cluster running system images list (list)\n"},"services":{"$ref":"#/types/rke:index/ClusterServices:ClusterServices","description":"RKE k8s cluster services (list maxitems:1)\n"},"servicesEtcdDeprecated":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated","description":"Use services.etcd instead (list maxitems:1)\n","deprecationMessage":"Use services.etcd instead"},"servicesKubeApiDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated","description":"Use services.kube_api instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_api instead"},"servicesKubeControllerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated","description":"Use services.kube_controller instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_controller instead"},"servicesKubeProxyDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated","description":"Use services.kubeproxy instead (list maxitems:1)\n","deprecationMessage":"Use services.kubeproxy instead"},"servicesKubeSchedulerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated","description":"Use services.scheduler instead (list maxitems:1)\n","deprecationMessage":"Use services.scheduler instead"},"servicesKubeletDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated","description":"Use services.kubelet instead (list maxitems:1)\n","deprecationMessage":"Use services.kubelet instead"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"systemImages":{"$ref":"#/types/rke:index/ClusterSystemImages:ClusterSystemImages","description":"RKE k8s cluster system images list (list maxitems:1)\n"},"updateOnly":{"type":"boolean","description":"Skip idempotent deployment of control and etcd plane. Default `false` (bool)\n"},"upgradeStrategy":{"$ref":"#/types/rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy","description":"RKE k8s cluster upgrade strategy (list maxitems:1)\n"},"workerHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterWorkerHost:ClusterWorkerHost"},"description":"(Computed) RKE k8s cluster worker nodes (list)\n"}},"type":"object"}}}} \ No newline at end of file +{"name":"rke","displayName":"Rancher Kubernetes Engine (RKE)","version":"3.4.0-alpha.1698441351+7198616a.dirty","description":"A Pulumi package for creating and managing rke cloud resources.","keywords":["pulumi","rke"],"homepage":"https://pulumi.io","license":"Apache-2.0","attribution":"This Pulumi package is based on the [`rke` Terraform Provider](https://github.com/rancher/terraform-provider-rke).","repository":"https://github.com/pulumi/pulumi-rke","meta":{"moduleFormat":"(.*)(?:/[^/]*)"},"language":{"csharp":{"packageReferences":{"Pulumi":"3.*"},"namespaces":{"index":"index","rke":"Rke"},"compatibility":"tfbridge20"},"go":{"importBasePath":"github.com/pulumi/pulumi-rke/sdk/v3/go/rke","generateResourceContainerTypes":true,"generateExtraInputTypes":true},"nodejs":{"packageDescription":"A Pulumi package for creating and managing rke cloud resources.","readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/rancher/terraform-provider-rke)\n\u003e distributed under [MIT](https://mit-license.org/). If you encounter a bug or missing feature,\n\u003e first check the [`pulumi-rke` repo](https://github.com/pulumi/pulumi-rke/issues); however, if that doesn't turn up anything,\n\u003e please consult the source [`terraform-provider-rke` repo](https://github.com/rancher/terraform-provider-rke/issues).","dependencies":{"@pulumi/pulumi":"^3.0.0"},"devDependencies":{"@types/mime":"^2.0.0","@types/node":"^10.0.0"},"compatibility":"tfbridge20","disableUnionOutputTypes":true},"python":{"requires":{"pulumi":"\u003e=3.0.0,\u003c4.0.0"},"readme":"\u003e This provider is a derived work of the [Terraform Provider](https://github.com/rancher/terraform-provider-rke)\n\u003e distributed under [MIT](https://mit-license.org/). If you encounter a bug or missing feature,\n\u003e first check the [`pulumi-rke` repo](https://github.com/pulumi/pulumi-rke/issues); however, if that doesn't turn up anything,\n\u003e please consult the source [`terraform-provider-rke` repo](https://github.com/rancher/terraform-provider-rke/issues).","compatibility":"tfbridge20","pyproject":{"enabled":true}}},"config":{"variables":{"debug":{"type":"boolean","default":false,"defaultInfo":{"environment":["RKE_DEBUG"]}},"logFile":{"type":"string","defaultInfo":{"environment":["RKE_LOG_FILE"]}}}},"types":{"rke:index/ClusterAuthentication:ClusterAuthentication":{"properties":{"sans":{"type":"array","items":{"type":"string"},"description":"List of additional hostnames and IPs to include in the api server PKI cert (list)\n"},"strategy":{"type":"string","description":"Authentication strategy that will be used in RKE k8s cluster. Default: `x509` (string)\n"},"webhook":{"$ref":"#/types/rke:index/ClusterAuthenticationWebhook:ClusterAuthenticationWebhook","description":"Webhook configuration options (list maxitem: 1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["sans","webhook"]}}},"rke:index/ClusterAuthenticationWebhook:ClusterAuthenticationWebhook":{"properties":{"cacheTimeout":{"type":"string","description":"Controls how long to cache authentication decisions (string)\n"},"configFile":{"type":"string","description":"Multiline string that represent a custom webhook config file (string)\n"}},"type":"object"},"rke:index/ClusterAuthorization:ClusterAuthorization":{"properties":{"mode":{"type":"string","description":"RKE mode for authorization. `rbac` and `none` modes are available. Default `rbac` (string)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"}},"type":"object"},"rke:index/ClusterBastionHost:ClusterBastionHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"ignoreProxyEnvVars":{"type":"boolean","description":"Ignore proxy env vars at Bastion Host? Default: `false` (bool)\n"},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCert":{"type":"string","description":"SSH Certificate (string)\n","secret":true},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKey":{"type":"string","description":"SSH Private Key (string)\n","secret":true},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"user":{"type":"string","description":"Registry user (string)\n"}},"type":"object","required":["address","user"],"language":{"nodejs":{"requiredOutputs":["address","sshAgentAuth","sshCertPath","sshKeyPath","user"]}}},"rke:index/ClusterCertificate:ClusterCertificate":{"properties":{"certificate":{"type":"string","secret":true},"commonName":{"type":"string"},"config":{"type":"string","secret":true},"configEnvName":{"type":"string"},"configPath":{"type":"string"},"envName":{"type":"string"},"id":{"type":"string","description":"(Computed) The ID of the resource (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n","secret":true},"keyEnvName":{"type":"string"},"keyPath":{"type":"string"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"ouName":{"type":"string"},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["certificate","commonName","config","configEnvName","configPath","envName","id","key","keyEnvName","keyPath","name","ouName","path"]}}},"rke:index/ClusterCloudProvider:ClusterCloudProvider":{"properties":{"awsCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudConfig:ClusterCloudProviderAwsCloudConfig","description":"Use aws_cloud_provider instead\n","deprecationMessage":"Use aws_cloud_provider instead"},"awsCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudProvider:ClusterCloudProviderAwsCloudProvider","description":"AWS Cloud Provider config [rke-aws-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/aws/) (list maxitems:1)\n"},"azureCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderAzureCloudConfig:ClusterCloudProviderAzureCloudConfig","description":"Use azure_cloud_provider instead\n","deprecationMessage":"Use azure_cloud_provider instead"},"azureCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderAzureCloudProvider:ClusterCloudProviderAzureCloudProvider","description":"Azure Cloud Provider config [rke-azure-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/azure/) (list maxitems:1)\n"},"customCloudConfig":{"type":"string","description":"Use custom_cloud_provider instead\n","deprecationMessage":"Use custom_cloud_provider instead"},"customCloudProvider":{"type":"string","description":"Custom Cloud Provider config (string)\n"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"openstackCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfig:ClusterCloudProviderOpenstackCloudConfig","description":"Use openstack_cloud_provider instead\n","deprecationMessage":"Use openstack_cloud_provider instead"},"openstackCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProvider:ClusterCloudProviderOpenstackCloudProvider","description":"Openstack Cloud Provider config [rke-openstack-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/openstack/) (list maxitems:1)\n"},"vsphereCloudConfig":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfig:ClusterCloudProviderVsphereCloudConfig","description":"Use vsphere_cloud_provider instead\n","deprecationMessage":"Use vsphere_cloud_provider instead"},"vsphereCloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProvider:ClusterCloudProviderVsphereCloudProvider","description":"Vsphere Cloud Provider config [rke-vsphere-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/vsphere/) Extra argument `name` is required on `virtual_center` configuration. (list maxitems:1)\n"}},"type":"object","required":["name"]},"rke:index/ClusterCloudProviderAwsCloudConfig:ClusterCloudProviderAwsCloudConfig":{"properties":{"global":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudConfigGlobal:ClusterCloudProviderAwsCloudConfigGlobal","description":"(list maxitems:1)\n"},"serviceOverrides":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudConfigServiceOverride:ClusterCloudProviderAwsCloudConfigServiceOverride"},"description":"(list)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudConfigGlobal:ClusterCloudProviderAwsCloudConfigGlobal":{"properties":{"disableSecurityGroupIngress":{"type":"boolean","description":"Disables the automatic ingress creation. Default `false` (bool)\n"},"disableStrictZoneCheck":{"type":"boolean","description":"Setting this to true will disable the check and provide a warning that the check was skipped. Default `false` (bool)\n"},"elbSecurityGroup":{"type":"string","description":"Use these ELB security groups instead create new (string)\n"},"kubernetesClusterId":{"type":"string","description":"The cluster id we'll use to identify our cluster resources (string)\n"},"kubernetesClusterTag":{"type":"string","description":"Legacy cluster id we'll use to identify our cluster resources (string)\n"},"roleArn":{"type":"string","description":"IAM role to assume when interaction with AWS APIs (string)\n"},"routeTableId":{"type":"string","description":"Enables using a specific RouteTable (string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"vpc":{"type":"string","description":"The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string)\n"},"zone":{"type":"string","description":"The AWS zone (string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudConfigServiceOverride:ClusterCloudProviderAwsCloudConfigServiceOverride":{"properties":{"key":{"type":"string","description":"TLS key for etcd service (string)\n","deprecationMessage":"Use service instead"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"service":{"type":"string","description":"(string)\n"},"signingMethod":{"type":"string","description":"(string)\n"},"signingName":{"type":"string","description":"(string)\n"},"signingRegion":{"type":"string","description":"(string)\n"},"url":{"type":"string","description":"Registry URL (string)\n"}},"type":"object","required":["service"],"language":{"nodejs":{"requiredOutputs":["service","signingMethod"]}}},"rke:index/ClusterCloudProviderAwsCloudProvider:ClusterCloudProviderAwsCloudProvider":{"properties":{"global":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudProviderGlobal:ClusterCloudProviderAwsCloudProviderGlobal","description":"(list maxitems:1)\n"},"serviceOverrides":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderAwsCloudProviderServiceOverride:ClusterCloudProviderAwsCloudProviderServiceOverride"},"description":"(list)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudProviderGlobal:ClusterCloudProviderAwsCloudProviderGlobal":{"properties":{"disableSecurityGroupIngress":{"type":"boolean","description":"Disables the automatic ingress creation. Default `false` (bool)\n"},"disableStrictZoneCheck":{"type":"boolean","description":"Setting this to true will disable the check and provide a warning that the check was skipped. Default `false` (bool)\n"},"elbSecurityGroup":{"type":"string","description":"Use these ELB security groups instead create new (string)\n"},"kubernetesClusterId":{"type":"string","description":"The cluster id we'll use to identify our cluster resources (string)\n"},"kubernetesClusterTag":{"type":"string","description":"Legacy cluster id we'll use to identify our cluster resources (string)\n"},"roleArn":{"type":"string","description":"IAM role to assume when interaction with AWS APIs (string)\n"},"routeTableId":{"type":"string","description":"Enables using a specific RouteTable (string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"vpc":{"type":"string","description":"The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string)\n"},"zone":{"type":"string","description":"The AWS zone (string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderAwsCloudProviderServiceOverride:ClusterCloudProviderAwsCloudProviderServiceOverride":{"properties":{"key":{"type":"string","description":"TLS key for etcd service (string)\n","deprecationMessage":"Use service instead"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"service":{"type":"string","description":"(string)\n"},"signingMethod":{"type":"string","description":"(string)\n"},"signingName":{"type":"string","description":"(string)\n"},"signingRegion":{"type":"string","description":"(string)\n"},"url":{"type":"string","description":"Registry URL (string)\n"}},"type":"object","required":["service"],"language":{"nodejs":{"requiredOutputs":["service","signingMethod"]}}},"rke:index/ClusterCloudProviderAzureCloudConfig:ClusterCloudProviderAzureCloudConfig":{"properties":{"aadClientCertPassword":{"type":"string","description":"(string)\n","secret":true},"aadClientCertPath":{"type":"string","description":"(string)\n"},"aadClientId":{"type":"string","description":"(string)\n","secret":true},"aadClientSecret":{"type":"string","description":"(string)\n","secret":true},"cloud":{"type":"string","description":"(string)\n"},"cloudProviderBackoff":{"type":"boolean","description":"(bool)\n"},"cloudProviderBackoffDuration":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffExponent":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffJitter":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffRetries":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimit":{"type":"boolean","description":"(bool)\n"},"cloudProviderRateLimitBucket":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimitQps":{"type":"integer","description":"(int)\n"},"loadBalancerSku":{"type":"string"},"location":{"type":"string","description":"(string)\n"},"maximumLoadBalancerRuleCount":{"type":"integer","description":"(int)\n"},"primaryAvailabilitySetName":{"type":"string","description":"(string)\n"},"primaryScaleSetName":{"type":"string","description":"(string)\n"},"resourceGroup":{"type":"string","description":"(string)\n"},"routeTableName":{"type":"string","description":"(string)\n"},"securityGroupName":{"type":"string","description":"(string)\n"},"subnetName":{"type":"string","description":"(string)\n"},"subscriptionId":{"type":"string","description":"(string)\n","secret":true},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"useInstanceMetadata":{"type":"boolean","description":"(bool)\n"},"useManagedIdentityExtension":{"type":"boolean","description":"(bool)\n"},"vmType":{"type":"string","description":"(string)\n"},"vnetName":{"type":"string","description":"(string)\n"},"vnetResourceGroup":{"type":"string","description":"(string)\n"}},"type":"object","required":["aadClientId","aadClientSecret","subscriptionId","tenantId"],"language":{"nodejs":{"requiredOutputs":["aadClientId","aadClientSecret","cloudProviderRateLimitBucket","subscriptionId","tenantId"]}}},"rke:index/ClusterCloudProviderAzureCloudProvider:ClusterCloudProviderAzureCloudProvider":{"properties":{"aadClientCertPassword":{"type":"string","description":"(string)\n","secret":true},"aadClientCertPath":{"type":"string","description":"(string)\n"},"aadClientId":{"type":"string","description":"(string)\n","secret":true},"aadClientSecret":{"type":"string","description":"(string)\n","secret":true},"cloud":{"type":"string","description":"(string)\n"},"cloudProviderBackoff":{"type":"boolean","description":"(bool)\n"},"cloudProviderBackoffDuration":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffExponent":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffJitter":{"type":"integer","description":"(int)\n"},"cloudProviderBackoffRetries":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimit":{"type":"boolean","description":"(bool)\n"},"cloudProviderRateLimitBucket":{"type":"integer","description":"(int)\n"},"cloudProviderRateLimitQps":{"type":"integer","description":"(int)\n"},"loadBalancerSku":{"type":"string"},"location":{"type":"string","description":"(string)\n"},"maximumLoadBalancerRuleCount":{"type":"integer","description":"(int)\n"},"primaryAvailabilitySetName":{"type":"string","description":"(string)\n"},"primaryScaleSetName":{"type":"string","description":"(string)\n"},"resourceGroup":{"type":"string","description":"(string)\n"},"routeTableName":{"type":"string","description":"(string)\n"},"securityGroupName":{"type":"string","description":"(string)\n"},"subnetName":{"type":"string","description":"(string)\n"},"subscriptionId":{"type":"string","description":"(string)\n","secret":true},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"useInstanceMetadata":{"type":"boolean","description":"(bool)\n"},"useManagedIdentityExtension":{"type":"boolean","description":"(bool)\n"},"vmType":{"type":"string","description":"(string)\n"},"vnetName":{"type":"string","description":"(string)\n"},"vnetResourceGroup":{"type":"string","description":"(string)\n"}},"type":"object","required":["aadClientId","aadClientSecret","subscriptionId","tenantId"],"language":{"nodejs":{"requiredOutputs":["aadClientId","aadClientSecret","cloudProviderRateLimitBucket","subscriptionId","tenantId"]}}},"rke:index/ClusterCloudProviderOpenstackCloudConfig:ClusterCloudProviderOpenstackCloudConfig":{"properties":{"blockStorage":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigBlockStorage:ClusterCloudProviderOpenstackCloudConfigBlockStorage","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigGlobal:ClusterCloudProviderOpenstackCloudConfigGlobal","description":"(list maxitems:1)\n"},"loadBalancer":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigLoadBalancer:ClusterCloudProviderOpenstackCloudConfigLoadBalancer","description":"(list maxitems:1)\n"},"metadata":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigMetadata:ClusterCloudProviderOpenstackCloudConfigMetadata","description":"(list maxitems:1)\n"},"route":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudConfigRoute:ClusterCloudProviderOpenstackCloudConfigRoute","description":"(list maxitems:1)\n"}},"type":"object","required":["global"],"language":{"nodejs":{"requiredOutputs":["blockStorage","global","loadBalancer","metadata","route"]}}},"rke:index/ClusterCloudProviderOpenstackCloudConfigBlockStorage:ClusterCloudProviderOpenstackCloudConfigBlockStorage":{"properties":{"bsVersion":{"type":"string","description":"(string)\n"},"ignoreVolumeAz":{"type":"boolean","description":"(string)\n"},"trustDevicePath":{"type":"boolean","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudConfigGlobal:ClusterCloudProviderOpenstackCloudConfigGlobal":{"properties":{"authUrl":{"type":"string","description":"(string)\n"},"caFile":{"type":"string","description":"(string)\n"},"domainId":{"type":"string","description":"Required if `domain_name` not provided. (string)\n","secret":true},"domainName":{"type":"string","description":"Required if `domain_id` not provided. (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"region":{"type":"string","description":"Region for S3 service (string)\n"},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"tenantName":{"type":"string","description":"Required if `tenant_id` not provided. (string)\n"},"trustId":{"type":"string","description":"(string)\n","secret":true},"userId":{"type":"string","description":"Required if `username` not provided. (string)\n","secret":true},"username":{"type":"string","description":"Required if `user_id` not provided. (string)\n"}},"type":"object","required":["authUrl","password"]},"rke:index/ClusterCloudProviderOpenstackCloudConfigLoadBalancer:ClusterCloudProviderOpenstackCloudConfigLoadBalancer":{"properties":{"createMonitor":{"type":"boolean","description":"(bool)\n"},"floatingNetworkId":{"type":"string","description":"(string)\n"},"lbMethod":{"type":"string","description":"(string)\n"},"lbProvider":{"type":"string","description":"(string)\n"},"lbVersion":{"type":"string","description":"(string)\n"},"manageSecurityGroups":{"type":"boolean","description":"(bool)\n"},"monitorDelay":{"type":"string","description":"(string)\n"},"monitorMaxRetries":{"type":"integer","description":"(int)\n"},"monitorTimeout":{"type":"string","description":"(string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"useOctavia":{"type":"boolean","description":"(bool)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudConfigMetadata:ClusterCloudProviderOpenstackCloudConfigMetadata":{"properties":{"requestTimeout":{"type":"integer","description":"(int)\n"},"searchOrder":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudConfigRoute:ClusterCloudProviderOpenstackCloudConfigRoute":{"properties":{"routerId":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProvider:ClusterCloudProviderOpenstackCloudProvider":{"properties":{"blockStorage":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderBlockStorage:ClusterCloudProviderOpenstackCloudProviderBlockStorage","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderGlobal:ClusterCloudProviderOpenstackCloudProviderGlobal","description":"(list maxitems:1)\n"},"loadBalancer":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderLoadBalancer:ClusterCloudProviderOpenstackCloudProviderLoadBalancer","description":"(list maxitems:1)\n"},"metadata":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderMetadata:ClusterCloudProviderOpenstackCloudProviderMetadata","description":"(list maxitems:1)\n"},"route":{"$ref":"#/types/rke:index/ClusterCloudProviderOpenstackCloudProviderRoute:ClusterCloudProviderOpenstackCloudProviderRoute","description":"(list maxitems:1)\n"}},"type":"object","required":["global"],"language":{"nodejs":{"requiredOutputs":["blockStorage","global","loadBalancer","metadata","route"]}}},"rke:index/ClusterCloudProviderOpenstackCloudProviderBlockStorage:ClusterCloudProviderOpenstackCloudProviderBlockStorage":{"properties":{"bsVersion":{"type":"string","description":"(string)\n"},"ignoreVolumeAz":{"type":"boolean","description":"(string)\n"},"trustDevicePath":{"type":"boolean","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProviderGlobal:ClusterCloudProviderOpenstackCloudProviderGlobal":{"properties":{"authUrl":{"type":"string","description":"(string)\n"},"caFile":{"type":"string","description":"(string)\n"},"domainId":{"type":"string","description":"Required if `domain_name` not provided. (string)\n","secret":true},"domainName":{"type":"string","description":"Required if `domain_id` not provided. (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"region":{"type":"string","description":"Region for S3 service (string)\n"},"tenantId":{"type":"string","description":"Required if `tenant_name` not provided. (string)\n","secret":true},"tenantName":{"type":"string","description":"Required if `tenant_id` not provided. (string)\n"},"trustId":{"type":"string","description":"(string)\n","secret":true},"userId":{"type":"string","description":"Required if `username` not provided. (string)\n","secret":true},"username":{"type":"string","description":"Required if `user_id` not provided. (string)\n"}},"type":"object","required":["authUrl","password"]},"rke:index/ClusterCloudProviderOpenstackCloudProviderLoadBalancer:ClusterCloudProviderOpenstackCloudProviderLoadBalancer":{"properties":{"createMonitor":{"type":"boolean","description":"(bool)\n"},"floatingNetworkId":{"type":"string","description":"(string)\n"},"lbMethod":{"type":"string","description":"(string)\n"},"lbProvider":{"type":"string","description":"(string)\n"},"lbVersion":{"type":"string","description":"(string)\n"},"manageSecurityGroups":{"type":"boolean","description":"(bool)\n"},"monitorDelay":{"type":"string","description":"(string)\n"},"monitorMaxRetries":{"type":"integer","description":"(int)\n"},"monitorTimeout":{"type":"string","description":"(string)\n"},"subnetId":{"type":"string","description":"(string)\n"},"useOctavia":{"type":"boolean","description":"(bool)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProviderMetadata:ClusterCloudProviderOpenstackCloudProviderMetadata":{"properties":{"requestTimeout":{"type":"integer","description":"(int)\n"},"searchOrder":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderOpenstackCloudProviderRoute:ClusterCloudProviderOpenstackCloudProviderRoute":{"properties":{"routerId":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudConfig:ClusterCloudProviderVsphereCloudConfig":{"properties":{"disk":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigDisk:ClusterCloudProviderVsphereCloudConfigDisk","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigGlobal:ClusterCloudProviderVsphereCloudConfigGlobal","description":"(list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigNetwork:ClusterCloudProviderVsphereCloudConfigNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"virtualCenters":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigVirtualCenter:ClusterCloudProviderVsphereCloudConfigVirtualCenter"},"description":"(List)\n"},"workspace":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudConfigWorkspace:ClusterCloudProviderVsphereCloudConfigWorkspace","description":"(list maxitems:1)\n"}},"type":"object","required":["virtualCenters","workspace"],"language":{"nodejs":{"requiredOutputs":["disk","global","network","virtualCenters","workspace"]}}},"rke:index/ClusterCloudProviderVsphereCloudConfigDisk:ClusterCloudProviderVsphereCloudConfigDisk":{"properties":{"scsiControllerType":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudConfigGlobal:ClusterCloudProviderVsphereCloudConfigGlobal":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"datacenters":{"type":"string","description":"(string)\n"},"datastore":{"type":"string","description":"(string)\n"},"insecureFlag":{"type":"boolean","description":"(bool)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true},"vmName":{"type":"string","description":"(string)\n"},"vmUuid":{"type":"string","description":"(string)\n"},"workingDir":{"type":"string","description":"(string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["datacenters"]}}},"rke:index/ClusterCloudProviderVsphereCloudConfigNetwork:ClusterCloudProviderVsphereCloudConfigNetwork":{"properties":{"publicNetwork":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudConfigVirtualCenter:ClusterCloudProviderVsphereCloudConfigVirtualCenter":{"properties":{"datacenters":{"type":"string","description":"(string)\n"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["datacenters","name","password","user"]},"rke:index/ClusterCloudProviderVsphereCloudConfigWorkspace:ClusterCloudProviderVsphereCloudConfigWorkspace":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"defaultDatastore":{"type":"string","description":"(string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"resourcepoolPath":{"type":"string","description":"(string)\n"},"server":{"type":"string","description":"(string)\n"}},"type":"object","required":["datacenter","server"]},"rke:index/ClusterCloudProviderVsphereCloudProvider:ClusterCloudProviderVsphereCloudProvider":{"properties":{"disk":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderDisk:ClusterCloudProviderVsphereCloudProviderDisk","description":"(list maxitems:1)\n"},"global":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderGlobal:ClusterCloudProviderVsphereCloudProviderGlobal","description":"(list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderNetwork:ClusterCloudProviderVsphereCloudProviderNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"virtualCenters":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderVirtualCenter:ClusterCloudProviderVsphereCloudProviderVirtualCenter"},"description":"(List)\n"},"workspace":{"$ref":"#/types/rke:index/ClusterCloudProviderVsphereCloudProviderWorkspace:ClusterCloudProviderVsphereCloudProviderWorkspace","description":"(list maxitems:1)\n"}},"type":"object","required":["virtualCenters","workspace"],"language":{"nodejs":{"requiredOutputs":["disk","global","network","virtualCenters","workspace"]}}},"rke:index/ClusterCloudProviderVsphereCloudProviderDisk:ClusterCloudProviderVsphereCloudProviderDisk":{"properties":{"scsiControllerType":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudProviderGlobal:ClusterCloudProviderVsphereCloudProviderGlobal":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"datacenters":{"type":"string","description":"(string)\n"},"datastore":{"type":"string","description":"(string)\n"},"insecureFlag":{"type":"boolean","description":"(bool)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true},"vmName":{"type":"string","description":"(string)\n"},"vmUuid":{"type":"string","description":"(string)\n"},"workingDir":{"type":"string","description":"(string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["datacenters"]}}},"rke:index/ClusterCloudProviderVsphereCloudProviderNetwork:ClusterCloudProviderVsphereCloudProviderNetwork":{"properties":{"publicNetwork":{"type":"string","description":"(string)\n"}},"type":"object"},"rke:index/ClusterCloudProviderVsphereCloudProviderVirtualCenter:ClusterCloudProviderVsphereCloudProviderVirtualCenter":{"properties":{"datacenters":{"type":"string","description":"(string)\n"},"name":{"type":"string","description":"Name of virtualcenter config for Vsphere Cloud Provider config (string)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"soapRoundtripCount":{"type":"integer","description":"(int)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["datacenters","name","password","user"]},"rke:index/ClusterCloudProviderVsphereCloudProviderWorkspace:ClusterCloudProviderVsphereCloudProviderWorkspace":{"properties":{"datacenter":{"type":"string","description":"(string)\n"},"defaultDatastore":{"type":"string","description":"(string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"resourcepoolPath":{"type":"string","description":"(string)\n"},"server":{"type":"string","description":"(string)\n"}},"type":"object","required":["datacenter","server"]},"rke:index/ClusterControlPlaneHost:ClusterControlPlaneHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}},"rke:index/ClusterDns:ClusterDns":{"properties":{"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"},"nodelocal":{"$ref":"#/types/rke:index/ClusterDnsNodelocal:ClusterDnsNodelocal","description":"Docker image for nodelocal (string)\n"},"provider":{"type":"string","description":"Monitoring provider (string)\n"},"reverseCidrs":{"type":"array","items":{"type":"string"},"description":"Reverse CIDRs (list)\n"},"upstreamNameservers":{"type":"array","items":{"type":"string"},"description":"Upstream nameservers (list)\n"}},"type":"object"},"rke:index/ClusterDnsNodelocal:ClusterDnsNodelocal":{"properties":{"ipAddress":{"type":"string","description":"Nodelocal dns ip address (string)\n"},"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"}},"type":"object"},"rke:index/ClusterEtcdHost:ClusterEtcdHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}},"rke:index/ClusterInactiveHost:ClusterInactiveHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}},"rke:index/ClusterIngress:ClusterIngress":{"properties":{"defaultBackend":{"type":"boolean"},"dnsPolicy":{"type":"string","description":"Ingress controller DNS policy. `ClusterFirstWithHostNet`, `ClusterFirst`, `Default`, and `None` are supported. [K8S dns Policy](https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy) (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"httpPort":{"type":"integer","description":"Ingress controller http port (int)\n"},"httpsPort":{"type":"integer","description":"Ingress controller https port (int)\n"},"networkMode":{"type":"string","description":"Networt mode for the ingress controller. `hostNetwork`, `hostPort` and `none` are supported (string)\n"},"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"},"provider":{"type":"string","description":"Monitoring provider (string)\n"}},"type":"object"},"rke:index/ClusterMonitoring:ClusterMonitoring":{"properties":{"nodeSelector":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node selector key pair (map)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"},"provider":{"type":"string","description":"Monitoring provider (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["provider"]}}},"rke:index/ClusterNetwork:ClusterNetwork":{"properties":{"aciNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkAciNetworkProvider:ClusterNetworkAciNetworkProvider","description":"Aci network provider config (list maxitems:1)\n"},"calicoNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkCalicoNetworkProvider:ClusterNetworkCalicoNetworkProvider","description":"Calico network provider config (list maxitems:1)\n"},"canalNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkCanalNetworkProvider:ClusterNetworkCanalNetworkProvider","description":"Canal network provider config (list maxitems:1)\n"},"flannelNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkFlannelNetworkProvider:ClusterNetworkFlannelNetworkProvider","description":"Flannel network provider config (list maxitems:1)\n"},"mtu":{"type":"integer","description":"Network provider MTU. Default `0` (int)\n"},"options":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Network provider options (map)\n"},"plugin":{"type":"string","description":"Network provider plugin. `calico`, `canal` (default), `flannel`, `none` and `weave` are supported. (string)\n"},"weaveNetworkProvider":{"$ref":"#/types/rke:index/ClusterNetworkWeaveNetworkProvider:ClusterNetworkWeaveNetworkProvider","description":"Weave network provider config (list maxitems:1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["options"]}}},"rke:index/ClusterNetworkAciNetworkProvider:ClusterNetworkAciNetworkProvider":{"properties":{"aep":{"type":"string","description":"Attachment entity profile name on aci (string)\n"},"apicHosts":{"type":"array","items":{"type":"string"},"description":"Ip address for apic hosts (list)\n"},"apicUserCrt":{"type":"string","description":"Base64 encoded certificate for aci apic user (string)\n","secret":true},"apicUserKey":{"type":"string","description":"Base64 encoded private key for aci apic user (string)\n","secret":true},"apicUserName":{"type":"string","description":"User name for aci apic (string)\n"},"encapType":{"type":"string","description":"One of the supported encap types for aci(vlan/vxlan) (string)\n"},"externDynamic":{"type":"string","description":"Subnet to use for dynamic external IPs on aci (string)\n* `extern_static\"` - (Required) Subnet to use for static external IPs on aci (string)\n"},"externStatic":{"type":"string"},"infraVlan":{"type":"string","description":"Vlan for infra network on aci (string)\n"},"kubeApiVlan":{"type":"string","description":"Vlan for node network on aci (string)\n"},"l3out":{"type":"string","description":"L3Out on aci (string)\n"},"l3outExternalNetworks":{"type":"array","items":{"type":"string"},"description":"L3out external networks on aci (list)\n"},"mcastRangeEnd":{"type":"string","description":"Mcast range end address for endpoint groups on aci (string)\n"},"mcastRangeStart":{"type":"string","description":"Mcast range start address for endpoint groups on aci (string)\n"},"nodeSubnet":{"type":"string","description":"Kubernetes node address subnet (string)\n"},"nodeSvcSubnet":{"type":"string","description":"Subnet to use for service graph endpoints on aci (string)\n"},"serviceVlan":{"type":"string","description":"Vlan for service graph nodes on aci (string)\n"},"snatPortRangeEnd":{"type":"string","description":"Port end range for Source Network Address Translation on aci (string)\n"},"snatPortRangeStart":{"type":"string","description":"Port start range for Source Network Address Translation on aci (string)\n"},"snatPortsPerNode":{"type":"string","description":"Ports per node for Source Network Address Translation on aci (string)\n"},"systemId":{"type":"string","description":"Unique suffix for all cluster related objects in aci (string)\n"},"token":{"type":"string","description":"UUID for this version of the input configuration (string)\n","secret":true},"vrfName":{"type":"string","description":"VRF Name on aci (string)\n"},"vrfTenant":{"type":"string","description":"Tenant for VRF on aci (string)\n"}},"type":"object","required":["aep","apicHosts","apicUserCrt","apicUserKey","apicUserName","encapType","externDynamic","externStatic","infraVlan","kubeApiVlan","l3out","l3outExternalNetworks","mcastRangeEnd","mcastRangeStart","nodeSubnet","nodeSvcSubnet","serviceVlan","systemId","token","vrfName","vrfTenant"]},"rke:index/ClusterNetworkCalicoNetworkProvider:ClusterNetworkCalicoNetworkProvider":{"properties":{"cloudProvider":{"type":"string","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["cloudProvider"]}}},"rke:index/ClusterNetworkCanalNetworkProvider:ClusterNetworkCanalNetworkProvider":{"properties":{"iface":{"type":"string","description":"Flannel network interface (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["iface"]}}},"rke:index/ClusterNetworkFlannelNetworkProvider:ClusterNetworkFlannelNetworkProvider":{"properties":{"iface":{"type":"string","description":"Flannel network interface (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["iface"]}}},"rke:index/ClusterNetworkWeaveNetworkProvider:ClusterNetworkWeaveNetworkProvider":{"properties":{"password":{"type":"string","description":"Registry password (string)\n"}},"type":"object","required":["password"]},"rke:index/ClusterNode:ClusterNode":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"dockerSocket":{"type":"string","description":"Docker socket on the node that will be used in tunneling (string)\n"},"hostnameOverride":{"type":"string","description":"Hostname override for node (string)\n"},"internalAddress":{"type":"string","description":"Internal address that will be used for components communication (string)\n"},"labels":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Node labels (map)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"},"port":{"type":"string","description":"Port used for SSH communication (string)\n"},"roles":{"type":"array","items":{"type":"string"},"description":"Node roles in k8s cluster. `controlplane`, `etcd` and `worker` are supported. (list)\n"},"rolesDeprecated":{"type":"string","deprecationMessage":"Use role instead","language":{"csharp":{"name":"RolesDeprecated"}}},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCert":{"type":"string","description":"SSH Certificate (string)\n","secret":true},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKey":{"type":"string","description":"SSH Private Key (string)\n","secret":true},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"taints":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNodeTaint:ClusterNodeTaint"},"description":"Node taints (list)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["address","roles","user"],"language":{"nodejs":{"requiredOutputs":["address","roles","sshAgentAuth","user"]}}},"rke:index/ClusterNodeTaint:ClusterNodeTaint":{"properties":{"effect":{"type":"string","description":"Taint effect. `NoExecute`, `NoSchedule` (default) and `PreferNoSchedule` are supported (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n"},"value":{"type":"string","description":"Taint value (string)\n"}},"type":"object","required":["key","value"]},"rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry":{"properties":{"isDefault":{"type":"boolean","description":"Set as default registry. Default `false` (bool)\n"},"password":{"type":"string","description":"Registry password (string)\n","secret":true},"url":{"type":"string","description":"Registry URL (string)\n"},"user":{"type":"string","description":"Registry user (string)\n","secret":true}},"type":"object","required":["url"]},"rke:index/ClusterRestore:ClusterRestore":{"properties":{"restore":{"type":"boolean","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"snapshotName":{"type":"string","description":"Snapshot name (string)\n"}},"type":"object"},"rke:index/ClusterRotateCertificates:ClusterRotateCertificates":{"properties":{"caCertificates":{"type":"boolean","description":"Rotate CA Certificates. Default `false` (bool)\n"},"services":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster services (list maxitems:1)\n"}},"type":"object"},"rke:index/ClusterRunningSystemImage:ClusterRunningSystemImage":{"properties":{"aciCniDeployContainer":{"type":"string","description":"Docker image for aci_cni_deploy_container (string)\n"},"aciControllerContainer":{"type":"string","description":"Docker image for aci_controller_container (string)\n"},"aciHostContainer":{"type":"string","description":"Docker image for aci_host_container (string)\n"},"aciMcastContainer":{"type":"string","description":"Docker image for aci_mcast_container (string)\n"},"aciOpflexContainer":{"type":"string","description":"Docker image for aci_opflex_container (string)\n"},"aciOvsContainer":{"type":"string","description":"Docker image for aci_ovs_container (string)\n"},"alpine":{"type":"string","description":"Docker image for alpine (string)\n"},"calicoCni":{"type":"string","description":"Docker image for calico_cni (string)\n"},"calicoControllers":{"type":"string","description":"Docker image for calico_controllers (string)\n"},"calicoCtl":{"type":"string","description":"Docker image for calico_ctl (string)\n"},"calicoFlexVol":{"type":"string","description":"Docker image for calico_flex_vol (string)\n"},"calicoNode":{"type":"string","description":"Docker image for calico_node (string)\n"},"canalCni":{"type":"string","description":"Docker image for canal_cni (string)\n"},"canalFlannel":{"type":"string","description":"Docker image for canal_flannel (string)\n"},"canalFlexVol":{"type":"string","description":"Docker image for canal_flex_vol (string)\n"},"canalNode":{"type":"string","description":"Docker image for canal_node (string)\n"},"certDownloader":{"type":"string","description":"Docker image for cert_downloader (string)\n"},"coredns":{"type":"string","description":"Docker image for coredns (string)\n"},"corednsAutoscaler":{"type":"string","description":"Docker image for coredns_autoscaler (string)\n"},"dnsmasq":{"type":"string","description":"Docker image for dnsmasq (string)\n"},"etcd":{"type":"string","description":"Docker image for etcd (string)\n"},"flannel":{"type":"string","description":"Docker image for flannel (string)\n"},"flannelCni":{"type":"string","description":"Docker image for flannel_cni (string)\n"},"ingress":{"type":"string","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"ingressBackend":{"type":"string","description":"Docker image for ingress_backend (string)\n"},"kubeDns":{"type":"string","description":"Docker image for kube_dns (string)\n"},"kubeDnsAutoscaler":{"type":"string","description":"Docker image for kube_dns_autoscaler (string)\n"},"kubeDnsSidecar":{"type":"string","description":"Docker image for kube_dns_sidecar (string)\n"},"kubernetes":{"type":"string","description":"Docker image for kubernetes (string)\n"},"kubernetesServicesSidecar":{"type":"string","description":"Docker image for kubernetes_services_sidecar (string)\n"},"metricsServer":{"type":"string","description":"Docker image for metrics_server (string)\n"},"nginxProxy":{"type":"string","description":"Docker image for nginx_proxy (string)\n"},"nodelocal":{"type":"string","description":"Docker image for nodelocal (string)\n"},"podInfraContainer":{"type":"string","description":"Docker image for pod_infra_container (string)\n"},"weaveCni":{"type":"string","description":"Docker image for weave_cni (string)\n"},"weaveNode":{"type":"string","description":"Docker image for weave_node (string)\n"},"windowsPodInfraContainer":{"type":"string","description":"Docker image for windows_pod_infra_container (string)\n"}},"type":"object"},"rke:index/ClusterServices:ClusterServices":{"properties":{"etcd":{"$ref":"#/types/rke:index/ClusterServicesEtcd:ClusterServicesEtcd","description":"Docker image for etcd (string)\n"},"kubeApi":{"$ref":"#/types/rke:index/ClusterServicesKubeApi:ClusterServicesKubeApi","description":"Kube API options for RKE services (list maxitems:1)\n"},"kubeController":{"$ref":"#/types/rke:index/ClusterServicesKubeController:ClusterServicesKubeController","description":"Kube Controller options for RKE services (list maxitems:1)\n"},"kubelet":{"$ref":"#/types/rke:index/ClusterServicesKubelet:ClusterServicesKubelet","description":"Kubelet options for RKE services (list maxitems:1)\n"},"kubeproxy":{"$ref":"#/types/rke:index/ClusterServicesKubeproxy:ClusterServicesKubeproxy","description":"Kubeproxy options for RKE services (list maxitems:1)\n"},"scheduler":{"$ref":"#/types/rke:index/ClusterServicesScheduler:ClusterServicesScheduler","description":"Scheduler options for RKE services (list maxitems:1)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["etcd","kubeApi","kubeController","kubelet","kubeproxy","scheduler"]}}},"rke:index/ClusterServicesEtcd:ClusterServicesEtcd":{"properties":{"backupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdBackupConfig:ClusterServicesEtcdBackupConfig","description":"Backup options for etcd service. Just for Rancher v2.2.x (list maxitems:1)\n"},"caCert":{"type":"string","description":"TLS CA certificate for etcd service (string)\n","secret":true},"cert":{"type":"string","description":"TLS certificate for etcd service (string)\n","secret":true},"creation":{"type":"string","description":"Creation option for etcd service (string)\n"},"externalUrls":{"type":"array","items":{"type":"string"},"description":"External urls for etcd service (list)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"gid":{"type":"integer","description":"Etcd service GID. Default: `0`. For Rancher v2.3.x or above (int)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n","secret":true},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"retention":{"type":"string","description":"Retention for etcd backup. Default `6` (int)\n"},"snapshot":{"type":"boolean","description":"Snapshot option for etcd service. Default `true` (bool)\n"},"uid":{"type":"integer","description":"Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["backupConfig","caCert","cert","creation","externalUrls","extraArgs","extraBinds","extraEnvs","image","key","path","retention"]}}},"rke:index/ClusterServicesEtcdBackupConfig:ClusterServicesEtcdBackupConfig":{"properties":{"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"},"intervalHours":{"type":"integer","description":"Interval hours for etcd backup. Default `12` (int)\n"},"retention":{"type":"integer","description":"Retention for etcd backup. Default `6` (int)\n"},"s3BackupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdBackupConfigS3BackupConfig:ClusterServicesEtcdBackupConfigS3BackupConfig","description":"S3 config options for etcd backup (list maxitems:1)\n"},"safeTimestamp":{"type":"boolean","description":"Safe timestamp for etcd backup. Default: `false` (bool)\n"},"timeout":{"type":"integer","description":"RKE node drain timeout (int)\n"}},"type":"object"},"rke:index/ClusterServicesEtcdBackupConfigS3BackupConfig:ClusterServicesEtcdBackupConfigS3BackupConfig":{"properties":{"accessKey":{"type":"string","description":"Access key for S3 service (string)\n","secret":true},"bucketName":{"type":"string","description":"Bucket name for S3 service (string)\n"},"customCa":{"type":"string","description":"Base64 encoded custom CA for S3 service. Use filebase64(\u003cFILE\u003e) for encoding file. Available from Rancher v2.2.5 (string)\n"},"endpoint":{"type":"string","description":"Endpoint for S3 service (string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"secretKey":{"type":"string","description":"Secret key for S3 service (string)\n","secret":true}},"type":"object"},"rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated":{"properties":{"backupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecatedBackupConfig:ClusterServicesEtcdDeprecatedBackupConfig","description":"Backup options for etcd service. Just for Rancher v2.2.x (list maxitems:1)\n"},"caCert":{"type":"string","description":"TLS CA certificate for etcd service (string)\n","secret":true},"cert":{"type":"string","description":"TLS certificate for etcd service (string)\n","secret":true},"creation":{"type":"string","description":"Creation option for etcd service (string)\n"},"externalUrls":{"type":"array","items":{"type":"string"},"description":"External urls for etcd service (list)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"gid":{"type":"integer","description":"Etcd service GID. Default: `0`. For Rancher v2.3.x or above (int)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"key":{"type":"string","description":"TLS key for etcd service (string)\n","secret":true},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"retention":{"type":"string","description":"Retention for etcd backup. Default `6` (int)\n"},"snapshot":{"type":"boolean","description":"Snapshot option for etcd service. Default `true` (bool)\n"},"uid":{"type":"integer","description":"Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["backupConfig","caCert","cert","creation","externalUrls","extraArgs","extraBinds","extraEnvs","image","key","path","retention"]}}},"rke:index/ClusterServicesEtcdDeprecatedBackupConfig:ClusterServicesEtcdDeprecatedBackupConfig":{"properties":{"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"},"intervalHours":{"type":"integer","description":"Interval hours for etcd backup. Default `12` (int)\n"},"retention":{"type":"integer","description":"Retention for etcd backup. Default `6` (int)\n"},"s3BackupConfig":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig:ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig","description":"S3 config options for etcd backup (list maxitems:1)\n"},"safeTimestamp":{"type":"boolean","description":"Safe timestamp for etcd backup. Default: `false` (bool)\n"},"timeout":{"type":"integer","description":"RKE node drain timeout (int)\n"}},"type":"object"},"rke:index/ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig:ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig":{"properties":{"accessKey":{"type":"string","description":"Access key for S3 service (string)\n","secret":true},"bucketName":{"type":"string","description":"Bucket name for S3 service (string)\n"},"customCa":{"type":"string","description":"Base64 encoded custom CA for S3 service. Use filebase64(\u003cFILE\u003e) for encoding file. Available from Rancher v2.2.5 (string)\n"},"endpoint":{"type":"string","description":"Endpoint for S3 service (string)\n"},"folder":{"type":"string","description":"Folder for S3 service. Available from Rancher v2.2.7 (string)\n"},"region":{"type":"string","description":"Region for S3 service (string)\n"},"secretKey":{"type":"string","description":"Secret key for S3 service (string)\n","secret":true}},"type":"object"},"rke:index/ClusterServicesKubeApi:ClusterServicesKubeApi":{"properties":{"alwaysPullImages":{"type":"boolean","description":"Enable [AlwaysPullImages](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#alwayspullimages) Admission controller plugin. [Rancher docs](https://rancher.com/docs/rke/latest/en/config-options/services/#kubernetes-api-server-options) (bool)\n"},"auditLog":{"$ref":"#/types/rke:index/ClusterServicesKubeApiAuditLog:ClusterServicesKubeApiAuditLog","description":"K8s audit log configuration. (list maxitem: 1)\n"},"eventRateLimit":{"$ref":"#/types/rke:index/ClusterServicesKubeApiEventRateLimit:ClusterServicesKubeApiEventRateLimit","description":"K8s event rate limit configuration. (list maxitem: 1)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"podSecurityPolicy":{"type":"boolean","description":"Pod Security Policy option for kube API service (bool)\n"},"secretsEncryptionConfig":{"$ref":"#/types/rke:index/ClusterServicesKubeApiSecretsEncryptionConfig:ClusterServicesKubeApiSecretsEncryptionConfig","description":"[Encrypt k8s secret data configration](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/). (list maxitem: 1)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"},"serviceNodePortRange":{"type":"string","description":"Service Node Port Range option for kube API service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["alwaysPullImages","auditLog","extraArgs","extraBinds","extraEnvs","image","podSecurityPolicy","serviceClusterIpRange","serviceNodePortRange"]}}},"rke:index/ClusterServicesKubeApiAuditLog:ClusterServicesKubeApiAuditLog":{"properties":{"configuration":{"$ref":"#/types/rke:index/ClusterServicesKubeApiAuditLogConfiguration:ClusterServicesKubeApiAuditLogConfiguration","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiAuditLogConfiguration:ClusterServicesKubeApiAuditLogConfiguration":{"properties":{"format":{"type":"string","description":"Audit log format (string)\n"},"maxAge":{"type":"integer","description":"Audit log max age (int)\n"},"maxBackup":{"type":"integer","description":"Audit log max backup. Default: `10` (int)\n"},"maxSize":{"type":"integer","description":"Audit log max size. Default: `100` (int)\n"},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"policy":{"type":"string","description":"Audit policy json encoded definition. `\"apiVersion\"` and `\"kind\":\"Policy\",\"rules\"` fields are required in the json. Ex. `jsonencode({\"apiVersion\":\"audit.k8s.io/v1\",\"kind\":\"Policy\",\"rules\":[{\"level\":\"RequestResponse\",\"resources\":[{\"group\":\"\",\"resources\":[\"pods\"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["format","maxAge","maxBackup","maxSize","path","policy"]}}},"rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated":{"properties":{"alwaysPullImages":{"type":"boolean","description":"Enable [AlwaysPullImages](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#alwayspullimages) Admission controller plugin. [Rancher docs](https://rancher.com/docs/rke/latest/en/config-options/services/#kubernetes-api-server-options) (bool)\n"},"auditLog":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedAuditLog:ClusterServicesKubeApiDeprecatedAuditLog","description":"K8s audit log configuration. (list maxitem: 1)\n"},"eventRateLimit":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedEventRateLimit:ClusterServicesKubeApiDeprecatedEventRateLimit","description":"K8s event rate limit configuration. (list maxitem: 1)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"podSecurityPolicy":{"type":"boolean","description":"Pod Security Policy option for kube API service (bool)\n"},"secretsEncryptionConfig":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig:ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig","description":"[Encrypt k8s secret data configration](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/). (list maxitem: 1)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"},"serviceNodePortRange":{"type":"string","description":"Service Node Port Range option for kube API service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["alwaysPullImages","auditLog","extraArgs","extraBinds","extraEnvs","image","podSecurityPolicy","serviceClusterIpRange","serviceNodePortRange"]}}},"rke:index/ClusterServicesKubeApiDeprecatedAuditLog:ClusterServicesKubeApiDeprecatedAuditLog":{"properties":{"configuration":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecatedAuditLogConfiguration:ClusterServicesKubeApiDeprecatedAuditLogConfiguration","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiDeprecatedAuditLogConfiguration:ClusterServicesKubeApiDeprecatedAuditLogConfiguration":{"properties":{"format":{"type":"string","description":"Audit log format (string)\n"},"maxAge":{"type":"integer","description":"Audit log max age (int)\n"},"maxBackup":{"type":"integer","description":"Audit log max backup. Default: `10` (int)\n"},"maxSize":{"type":"integer","description":"Audit log max size. Default: `100` (int)\n"},"path":{"type":"string","description":"Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string)\n"},"policy":{"type":"string","description":"Audit policy json encoded definition. `\"apiVersion\"` and `\"kind\":\"Policy\",\"rules\"` fields are required in the json. Ex. `jsonencode({\"apiVersion\":\"audit.k8s.io/v1\",\"kind\":\"Policy\",\"rules\":[{\"level\":\"RequestResponse\",\"resources\":[{\"group\":\"\",\"resources\":[\"pods\"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["format","maxAge","maxBackup","maxSize","path","policy"]}}},"rke:index/ClusterServicesKubeApiDeprecatedEventRateLimit:ClusterServicesKubeApiDeprecatedEventRateLimit":{"properties":{"configuration":{"type":"string","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig:ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig":{"properties":{"customConfig":{"type":"string","description":"Secrets encryption yaml encoded custom configuration. `\"apiVersion\"` and `\"kind\":\"EncryptionConfiguration\"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["customConfig","enabled"]}}},"rke:index/ClusterServicesKubeApiEventRateLimit:ClusterServicesKubeApiEventRateLimit":{"properties":{"configuration":{"type":"string","description":"Event rate limit yaml encoded configuration. `\"apiVersion\"` and `\"kind\":\"Configuration\"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["configuration","enabled"]}}},"rke:index/ClusterServicesKubeApiSecretsEncryptionConfig:ClusterServicesKubeApiSecretsEncryptionConfig":{"properties":{"customConfig":{"type":"string","description":"Secrets encryption yaml encoded custom configuration. `\"apiVersion\"` and `\"kind\":\"EncryptionConfiguration\"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string)\n"},"enabled":{"type":"boolean","description":"Enable secrets encryption (bool)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["customConfig","enabled"]}}},"rke:index/ClusterServicesKubeController:ClusterServicesKubeController":{"properties":{"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterCidr","extraArgs","extraBinds","extraEnvs","image","serviceClusterIpRange"]}}},"rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated":{"properties":{"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"serviceClusterIpRange":{"type":"string","description":"Service Cluster ip Range option for kube controller service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterCidr","extraArgs","extraBinds","extraEnvs","image","serviceClusterIpRange"]}}},"rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterServicesKubelet:ClusterServicesKubelet":{"properties":{"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"failSwapOn":{"type":"boolean","description":"Enable or disable failing when swap on is not supported (bool)\n"},"generateServingCertificate":{"type":"boolean","description":"[Generate a certificate signed by the kube-ca](https://rancher.com/docs/rke/latest/en/config-options/services/#kubelet-serving-certificate-requirements). Default `false` (bool)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"infraContainerImage":{"type":"string","description":"Infra container image for kubelet service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterDnsServer","extraArgs","extraBinds","extraEnvs","failSwapOn","image","infraContainerImage"]}}},"rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated":{"properties":{"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"failSwapOn":{"type":"boolean","description":"Enable or disable failing when swap on is not supported (bool)\n"},"generateServingCertificate":{"type":"boolean","description":"[Generate a certificate signed by the kube-ca](https://rancher.com/docs/rke/latest/en/config-options/services/#kubelet-serving-certificate-requirements). Default `false` (bool)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"},"infraContainerImage":{"type":"string","description":"Infra container image for kubelet service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["clusterDnsServer","extraArgs","extraBinds","extraEnvs","failSwapOn","image","infraContainerImage"]}}},"rke:index/ClusterServicesKubeproxy:ClusterServicesKubeproxy":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterServicesScheduler:ClusterServicesScheduler":{"properties":{"extraArgs":{"type":"object","additionalProperties":{"$ref":"pulumi.json#/Any"},"description":"Extra arguments for scheduler service (map)\n"},"extraBinds":{"type":"array","items":{"type":"string"},"description":"Extra binds for scheduler service (list)\n"},"extraEnvs":{"type":"array","items":{"type":"string"},"description":"Extra environment for scheduler service (list)\n"},"image":{"type":"string","description":"Docker image for scheduler service (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["extraArgs","extraBinds","extraEnvs","image"]}}},"rke:index/ClusterSystemImages:ClusterSystemImages":{"properties":{"aciCniDeployContainer":{"type":"string","description":"Docker image for aci_cni_deploy_container (string)\n"},"aciControllerContainer":{"type":"string","description":"Docker image for aci_controller_container (string)\n"},"aciHostContainer":{"type":"string","description":"Docker image for aci_host_container (string)\n"},"aciMcastContainer":{"type":"string","description":"Docker image for aci_mcast_container (string)\n"},"aciOpflexContainer":{"type":"string","description":"Docker image for aci_opflex_container (string)\n"},"aciOvsContainer":{"type":"string","description":"Docker image for aci_ovs_container (string)\n"},"alpine":{"type":"string","description":"Docker image for alpine (string)\n"},"calicoCni":{"type":"string","description":"Docker image for calico_cni (string)\n"},"calicoControllers":{"type":"string","description":"Docker image for calico_controllers (string)\n"},"calicoCtl":{"type":"string","description":"Docker image for calico_ctl (string)\n"},"calicoFlexVol":{"type":"string","description":"Docker image for calico_flex_vol (string)\n"},"calicoNode":{"type":"string","description":"Docker image for calico_node (string)\n"},"canalCni":{"type":"string","description":"Docker image for canal_cni (string)\n"},"canalFlannel":{"type":"string","description":"Docker image for canal_flannel (string)\n"},"canalFlexVol":{"type":"string","description":"Docker image for canal_flex_vol (string)\n"},"canalNode":{"type":"string","description":"Docker image for canal_node (string)\n"},"certDownloader":{"type":"string","description":"Docker image for cert_downloader (string)\n"},"coredns":{"type":"string","description":"Docker image for coredns (string)\n"},"corednsAutoscaler":{"type":"string","description":"Docker image for coredns_autoscaler (string)\n"},"dnsmasq":{"type":"string","description":"Docker image for dnsmasq (string)\n"},"etcd":{"type":"string","description":"Docker image for etcd (string)\n"},"flannel":{"type":"string","description":"Docker image for flannel (string)\n"},"flannelCni":{"type":"string","description":"Docker image for flannel_cni (string)\n"},"ingress":{"type":"string","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"ingressBackend":{"type":"string","description":"Docker image for ingress_backend (string)\n"},"kubeDns":{"type":"string","description":"Docker image for kube_dns (string)\n"},"kubeDnsAutoscaler":{"type":"string","description":"Docker image for kube_dns_autoscaler (string)\n"},"kubeDnsSidecar":{"type":"string","description":"Docker image for kube_dns_sidecar (string)\n"},"kubernetes":{"type":"string","description":"Docker image for kubernetes (string)\n"},"kubernetesServicesSidecar":{"type":"string","description":"Docker image for kubernetes_services_sidecar (string)\n"},"metricsServer":{"type":"string","description":"Docker image for metrics_server (string)\n"},"nginxProxy":{"type":"string","description":"Docker image for nginx_proxy (string)\n"},"nodelocal":{"type":"string","description":"Docker image for nodelocal (string)\n"},"podInfraContainer":{"type":"string","description":"Docker image for pod_infra_container (string)\n"},"weaveCni":{"type":"string","description":"Docker image for weave_cni (string)\n"},"weaveNode":{"type":"string","description":"Docker image for weave_node (string)\n"},"windowsPodInfraContainer":{"type":"string","description":"Docker image for windows_pod_infra_container (string)\n"}},"type":"object"},"rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy":{"properties":{"drain":{"type":"boolean","description":"RKE drain nodes (bool)\n"},"drainInput":{"$ref":"#/types/rke:index/ClusterUpgradeStrategyDrainInput:ClusterUpgradeStrategyDrainInput","description":"RKE drain node input (list Maxitems: 1)\n"},"maxUnavailableControlplane":{"type":"string","description":"RKE max unavailable controlplane nodes (string)\n"},"maxUnavailableWorker":{"type":"string","description":"RKE max unavailable worker nodes (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["drain","drainInput","maxUnavailableControlplane","maxUnavailableWorker"]}}},"rke:index/ClusterUpgradeStrategyDrainInput:ClusterUpgradeStrategyDrainInput":{"properties":{"deleteLocalData":{"type":"boolean","description":"Delete RKE node local data (bool)\n"},"force":{"type":"boolean","description":"Force RKE node drain (bool)\n"},"gracePeriod":{"type":"integer","description":"RKE node drain grace period (int)\n"},"ignoreDaemonSets":{"type":"boolean","description":"Ignore RKE daemon sets (bool)\n"},"timeout":{"type":"integer","description":"RKE node drain timeout (int)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["deleteLocalData","force","gracePeriod","ignoreDaemonSets","timeout"]}}},"rke:index/ClusterWorkerHost:ClusterWorkerHost":{"properties":{"address":{"type":"string","description":"Address ip for node (string)\n"},"nodeName":{"type":"string","description":"Name of the host provisioned via docker machine (string)\n"}},"type":"object","language":{"nodejs":{"requiredOutputs":["address","nodeName"]}}}},"provider":{"description":"The provider type for the rke package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n","properties":{"debug":{"type":"boolean"},"logFile":{"type":"string"}},"inputProperties":{"debug":{"type":"boolean","default":false,"defaultInfo":{"environment":["RKE_DEBUG"]}},"logFile":{"type":"string","defaultInfo":{"environment":["RKE_LOG_FILE"]}}}},"resources":{"rke:index/cluster:Cluster":{"description":"\n\n\n## Import\n\nrke_cluster can be imported using the RKE cluster config and state files as ID in the format `\u003ccluster_config_file\u003e:\u003crke_state_file\u003e`\n\n```sh\n $ pulumi import rke:index/cluster:Cluster foo \u0026lt;cluster_config_file\u0026gt;:\u0026lt;rke_state_file\u0026gt;\n```\n As experimental feature, dind rke_cluster can be also imported adding `dind` as 3rd import parameter `\u003ccluster_config_file\u003e:\u003crke_state_file\u003e:dind`\n\n```sh\n $ pulumi import rke:index/cluster:Cluster foo \u0026lt;cluster_config_file\u0026gt;:\u0026lt;rke_state_file\u0026gt;:dind\n```\n ","properties":{"addonJobTimeout":{"type":"integer","description":"RKE k8s cluster addon deployment timeout in seconds for status check (int)\n"},"addons":{"type":"string","description":"RKE k8s cluster user addons YAML manifest to be deployed (string)\n"},"addonsIncludes":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster user addons YAML manifest urls or paths to be deployed (list)\n"},"apiServerUrl":{"type":"string","description":"(Computed) RKE k8s cluster api server url (string)\n"},"authentication":{"$ref":"#/types/rke:index/ClusterAuthentication:ClusterAuthentication","description":"RKE k8s cluster authentication configuration (list maxitems:1)\n"},"authorization":{"$ref":"#/types/rke:index/ClusterAuthorization:ClusterAuthorization","description":"RKE k8s cluster authorization mode configuration (list maxitems:1)\n"},"bastionHost":{"$ref":"#/types/rke:index/ClusterBastionHost:ClusterBastionHost","description":"RKE k8s cluster bastion Host configuration (list maxitems:1)\n"},"caCrt":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster CA certificate (string)\n","secret":true},"certDir":{"type":"string","description":"Specify a certificate dir path (string)\n"},"certificates":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCertificate:ClusterCertificate"},"description":"(Computed/Sensitive) RKE k8s cluster certificates (string)\n","secret":true},"clientCert":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client certificate (string)\n","secret":true},"clientKey":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client key (string)\n","secret":true},"cloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProvider:ClusterCloudProvider","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"},"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"clusterName":{"type":"string","description":"RKE k8s cluster name used in the kube config (string)\n"},"clusterYaml":{"type":"string","description":"RKE k8s cluster config yaml encoded. Provider arguments take precedence over this one (string)\n","secret":true},"controlPlaneHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterControlPlaneHost:ClusterControlPlaneHost"},"description":"(Computed) RKE k8s cluster control plane nodes (list)\n"},"customCerts":{"type":"boolean","description":"Use custom certificates from a cert dir (string)\n"},"delayOnCreation":{"type":"integer","description":"RKE k8s cluster delay on creation (int)\n"},"dind":{"type":"boolean","description":"Deploy RKE cluster on a dind environment. Default: `false` (bool)\n"},"dindDnsServer":{"type":"string","description":"DinD RKE cluster dns (string)\n"},"dindStorageDriver":{"type":"string","description":"DinD RKE cluster storage driver (string)\n"},"disablePortCheck":{"type":"boolean","description":"Enable/Disable RKE k8s cluster port checking. Default `false` (bool)\n"},"dns":{"$ref":"#/types/rke:index/ClusterDns:ClusterDns","description":"RKE k8s cluster DNS Config (list maxitems:1)\n"},"enableCriDockerd":{"type":"boolean","description":"Enable/Disable CRI dockerd for kubelet. Default `false` (bool)\n"},"etcdHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterEtcdHost:ClusterEtcdHost"},"description":"(Computed) RKE k8s cluster etcd nodes (list)\n"},"ignoreDockerVersion":{"type":"boolean","description":"Enable/Disable RKE k8s cluster strict docker version checking. Default `false` (bool)\n"},"inactiveHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterInactiveHost:ClusterInactiveHost"},"description":"(Computed) RKE k8s cluster inactive nodes (list)\n"},"ingress":{"$ref":"#/types/rke:index/ClusterIngress:ClusterIngress","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"internalKubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster internal kube config yaml (string)\n","deprecationMessage":"Use kube_config_yaml instead","secret":true},"kubeAdminUser":{"type":"string","description":"(Computed) RKE k8s cluster admin user (string)\n"},"kubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster kube config yaml (string)\n","secret":true},"kubernetesVersion":{"type":"string","description":"K8s version to deploy. If kubernetes image is specified, image version takes precedence. Default: `rke default` (string)\n"},"monitoring":{"$ref":"#/types/rke:index/ClusterMonitoring:ClusterMonitoring","description":"RKE k8s cluster monitoring Config (list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterNetwork:ClusterNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"nodes":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNode:ClusterNode"},"description":"RKE k8s cluster nodes (list)\n"},"nodesConfs":{"type":"array","items":{"type":"string"},"deprecationMessage":"Use cluster_yaml instead"},"prefixPath":{"type":"string","description":"RKE k8s directory path (string)\n"},"privateRegistries":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry"},"description":"RKE k8s cluster private docker registries (list)\n"},"restore":{"$ref":"#/types/rke:index/ClusterRestore:ClusterRestore","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"rkeClusterYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster config yaml (string)\n","secret":true},"rkeState":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster state (string)\n","secret":true},"rotateCertificates":{"$ref":"#/types/rke:index/ClusterRotateCertificates:ClusterRotateCertificates","description":"RKE k8s cluster rotate certificates configuration (list maxitems:1)\n"},"runningSystemImages":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterRunningSystemImage:ClusterRunningSystemImage"},"description":"(Computed) RKE k8s cluster running system images list (list)\n"},"services":{"$ref":"#/types/rke:index/ClusterServices:ClusterServices","description":"RKE k8s cluster services (list maxitems:1)\n"},"servicesEtcdDeprecated":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated","description":"Use services.etcd instead (list maxitems:1)\n","deprecationMessage":"Use services.etcd instead"},"servicesKubeApiDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated","description":"Use services.kube_api instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_api instead"},"servicesKubeControllerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated","description":"Use services.kube_controller instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_controller instead"},"servicesKubeProxyDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated","description":"Use services.kubeproxy instead (list maxitems:1)\n","deprecationMessage":"Use services.kubeproxy instead"},"servicesKubeSchedulerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated","description":"Use services.scheduler instead (list maxitems:1)\n","deprecationMessage":"Use services.scheduler instead"},"servicesKubeletDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated","description":"Use services.kubelet instead (list maxitems:1)\n","deprecationMessage":"Use services.kubelet instead"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"systemImages":{"$ref":"#/types/rke:index/ClusterSystemImages:ClusterSystemImages","description":"RKE k8s cluster system images list (list maxitems:1)\n"},"updateOnly":{"type":"boolean","description":"Skip idempotent deployment of control and etcd plane. Default `false` (bool)\n"},"upgradeStrategy":{"$ref":"#/types/rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy","description":"RKE k8s cluster upgrade strategy (list maxitems:1)\n"},"workerHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterWorkerHost:ClusterWorkerHost"},"description":"(Computed) RKE k8s cluster worker nodes (list)\n"}},"required":["apiServerUrl","caCrt","certificates","clientCert","clientKey","clusterCidr","clusterDnsServer","clusterDomain","controlPlaneHosts","etcdHosts","inactiveHosts","internalKubeConfigYaml","kubeAdminUser","kubeConfigYaml","rkeClusterYaml","rkeState","runningSystemImages","sshAgentAuth","workerHosts"],"inputProperties":{"addonJobTimeout":{"type":"integer","description":"RKE k8s cluster addon deployment timeout in seconds for status check (int)\n"},"addons":{"type":"string","description":"RKE k8s cluster user addons YAML manifest to be deployed (string)\n"},"addonsIncludes":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster user addons YAML manifest urls or paths to be deployed (list)\n"},"authentication":{"$ref":"#/types/rke:index/ClusterAuthentication:ClusterAuthentication","description":"RKE k8s cluster authentication configuration (list maxitems:1)\n"},"authorization":{"$ref":"#/types/rke:index/ClusterAuthorization:ClusterAuthorization","description":"RKE k8s cluster authorization mode configuration (list maxitems:1)\n"},"bastionHost":{"$ref":"#/types/rke:index/ClusterBastionHost:ClusterBastionHost","description":"RKE k8s cluster bastion Host configuration (list maxitems:1)\n"},"certDir":{"type":"string","description":"Specify a certificate dir path (string)\n"},"cloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProvider:ClusterCloudProvider","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"},"clusterName":{"type":"string","description":"RKE k8s cluster name used in the kube config (string)\n"},"clusterYaml":{"type":"string","description":"RKE k8s cluster config yaml encoded. Provider arguments take precedence over this one (string)\n","secret":true},"customCerts":{"type":"boolean","description":"Use custom certificates from a cert dir (string)\n"},"delayOnCreation":{"type":"integer","description":"RKE k8s cluster delay on creation (int)\n"},"dind":{"type":"boolean","description":"Deploy RKE cluster on a dind environment. Default: `false` (bool)\n"},"dindDnsServer":{"type":"string","description":"DinD RKE cluster dns (string)\n"},"dindStorageDriver":{"type":"string","description":"DinD RKE cluster storage driver (string)\n"},"disablePortCheck":{"type":"boolean","description":"Enable/Disable RKE k8s cluster port checking. Default `false` (bool)\n"},"dns":{"$ref":"#/types/rke:index/ClusterDns:ClusterDns","description":"RKE k8s cluster DNS Config (list maxitems:1)\n"},"enableCriDockerd":{"type":"boolean","description":"Enable/Disable CRI dockerd for kubelet. Default `false` (bool)\n"},"ignoreDockerVersion":{"type":"boolean","description":"Enable/Disable RKE k8s cluster strict docker version checking. Default `false` (bool)\n"},"ingress":{"$ref":"#/types/rke:index/ClusterIngress:ClusterIngress","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"kubernetesVersion":{"type":"string","description":"K8s version to deploy. If kubernetes image is specified, image version takes precedence. Default: `rke default` (string)\n"},"monitoring":{"$ref":"#/types/rke:index/ClusterMonitoring:ClusterMonitoring","description":"RKE k8s cluster monitoring Config (list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterNetwork:ClusterNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"nodes":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNode:ClusterNode"},"description":"RKE k8s cluster nodes (list)\n"},"nodesConfs":{"type":"array","items":{"type":"string"},"deprecationMessage":"Use cluster_yaml instead"},"prefixPath":{"type":"string","description":"RKE k8s directory path (string)\n"},"privateRegistries":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry"},"description":"RKE k8s cluster private docker registries (list)\n"},"restore":{"$ref":"#/types/rke:index/ClusterRestore:ClusterRestore","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"rotateCertificates":{"$ref":"#/types/rke:index/ClusterRotateCertificates:ClusterRotateCertificates","description":"RKE k8s cluster rotate certificates configuration (list maxitems:1)\n"},"services":{"$ref":"#/types/rke:index/ClusterServices:ClusterServices","description":"RKE k8s cluster services (list maxitems:1)\n"},"servicesEtcdDeprecated":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated","description":"Use services.etcd instead (list maxitems:1)\n","deprecationMessage":"Use services.etcd instead"},"servicesKubeApiDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated","description":"Use services.kube_api instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_api instead"},"servicesKubeControllerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated","description":"Use services.kube_controller instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_controller instead"},"servicesKubeProxyDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated","description":"Use services.kubeproxy instead (list maxitems:1)\n","deprecationMessage":"Use services.kubeproxy instead"},"servicesKubeSchedulerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated","description":"Use services.scheduler instead (list maxitems:1)\n","deprecationMessage":"Use services.scheduler instead"},"servicesKubeletDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated","description":"Use services.kubelet instead (list maxitems:1)\n","deprecationMessage":"Use services.kubelet instead"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"systemImages":{"$ref":"#/types/rke:index/ClusterSystemImages:ClusterSystemImages","description":"RKE k8s cluster system images list (list maxitems:1)\n"},"updateOnly":{"type":"boolean","description":"Skip idempotent deployment of control and etcd plane. Default `false` (bool)\n"},"upgradeStrategy":{"$ref":"#/types/rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy","description":"RKE k8s cluster upgrade strategy (list maxitems:1)\n"}},"stateInputs":{"description":"Input properties used for looking up and filtering Cluster resources.\n","properties":{"addonJobTimeout":{"type":"integer","description":"RKE k8s cluster addon deployment timeout in seconds for status check (int)\n"},"addons":{"type":"string","description":"RKE k8s cluster user addons YAML manifest to be deployed (string)\n"},"addonsIncludes":{"type":"array","items":{"type":"string"},"description":"RKE k8s cluster user addons YAML manifest urls or paths to be deployed (list)\n"},"apiServerUrl":{"type":"string","description":"(Computed) RKE k8s cluster api server url (string)\n"},"authentication":{"$ref":"#/types/rke:index/ClusterAuthentication:ClusterAuthentication","description":"RKE k8s cluster authentication configuration (list maxitems:1)\n"},"authorization":{"$ref":"#/types/rke:index/ClusterAuthorization:ClusterAuthorization","description":"RKE k8s cluster authorization mode configuration (list maxitems:1)\n"},"bastionHost":{"$ref":"#/types/rke:index/ClusterBastionHost:ClusterBastionHost","description":"RKE k8s cluster bastion Host configuration (list maxitems:1)\n"},"caCrt":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster CA certificate (string)\n","secret":true},"certDir":{"type":"string","description":"Specify a certificate dir path (string)\n"},"certificates":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterCertificate:ClusterCertificate"},"description":"(Computed/Sensitive) RKE k8s cluster certificates (string)\n","secret":true},"clientCert":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client certificate (string)\n","secret":true},"clientKey":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster client key (string)\n","secret":true},"cloudProvider":{"$ref":"#/types/rke:index/ClusterCloudProvider:ClusterCloudProvider","description":"RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1)\n"},"clusterCidr":{"type":"string","description":"Cluster CIDR option for kube controller service (string)\n"},"clusterDnsServer":{"type":"string","description":"Cluster DNS Server option for kubelet service (string)\n"},"clusterDomain":{"type":"string","description":"Cluster Domain option for kubelet service. Default `cluster.local` (string)\n"},"clusterName":{"type":"string","description":"RKE k8s cluster name used in the kube config (string)\n"},"clusterYaml":{"type":"string","description":"RKE k8s cluster config yaml encoded. Provider arguments take precedence over this one (string)\n","secret":true},"controlPlaneHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterControlPlaneHost:ClusterControlPlaneHost"},"description":"(Computed) RKE k8s cluster control plane nodes (list)\n"},"customCerts":{"type":"boolean","description":"Use custom certificates from a cert dir (string)\n"},"delayOnCreation":{"type":"integer","description":"RKE k8s cluster delay on creation (int)\n"},"dind":{"type":"boolean","description":"Deploy RKE cluster on a dind environment. Default: `false` (bool)\n"},"dindDnsServer":{"type":"string","description":"DinD RKE cluster dns (string)\n"},"dindStorageDriver":{"type":"string","description":"DinD RKE cluster storage driver (string)\n"},"disablePortCheck":{"type":"boolean","description":"Enable/Disable RKE k8s cluster port checking. Default `false` (bool)\n"},"dns":{"$ref":"#/types/rke:index/ClusterDns:ClusterDns","description":"RKE k8s cluster DNS Config (list maxitems:1)\n"},"enableCriDockerd":{"type":"boolean","description":"Enable/Disable CRI dockerd for kubelet. Default `false` (bool)\n"},"etcdHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterEtcdHost:ClusterEtcdHost"},"description":"(Computed) RKE k8s cluster etcd nodes (list)\n"},"ignoreDockerVersion":{"type":"boolean","description":"Enable/Disable RKE k8s cluster strict docker version checking. Default `false` (bool)\n"},"inactiveHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterInactiveHost:ClusterInactiveHost"},"description":"(Computed) RKE k8s cluster inactive nodes (list)\n"},"ingress":{"$ref":"#/types/rke:index/ClusterIngress:ClusterIngress","description":"RKE k8s cluster ingress controller configuration (list maxitems:1)\n"},"internalKubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster internal kube config yaml (string)\n","deprecationMessage":"Use kube_config_yaml instead","secret":true},"kubeAdminUser":{"type":"string","description":"(Computed) RKE k8s cluster admin user (string)\n"},"kubeConfigYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster kube config yaml (string)\n","secret":true},"kubernetesVersion":{"type":"string","description":"K8s version to deploy. If kubernetes image is specified, image version takes precedence. Default: `rke default` (string)\n"},"monitoring":{"$ref":"#/types/rke:index/ClusterMonitoring:ClusterMonitoring","description":"RKE k8s cluster monitoring Config (list maxitems:1)\n"},"network":{"$ref":"#/types/rke:index/ClusterNetwork:ClusterNetwork","description":"RKE k8s cluster network configuration (list maxitems:1)\n"},"nodes":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterNode:ClusterNode"},"description":"RKE k8s cluster nodes (list)\n"},"nodesConfs":{"type":"array","items":{"type":"string"},"deprecationMessage":"Use cluster_yaml instead"},"prefixPath":{"type":"string","description":"RKE k8s directory path (string)\n"},"privateRegistries":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterPrivateRegistry:ClusterPrivateRegistry"},"description":"RKE k8s cluster private docker registries (list)\n"},"restore":{"$ref":"#/types/rke:index/ClusterRestore:ClusterRestore","description":"RKE k8s cluster restore configuration (list maxitems:1)\n"},"rkeClusterYaml":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster config yaml (string)\n","secret":true},"rkeState":{"type":"string","description":"(Computed/Sensitive) RKE k8s cluster state (string)\n","secret":true},"rotateCertificates":{"$ref":"#/types/rke:index/ClusterRotateCertificates:ClusterRotateCertificates","description":"RKE k8s cluster rotate certificates configuration (list maxitems:1)\n"},"runningSystemImages":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterRunningSystemImage:ClusterRunningSystemImage"},"description":"(Computed) RKE k8s cluster running system images list (list)\n"},"services":{"$ref":"#/types/rke:index/ClusterServices:ClusterServices","description":"RKE k8s cluster services (list maxitems:1)\n"},"servicesEtcdDeprecated":{"$ref":"#/types/rke:index/ClusterServicesEtcdDeprecated:ClusterServicesEtcdDeprecated","description":"Use services.etcd instead (list maxitems:1)\n","deprecationMessage":"Use services.etcd instead"},"servicesKubeApiDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeApiDeprecated:ClusterServicesKubeApiDeprecated","description":"Use services.kube_api instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_api instead"},"servicesKubeControllerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeControllerDeprecated:ClusterServicesKubeControllerDeprecated","description":"Use services.kube_controller instead (list maxitems:1)\n","deprecationMessage":"Use services.kube_controller instead"},"servicesKubeProxyDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeProxyDeprecated:ClusterServicesKubeProxyDeprecated","description":"Use services.kubeproxy instead (list maxitems:1)\n","deprecationMessage":"Use services.kubeproxy instead"},"servicesKubeSchedulerDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeSchedulerDeprecated:ClusterServicesKubeSchedulerDeprecated","description":"Use services.scheduler instead (list maxitems:1)\n","deprecationMessage":"Use services.scheduler instead"},"servicesKubeletDeprecated":{"$ref":"#/types/rke:index/ClusterServicesKubeletDeprecated:ClusterServicesKubeletDeprecated","description":"Use services.kubelet instead (list maxitems:1)\n","deprecationMessage":"Use services.kubelet instead"},"sshAgentAuth":{"type":"boolean","description":"SSH Agent Auth enable (bool)\n"},"sshCertPath":{"type":"string","description":"SSH Certificate Path (string)\n"},"sshKeyPath":{"type":"string","description":"SSH Private Key Path (string)\n"},"systemImages":{"$ref":"#/types/rke:index/ClusterSystemImages:ClusterSystemImages","description":"RKE k8s cluster system images list (list maxitems:1)\n"},"updateOnly":{"type":"boolean","description":"Skip idempotent deployment of control and etcd plane. Default `false` (bool)\n"},"upgradeStrategy":{"$ref":"#/types/rke:index/ClusterUpgradeStrategy:ClusterUpgradeStrategy","description":"RKE k8s cluster upgrade strategy (list maxitems:1)\n"},"workerHosts":{"type":"array","items":{"$ref":"#/types/rke:index/ClusterWorkerHost:ClusterWorkerHost"},"description":"(Computed) RKE k8s cluster worker nodes (list)\n"}},"type":"object"}}}} \ No newline at end of file diff --git a/provider/go.mod b/provider/go.mod index 9dfdde36..1827beda 100644 --- a/provider/go.mod +++ b/provider/go.mod @@ -3,8 +3,8 @@ module github.com/pulumi/pulumi-rke/provider/v3 go 1.21 require ( - github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.1 - github.com/pulumi/pulumi/sdk/v3 v3.90.1 + github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.2 + github.com/pulumi/pulumi/sdk/v3 v3.91.1 github.com/rancher/terraform-provider-rke v1.4.2 ) @@ -219,7 +219,7 @@ require ( github.com/pulumi/pulumi-java/pkg v0.9.8 // indirect github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.4 // indirect github.com/pulumi/pulumi-yaml v1.2.2 // indirect - github.com/pulumi/pulumi/pkg/v3 v3.90.1 // indirect + github.com/pulumi/pulumi/pkg/v3 v3.91.1 // indirect github.com/pulumi/schema-tools v0.1.2 // indirect github.com/pulumi/terraform-diff-reader v0.0.2 // indirect github.com/rancher/lasso v0.0.0-20221202205459-e7138f16489c // indirect diff --git a/provider/go.sum b/provider/go.sum index ffb62169..e9c7d278 100644 --- a/provider/go.sum +++ b/provider/go.sum @@ -2235,16 +2235,16 @@ github.com/pulumi/pulumi-java/pkg v0.9.8 h1:c8mYsalnRXA2Ibgvv6scefOn6mW1Vb0UT0mc github.com/pulumi/pulumi-java/pkg v0.9.8/go.mod h1:c6rSw/+q4O0IImgJ9axxoC6QesbPYWBaG5gimbHouUQ= github.com/pulumi/pulumi-terraform-bridge/testing v0.0.1 h1:SCg1gjfY9N4yn8U8peIUYATifjoDABkyR7H9lmefsfc= github.com/pulumi/pulumi-terraform-bridge/testing v0.0.1/go.mod h1:7OeUPH8rpt5ipyj9EFcnXpuzQ8SHL0dyqdfa8nOacdk= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.1 h1:hBgediyT2LdS5yfD5AMiCmBJ/TYP94Xxv6a4TcAfV0g= -github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.1/go.mod h1:6YVbDo019OeHkQWo9MnUbBy6cCgCQeoXZDjmR9SYmUA= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.2 h1:6JRJz3Wk7O9OhNFbxCrNvPVQAK+prBm6XBuSlIVqRnU= +github.com/pulumi/pulumi-terraform-bridge/v3 v3.63.2/go.mod h1:ye7JUFqTNbBh6ohcr1KpyXNv+kYFYvZAIqXqts4Ialc= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.4 h1:rIzMmtcVpPX8ynaz6/nW5AHNY63DiNfCohqmxWvMpM4= github.com/pulumi/pulumi-terraform-bridge/x/muxer v0.0.4/go.mod h1:Kt8RIZWa/N8rW3+0g6NrqCBmF3o+HuIhFaZpssEkG6w= github.com/pulumi/pulumi-yaml v1.2.2 h1:W6BeUBLhDrJ2GSU0em1AUVelG9PBI4ABY61DdhJOO3E= github.com/pulumi/pulumi-yaml v1.2.2/go.mod h1:EgakC7b/4+VBNnlgM1RZIea2gUstV8s/7bdFJZt0P64= -github.com/pulumi/pulumi/pkg/v3 v3.90.1 h1:RFC/eqTbDfIvfeVQL8WaPmyQr1KzZhAGIIDGr9jj9y8= -github.com/pulumi/pulumi/pkg/v3 v3.90.1/go.mod h1:J+WbfN30g3FfQifpLjQPI0UhPsC9ASEePLK8Nix06A8= -github.com/pulumi/pulumi/sdk/v3 v3.90.1 h1:iT4t57N92WGhEQtg+KVDEmYzgfEyri39eihQzcNmtrM= -github.com/pulumi/pulumi/sdk/v3 v3.90.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= +github.com/pulumi/pulumi/pkg/v3 v3.91.1 h1:xHnyEwJO9we2zCiM9gHTkJxjZ6a6yi5vYCwWHCYRj9Y= +github.com/pulumi/pulumi/pkg/v3 v3.91.1/go.mod h1:dzBQDJyCOEhtBVN5INA5/i9yG9DZlsStl/mAkrhs9II= +github.com/pulumi/pulumi/sdk/v3 v3.91.1 h1:6I9GMmHv23X+G6hoduU1XE6hBWSNtB+zcb1MX17YvlA= +github.com/pulumi/pulumi/sdk/v3 v3.91.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= github.com/pulumi/schema-tools v0.1.2 h1:Fd9xvUjgck4NA+7/jSk7InqCUT4Kj940+EcnbQKpfZo= github.com/pulumi/schema-tools v0.1.2/go.mod h1:62lgj52Tzq11eqWTIaKd+EVyYAu5dEcDJxMhTjvMO/k= github.com/pulumi/terraform-diff-reader v0.0.2 h1:kTE4nEXU3/SYXESvAIem+wyHMI3abqkI3OhJ0G04LLI= diff --git a/sdk/go.mod b/sdk/go.mod index 09ac7449..22b75e82 100644 --- a/sdk/go.mod +++ b/sdk/go.mod @@ -4,7 +4,7 @@ go 1.21 require ( github.com/blang/semver v3.5.1+incompatible - github.com/pulumi/pulumi/sdk/v3 v3.90.1 + github.com/pulumi/pulumi/sdk/v3 v3.91.1 ) require ( diff --git a/sdk/go.sum b/sdk/go.sum index 71605eeb..90c3c989 100644 --- a/sdk/go.sum +++ b/sdk/go.sum @@ -144,8 +144,8 @@ github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZb github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/pulumi/esc v0.5.6 h1:4WV3X7OEVcChIwbSG+JxhZDdmq/q7lFPaSjHRYlPwmI= github.com/pulumi/esc v0.5.6/go.mod h1:wpwNfVS5fV7Kd51j4dJ6FWYlKfxdqyppgp0gtkzqH04= -github.com/pulumi/pulumi/sdk/v3 v3.90.1 h1:iT4t57N92WGhEQtg+KVDEmYzgfEyri39eihQzcNmtrM= -github.com/pulumi/pulumi/sdk/v3 v3.90.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= +github.com/pulumi/pulumi/sdk/v3 v3.91.1 h1:6I9GMmHv23X+G6hoduU1XE6hBWSNtB+zcb1MX17YvlA= +github.com/pulumi/pulumi/sdk/v3 v3.91.1/go.mod h1:zYaQQibB2pYKy/uG4c4YkX7lQIBpZ0KsuMaq/3HsIBQ= github.com/rivo/uniseg v0.1.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= github.com/rivo/uniseg v0.4.4 h1:8TfxU8dW6PdqD27gjM8MVNuicgxIjxpm4K7x4jp8sis= diff --git a/sdk/python/pulumi_rke/_inputs.py b/sdk/python/pulumi_rke/_inputs.py index 51091ef0..b9f8e5de 100644 --- a/sdk/python/pulumi_rke/_inputs.py +++ b/sdk/python/pulumi_rke/_inputs.py @@ -6,7 +6,7 @@ import warnings import pulumi import pulumi.runtime -from typing import Any, Callable, Mapping, Optional, Sequence, Union, overload +from typing import Any, Mapping, Optional, Sequence, Union, overload from . import _utilities __all__ = [ @@ -109,27 +109,12 @@ def __init__(__self__, *, :param pulumi.Input[str] strategy: Authentication strategy that will be used in RKE k8s cluster. Default: `x509` (string) :param pulumi.Input['ClusterAuthenticationWebhookArgs'] webhook: Webhook configuration options (list maxitem: 1) """ - ClusterAuthenticationArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - sans=sans, - strategy=strategy, - webhook=webhook, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - strategy: Optional[pulumi.Input[str]] = None, - webhook: Optional[pulumi.Input['ClusterAuthenticationWebhookArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if sans is not None: - _setter("sans", sans) + pulumi.set(__self__, "sans", sans) if strategy is not None: - _setter("strategy", strategy) + pulumi.set(__self__, "strategy", strategy) if webhook is not None: - _setter("webhook", webhook) + pulumi.set(__self__, "webhook", webhook) @property @pulumi.getter @@ -177,27 +162,10 @@ def __init__(__self__, *, :param pulumi.Input[str] cache_timeout: Controls how long to cache authentication decisions (string) :param pulumi.Input[str] config_file: Multiline string that represent a custom webhook config file (string) """ - ClusterAuthenticationWebhookArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - cache_timeout=cache_timeout, - config_file=config_file, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cache_timeout: Optional[pulumi.Input[str]] = None, - config_file: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cache_timeout is None and 'cacheTimeout' in kwargs: - cache_timeout = kwargs['cacheTimeout'] - if config_file is None and 'configFile' in kwargs: - config_file = kwargs['configFile'] - if cache_timeout is not None: - _setter("cache_timeout", cache_timeout) + pulumi.set(__self__, "cache_timeout", cache_timeout) if config_file is not None: - _setter("config_file", config_file) + pulumi.set(__self__, "config_file", config_file) @property @pulumi.getter(name="cacheTimeout") @@ -233,23 +201,10 @@ def __init__(__self__, *, :param pulumi.Input[str] mode: RKE mode for authorization. `rbac` and `none` modes are available. Default `rbac` (string) :param pulumi.Input[Mapping[str, Any]] options: Network provider options (map) """ - ClusterAuthorizationArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - mode=mode, - options=options, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - mode: Optional[pulumi.Input[str]] = None, - options: Optional[pulumi.Input[Mapping[str, Any]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if mode is not None: - _setter("mode", mode) + pulumi.set(__self__, "mode", mode) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) @property @pulumi.getter @@ -299,65 +254,22 @@ def __init__(__self__, *, :param pulumi.Input[str] ssh_key: SSH Private Key (string) :param pulumi.Input[str] ssh_key_path: SSH Private Key Path (string) """ - ClusterBastionHostArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - user=user, - ignore_proxy_env_vars=ignore_proxy_env_vars, - port=port, - ssh_agent_auth=ssh_agent_auth, - ssh_cert=ssh_cert, - ssh_cert_path=ssh_cert_path, - ssh_key=ssh_key, - ssh_key_path=ssh_key_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[pulumi.Input[str]] = None, - user: Optional[pulumi.Input[str]] = None, - ignore_proxy_env_vars: Optional[pulumi.Input[bool]] = None, - port: Optional[pulumi.Input[str]] = None, - ssh_agent_auth: Optional[pulumi.Input[bool]] = None, - ssh_cert: Optional[pulumi.Input[str]] = None, - ssh_cert_path: Optional[pulumi.Input[str]] = None, - ssh_key: Optional[pulumi.Input[str]] = None, - ssh_key_path: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if address is None: - raise TypeError("Missing 'address' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if ignore_proxy_env_vars is None and 'ignoreProxyEnvVars' in kwargs: - ignore_proxy_env_vars = kwargs['ignoreProxyEnvVars'] - if ssh_agent_auth is None and 'sshAgentAuth' in kwargs: - ssh_agent_auth = kwargs['sshAgentAuth'] - if ssh_cert is None and 'sshCert' in kwargs: - ssh_cert = kwargs['sshCert'] - if ssh_cert_path is None and 'sshCertPath' in kwargs: - ssh_cert_path = kwargs['sshCertPath'] - if ssh_key is None and 'sshKey' in kwargs: - ssh_key = kwargs['sshKey'] - if ssh_key_path is None and 'sshKeyPath' in kwargs: - ssh_key_path = kwargs['sshKeyPath'] - - _setter("address", address) - _setter("user", user) + pulumi.set(__self__, "address", address) + pulumi.set(__self__, "user", user) if ignore_proxy_env_vars is not None: - _setter("ignore_proxy_env_vars", ignore_proxy_env_vars) + pulumi.set(__self__, "ignore_proxy_env_vars", ignore_proxy_env_vars) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if ssh_agent_auth is not None: - _setter("ssh_agent_auth", ssh_agent_auth) + pulumi.set(__self__, "ssh_agent_auth", ssh_agent_auth) if ssh_cert is not None: - _setter("ssh_cert", ssh_cert) + pulumi.set(__self__, "ssh_cert", ssh_cert) if ssh_cert_path is not None: - _setter("ssh_cert_path", ssh_cert_path) + pulumi.set(__self__, "ssh_cert_path", ssh_cert_path) if ssh_key is not None: - _setter("ssh_key", ssh_key) + pulumi.set(__self__, "ssh_key", ssh_key) if ssh_key_path is not None: - _setter("ssh_key_path", ssh_key_path) + pulumi.set(__self__, "ssh_key_path", ssh_key_path) @property @pulumi.getter @@ -490,81 +402,32 @@ def __init__(__self__, *, :param pulumi.Input[str] name: Name of virtualcenter config for Vsphere Cloud Provider config (string) :param pulumi.Input[str] path: Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string) """ - ClusterCertificateArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - certificate=certificate, - common_name=common_name, - config=config, - config_env_name=config_env_name, - config_path=config_path, - env_name=env_name, - id=id, - key=key, - key_env_name=key_env_name, - key_path=key_path, - name=name, - ou_name=ou_name, - path=path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - certificate: Optional[pulumi.Input[str]] = None, - common_name: Optional[pulumi.Input[str]] = None, - config: Optional[pulumi.Input[str]] = None, - config_env_name: Optional[pulumi.Input[str]] = None, - config_path: Optional[pulumi.Input[str]] = None, - env_name: Optional[pulumi.Input[str]] = None, - id: Optional[pulumi.Input[str]] = None, - key: Optional[pulumi.Input[str]] = None, - key_env_name: Optional[pulumi.Input[str]] = None, - key_path: Optional[pulumi.Input[str]] = None, - name: Optional[pulumi.Input[str]] = None, - ou_name: Optional[pulumi.Input[str]] = None, - path: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if common_name is None and 'commonName' in kwargs: - common_name = kwargs['commonName'] - if config_env_name is None and 'configEnvName' in kwargs: - config_env_name = kwargs['configEnvName'] - if config_path is None and 'configPath' in kwargs: - config_path = kwargs['configPath'] - if env_name is None and 'envName' in kwargs: - env_name = kwargs['envName'] - if key_env_name is None and 'keyEnvName' in kwargs: - key_env_name = kwargs['keyEnvName'] - if key_path is None and 'keyPath' in kwargs: - key_path = kwargs['keyPath'] - if ou_name is None and 'ouName' in kwargs: - ou_name = kwargs['ouName'] - if certificate is not None: - _setter("certificate", certificate) + pulumi.set(__self__, "certificate", certificate) if common_name is not None: - _setter("common_name", common_name) + pulumi.set(__self__, "common_name", common_name) if config is not None: - _setter("config", config) + pulumi.set(__self__, "config", config) if config_env_name is not None: - _setter("config_env_name", config_env_name) + pulumi.set(__self__, "config_env_name", config_env_name) if config_path is not None: - _setter("config_path", config_path) + pulumi.set(__self__, "config_path", config_path) if env_name is not None: - _setter("env_name", env_name) + pulumi.set(__self__, "env_name", env_name) if id is not None: - _setter("id", id) + pulumi.set(__self__, "id", id) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if key_env_name is not None: - _setter("key_env_name", key_env_name) + pulumi.set(__self__, "key_env_name", key_env_name) if key_path is not None: - _setter("key_path", key_path) + pulumi.set(__self__, "key_path", key_path) if name is not None: - _setter("name", name) + pulumi.set(__self__, "name", name) if ou_name is not None: - _setter("ou_name", ou_name) + pulumi.set(__self__, "ou_name", ou_name) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) @property @pulumi.getter @@ -723,95 +586,42 @@ def __init__(__self__, *, :param pulumi.Input['ClusterCloudProviderVsphereCloudConfigArgs'] vsphere_cloud_config: Use vsphere_cloud_provider instead :param pulumi.Input['ClusterCloudProviderVsphereCloudProviderArgs'] vsphere_cloud_provider: Vsphere Cloud Provider config [rke-vsphere-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/vsphere/) Extra argument `name` is required on `virtual_center` configuration. (list maxitems:1) """ - ClusterCloudProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - name=name, - aws_cloud_config=aws_cloud_config, - aws_cloud_provider=aws_cloud_provider, - azure_cloud_config=azure_cloud_config, - azure_cloud_provider=azure_cloud_provider, - custom_cloud_config=custom_cloud_config, - custom_cloud_provider=custom_cloud_provider, - openstack_cloud_config=openstack_cloud_config, - openstack_cloud_provider=openstack_cloud_provider, - vsphere_cloud_config=vsphere_cloud_config, - vsphere_cloud_provider=vsphere_cloud_provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - name: Optional[pulumi.Input[str]] = None, - aws_cloud_config: Optional[pulumi.Input['ClusterCloudProviderAwsCloudConfigArgs']] = None, - aws_cloud_provider: Optional[pulumi.Input['ClusterCloudProviderAwsCloudProviderArgs']] = None, - azure_cloud_config: Optional[pulumi.Input['ClusterCloudProviderAzureCloudConfigArgs']] = None, - azure_cloud_provider: Optional[pulumi.Input['ClusterCloudProviderAzureCloudProviderArgs']] = None, - custom_cloud_config: Optional[pulumi.Input[str]] = None, - custom_cloud_provider: Optional[pulumi.Input[str]] = None, - openstack_cloud_config: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudConfigArgs']] = None, - openstack_cloud_provider: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudProviderArgs']] = None, - vsphere_cloud_config: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudConfigArgs']] = None, - vsphere_cloud_provider: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudProviderArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if name is None: - raise TypeError("Missing 'name' argument") - if aws_cloud_config is None and 'awsCloudConfig' in kwargs: - aws_cloud_config = kwargs['awsCloudConfig'] - if aws_cloud_provider is None and 'awsCloudProvider' in kwargs: - aws_cloud_provider = kwargs['awsCloudProvider'] - if azure_cloud_config is None and 'azureCloudConfig' in kwargs: - azure_cloud_config = kwargs['azureCloudConfig'] - if azure_cloud_provider is None and 'azureCloudProvider' in kwargs: - azure_cloud_provider = kwargs['azureCloudProvider'] - if custom_cloud_config is None and 'customCloudConfig' in kwargs: - custom_cloud_config = kwargs['customCloudConfig'] - if custom_cloud_provider is None and 'customCloudProvider' in kwargs: - custom_cloud_provider = kwargs['customCloudProvider'] - if openstack_cloud_config is None and 'openstackCloudConfig' in kwargs: - openstack_cloud_config = kwargs['openstackCloudConfig'] - if openstack_cloud_provider is None and 'openstackCloudProvider' in kwargs: - openstack_cloud_provider = kwargs['openstackCloudProvider'] - if vsphere_cloud_config is None and 'vsphereCloudConfig' in kwargs: - vsphere_cloud_config = kwargs['vsphereCloudConfig'] - if vsphere_cloud_provider is None and 'vsphereCloudProvider' in kwargs: - vsphere_cloud_provider = kwargs['vsphereCloudProvider'] - - _setter("name", name) + pulumi.set(__self__, "name", name) if aws_cloud_config is not None: warnings.warn("""Use aws_cloud_provider instead""", DeprecationWarning) pulumi.log.warn("""aws_cloud_config is deprecated: Use aws_cloud_provider instead""") if aws_cloud_config is not None: - _setter("aws_cloud_config", aws_cloud_config) + pulumi.set(__self__, "aws_cloud_config", aws_cloud_config) if aws_cloud_provider is not None: - _setter("aws_cloud_provider", aws_cloud_provider) + pulumi.set(__self__, "aws_cloud_provider", aws_cloud_provider) if azure_cloud_config is not None: warnings.warn("""Use azure_cloud_provider instead""", DeprecationWarning) pulumi.log.warn("""azure_cloud_config is deprecated: Use azure_cloud_provider instead""") if azure_cloud_config is not None: - _setter("azure_cloud_config", azure_cloud_config) + pulumi.set(__self__, "azure_cloud_config", azure_cloud_config) if azure_cloud_provider is not None: - _setter("azure_cloud_provider", azure_cloud_provider) + pulumi.set(__self__, "azure_cloud_provider", azure_cloud_provider) if custom_cloud_config is not None: warnings.warn("""Use custom_cloud_provider instead""", DeprecationWarning) pulumi.log.warn("""custom_cloud_config is deprecated: Use custom_cloud_provider instead""") if custom_cloud_config is not None: - _setter("custom_cloud_config", custom_cloud_config) + pulumi.set(__self__, "custom_cloud_config", custom_cloud_config) if custom_cloud_provider is not None: - _setter("custom_cloud_provider", custom_cloud_provider) + pulumi.set(__self__, "custom_cloud_provider", custom_cloud_provider) if openstack_cloud_config is not None: warnings.warn("""Use openstack_cloud_provider instead""", DeprecationWarning) pulumi.log.warn("""openstack_cloud_config is deprecated: Use openstack_cloud_provider instead""") if openstack_cloud_config is not None: - _setter("openstack_cloud_config", openstack_cloud_config) + pulumi.set(__self__, "openstack_cloud_config", openstack_cloud_config) if openstack_cloud_provider is not None: - _setter("openstack_cloud_provider", openstack_cloud_provider) + pulumi.set(__self__, "openstack_cloud_provider", openstack_cloud_provider) if vsphere_cloud_config is not None: warnings.warn("""Use vsphere_cloud_provider instead""", DeprecationWarning) pulumi.log.warn("""vsphere_cloud_config is deprecated: Use vsphere_cloud_provider instead""") if vsphere_cloud_config is not None: - _setter("vsphere_cloud_config", vsphere_cloud_config) + pulumi.set(__self__, "vsphere_cloud_config", vsphere_cloud_config) if vsphere_cloud_provider is not None: - _setter("vsphere_cloud_provider", vsphere_cloud_provider) + pulumi.set(__self__, "vsphere_cloud_provider", vsphere_cloud_provider) @property @pulumi.getter @@ -970,27 +780,10 @@ def __init__(__self__, *, :param pulumi.Input['ClusterCloudProviderAwsCloudConfigGlobalArgs'] global_: (list maxitems:1) :param pulumi.Input[Sequence[pulumi.Input['ClusterCloudProviderAwsCloudConfigServiceOverrideArgs']]] service_overrides: (list) """ - ClusterCloudProviderAwsCloudConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - service_overrides=service_overrides, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional[pulumi.Input['ClusterCloudProviderAwsCloudConfigGlobalArgs']] = None, - service_overrides: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterCloudProviderAwsCloudConfigServiceOverrideArgs']]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if service_overrides is None and 'serviceOverrides' in kwargs: - service_overrides = kwargs['serviceOverrides'] - if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if service_overrides is not None: - _setter("service_overrides", service_overrides) + pulumi.set(__self__, "service_overrides", service_overrides) @property @pulumi.getter(name="global") @@ -1042,71 +835,26 @@ def __init__(__self__, *, :param pulumi.Input[str] vpc: The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string) :param pulumi.Input[str] zone: The AWS zone (string) """ - ClusterCloudProviderAwsCloudConfigGlobalArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - disable_security_group_ingress=disable_security_group_ingress, - disable_strict_zone_check=disable_strict_zone_check, - elb_security_group=elb_security_group, - kubernetes_cluster_id=kubernetes_cluster_id, - kubernetes_cluster_tag=kubernetes_cluster_tag, - role_arn=role_arn, - route_table_id=route_table_id, - subnet_id=subnet_id, - vpc=vpc, - zone=zone, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - disable_security_group_ingress: Optional[pulumi.Input[bool]] = None, - disable_strict_zone_check: Optional[pulumi.Input[bool]] = None, - elb_security_group: Optional[pulumi.Input[str]] = None, - kubernetes_cluster_id: Optional[pulumi.Input[str]] = None, - kubernetes_cluster_tag: Optional[pulumi.Input[str]] = None, - role_arn: Optional[pulumi.Input[str]] = None, - route_table_id: Optional[pulumi.Input[str]] = None, - subnet_id: Optional[pulumi.Input[str]] = None, - vpc: Optional[pulumi.Input[str]] = None, - zone: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if disable_security_group_ingress is None and 'disableSecurityGroupIngress' in kwargs: - disable_security_group_ingress = kwargs['disableSecurityGroupIngress'] - if disable_strict_zone_check is None and 'disableStrictZoneCheck' in kwargs: - disable_strict_zone_check = kwargs['disableStrictZoneCheck'] - if elb_security_group is None and 'elbSecurityGroup' in kwargs: - elb_security_group = kwargs['elbSecurityGroup'] - if kubernetes_cluster_id is None and 'kubernetesClusterId' in kwargs: - kubernetes_cluster_id = kwargs['kubernetesClusterId'] - if kubernetes_cluster_tag is None and 'kubernetesClusterTag' in kwargs: - kubernetes_cluster_tag = kwargs['kubernetesClusterTag'] - if role_arn is None and 'roleArn' in kwargs: - role_arn = kwargs['roleArn'] - if route_table_id is None and 'routeTableId' in kwargs: - route_table_id = kwargs['routeTableId'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if disable_security_group_ingress is not None: - _setter("disable_security_group_ingress", disable_security_group_ingress) + pulumi.set(__self__, "disable_security_group_ingress", disable_security_group_ingress) if disable_strict_zone_check is not None: - _setter("disable_strict_zone_check", disable_strict_zone_check) + pulumi.set(__self__, "disable_strict_zone_check", disable_strict_zone_check) if elb_security_group is not None: - _setter("elb_security_group", elb_security_group) + pulumi.set(__self__, "elb_security_group", elb_security_group) if kubernetes_cluster_id is not None: - _setter("kubernetes_cluster_id", kubernetes_cluster_id) + pulumi.set(__self__, "kubernetes_cluster_id", kubernetes_cluster_id) if kubernetes_cluster_tag is not None: - _setter("kubernetes_cluster_tag", kubernetes_cluster_tag) + pulumi.set(__self__, "kubernetes_cluster_tag", kubernetes_cluster_tag) if role_arn is not None: - _setter("role_arn", role_arn) + pulumi.set(__self__, "role_arn", role_arn) if route_table_id is not None: - _setter("route_table_id", route_table_id) + pulumi.set(__self__, "route_table_id", route_table_id) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if vpc is not None: - _setter("vpc", vpc) + pulumi.set(__self__, "vpc", vpc) if zone is not None: - _setter("zone", zone) + pulumi.set(__self__, "zone", zone) @property @pulumi.getter(name="disableSecurityGroupIngress") @@ -1248,53 +996,22 @@ def __init__(__self__, *, :param pulumi.Input[str] signing_region: (string) :param pulumi.Input[str] url: Registry URL (string) """ - ClusterCloudProviderAwsCloudConfigServiceOverrideArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - service=service, - key=key, - region=region, - signing_method=signing_method, - signing_name=signing_name, - signing_region=signing_region, - url=url, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - service: Optional[pulumi.Input[str]] = None, - key: Optional[pulumi.Input[str]] = None, - region: Optional[pulumi.Input[str]] = None, - signing_method: Optional[pulumi.Input[str]] = None, - signing_name: Optional[pulumi.Input[str]] = None, - signing_region: Optional[pulumi.Input[str]] = None, - url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if service is None: - raise TypeError("Missing 'service' argument") - if signing_method is None and 'signingMethod' in kwargs: - signing_method = kwargs['signingMethod'] - if signing_name is None and 'signingName' in kwargs: - signing_name = kwargs['signingName'] - if signing_region is None and 'signingRegion' in kwargs: - signing_region = kwargs['signingRegion'] - - _setter("service", service) + pulumi.set(__self__, "service", service) if key is not None: warnings.warn("""Use service instead""", DeprecationWarning) pulumi.log.warn("""key is deprecated: Use service instead""") if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if signing_method is not None: - _setter("signing_method", signing_method) + pulumi.set(__self__, "signing_method", signing_method) if signing_name is not None: - _setter("signing_name", signing_name) + pulumi.set(__self__, "signing_name", signing_name) if signing_region is not None: - _setter("signing_region", signing_region) + pulumi.set(__self__, "signing_region", signing_region) if url is not None: - _setter("url", url) + pulumi.set(__self__, "url", url) @property @pulumi.getter @@ -1393,27 +1110,10 @@ def __init__(__self__, *, :param pulumi.Input['ClusterCloudProviderAwsCloudProviderGlobalArgs'] global_: (list maxitems:1) :param pulumi.Input[Sequence[pulumi.Input['ClusterCloudProviderAwsCloudProviderServiceOverrideArgs']]] service_overrides: (list) """ - ClusterCloudProviderAwsCloudProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - service_overrides=service_overrides, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional[pulumi.Input['ClusterCloudProviderAwsCloudProviderGlobalArgs']] = None, - service_overrides: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterCloudProviderAwsCloudProviderServiceOverrideArgs']]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if service_overrides is None and 'serviceOverrides' in kwargs: - service_overrides = kwargs['serviceOverrides'] - if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if service_overrides is not None: - _setter("service_overrides", service_overrides) + pulumi.set(__self__, "service_overrides", service_overrides) @property @pulumi.getter(name="global") @@ -1465,71 +1165,26 @@ def __init__(__self__, *, :param pulumi.Input[str] vpc: The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string) :param pulumi.Input[str] zone: The AWS zone (string) """ - ClusterCloudProviderAwsCloudProviderGlobalArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - disable_security_group_ingress=disable_security_group_ingress, - disable_strict_zone_check=disable_strict_zone_check, - elb_security_group=elb_security_group, - kubernetes_cluster_id=kubernetes_cluster_id, - kubernetes_cluster_tag=kubernetes_cluster_tag, - role_arn=role_arn, - route_table_id=route_table_id, - subnet_id=subnet_id, - vpc=vpc, - zone=zone, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - disable_security_group_ingress: Optional[pulumi.Input[bool]] = None, - disable_strict_zone_check: Optional[pulumi.Input[bool]] = None, - elb_security_group: Optional[pulumi.Input[str]] = None, - kubernetes_cluster_id: Optional[pulumi.Input[str]] = None, - kubernetes_cluster_tag: Optional[pulumi.Input[str]] = None, - role_arn: Optional[pulumi.Input[str]] = None, - route_table_id: Optional[pulumi.Input[str]] = None, - subnet_id: Optional[pulumi.Input[str]] = None, - vpc: Optional[pulumi.Input[str]] = None, - zone: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if disable_security_group_ingress is None and 'disableSecurityGroupIngress' in kwargs: - disable_security_group_ingress = kwargs['disableSecurityGroupIngress'] - if disable_strict_zone_check is None and 'disableStrictZoneCheck' in kwargs: - disable_strict_zone_check = kwargs['disableStrictZoneCheck'] - if elb_security_group is None and 'elbSecurityGroup' in kwargs: - elb_security_group = kwargs['elbSecurityGroup'] - if kubernetes_cluster_id is None and 'kubernetesClusterId' in kwargs: - kubernetes_cluster_id = kwargs['kubernetesClusterId'] - if kubernetes_cluster_tag is None and 'kubernetesClusterTag' in kwargs: - kubernetes_cluster_tag = kwargs['kubernetesClusterTag'] - if role_arn is None and 'roleArn' in kwargs: - role_arn = kwargs['roleArn'] - if route_table_id is None and 'routeTableId' in kwargs: - route_table_id = kwargs['routeTableId'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if disable_security_group_ingress is not None: - _setter("disable_security_group_ingress", disable_security_group_ingress) + pulumi.set(__self__, "disable_security_group_ingress", disable_security_group_ingress) if disable_strict_zone_check is not None: - _setter("disable_strict_zone_check", disable_strict_zone_check) + pulumi.set(__self__, "disable_strict_zone_check", disable_strict_zone_check) if elb_security_group is not None: - _setter("elb_security_group", elb_security_group) + pulumi.set(__self__, "elb_security_group", elb_security_group) if kubernetes_cluster_id is not None: - _setter("kubernetes_cluster_id", kubernetes_cluster_id) + pulumi.set(__self__, "kubernetes_cluster_id", kubernetes_cluster_id) if kubernetes_cluster_tag is not None: - _setter("kubernetes_cluster_tag", kubernetes_cluster_tag) + pulumi.set(__self__, "kubernetes_cluster_tag", kubernetes_cluster_tag) if role_arn is not None: - _setter("role_arn", role_arn) + pulumi.set(__self__, "role_arn", role_arn) if route_table_id is not None: - _setter("route_table_id", route_table_id) + pulumi.set(__self__, "route_table_id", route_table_id) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if vpc is not None: - _setter("vpc", vpc) + pulumi.set(__self__, "vpc", vpc) if zone is not None: - _setter("zone", zone) + pulumi.set(__self__, "zone", zone) @property @pulumi.getter(name="disableSecurityGroupIngress") @@ -1671,53 +1326,22 @@ def __init__(__self__, *, :param pulumi.Input[str] signing_region: (string) :param pulumi.Input[str] url: Registry URL (string) """ - ClusterCloudProviderAwsCloudProviderServiceOverrideArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - service=service, - key=key, - region=region, - signing_method=signing_method, - signing_name=signing_name, - signing_region=signing_region, - url=url, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - service: Optional[pulumi.Input[str]] = None, - key: Optional[pulumi.Input[str]] = None, - region: Optional[pulumi.Input[str]] = None, - signing_method: Optional[pulumi.Input[str]] = None, - signing_name: Optional[pulumi.Input[str]] = None, - signing_region: Optional[pulumi.Input[str]] = None, - url: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if service is None: - raise TypeError("Missing 'service' argument") - if signing_method is None and 'signingMethod' in kwargs: - signing_method = kwargs['signingMethod'] - if signing_name is None and 'signingName' in kwargs: - signing_name = kwargs['signingName'] - if signing_region is None and 'signingRegion' in kwargs: - signing_region = kwargs['signingRegion'] - - _setter("service", service) + pulumi.set(__self__, "service", service) if key is not None: warnings.warn("""Use service instead""", DeprecationWarning) pulumi.log.warn("""key is deprecated: Use service instead""") if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if signing_method is not None: - _setter("signing_method", signing_method) + pulumi.set(__self__, "signing_method", signing_method) if signing_name is not None: - _setter("signing_name", signing_name) + pulumi.set(__self__, "signing_name", signing_name) if signing_region is not None: - _setter("signing_region", signing_region) + pulumi.set(__self__, "signing_region", signing_region) if url is not None: - _setter("url", url) + pulumi.set(__self__, "url", url) @property @pulumi.getter @@ -1869,189 +1493,60 @@ def __init__(__self__, *, :param pulumi.Input[str] vnet_name: (string) :param pulumi.Input[str] vnet_resource_group: (string) """ - ClusterCloudProviderAzureCloudConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - aad_client_id=aad_client_id, - aad_client_secret=aad_client_secret, - subscription_id=subscription_id, - tenant_id=tenant_id, - aad_client_cert_password=aad_client_cert_password, - aad_client_cert_path=aad_client_cert_path, - cloud=cloud, - cloud_provider_backoff=cloud_provider_backoff, - cloud_provider_backoff_duration=cloud_provider_backoff_duration, - cloud_provider_backoff_exponent=cloud_provider_backoff_exponent, - cloud_provider_backoff_jitter=cloud_provider_backoff_jitter, - cloud_provider_backoff_retries=cloud_provider_backoff_retries, - cloud_provider_rate_limit=cloud_provider_rate_limit, - cloud_provider_rate_limit_bucket=cloud_provider_rate_limit_bucket, - cloud_provider_rate_limit_qps=cloud_provider_rate_limit_qps, - load_balancer_sku=load_balancer_sku, - location=location, - maximum_load_balancer_rule_count=maximum_load_balancer_rule_count, - primary_availability_set_name=primary_availability_set_name, - primary_scale_set_name=primary_scale_set_name, - resource_group=resource_group, - route_table_name=route_table_name, - security_group_name=security_group_name, - subnet_name=subnet_name, - use_instance_metadata=use_instance_metadata, - use_managed_identity_extension=use_managed_identity_extension, - vm_type=vm_type, - vnet_name=vnet_name, - vnet_resource_group=vnet_resource_group, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aad_client_id: Optional[pulumi.Input[str]] = None, - aad_client_secret: Optional[pulumi.Input[str]] = None, - subscription_id: Optional[pulumi.Input[str]] = None, - tenant_id: Optional[pulumi.Input[str]] = None, - aad_client_cert_password: Optional[pulumi.Input[str]] = None, - aad_client_cert_path: Optional[pulumi.Input[str]] = None, - cloud: Optional[pulumi.Input[str]] = None, - cloud_provider_backoff: Optional[pulumi.Input[bool]] = None, - cloud_provider_backoff_duration: Optional[pulumi.Input[int]] = None, - cloud_provider_backoff_exponent: Optional[pulumi.Input[int]] = None, - cloud_provider_backoff_jitter: Optional[pulumi.Input[int]] = None, - cloud_provider_backoff_retries: Optional[pulumi.Input[int]] = None, - cloud_provider_rate_limit: Optional[pulumi.Input[bool]] = None, - cloud_provider_rate_limit_bucket: Optional[pulumi.Input[int]] = None, - cloud_provider_rate_limit_qps: Optional[pulumi.Input[int]] = None, - load_balancer_sku: Optional[pulumi.Input[str]] = None, - location: Optional[pulumi.Input[str]] = None, - maximum_load_balancer_rule_count: Optional[pulumi.Input[int]] = None, - primary_availability_set_name: Optional[pulumi.Input[str]] = None, - primary_scale_set_name: Optional[pulumi.Input[str]] = None, - resource_group: Optional[pulumi.Input[str]] = None, - route_table_name: Optional[pulumi.Input[str]] = None, - security_group_name: Optional[pulumi.Input[str]] = None, - subnet_name: Optional[pulumi.Input[str]] = None, - use_instance_metadata: Optional[pulumi.Input[bool]] = None, - use_managed_identity_extension: Optional[pulumi.Input[bool]] = None, - vm_type: Optional[pulumi.Input[str]] = None, - vnet_name: Optional[pulumi.Input[str]] = None, - vnet_resource_group: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aad_client_id is None and 'aadClientId' in kwargs: - aad_client_id = kwargs['aadClientId'] - if aad_client_id is None: - raise TypeError("Missing 'aad_client_id' argument") - if aad_client_secret is None and 'aadClientSecret' in kwargs: - aad_client_secret = kwargs['aadClientSecret'] - if aad_client_secret is None: - raise TypeError("Missing 'aad_client_secret' argument") - if subscription_id is None and 'subscriptionId' in kwargs: - subscription_id = kwargs['subscriptionId'] - if subscription_id is None: - raise TypeError("Missing 'subscription_id' argument") - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_id is None: - raise TypeError("Missing 'tenant_id' argument") - if aad_client_cert_password is None and 'aadClientCertPassword' in kwargs: - aad_client_cert_password = kwargs['aadClientCertPassword'] - if aad_client_cert_path is None and 'aadClientCertPath' in kwargs: - aad_client_cert_path = kwargs['aadClientCertPath'] - if cloud_provider_backoff is None and 'cloudProviderBackoff' in kwargs: - cloud_provider_backoff = kwargs['cloudProviderBackoff'] - if cloud_provider_backoff_duration is None and 'cloudProviderBackoffDuration' in kwargs: - cloud_provider_backoff_duration = kwargs['cloudProviderBackoffDuration'] - if cloud_provider_backoff_exponent is None and 'cloudProviderBackoffExponent' in kwargs: - cloud_provider_backoff_exponent = kwargs['cloudProviderBackoffExponent'] - if cloud_provider_backoff_jitter is None and 'cloudProviderBackoffJitter' in kwargs: - cloud_provider_backoff_jitter = kwargs['cloudProviderBackoffJitter'] - if cloud_provider_backoff_retries is None and 'cloudProviderBackoffRetries' in kwargs: - cloud_provider_backoff_retries = kwargs['cloudProviderBackoffRetries'] - if cloud_provider_rate_limit is None and 'cloudProviderRateLimit' in kwargs: - cloud_provider_rate_limit = kwargs['cloudProviderRateLimit'] - if cloud_provider_rate_limit_bucket is None and 'cloudProviderRateLimitBucket' in kwargs: - cloud_provider_rate_limit_bucket = kwargs['cloudProviderRateLimitBucket'] - if cloud_provider_rate_limit_qps is None and 'cloudProviderRateLimitQps' in kwargs: - cloud_provider_rate_limit_qps = kwargs['cloudProviderRateLimitQps'] - if load_balancer_sku is None and 'loadBalancerSku' in kwargs: - load_balancer_sku = kwargs['loadBalancerSku'] - if maximum_load_balancer_rule_count is None and 'maximumLoadBalancerRuleCount' in kwargs: - maximum_load_balancer_rule_count = kwargs['maximumLoadBalancerRuleCount'] - if primary_availability_set_name is None and 'primaryAvailabilitySetName' in kwargs: - primary_availability_set_name = kwargs['primaryAvailabilitySetName'] - if primary_scale_set_name is None and 'primaryScaleSetName' in kwargs: - primary_scale_set_name = kwargs['primaryScaleSetName'] - if resource_group is None and 'resourceGroup' in kwargs: - resource_group = kwargs['resourceGroup'] - if route_table_name is None and 'routeTableName' in kwargs: - route_table_name = kwargs['routeTableName'] - if security_group_name is None and 'securityGroupName' in kwargs: - security_group_name = kwargs['securityGroupName'] - if subnet_name is None and 'subnetName' in kwargs: - subnet_name = kwargs['subnetName'] - if use_instance_metadata is None and 'useInstanceMetadata' in kwargs: - use_instance_metadata = kwargs['useInstanceMetadata'] - if use_managed_identity_extension is None and 'useManagedIdentityExtension' in kwargs: - use_managed_identity_extension = kwargs['useManagedIdentityExtension'] - if vm_type is None and 'vmType' in kwargs: - vm_type = kwargs['vmType'] - if vnet_name is None and 'vnetName' in kwargs: - vnet_name = kwargs['vnetName'] - if vnet_resource_group is None and 'vnetResourceGroup' in kwargs: - vnet_resource_group = kwargs['vnetResourceGroup'] - - _setter("aad_client_id", aad_client_id) - _setter("aad_client_secret", aad_client_secret) - _setter("subscription_id", subscription_id) - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "aad_client_id", aad_client_id) + pulumi.set(__self__, "aad_client_secret", aad_client_secret) + pulumi.set(__self__, "subscription_id", subscription_id) + pulumi.set(__self__, "tenant_id", tenant_id) if aad_client_cert_password is not None: - _setter("aad_client_cert_password", aad_client_cert_password) + pulumi.set(__self__, "aad_client_cert_password", aad_client_cert_password) if aad_client_cert_path is not None: - _setter("aad_client_cert_path", aad_client_cert_path) + pulumi.set(__self__, "aad_client_cert_path", aad_client_cert_path) if cloud is not None: - _setter("cloud", cloud) + pulumi.set(__self__, "cloud", cloud) if cloud_provider_backoff is not None: - _setter("cloud_provider_backoff", cloud_provider_backoff) + pulumi.set(__self__, "cloud_provider_backoff", cloud_provider_backoff) if cloud_provider_backoff_duration is not None: - _setter("cloud_provider_backoff_duration", cloud_provider_backoff_duration) + pulumi.set(__self__, "cloud_provider_backoff_duration", cloud_provider_backoff_duration) if cloud_provider_backoff_exponent is not None: - _setter("cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) + pulumi.set(__self__, "cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) if cloud_provider_backoff_jitter is not None: - _setter("cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) + pulumi.set(__self__, "cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) if cloud_provider_backoff_retries is not None: - _setter("cloud_provider_backoff_retries", cloud_provider_backoff_retries) + pulumi.set(__self__, "cloud_provider_backoff_retries", cloud_provider_backoff_retries) if cloud_provider_rate_limit is not None: - _setter("cloud_provider_rate_limit", cloud_provider_rate_limit) + pulumi.set(__self__, "cloud_provider_rate_limit", cloud_provider_rate_limit) if cloud_provider_rate_limit_bucket is not None: - _setter("cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) + pulumi.set(__self__, "cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) if cloud_provider_rate_limit_qps is not None: - _setter("cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) + pulumi.set(__self__, "cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) if load_balancer_sku is not None: - _setter("load_balancer_sku", load_balancer_sku) + pulumi.set(__self__, "load_balancer_sku", load_balancer_sku) if location is not None: - _setter("location", location) + pulumi.set(__self__, "location", location) if maximum_load_balancer_rule_count is not None: - _setter("maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) + pulumi.set(__self__, "maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) if primary_availability_set_name is not None: - _setter("primary_availability_set_name", primary_availability_set_name) + pulumi.set(__self__, "primary_availability_set_name", primary_availability_set_name) if primary_scale_set_name is not None: - _setter("primary_scale_set_name", primary_scale_set_name) + pulumi.set(__self__, "primary_scale_set_name", primary_scale_set_name) if resource_group is not None: - _setter("resource_group", resource_group) + pulumi.set(__self__, "resource_group", resource_group) if route_table_name is not None: - _setter("route_table_name", route_table_name) + pulumi.set(__self__, "route_table_name", route_table_name) if security_group_name is not None: - _setter("security_group_name", security_group_name) + pulumi.set(__self__, "security_group_name", security_group_name) if subnet_name is not None: - _setter("subnet_name", subnet_name) + pulumi.set(__self__, "subnet_name", subnet_name) if use_instance_metadata is not None: - _setter("use_instance_metadata", use_instance_metadata) + pulumi.set(__self__, "use_instance_metadata", use_instance_metadata) if use_managed_identity_extension is not None: - _setter("use_managed_identity_extension", use_managed_identity_extension) + pulumi.set(__self__, "use_managed_identity_extension", use_managed_identity_extension) if vm_type is not None: - _setter("vm_type", vm_type) + pulumi.set(__self__, "vm_type", vm_type) if vnet_name is not None: - _setter("vnet_name", vnet_name) + pulumi.set(__self__, "vnet_name", vnet_name) if vnet_resource_group is not None: - _setter("vnet_resource_group", vnet_resource_group) + pulumi.set(__self__, "vnet_resource_group", vnet_resource_group) @property @pulumi.getter(name="aadClientId") @@ -2461,189 +1956,60 @@ def __init__(__self__, *, :param pulumi.Input[str] vnet_name: (string) :param pulumi.Input[str] vnet_resource_group: (string) """ - ClusterCloudProviderAzureCloudProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - aad_client_id=aad_client_id, - aad_client_secret=aad_client_secret, - subscription_id=subscription_id, - tenant_id=tenant_id, - aad_client_cert_password=aad_client_cert_password, - aad_client_cert_path=aad_client_cert_path, - cloud=cloud, - cloud_provider_backoff=cloud_provider_backoff, - cloud_provider_backoff_duration=cloud_provider_backoff_duration, - cloud_provider_backoff_exponent=cloud_provider_backoff_exponent, - cloud_provider_backoff_jitter=cloud_provider_backoff_jitter, - cloud_provider_backoff_retries=cloud_provider_backoff_retries, - cloud_provider_rate_limit=cloud_provider_rate_limit, - cloud_provider_rate_limit_bucket=cloud_provider_rate_limit_bucket, - cloud_provider_rate_limit_qps=cloud_provider_rate_limit_qps, - load_balancer_sku=load_balancer_sku, - location=location, - maximum_load_balancer_rule_count=maximum_load_balancer_rule_count, - primary_availability_set_name=primary_availability_set_name, - primary_scale_set_name=primary_scale_set_name, - resource_group=resource_group, - route_table_name=route_table_name, - security_group_name=security_group_name, - subnet_name=subnet_name, - use_instance_metadata=use_instance_metadata, - use_managed_identity_extension=use_managed_identity_extension, - vm_type=vm_type, - vnet_name=vnet_name, - vnet_resource_group=vnet_resource_group, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aad_client_id: Optional[pulumi.Input[str]] = None, - aad_client_secret: Optional[pulumi.Input[str]] = None, - subscription_id: Optional[pulumi.Input[str]] = None, - tenant_id: Optional[pulumi.Input[str]] = None, - aad_client_cert_password: Optional[pulumi.Input[str]] = None, - aad_client_cert_path: Optional[pulumi.Input[str]] = None, - cloud: Optional[pulumi.Input[str]] = None, - cloud_provider_backoff: Optional[pulumi.Input[bool]] = None, - cloud_provider_backoff_duration: Optional[pulumi.Input[int]] = None, - cloud_provider_backoff_exponent: Optional[pulumi.Input[int]] = None, - cloud_provider_backoff_jitter: Optional[pulumi.Input[int]] = None, - cloud_provider_backoff_retries: Optional[pulumi.Input[int]] = None, - cloud_provider_rate_limit: Optional[pulumi.Input[bool]] = None, - cloud_provider_rate_limit_bucket: Optional[pulumi.Input[int]] = None, - cloud_provider_rate_limit_qps: Optional[pulumi.Input[int]] = None, - load_balancer_sku: Optional[pulumi.Input[str]] = None, - location: Optional[pulumi.Input[str]] = None, - maximum_load_balancer_rule_count: Optional[pulumi.Input[int]] = None, - primary_availability_set_name: Optional[pulumi.Input[str]] = None, - primary_scale_set_name: Optional[pulumi.Input[str]] = None, - resource_group: Optional[pulumi.Input[str]] = None, - route_table_name: Optional[pulumi.Input[str]] = None, - security_group_name: Optional[pulumi.Input[str]] = None, - subnet_name: Optional[pulumi.Input[str]] = None, - use_instance_metadata: Optional[pulumi.Input[bool]] = None, - use_managed_identity_extension: Optional[pulumi.Input[bool]] = None, - vm_type: Optional[pulumi.Input[str]] = None, - vnet_name: Optional[pulumi.Input[str]] = None, - vnet_resource_group: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aad_client_id is None and 'aadClientId' in kwargs: - aad_client_id = kwargs['aadClientId'] - if aad_client_id is None: - raise TypeError("Missing 'aad_client_id' argument") - if aad_client_secret is None and 'aadClientSecret' in kwargs: - aad_client_secret = kwargs['aadClientSecret'] - if aad_client_secret is None: - raise TypeError("Missing 'aad_client_secret' argument") - if subscription_id is None and 'subscriptionId' in kwargs: - subscription_id = kwargs['subscriptionId'] - if subscription_id is None: - raise TypeError("Missing 'subscription_id' argument") - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_id is None: - raise TypeError("Missing 'tenant_id' argument") - if aad_client_cert_password is None and 'aadClientCertPassword' in kwargs: - aad_client_cert_password = kwargs['aadClientCertPassword'] - if aad_client_cert_path is None and 'aadClientCertPath' in kwargs: - aad_client_cert_path = kwargs['aadClientCertPath'] - if cloud_provider_backoff is None and 'cloudProviderBackoff' in kwargs: - cloud_provider_backoff = kwargs['cloudProviderBackoff'] - if cloud_provider_backoff_duration is None and 'cloudProviderBackoffDuration' in kwargs: - cloud_provider_backoff_duration = kwargs['cloudProviderBackoffDuration'] - if cloud_provider_backoff_exponent is None and 'cloudProviderBackoffExponent' in kwargs: - cloud_provider_backoff_exponent = kwargs['cloudProviderBackoffExponent'] - if cloud_provider_backoff_jitter is None and 'cloudProviderBackoffJitter' in kwargs: - cloud_provider_backoff_jitter = kwargs['cloudProviderBackoffJitter'] - if cloud_provider_backoff_retries is None and 'cloudProviderBackoffRetries' in kwargs: - cloud_provider_backoff_retries = kwargs['cloudProviderBackoffRetries'] - if cloud_provider_rate_limit is None and 'cloudProviderRateLimit' in kwargs: - cloud_provider_rate_limit = kwargs['cloudProviderRateLimit'] - if cloud_provider_rate_limit_bucket is None and 'cloudProviderRateLimitBucket' in kwargs: - cloud_provider_rate_limit_bucket = kwargs['cloudProviderRateLimitBucket'] - if cloud_provider_rate_limit_qps is None and 'cloudProviderRateLimitQps' in kwargs: - cloud_provider_rate_limit_qps = kwargs['cloudProviderRateLimitQps'] - if load_balancer_sku is None and 'loadBalancerSku' in kwargs: - load_balancer_sku = kwargs['loadBalancerSku'] - if maximum_load_balancer_rule_count is None and 'maximumLoadBalancerRuleCount' in kwargs: - maximum_load_balancer_rule_count = kwargs['maximumLoadBalancerRuleCount'] - if primary_availability_set_name is None and 'primaryAvailabilitySetName' in kwargs: - primary_availability_set_name = kwargs['primaryAvailabilitySetName'] - if primary_scale_set_name is None and 'primaryScaleSetName' in kwargs: - primary_scale_set_name = kwargs['primaryScaleSetName'] - if resource_group is None and 'resourceGroup' in kwargs: - resource_group = kwargs['resourceGroup'] - if route_table_name is None and 'routeTableName' in kwargs: - route_table_name = kwargs['routeTableName'] - if security_group_name is None and 'securityGroupName' in kwargs: - security_group_name = kwargs['securityGroupName'] - if subnet_name is None and 'subnetName' in kwargs: - subnet_name = kwargs['subnetName'] - if use_instance_metadata is None and 'useInstanceMetadata' in kwargs: - use_instance_metadata = kwargs['useInstanceMetadata'] - if use_managed_identity_extension is None and 'useManagedIdentityExtension' in kwargs: - use_managed_identity_extension = kwargs['useManagedIdentityExtension'] - if vm_type is None and 'vmType' in kwargs: - vm_type = kwargs['vmType'] - if vnet_name is None and 'vnetName' in kwargs: - vnet_name = kwargs['vnetName'] - if vnet_resource_group is None and 'vnetResourceGroup' in kwargs: - vnet_resource_group = kwargs['vnetResourceGroup'] - - _setter("aad_client_id", aad_client_id) - _setter("aad_client_secret", aad_client_secret) - _setter("subscription_id", subscription_id) - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "aad_client_id", aad_client_id) + pulumi.set(__self__, "aad_client_secret", aad_client_secret) + pulumi.set(__self__, "subscription_id", subscription_id) + pulumi.set(__self__, "tenant_id", tenant_id) if aad_client_cert_password is not None: - _setter("aad_client_cert_password", aad_client_cert_password) + pulumi.set(__self__, "aad_client_cert_password", aad_client_cert_password) if aad_client_cert_path is not None: - _setter("aad_client_cert_path", aad_client_cert_path) + pulumi.set(__self__, "aad_client_cert_path", aad_client_cert_path) if cloud is not None: - _setter("cloud", cloud) + pulumi.set(__self__, "cloud", cloud) if cloud_provider_backoff is not None: - _setter("cloud_provider_backoff", cloud_provider_backoff) + pulumi.set(__self__, "cloud_provider_backoff", cloud_provider_backoff) if cloud_provider_backoff_duration is not None: - _setter("cloud_provider_backoff_duration", cloud_provider_backoff_duration) + pulumi.set(__self__, "cloud_provider_backoff_duration", cloud_provider_backoff_duration) if cloud_provider_backoff_exponent is not None: - _setter("cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) + pulumi.set(__self__, "cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) if cloud_provider_backoff_jitter is not None: - _setter("cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) + pulumi.set(__self__, "cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) if cloud_provider_backoff_retries is not None: - _setter("cloud_provider_backoff_retries", cloud_provider_backoff_retries) + pulumi.set(__self__, "cloud_provider_backoff_retries", cloud_provider_backoff_retries) if cloud_provider_rate_limit is not None: - _setter("cloud_provider_rate_limit", cloud_provider_rate_limit) + pulumi.set(__self__, "cloud_provider_rate_limit", cloud_provider_rate_limit) if cloud_provider_rate_limit_bucket is not None: - _setter("cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) + pulumi.set(__self__, "cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) if cloud_provider_rate_limit_qps is not None: - _setter("cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) + pulumi.set(__self__, "cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) if load_balancer_sku is not None: - _setter("load_balancer_sku", load_balancer_sku) + pulumi.set(__self__, "load_balancer_sku", load_balancer_sku) if location is not None: - _setter("location", location) + pulumi.set(__self__, "location", location) if maximum_load_balancer_rule_count is not None: - _setter("maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) + pulumi.set(__self__, "maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) if primary_availability_set_name is not None: - _setter("primary_availability_set_name", primary_availability_set_name) + pulumi.set(__self__, "primary_availability_set_name", primary_availability_set_name) if primary_scale_set_name is not None: - _setter("primary_scale_set_name", primary_scale_set_name) + pulumi.set(__self__, "primary_scale_set_name", primary_scale_set_name) if resource_group is not None: - _setter("resource_group", resource_group) + pulumi.set(__self__, "resource_group", resource_group) if route_table_name is not None: - _setter("route_table_name", route_table_name) + pulumi.set(__self__, "route_table_name", route_table_name) if security_group_name is not None: - _setter("security_group_name", security_group_name) + pulumi.set(__self__, "security_group_name", security_group_name) if subnet_name is not None: - _setter("subnet_name", subnet_name) + pulumi.set(__self__, "subnet_name", subnet_name) if use_instance_metadata is not None: - _setter("use_instance_metadata", use_instance_metadata) + pulumi.set(__self__, "use_instance_metadata", use_instance_metadata) if use_managed_identity_extension is not None: - _setter("use_managed_identity_extension", use_managed_identity_extension) + pulumi.set(__self__, "use_managed_identity_extension", use_managed_identity_extension) if vm_type is not None: - _setter("vm_type", vm_type) + pulumi.set(__self__, "vm_type", vm_type) if vnet_name is not None: - _setter("vnet_name", vnet_name) + pulumi.set(__self__, "vnet_name", vnet_name) if vnet_resource_group is not None: - _setter("vnet_resource_group", vnet_resource_group) + pulumi.set(__self__, "vnet_resource_group", vnet_resource_group) @property @pulumi.getter(name="aadClientId") @@ -3006,42 +2372,15 @@ def __init__(__self__, *, :param pulumi.Input['ClusterCloudProviderOpenstackCloudConfigMetadataArgs'] metadata: (list maxitems:1) :param pulumi.Input['ClusterCloudProviderOpenstackCloudConfigRouteArgs'] route: (list maxitems:1) """ - ClusterCloudProviderOpenstackCloudConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - block_storage=block_storage, - load_balancer=load_balancer, - metadata=metadata, - route=route, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudConfigGlobalArgs']] = None, - block_storage: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudConfigBlockStorageArgs']] = None, - load_balancer: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudConfigLoadBalancerArgs']] = None, - metadata: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudConfigMetadataArgs']] = None, - route: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudConfigRouteArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if global_ is None: - raise TypeError("Missing 'global_' argument") - if block_storage is None and 'blockStorage' in kwargs: - block_storage = kwargs['blockStorage'] - if load_balancer is None and 'loadBalancer' in kwargs: - load_balancer = kwargs['loadBalancer'] - - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if block_storage is not None: - _setter("block_storage", block_storage) + pulumi.set(__self__, "block_storage", block_storage) if load_balancer is not None: - _setter("load_balancer", load_balancer) + pulumi.set(__self__, "load_balancer", load_balancer) if metadata is not None: - _setter("metadata", metadata) + pulumi.set(__self__, "metadata", metadata) if route is not None: - _setter("route", route) + pulumi.set(__self__, "route", route) @property @pulumi.getter(name="global") @@ -3115,33 +2454,12 @@ def __init__(__self__, *, :param pulumi.Input[bool] ignore_volume_az: (string) :param pulumi.Input[bool] trust_device_path: (string) """ - ClusterCloudProviderOpenstackCloudConfigBlockStorageArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - bs_version=bs_version, - ignore_volume_az=ignore_volume_az, - trust_device_path=trust_device_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - bs_version: Optional[pulumi.Input[str]] = None, - ignore_volume_az: Optional[pulumi.Input[bool]] = None, - trust_device_path: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if bs_version is None and 'bsVersion' in kwargs: - bs_version = kwargs['bsVersion'] - if ignore_volume_az is None and 'ignoreVolumeAz' in kwargs: - ignore_volume_az = kwargs['ignoreVolumeAz'] - if trust_device_path is None and 'trustDevicePath' in kwargs: - trust_device_path = kwargs['trustDevicePath'] - if bs_version is not None: - _setter("bs_version", bs_version) + pulumi.set(__self__, "bs_version", bs_version) if ignore_volume_az is not None: - _setter("ignore_volume_az", ignore_volume_az) + pulumi.set(__self__, "ignore_volume_az", ignore_volume_az) if trust_device_path is not None: - _setter("trust_device_path", trust_device_path) + pulumi.set(__self__, "trust_device_path", trust_device_path) @property @pulumi.getter(name="bsVersion") @@ -3207,77 +2525,26 @@ def __init__(__self__, *, :param pulumi.Input[str] user_id: Required if `username` not provided. (string) :param pulumi.Input[str] username: Required if `user_id` not provided. (string) """ - ClusterCloudProviderOpenstackCloudConfigGlobalArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - auth_url=auth_url, - password=password, - ca_file=ca_file, - domain_id=domain_id, - domain_name=domain_name, - region=region, - tenant_id=tenant_id, - tenant_name=tenant_name, - trust_id=trust_id, - user_id=user_id, - username=username, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - auth_url: Optional[pulumi.Input[str]] = None, - password: Optional[pulumi.Input[str]] = None, - ca_file: Optional[pulumi.Input[str]] = None, - domain_id: Optional[pulumi.Input[str]] = None, - domain_name: Optional[pulumi.Input[str]] = None, - region: Optional[pulumi.Input[str]] = None, - tenant_id: Optional[pulumi.Input[str]] = None, - tenant_name: Optional[pulumi.Input[str]] = None, - trust_id: Optional[pulumi.Input[str]] = None, - user_id: Optional[pulumi.Input[str]] = None, - username: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if auth_url is None and 'authUrl' in kwargs: - auth_url = kwargs['authUrl'] - if auth_url is None: - raise TypeError("Missing 'auth_url' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if ca_file is None and 'caFile' in kwargs: - ca_file = kwargs['caFile'] - if domain_id is None and 'domainId' in kwargs: - domain_id = kwargs['domainId'] - if domain_name is None and 'domainName' in kwargs: - domain_name = kwargs['domainName'] - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_name is None and 'tenantName' in kwargs: - tenant_name = kwargs['tenantName'] - if trust_id is None and 'trustId' in kwargs: - trust_id = kwargs['trustId'] - if user_id is None and 'userId' in kwargs: - user_id = kwargs['userId'] - - _setter("auth_url", auth_url) - _setter("password", password) + pulumi.set(__self__, "auth_url", auth_url) + pulumi.set(__self__, "password", password) if ca_file is not None: - _setter("ca_file", ca_file) + pulumi.set(__self__, "ca_file", ca_file) if domain_id is not None: - _setter("domain_id", domain_id) + pulumi.set(__self__, "domain_id", domain_id) if domain_name is not None: - _setter("domain_name", domain_name) + pulumi.set(__self__, "domain_name", domain_name) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if tenant_id is not None: - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "tenant_id", tenant_id) if tenant_name is not None: - _setter("tenant_name", tenant_name) + pulumi.set(__self__, "tenant_name", tenant_name) if trust_id is not None: - _setter("trust_id", trust_id) + pulumi.set(__self__, "trust_id", trust_id) if user_id is not None: - _setter("user_id", user_id) + pulumi.set(__self__, "user_id", user_id) if username is not None: - _setter("username", username) + pulumi.set(__self__, "username", username) @property @pulumi.getter(name="authUrl") @@ -3439,81 +2706,28 @@ def __init__(__self__, *, :param pulumi.Input[str] subnet_id: (string) :param pulumi.Input[bool] use_octavia: (bool) """ - ClusterCloudProviderOpenstackCloudConfigLoadBalancerArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - create_monitor=create_monitor, - floating_network_id=floating_network_id, - lb_method=lb_method, - lb_provider=lb_provider, - lb_version=lb_version, - manage_security_groups=manage_security_groups, - monitor_delay=monitor_delay, - monitor_max_retries=monitor_max_retries, - monitor_timeout=monitor_timeout, - subnet_id=subnet_id, - use_octavia=use_octavia, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - create_monitor: Optional[pulumi.Input[bool]] = None, - floating_network_id: Optional[pulumi.Input[str]] = None, - lb_method: Optional[pulumi.Input[str]] = None, - lb_provider: Optional[pulumi.Input[str]] = None, - lb_version: Optional[pulumi.Input[str]] = None, - manage_security_groups: Optional[pulumi.Input[bool]] = None, - monitor_delay: Optional[pulumi.Input[str]] = None, - monitor_max_retries: Optional[pulumi.Input[int]] = None, - monitor_timeout: Optional[pulumi.Input[str]] = None, - subnet_id: Optional[pulumi.Input[str]] = None, - use_octavia: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if create_monitor is None and 'createMonitor' in kwargs: - create_monitor = kwargs['createMonitor'] - if floating_network_id is None and 'floatingNetworkId' in kwargs: - floating_network_id = kwargs['floatingNetworkId'] - if lb_method is None and 'lbMethod' in kwargs: - lb_method = kwargs['lbMethod'] - if lb_provider is None and 'lbProvider' in kwargs: - lb_provider = kwargs['lbProvider'] - if lb_version is None and 'lbVersion' in kwargs: - lb_version = kwargs['lbVersion'] - if manage_security_groups is None and 'manageSecurityGroups' in kwargs: - manage_security_groups = kwargs['manageSecurityGroups'] - if monitor_delay is None and 'monitorDelay' in kwargs: - monitor_delay = kwargs['monitorDelay'] - if monitor_max_retries is None and 'monitorMaxRetries' in kwargs: - monitor_max_retries = kwargs['monitorMaxRetries'] - if monitor_timeout is None and 'monitorTimeout' in kwargs: - monitor_timeout = kwargs['monitorTimeout'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if use_octavia is None and 'useOctavia' in kwargs: - use_octavia = kwargs['useOctavia'] - if create_monitor is not None: - _setter("create_monitor", create_monitor) + pulumi.set(__self__, "create_monitor", create_monitor) if floating_network_id is not None: - _setter("floating_network_id", floating_network_id) + pulumi.set(__self__, "floating_network_id", floating_network_id) if lb_method is not None: - _setter("lb_method", lb_method) + pulumi.set(__self__, "lb_method", lb_method) if lb_provider is not None: - _setter("lb_provider", lb_provider) + pulumi.set(__self__, "lb_provider", lb_provider) if lb_version is not None: - _setter("lb_version", lb_version) + pulumi.set(__self__, "lb_version", lb_version) if manage_security_groups is not None: - _setter("manage_security_groups", manage_security_groups) + pulumi.set(__self__, "manage_security_groups", manage_security_groups) if monitor_delay is not None: - _setter("monitor_delay", monitor_delay) + pulumi.set(__self__, "monitor_delay", monitor_delay) if monitor_max_retries is not None: - _setter("monitor_max_retries", monitor_max_retries) + pulumi.set(__self__, "monitor_max_retries", monitor_max_retries) if monitor_timeout is not None: - _setter("monitor_timeout", monitor_timeout) + pulumi.set(__self__, "monitor_timeout", monitor_timeout) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if use_octavia is not None: - _setter("use_octavia", use_octavia) + pulumi.set(__self__, "use_octavia", use_octavia) @property @pulumi.getter(name="createMonitor") @@ -3657,27 +2871,10 @@ def __init__(__self__, *, :param pulumi.Input[int] request_timeout: (int) :param pulumi.Input[str] search_order: (string) """ - ClusterCloudProviderOpenstackCloudConfigMetadataArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - request_timeout=request_timeout, - search_order=search_order, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - request_timeout: Optional[pulumi.Input[int]] = None, - search_order: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if request_timeout is None and 'requestTimeout' in kwargs: - request_timeout = kwargs['requestTimeout'] - if search_order is None and 'searchOrder' in kwargs: - search_order = kwargs['searchOrder'] - if request_timeout is not None: - _setter("request_timeout", request_timeout) + pulumi.set(__self__, "request_timeout", request_timeout) if search_order is not None: - _setter("search_order", search_order) + pulumi.set(__self__, "search_order", search_order) @property @pulumi.getter(name="requestTimeout") @@ -3711,21 +2908,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] router_id: (string) """ - ClusterCloudProviderOpenstackCloudConfigRouteArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - router_id=router_id, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - router_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if router_id is None and 'routerId' in kwargs: - router_id = kwargs['routerId'] - if router_id is not None: - _setter("router_id", router_id) + pulumi.set(__self__, "router_id", router_id) @property @pulumi.getter(name="routerId") @@ -3755,42 +2939,15 @@ def __init__(__self__, *, :param pulumi.Input['ClusterCloudProviderOpenstackCloudProviderMetadataArgs'] metadata: (list maxitems:1) :param pulumi.Input['ClusterCloudProviderOpenstackCloudProviderRouteArgs'] route: (list maxitems:1) """ - ClusterCloudProviderOpenstackCloudProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - block_storage=block_storage, - load_balancer=load_balancer, - metadata=metadata, - route=route, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudProviderGlobalArgs']] = None, - block_storage: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudProviderBlockStorageArgs']] = None, - load_balancer: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudProviderLoadBalancerArgs']] = None, - metadata: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudProviderMetadataArgs']] = None, - route: Optional[pulumi.Input['ClusterCloudProviderOpenstackCloudProviderRouteArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if global_ is None: - raise TypeError("Missing 'global_' argument") - if block_storage is None and 'blockStorage' in kwargs: - block_storage = kwargs['blockStorage'] - if load_balancer is None and 'loadBalancer' in kwargs: - load_balancer = kwargs['loadBalancer'] - - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if block_storage is not None: - _setter("block_storage", block_storage) + pulumi.set(__self__, "block_storage", block_storage) if load_balancer is not None: - _setter("load_balancer", load_balancer) + pulumi.set(__self__, "load_balancer", load_balancer) if metadata is not None: - _setter("metadata", metadata) + pulumi.set(__self__, "metadata", metadata) if route is not None: - _setter("route", route) + pulumi.set(__self__, "route", route) @property @pulumi.getter(name="global") @@ -3864,33 +3021,12 @@ def __init__(__self__, *, :param pulumi.Input[bool] ignore_volume_az: (string) :param pulumi.Input[bool] trust_device_path: (string) """ - ClusterCloudProviderOpenstackCloudProviderBlockStorageArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - bs_version=bs_version, - ignore_volume_az=ignore_volume_az, - trust_device_path=trust_device_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - bs_version: Optional[pulumi.Input[str]] = None, - ignore_volume_az: Optional[pulumi.Input[bool]] = None, - trust_device_path: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if bs_version is None and 'bsVersion' in kwargs: - bs_version = kwargs['bsVersion'] - if ignore_volume_az is None and 'ignoreVolumeAz' in kwargs: - ignore_volume_az = kwargs['ignoreVolumeAz'] - if trust_device_path is None and 'trustDevicePath' in kwargs: - trust_device_path = kwargs['trustDevicePath'] - if bs_version is not None: - _setter("bs_version", bs_version) + pulumi.set(__self__, "bs_version", bs_version) if ignore_volume_az is not None: - _setter("ignore_volume_az", ignore_volume_az) + pulumi.set(__self__, "ignore_volume_az", ignore_volume_az) if trust_device_path is not None: - _setter("trust_device_path", trust_device_path) + pulumi.set(__self__, "trust_device_path", trust_device_path) @property @pulumi.getter(name="bsVersion") @@ -3956,77 +3092,26 @@ def __init__(__self__, *, :param pulumi.Input[str] user_id: Required if `username` not provided. (string) :param pulumi.Input[str] username: Required if `user_id` not provided. (string) """ - ClusterCloudProviderOpenstackCloudProviderGlobalArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - auth_url=auth_url, - password=password, - ca_file=ca_file, - domain_id=domain_id, - domain_name=domain_name, - region=region, - tenant_id=tenant_id, - tenant_name=tenant_name, - trust_id=trust_id, - user_id=user_id, - username=username, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - auth_url: Optional[pulumi.Input[str]] = None, - password: Optional[pulumi.Input[str]] = None, - ca_file: Optional[pulumi.Input[str]] = None, - domain_id: Optional[pulumi.Input[str]] = None, - domain_name: Optional[pulumi.Input[str]] = None, - region: Optional[pulumi.Input[str]] = None, - tenant_id: Optional[pulumi.Input[str]] = None, - tenant_name: Optional[pulumi.Input[str]] = None, - trust_id: Optional[pulumi.Input[str]] = None, - user_id: Optional[pulumi.Input[str]] = None, - username: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if auth_url is None and 'authUrl' in kwargs: - auth_url = kwargs['authUrl'] - if auth_url is None: - raise TypeError("Missing 'auth_url' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if ca_file is None and 'caFile' in kwargs: - ca_file = kwargs['caFile'] - if domain_id is None and 'domainId' in kwargs: - domain_id = kwargs['domainId'] - if domain_name is None and 'domainName' in kwargs: - domain_name = kwargs['domainName'] - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_name is None and 'tenantName' in kwargs: - tenant_name = kwargs['tenantName'] - if trust_id is None and 'trustId' in kwargs: - trust_id = kwargs['trustId'] - if user_id is None and 'userId' in kwargs: - user_id = kwargs['userId'] - - _setter("auth_url", auth_url) - _setter("password", password) + pulumi.set(__self__, "auth_url", auth_url) + pulumi.set(__self__, "password", password) if ca_file is not None: - _setter("ca_file", ca_file) + pulumi.set(__self__, "ca_file", ca_file) if domain_id is not None: - _setter("domain_id", domain_id) + pulumi.set(__self__, "domain_id", domain_id) if domain_name is not None: - _setter("domain_name", domain_name) + pulumi.set(__self__, "domain_name", domain_name) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if tenant_id is not None: - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "tenant_id", tenant_id) if tenant_name is not None: - _setter("tenant_name", tenant_name) + pulumi.set(__self__, "tenant_name", tenant_name) if trust_id is not None: - _setter("trust_id", trust_id) + pulumi.set(__self__, "trust_id", trust_id) if user_id is not None: - _setter("user_id", user_id) + pulumi.set(__self__, "user_id", user_id) if username is not None: - _setter("username", username) + pulumi.set(__self__, "username", username) @property @pulumi.getter(name="authUrl") @@ -4188,81 +3273,28 @@ def __init__(__self__, *, :param pulumi.Input[str] subnet_id: (string) :param pulumi.Input[bool] use_octavia: (bool) """ - ClusterCloudProviderOpenstackCloudProviderLoadBalancerArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - create_monitor=create_monitor, - floating_network_id=floating_network_id, - lb_method=lb_method, - lb_provider=lb_provider, - lb_version=lb_version, - manage_security_groups=manage_security_groups, - monitor_delay=monitor_delay, - monitor_max_retries=monitor_max_retries, - monitor_timeout=monitor_timeout, - subnet_id=subnet_id, - use_octavia=use_octavia, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - create_monitor: Optional[pulumi.Input[bool]] = None, - floating_network_id: Optional[pulumi.Input[str]] = None, - lb_method: Optional[pulumi.Input[str]] = None, - lb_provider: Optional[pulumi.Input[str]] = None, - lb_version: Optional[pulumi.Input[str]] = None, - manage_security_groups: Optional[pulumi.Input[bool]] = None, - monitor_delay: Optional[pulumi.Input[str]] = None, - monitor_max_retries: Optional[pulumi.Input[int]] = None, - monitor_timeout: Optional[pulumi.Input[str]] = None, - subnet_id: Optional[pulumi.Input[str]] = None, - use_octavia: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if create_monitor is None and 'createMonitor' in kwargs: - create_monitor = kwargs['createMonitor'] - if floating_network_id is None and 'floatingNetworkId' in kwargs: - floating_network_id = kwargs['floatingNetworkId'] - if lb_method is None and 'lbMethod' in kwargs: - lb_method = kwargs['lbMethod'] - if lb_provider is None and 'lbProvider' in kwargs: - lb_provider = kwargs['lbProvider'] - if lb_version is None and 'lbVersion' in kwargs: - lb_version = kwargs['lbVersion'] - if manage_security_groups is None and 'manageSecurityGroups' in kwargs: - manage_security_groups = kwargs['manageSecurityGroups'] - if monitor_delay is None and 'monitorDelay' in kwargs: - monitor_delay = kwargs['monitorDelay'] - if monitor_max_retries is None and 'monitorMaxRetries' in kwargs: - monitor_max_retries = kwargs['monitorMaxRetries'] - if monitor_timeout is None and 'monitorTimeout' in kwargs: - monitor_timeout = kwargs['monitorTimeout'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if use_octavia is None and 'useOctavia' in kwargs: - use_octavia = kwargs['useOctavia'] - if create_monitor is not None: - _setter("create_monitor", create_monitor) + pulumi.set(__self__, "create_monitor", create_monitor) if floating_network_id is not None: - _setter("floating_network_id", floating_network_id) + pulumi.set(__self__, "floating_network_id", floating_network_id) if lb_method is not None: - _setter("lb_method", lb_method) + pulumi.set(__self__, "lb_method", lb_method) if lb_provider is not None: - _setter("lb_provider", lb_provider) + pulumi.set(__self__, "lb_provider", lb_provider) if lb_version is not None: - _setter("lb_version", lb_version) + pulumi.set(__self__, "lb_version", lb_version) if manage_security_groups is not None: - _setter("manage_security_groups", manage_security_groups) + pulumi.set(__self__, "manage_security_groups", manage_security_groups) if monitor_delay is not None: - _setter("monitor_delay", monitor_delay) + pulumi.set(__self__, "monitor_delay", monitor_delay) if monitor_max_retries is not None: - _setter("monitor_max_retries", monitor_max_retries) + pulumi.set(__self__, "monitor_max_retries", monitor_max_retries) if monitor_timeout is not None: - _setter("monitor_timeout", monitor_timeout) + pulumi.set(__self__, "monitor_timeout", monitor_timeout) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if use_octavia is not None: - _setter("use_octavia", use_octavia) + pulumi.set(__self__, "use_octavia", use_octavia) @property @pulumi.getter(name="createMonitor") @@ -4406,27 +3438,10 @@ def __init__(__self__, *, :param pulumi.Input[int] request_timeout: (int) :param pulumi.Input[str] search_order: (string) """ - ClusterCloudProviderOpenstackCloudProviderMetadataArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - request_timeout=request_timeout, - search_order=search_order, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - request_timeout: Optional[pulumi.Input[int]] = None, - search_order: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if request_timeout is None and 'requestTimeout' in kwargs: - request_timeout = kwargs['requestTimeout'] - if search_order is None and 'searchOrder' in kwargs: - search_order = kwargs['searchOrder'] - if request_timeout is not None: - _setter("request_timeout", request_timeout) + pulumi.set(__self__, "request_timeout", request_timeout) if search_order is not None: - _setter("search_order", search_order) + pulumi.set(__self__, "search_order", search_order) @property @pulumi.getter(name="requestTimeout") @@ -4460,21 +3475,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] router_id: (string) """ - ClusterCloudProviderOpenstackCloudProviderRouteArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - router_id=router_id, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - router_id: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if router_id is None and 'routerId' in kwargs: - router_id = kwargs['routerId'] - if router_id is not None: - _setter("router_id", router_id) + pulumi.set(__self__, "router_id", router_id) @property @pulumi.getter(name="routerId") @@ -4504,41 +3506,14 @@ def __init__(__self__, *, :param pulumi.Input['ClusterCloudProviderVsphereCloudConfigGlobalArgs'] global_: (list maxitems:1) :param pulumi.Input['ClusterCloudProviderVsphereCloudConfigNetworkArgs'] network: RKE k8s cluster network configuration (list maxitems:1) """ - ClusterCloudProviderVsphereCloudConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - virtual_centers=virtual_centers, - workspace=workspace, - disk=disk, - global_=global_, - network=network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - virtual_centers: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterCloudProviderVsphereCloudConfigVirtualCenterArgs']]]] = None, - workspace: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudConfigWorkspaceArgs']] = None, - disk: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudConfigDiskArgs']] = None, - global_: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudConfigGlobalArgs']] = None, - network: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudConfigNetworkArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if virtual_centers is None and 'virtualCenters' in kwargs: - virtual_centers = kwargs['virtualCenters'] - if virtual_centers is None: - raise TypeError("Missing 'virtual_centers' argument") - if workspace is None: - raise TypeError("Missing 'workspace' argument") - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - - _setter("virtual_centers", virtual_centers) - _setter("workspace", workspace) + pulumi.set(__self__, "virtual_centers", virtual_centers) + pulumi.set(__self__, "workspace", workspace) if disk is not None: - _setter("disk", disk) + pulumi.set(__self__, "disk", disk) if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if network is not None: - _setter("network", network) + pulumi.set(__self__, "network", network) @property @pulumi.getter(name="virtualCenters") @@ -4608,21 +3583,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] scsi_controller_type: (string) """ - ClusterCloudProviderVsphereCloudConfigDiskArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - scsi_controller_type=scsi_controller_type, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - scsi_controller_type: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if scsi_controller_type is None and 'scsiControllerType' in kwargs: - scsi_controller_type = kwargs['scsiControllerType'] - if scsi_controller_type is not None: - _setter("scsi_controller_type", scsi_controller_type) + pulumi.set(__self__, "scsi_controller_type", scsi_controller_type) @property @pulumi.getter(name="scsiControllerType") @@ -4664,69 +3626,28 @@ def __init__(__self__, *, :param pulumi.Input[str] vm_uuid: (string) :param pulumi.Input[str] working_dir: (string) """ - ClusterCloudProviderVsphereCloudConfigGlobalArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - datacenters=datacenters, - datastore=datastore, - insecure_flag=insecure_flag, - password=password, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - user=user, - vm_name=vm_name, - vm_uuid=vm_uuid, - working_dir=working_dir, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[pulumi.Input[str]] = None, - datacenters: Optional[pulumi.Input[str]] = None, - datastore: Optional[pulumi.Input[str]] = None, - insecure_flag: Optional[pulumi.Input[bool]] = None, - password: Optional[pulumi.Input[str]] = None, - port: Optional[pulumi.Input[str]] = None, - soap_roundtrip_count: Optional[pulumi.Input[int]] = None, - user: Optional[pulumi.Input[str]] = None, - vm_name: Optional[pulumi.Input[str]] = None, - vm_uuid: Optional[pulumi.Input[str]] = None, - working_dir: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if insecure_flag is None and 'insecureFlag' in kwargs: - insecure_flag = kwargs['insecureFlag'] - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - if vm_name is None and 'vmName' in kwargs: - vm_name = kwargs['vmName'] - if vm_uuid is None and 'vmUuid' in kwargs: - vm_uuid = kwargs['vmUuid'] - if working_dir is None and 'workingDir' in kwargs: - working_dir = kwargs['workingDir'] - if datacenter is not None: - _setter("datacenter", datacenter) + pulumi.set(__self__, "datacenter", datacenter) if datacenters is not None: - _setter("datacenters", datacenters) + pulumi.set(__self__, "datacenters", datacenters) if datastore is not None: - _setter("datastore", datastore) + pulumi.set(__self__, "datastore", datastore) if insecure_flag is not None: - _setter("insecure_flag", insecure_flag) + pulumi.set(__self__, "insecure_flag", insecure_flag) if password is not None: - _setter("password", password) + pulumi.set(__self__, "password", password) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) if user is not None: - _setter("user", user) + pulumi.set(__self__, "user", user) if vm_name is not None: - _setter("vm_name", vm_name) + pulumi.set(__self__, "vm_name", vm_name) if vm_uuid is not None: - _setter("vm_uuid", vm_uuid) + pulumi.set(__self__, "vm_uuid", vm_uuid) if working_dir is not None: - _setter("working_dir", working_dir) + pulumi.set(__self__, "working_dir", working_dir) @property @pulumi.getter @@ -4868,21 +3789,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] public_network: (string) """ - ClusterCloudProviderVsphereCloudConfigNetworkArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - public_network=public_network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - public_network: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if public_network is None and 'publicNetwork' in kwargs: - public_network = kwargs['publicNetwork'] - if public_network is not None: - _setter("public_network", public_network) + pulumi.set(__self__, "public_network", public_network) @property @pulumi.getter(name="publicNetwork") @@ -4914,45 +3822,14 @@ def __init__(__self__, *, :param pulumi.Input[str] port: Port used for SSH communication (string) :param pulumi.Input[int] soap_roundtrip_count: (int) """ - ClusterCloudProviderVsphereCloudConfigVirtualCenterArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenters=datacenters, - name=name, - password=password, - user=user, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenters: Optional[pulumi.Input[str]] = None, - name: Optional[pulumi.Input[str]] = None, - password: Optional[pulumi.Input[str]] = None, - user: Optional[pulumi.Input[str]] = None, - port: Optional[pulumi.Input[str]] = None, - soap_roundtrip_count: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenters is None: - raise TypeError("Missing 'datacenters' argument") - if name is None: - raise TypeError("Missing 'name' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - - _setter("datacenters", datacenters) - _setter("name", name) - _setter("password", password) - _setter("user", user) + pulumi.set(__self__, "datacenters", datacenters) + pulumi.set(__self__, "name", name) + pulumi.set(__self__, "password", password) + pulumi.set(__self__, "user", user) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) @property @pulumi.getter @@ -5042,41 +3919,14 @@ def __init__(__self__, *, :param pulumi.Input[str] folder: Folder for S3 service. Available from Rancher v2.2.7 (string) :param pulumi.Input[str] resourcepool_path: (string) """ - ClusterCloudProviderVsphereCloudConfigWorkspaceArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - server=server, - default_datastore=default_datastore, - folder=folder, - resourcepool_path=resourcepool_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[pulumi.Input[str]] = None, - server: Optional[pulumi.Input[str]] = None, - default_datastore: Optional[pulumi.Input[str]] = None, - folder: Optional[pulumi.Input[str]] = None, - resourcepool_path: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenter is None: - raise TypeError("Missing 'datacenter' argument") - if server is None: - raise TypeError("Missing 'server' argument") - if default_datastore is None and 'defaultDatastore' in kwargs: - default_datastore = kwargs['defaultDatastore'] - if resourcepool_path is None and 'resourcepoolPath' in kwargs: - resourcepool_path = kwargs['resourcepoolPath'] - - _setter("datacenter", datacenter) - _setter("server", server) + pulumi.set(__self__, "datacenter", datacenter) + pulumi.set(__self__, "server", server) if default_datastore is not None: - _setter("default_datastore", default_datastore) + pulumi.set(__self__, "default_datastore", default_datastore) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if resourcepool_path is not None: - _setter("resourcepool_path", resourcepool_path) + pulumi.set(__self__, "resourcepool_path", resourcepool_path) @property @pulumi.getter @@ -5154,41 +4004,14 @@ def __init__(__self__, *, :param pulumi.Input['ClusterCloudProviderVsphereCloudProviderGlobalArgs'] global_: (list maxitems:1) :param pulumi.Input['ClusterCloudProviderVsphereCloudProviderNetworkArgs'] network: RKE k8s cluster network configuration (list maxitems:1) """ - ClusterCloudProviderVsphereCloudProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - virtual_centers=virtual_centers, - workspace=workspace, - disk=disk, - global_=global_, - network=network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - virtual_centers: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterCloudProviderVsphereCloudProviderVirtualCenterArgs']]]] = None, - workspace: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudProviderWorkspaceArgs']] = None, - disk: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudProviderDiskArgs']] = None, - global_: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudProviderGlobalArgs']] = None, - network: Optional[pulumi.Input['ClusterCloudProviderVsphereCloudProviderNetworkArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if virtual_centers is None and 'virtualCenters' in kwargs: - virtual_centers = kwargs['virtualCenters'] - if virtual_centers is None: - raise TypeError("Missing 'virtual_centers' argument") - if workspace is None: - raise TypeError("Missing 'workspace' argument") - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - - _setter("virtual_centers", virtual_centers) - _setter("workspace", workspace) + pulumi.set(__self__, "virtual_centers", virtual_centers) + pulumi.set(__self__, "workspace", workspace) if disk is not None: - _setter("disk", disk) + pulumi.set(__self__, "disk", disk) if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if network is not None: - _setter("network", network) + pulumi.set(__self__, "network", network) @property @pulumi.getter(name="virtualCenters") @@ -5258,21 +4081,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] scsi_controller_type: (string) """ - ClusterCloudProviderVsphereCloudProviderDiskArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - scsi_controller_type=scsi_controller_type, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - scsi_controller_type: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if scsi_controller_type is None and 'scsiControllerType' in kwargs: - scsi_controller_type = kwargs['scsiControllerType'] - if scsi_controller_type is not None: - _setter("scsi_controller_type", scsi_controller_type) + pulumi.set(__self__, "scsi_controller_type", scsi_controller_type) @property @pulumi.getter(name="scsiControllerType") @@ -5314,69 +4124,28 @@ def __init__(__self__, *, :param pulumi.Input[str] vm_uuid: (string) :param pulumi.Input[str] working_dir: (string) """ - ClusterCloudProviderVsphereCloudProviderGlobalArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - datacenters=datacenters, - datastore=datastore, - insecure_flag=insecure_flag, - password=password, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - user=user, - vm_name=vm_name, - vm_uuid=vm_uuid, - working_dir=working_dir, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[pulumi.Input[str]] = None, - datacenters: Optional[pulumi.Input[str]] = None, - datastore: Optional[pulumi.Input[str]] = None, - insecure_flag: Optional[pulumi.Input[bool]] = None, - password: Optional[pulumi.Input[str]] = None, - port: Optional[pulumi.Input[str]] = None, - soap_roundtrip_count: Optional[pulumi.Input[int]] = None, - user: Optional[pulumi.Input[str]] = None, - vm_name: Optional[pulumi.Input[str]] = None, - vm_uuid: Optional[pulumi.Input[str]] = None, - working_dir: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if insecure_flag is None and 'insecureFlag' in kwargs: - insecure_flag = kwargs['insecureFlag'] - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - if vm_name is None and 'vmName' in kwargs: - vm_name = kwargs['vmName'] - if vm_uuid is None and 'vmUuid' in kwargs: - vm_uuid = kwargs['vmUuid'] - if working_dir is None and 'workingDir' in kwargs: - working_dir = kwargs['workingDir'] - if datacenter is not None: - _setter("datacenter", datacenter) + pulumi.set(__self__, "datacenter", datacenter) if datacenters is not None: - _setter("datacenters", datacenters) + pulumi.set(__self__, "datacenters", datacenters) if datastore is not None: - _setter("datastore", datastore) + pulumi.set(__self__, "datastore", datastore) if insecure_flag is not None: - _setter("insecure_flag", insecure_flag) + pulumi.set(__self__, "insecure_flag", insecure_flag) if password is not None: - _setter("password", password) + pulumi.set(__self__, "password", password) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) if user is not None: - _setter("user", user) + pulumi.set(__self__, "user", user) if vm_name is not None: - _setter("vm_name", vm_name) + pulumi.set(__self__, "vm_name", vm_name) if vm_uuid is not None: - _setter("vm_uuid", vm_uuid) + pulumi.set(__self__, "vm_uuid", vm_uuid) if working_dir is not None: - _setter("working_dir", working_dir) + pulumi.set(__self__, "working_dir", working_dir) @property @pulumi.getter @@ -5518,21 +4287,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] public_network: (string) """ - ClusterCloudProviderVsphereCloudProviderNetworkArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - public_network=public_network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - public_network: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if public_network is None and 'publicNetwork' in kwargs: - public_network = kwargs['publicNetwork'] - if public_network is not None: - _setter("public_network", public_network) + pulumi.set(__self__, "public_network", public_network) @property @pulumi.getter(name="publicNetwork") @@ -5564,45 +4320,14 @@ def __init__(__self__, *, :param pulumi.Input[str] port: Port used for SSH communication (string) :param pulumi.Input[int] soap_roundtrip_count: (int) """ - ClusterCloudProviderVsphereCloudProviderVirtualCenterArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenters=datacenters, - name=name, - password=password, - user=user, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenters: Optional[pulumi.Input[str]] = None, - name: Optional[pulumi.Input[str]] = None, - password: Optional[pulumi.Input[str]] = None, - user: Optional[pulumi.Input[str]] = None, - port: Optional[pulumi.Input[str]] = None, - soap_roundtrip_count: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenters is None: - raise TypeError("Missing 'datacenters' argument") - if name is None: - raise TypeError("Missing 'name' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - - _setter("datacenters", datacenters) - _setter("name", name) - _setter("password", password) - _setter("user", user) + pulumi.set(__self__, "datacenters", datacenters) + pulumi.set(__self__, "name", name) + pulumi.set(__self__, "password", password) + pulumi.set(__self__, "user", user) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) @property @pulumi.getter @@ -5692,41 +4417,14 @@ def __init__(__self__, *, :param pulumi.Input[str] folder: Folder for S3 service. Available from Rancher v2.2.7 (string) :param pulumi.Input[str] resourcepool_path: (string) """ - ClusterCloudProviderVsphereCloudProviderWorkspaceArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - server=server, - default_datastore=default_datastore, - folder=folder, - resourcepool_path=resourcepool_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[pulumi.Input[str]] = None, - server: Optional[pulumi.Input[str]] = None, - default_datastore: Optional[pulumi.Input[str]] = None, - folder: Optional[pulumi.Input[str]] = None, - resourcepool_path: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenter is None: - raise TypeError("Missing 'datacenter' argument") - if server is None: - raise TypeError("Missing 'server' argument") - if default_datastore is None and 'defaultDatastore' in kwargs: - default_datastore = kwargs['defaultDatastore'] - if resourcepool_path is None and 'resourcepoolPath' in kwargs: - resourcepool_path = kwargs['resourcepoolPath'] - - _setter("datacenter", datacenter) - _setter("server", server) + pulumi.set(__self__, "datacenter", datacenter) + pulumi.set(__self__, "server", server) if default_datastore is not None: - _setter("default_datastore", default_datastore) + pulumi.set(__self__, "default_datastore", default_datastore) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if resourcepool_path is not None: - _setter("resourcepool_path", resourcepool_path) + pulumi.set(__self__, "resourcepool_path", resourcepool_path) @property @pulumi.getter @@ -5798,25 +4496,10 @@ def __init__(__self__, *, :param pulumi.Input[str] address: Address ip for node (string) :param pulumi.Input[str] node_name: Name of the host provisioned via docker machine (string) """ - ClusterControlPlaneHostArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[pulumi.Input[str]] = None, - node_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter @@ -5858,41 +4541,16 @@ def __init__(__self__, *, :param pulumi.Input[Sequence[pulumi.Input[str]]] reverse_cidrs: Reverse CIDRs (list) :param pulumi.Input[Sequence[pulumi.Input[str]]] upstream_nameservers: Upstream nameservers (list) """ - ClusterDnsArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - node_selector=node_selector, - nodelocal=nodelocal, - provider=provider, - reverse_cidrs=reverse_cidrs, - upstream_nameservers=upstream_nameservers, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - node_selector: Optional[pulumi.Input[Mapping[str, Any]]] = None, - nodelocal: Optional[pulumi.Input['ClusterDnsNodelocalArgs']] = None, - provider: Optional[pulumi.Input[str]] = None, - reverse_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - upstream_nameservers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if reverse_cidrs is None and 'reverseCidrs' in kwargs: - reverse_cidrs = kwargs['reverseCidrs'] - if upstream_nameservers is None and 'upstreamNameservers' in kwargs: - upstream_nameservers = kwargs['upstreamNameservers'] - if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) if nodelocal is not None: - _setter("nodelocal", nodelocal) + pulumi.set(__self__, "nodelocal", nodelocal) if provider is not None: - _setter("provider", provider) + pulumi.set(__self__, "provider", provider) if reverse_cidrs is not None: - _setter("reverse_cidrs", reverse_cidrs) + pulumi.set(__self__, "reverse_cidrs", reverse_cidrs) if upstream_nameservers is not None: - _setter("upstream_nameservers", upstream_nameservers) + pulumi.set(__self__, "upstream_nameservers", upstream_nameservers) @property @pulumi.getter(name="nodeSelector") @@ -5964,27 +4622,10 @@ def __init__(__self__, *, :param pulumi.Input[str] ip_address: Nodelocal dns ip address (string) :param pulumi.Input[Mapping[str, Any]] node_selector: Node selector key pair (map) """ - ClusterDnsNodelocalArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - ip_address=ip_address, - node_selector=node_selector, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - ip_address: Optional[pulumi.Input[str]] = None, - node_selector: Optional[pulumi.Input[Mapping[str, Any]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if ip_address is None and 'ipAddress' in kwargs: - ip_address = kwargs['ipAddress'] - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if ip_address is not None: - _setter("ip_address", ip_address) + pulumi.set(__self__, "ip_address", ip_address) if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) @property @pulumi.getter(name="ipAddress") @@ -6020,25 +4661,10 @@ def __init__(__self__, *, :param pulumi.Input[str] address: Address ip for node (string) :param pulumi.Input[str] node_name: Name of the host provisioned via docker machine (string) """ - ClusterEtcdHostArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[pulumi.Input[str]] = None, - node_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter @@ -6074,25 +4700,10 @@ def __init__(__self__, *, :param pulumi.Input[str] address: Address ip for node (string) :param pulumi.Input[str] node_name: Name of the host provisioned via docker machine (string) """ - ClusterInactiveHostArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[pulumi.Input[str]] = None, - node_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter @@ -6141,65 +4752,24 @@ def __init__(__self__, *, :param pulumi.Input[Mapping[str, Any]] options: Network provider options (map) :param pulumi.Input[str] provider: Monitoring provider (string) """ - ClusterIngressArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - default_backend=default_backend, - dns_policy=dns_policy, - extra_args=extra_args, - http_port=http_port, - https_port=https_port, - network_mode=network_mode, - node_selector=node_selector, - options=options, - provider=provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - default_backend: Optional[pulumi.Input[bool]] = None, - dns_policy: Optional[pulumi.Input[str]] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - http_port: Optional[pulumi.Input[int]] = None, - https_port: Optional[pulumi.Input[int]] = None, - network_mode: Optional[pulumi.Input[str]] = None, - node_selector: Optional[pulumi.Input[Mapping[str, Any]]] = None, - options: Optional[pulumi.Input[Mapping[str, Any]]] = None, - provider: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if default_backend is None and 'defaultBackend' in kwargs: - default_backend = kwargs['defaultBackend'] - if dns_policy is None and 'dnsPolicy' in kwargs: - dns_policy = kwargs['dnsPolicy'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if http_port is None and 'httpPort' in kwargs: - http_port = kwargs['httpPort'] - if https_port is None and 'httpsPort' in kwargs: - https_port = kwargs['httpsPort'] - if network_mode is None and 'networkMode' in kwargs: - network_mode = kwargs['networkMode'] - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if default_backend is not None: - _setter("default_backend", default_backend) + pulumi.set(__self__, "default_backend", default_backend) if dns_policy is not None: - _setter("dns_policy", dns_policy) + pulumi.set(__self__, "dns_policy", dns_policy) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if http_port is not None: - _setter("http_port", http_port) + pulumi.set(__self__, "http_port", http_port) if https_port is not None: - _setter("https_port", https_port) + pulumi.set(__self__, "https_port", https_port) if network_mode is not None: - _setter("network_mode", network_mode) + pulumi.set(__self__, "network_mode", network_mode) if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) if provider is not None: - _setter("provider", provider) + pulumi.set(__self__, "provider", provider) @property @pulumi.getter(name="defaultBackend") @@ -6318,29 +4888,12 @@ def __init__(__self__, *, :param pulumi.Input[Mapping[str, Any]] options: Network provider options (map) :param pulumi.Input[str] provider: Monitoring provider (string) """ - ClusterMonitoringArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - node_selector=node_selector, - options=options, - provider=provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - node_selector: Optional[pulumi.Input[Mapping[str, Any]]] = None, - options: Optional[pulumi.Input[Mapping[str, Any]]] = None, - provider: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) if provider is not None: - _setter("provider", provider) + pulumi.set(__self__, "provider", provider) @property @pulumi.getter(name="nodeSelector") @@ -6400,57 +4953,22 @@ def __init__(__self__, *, :param pulumi.Input[str] plugin: Network provider plugin. `calico`, `canal` (default), `flannel`, `none` and `weave` are supported. (string) :param pulumi.Input['ClusterNetworkWeaveNetworkProviderArgs'] weave_network_provider: Weave network provider config (list maxitems:1) """ - ClusterNetworkArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - aci_network_provider=aci_network_provider, - calico_network_provider=calico_network_provider, - canal_network_provider=canal_network_provider, - flannel_network_provider=flannel_network_provider, - mtu=mtu, - options=options, - plugin=plugin, - weave_network_provider=weave_network_provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aci_network_provider: Optional[pulumi.Input['ClusterNetworkAciNetworkProviderArgs']] = None, - calico_network_provider: Optional[pulumi.Input['ClusterNetworkCalicoNetworkProviderArgs']] = None, - canal_network_provider: Optional[pulumi.Input['ClusterNetworkCanalNetworkProviderArgs']] = None, - flannel_network_provider: Optional[pulumi.Input['ClusterNetworkFlannelNetworkProviderArgs']] = None, - mtu: Optional[pulumi.Input[int]] = None, - options: Optional[pulumi.Input[Mapping[str, Any]]] = None, - plugin: Optional[pulumi.Input[str]] = None, - weave_network_provider: Optional[pulumi.Input['ClusterNetworkWeaveNetworkProviderArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aci_network_provider is None and 'aciNetworkProvider' in kwargs: - aci_network_provider = kwargs['aciNetworkProvider'] - if calico_network_provider is None and 'calicoNetworkProvider' in kwargs: - calico_network_provider = kwargs['calicoNetworkProvider'] - if canal_network_provider is None and 'canalNetworkProvider' in kwargs: - canal_network_provider = kwargs['canalNetworkProvider'] - if flannel_network_provider is None and 'flannelNetworkProvider' in kwargs: - flannel_network_provider = kwargs['flannelNetworkProvider'] - if weave_network_provider is None and 'weaveNetworkProvider' in kwargs: - weave_network_provider = kwargs['weaveNetworkProvider'] - if aci_network_provider is not None: - _setter("aci_network_provider", aci_network_provider) + pulumi.set(__self__, "aci_network_provider", aci_network_provider) if calico_network_provider is not None: - _setter("calico_network_provider", calico_network_provider) + pulumi.set(__self__, "calico_network_provider", calico_network_provider) if canal_network_provider is not None: - _setter("canal_network_provider", canal_network_provider) + pulumi.set(__self__, "canal_network_provider", canal_network_provider) if flannel_network_provider is not None: - _setter("flannel_network_provider", flannel_network_provider) + pulumi.set(__self__, "flannel_network_provider", flannel_network_provider) if mtu is not None: - _setter("mtu", mtu) + pulumi.set(__self__, "mtu", mtu) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) if plugin is not None: - _setter("plugin", plugin) + pulumi.set(__self__, "plugin", plugin) if weave_network_provider is not None: - _setter("weave_network_provider", weave_network_provider) + pulumi.set(__self__, "weave_network_provider", weave_network_provider) @property @pulumi.getter(name="aciNetworkProvider") @@ -6602,174 +5120,33 @@ def __init__(__self__, *, :param pulumi.Input[str] snat_port_range_start: Port start range for Source Network Address Translation on aci (string) :param pulumi.Input[str] snat_ports_per_node: Ports per node for Source Network Address Translation on aci (string) """ - ClusterNetworkAciNetworkProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - aep=aep, - apic_hosts=apic_hosts, - apic_user_crt=apic_user_crt, - apic_user_key=apic_user_key, - apic_user_name=apic_user_name, - encap_type=encap_type, - extern_dynamic=extern_dynamic, - extern_static=extern_static, - infra_vlan=infra_vlan, - kube_api_vlan=kube_api_vlan, - l3out=l3out, - l3out_external_networks=l3out_external_networks, - mcast_range_end=mcast_range_end, - mcast_range_start=mcast_range_start, - node_subnet=node_subnet, - node_svc_subnet=node_svc_subnet, - service_vlan=service_vlan, - system_id=system_id, - token=token, - vrf_name=vrf_name, - vrf_tenant=vrf_tenant, - snat_port_range_end=snat_port_range_end, - snat_port_range_start=snat_port_range_start, - snat_ports_per_node=snat_ports_per_node, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aep: Optional[pulumi.Input[str]] = None, - apic_hosts: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - apic_user_crt: Optional[pulumi.Input[str]] = None, - apic_user_key: Optional[pulumi.Input[str]] = None, - apic_user_name: Optional[pulumi.Input[str]] = None, - encap_type: Optional[pulumi.Input[str]] = None, - extern_dynamic: Optional[pulumi.Input[str]] = None, - extern_static: Optional[pulumi.Input[str]] = None, - infra_vlan: Optional[pulumi.Input[str]] = None, - kube_api_vlan: Optional[pulumi.Input[str]] = None, - l3out: Optional[pulumi.Input[str]] = None, - l3out_external_networks: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - mcast_range_end: Optional[pulumi.Input[str]] = None, - mcast_range_start: Optional[pulumi.Input[str]] = None, - node_subnet: Optional[pulumi.Input[str]] = None, - node_svc_subnet: Optional[pulumi.Input[str]] = None, - service_vlan: Optional[pulumi.Input[str]] = None, - system_id: Optional[pulumi.Input[str]] = None, - token: Optional[pulumi.Input[str]] = None, - vrf_name: Optional[pulumi.Input[str]] = None, - vrf_tenant: Optional[pulumi.Input[str]] = None, - snat_port_range_end: Optional[pulumi.Input[str]] = None, - snat_port_range_start: Optional[pulumi.Input[str]] = None, - snat_ports_per_node: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aep is None: - raise TypeError("Missing 'aep' argument") - if apic_hosts is None and 'apicHosts' in kwargs: - apic_hosts = kwargs['apicHosts'] - if apic_hosts is None: - raise TypeError("Missing 'apic_hosts' argument") - if apic_user_crt is None and 'apicUserCrt' in kwargs: - apic_user_crt = kwargs['apicUserCrt'] - if apic_user_crt is None: - raise TypeError("Missing 'apic_user_crt' argument") - if apic_user_key is None and 'apicUserKey' in kwargs: - apic_user_key = kwargs['apicUserKey'] - if apic_user_key is None: - raise TypeError("Missing 'apic_user_key' argument") - if apic_user_name is None and 'apicUserName' in kwargs: - apic_user_name = kwargs['apicUserName'] - if apic_user_name is None: - raise TypeError("Missing 'apic_user_name' argument") - if encap_type is None and 'encapType' in kwargs: - encap_type = kwargs['encapType'] - if encap_type is None: - raise TypeError("Missing 'encap_type' argument") - if extern_dynamic is None and 'externDynamic' in kwargs: - extern_dynamic = kwargs['externDynamic'] - if extern_dynamic is None: - raise TypeError("Missing 'extern_dynamic' argument") - if extern_static is None and 'externStatic' in kwargs: - extern_static = kwargs['externStatic'] - if extern_static is None: - raise TypeError("Missing 'extern_static' argument") - if infra_vlan is None and 'infraVlan' in kwargs: - infra_vlan = kwargs['infraVlan'] - if infra_vlan is None: - raise TypeError("Missing 'infra_vlan' argument") - if kube_api_vlan is None and 'kubeApiVlan' in kwargs: - kube_api_vlan = kwargs['kubeApiVlan'] - if kube_api_vlan is None: - raise TypeError("Missing 'kube_api_vlan' argument") - if l3out is None: - raise TypeError("Missing 'l3out' argument") - if l3out_external_networks is None and 'l3outExternalNetworks' in kwargs: - l3out_external_networks = kwargs['l3outExternalNetworks'] - if l3out_external_networks is None: - raise TypeError("Missing 'l3out_external_networks' argument") - if mcast_range_end is None and 'mcastRangeEnd' in kwargs: - mcast_range_end = kwargs['mcastRangeEnd'] - if mcast_range_end is None: - raise TypeError("Missing 'mcast_range_end' argument") - if mcast_range_start is None and 'mcastRangeStart' in kwargs: - mcast_range_start = kwargs['mcastRangeStart'] - if mcast_range_start is None: - raise TypeError("Missing 'mcast_range_start' argument") - if node_subnet is None and 'nodeSubnet' in kwargs: - node_subnet = kwargs['nodeSubnet'] - if node_subnet is None: - raise TypeError("Missing 'node_subnet' argument") - if node_svc_subnet is None and 'nodeSvcSubnet' in kwargs: - node_svc_subnet = kwargs['nodeSvcSubnet'] - if node_svc_subnet is None: - raise TypeError("Missing 'node_svc_subnet' argument") - if service_vlan is None and 'serviceVlan' in kwargs: - service_vlan = kwargs['serviceVlan'] - if service_vlan is None: - raise TypeError("Missing 'service_vlan' argument") - if system_id is None and 'systemId' in kwargs: - system_id = kwargs['systemId'] - if system_id is None: - raise TypeError("Missing 'system_id' argument") - if token is None: - raise TypeError("Missing 'token' argument") - if vrf_name is None and 'vrfName' in kwargs: - vrf_name = kwargs['vrfName'] - if vrf_name is None: - raise TypeError("Missing 'vrf_name' argument") - if vrf_tenant is None and 'vrfTenant' in kwargs: - vrf_tenant = kwargs['vrfTenant'] - if vrf_tenant is None: - raise TypeError("Missing 'vrf_tenant' argument") - if snat_port_range_end is None and 'snatPortRangeEnd' in kwargs: - snat_port_range_end = kwargs['snatPortRangeEnd'] - if snat_port_range_start is None and 'snatPortRangeStart' in kwargs: - snat_port_range_start = kwargs['snatPortRangeStart'] - if snat_ports_per_node is None and 'snatPortsPerNode' in kwargs: - snat_ports_per_node = kwargs['snatPortsPerNode'] - - _setter("aep", aep) - _setter("apic_hosts", apic_hosts) - _setter("apic_user_crt", apic_user_crt) - _setter("apic_user_key", apic_user_key) - _setter("apic_user_name", apic_user_name) - _setter("encap_type", encap_type) - _setter("extern_dynamic", extern_dynamic) - _setter("extern_static", extern_static) - _setter("infra_vlan", infra_vlan) - _setter("kube_api_vlan", kube_api_vlan) - _setter("l3out", l3out) - _setter("l3out_external_networks", l3out_external_networks) - _setter("mcast_range_end", mcast_range_end) - _setter("mcast_range_start", mcast_range_start) - _setter("node_subnet", node_subnet) - _setter("node_svc_subnet", node_svc_subnet) - _setter("service_vlan", service_vlan) - _setter("system_id", system_id) - _setter("token", token) - _setter("vrf_name", vrf_name) - _setter("vrf_tenant", vrf_tenant) + pulumi.set(__self__, "aep", aep) + pulumi.set(__self__, "apic_hosts", apic_hosts) + pulumi.set(__self__, "apic_user_crt", apic_user_crt) + pulumi.set(__self__, "apic_user_key", apic_user_key) + pulumi.set(__self__, "apic_user_name", apic_user_name) + pulumi.set(__self__, "encap_type", encap_type) + pulumi.set(__self__, "extern_dynamic", extern_dynamic) + pulumi.set(__self__, "extern_static", extern_static) + pulumi.set(__self__, "infra_vlan", infra_vlan) + pulumi.set(__self__, "kube_api_vlan", kube_api_vlan) + pulumi.set(__self__, "l3out", l3out) + pulumi.set(__self__, "l3out_external_networks", l3out_external_networks) + pulumi.set(__self__, "mcast_range_end", mcast_range_end) + pulumi.set(__self__, "mcast_range_start", mcast_range_start) + pulumi.set(__self__, "node_subnet", node_subnet) + pulumi.set(__self__, "node_svc_subnet", node_svc_subnet) + pulumi.set(__self__, "service_vlan", service_vlan) + pulumi.set(__self__, "system_id", system_id) + pulumi.set(__self__, "token", token) + pulumi.set(__self__, "vrf_name", vrf_name) + pulumi.set(__self__, "vrf_tenant", vrf_tenant) if snat_port_range_end is not None: - _setter("snat_port_range_end", snat_port_range_end) + pulumi.set(__self__, "snat_port_range_end", snat_port_range_end) if snat_port_range_start is not None: - _setter("snat_port_range_start", snat_port_range_start) + pulumi.set(__self__, "snat_port_range_start", snat_port_range_start) if snat_ports_per_node is not None: - _setter("snat_ports_per_node", snat_ports_per_node) + pulumi.set(__self__, "snat_ports_per_node", snat_ports_per_node) @property @pulumi.getter @@ -7065,21 +5442,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] cloud_provider: RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1) """ - ClusterNetworkCalicoNetworkProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - cloud_provider=cloud_provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cloud_provider: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cloud_provider is None and 'cloudProvider' in kwargs: - cloud_provider = kwargs['cloudProvider'] - if cloud_provider is not None: - _setter("cloud_provider", cloud_provider) + pulumi.set(__self__, "cloud_provider", cloud_provider) @property @pulumi.getter(name="cloudProvider") @@ -7101,19 +5465,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] iface: Flannel network interface (string) """ - ClusterNetworkCanalNetworkProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - iface=iface, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - iface: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if iface is not None: - _setter("iface", iface) + pulumi.set(__self__, "iface", iface) @property @pulumi.getter @@ -7135,19 +5488,8 @@ def __init__(__self__, *, """ :param pulumi.Input[str] iface: Flannel network interface (string) """ - ClusterNetworkFlannelNetworkProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - iface=iface, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - iface: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if iface is not None: - _setter("iface", iface) + pulumi.set(__self__, "iface", iface) @property @pulumi.getter @@ -7169,20 +5511,7 @@ def __init__(__self__, *, """ :param pulumi.Input[str] password: Registry password (string) """ - ClusterNetworkWeaveNetworkProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - password=password, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - password: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if password is None: - raise TypeError("Missing 'password' argument") - - _setter("password", password) + pulumi.set(__self__, "password", password) @property @pulumi.getter @@ -7233,105 +5562,38 @@ def __init__(__self__, *, :param pulumi.Input[str] ssh_key_path: SSH Private Key Path (string) :param pulumi.Input[Sequence[pulumi.Input['ClusterNodeTaintArgs']]] taints: Node taints (list) """ - ClusterNodeArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - roles=roles, - user=user, - docker_socket=docker_socket, - hostname_override=hostname_override, - internal_address=internal_address, - labels=labels, - node_name=node_name, - port=port, - roles_deprecated=roles_deprecated, - ssh_agent_auth=ssh_agent_auth, - ssh_cert=ssh_cert, - ssh_cert_path=ssh_cert_path, - ssh_key=ssh_key, - ssh_key_path=ssh_key_path, - taints=taints, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[pulumi.Input[str]] = None, - roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - user: Optional[pulumi.Input[str]] = None, - docker_socket: Optional[pulumi.Input[str]] = None, - hostname_override: Optional[pulumi.Input[str]] = None, - internal_address: Optional[pulumi.Input[str]] = None, - labels: Optional[pulumi.Input[Mapping[str, Any]]] = None, - node_name: Optional[pulumi.Input[str]] = None, - port: Optional[pulumi.Input[str]] = None, - roles_deprecated: Optional[pulumi.Input[str]] = None, - ssh_agent_auth: Optional[pulumi.Input[bool]] = None, - ssh_cert: Optional[pulumi.Input[str]] = None, - ssh_cert_path: Optional[pulumi.Input[str]] = None, - ssh_key: Optional[pulumi.Input[str]] = None, - ssh_key_path: Optional[pulumi.Input[str]] = None, - taints: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterNodeTaintArgs']]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if address is None: - raise TypeError("Missing 'address' argument") - if roles is None: - raise TypeError("Missing 'roles' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if docker_socket is None and 'dockerSocket' in kwargs: - docker_socket = kwargs['dockerSocket'] - if hostname_override is None and 'hostnameOverride' in kwargs: - hostname_override = kwargs['hostnameOverride'] - if internal_address is None and 'internalAddress' in kwargs: - internal_address = kwargs['internalAddress'] - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if roles_deprecated is None and 'rolesDeprecated' in kwargs: - roles_deprecated = kwargs['rolesDeprecated'] - if ssh_agent_auth is None and 'sshAgentAuth' in kwargs: - ssh_agent_auth = kwargs['sshAgentAuth'] - if ssh_cert is None and 'sshCert' in kwargs: - ssh_cert = kwargs['sshCert'] - if ssh_cert_path is None and 'sshCertPath' in kwargs: - ssh_cert_path = kwargs['sshCertPath'] - if ssh_key is None and 'sshKey' in kwargs: - ssh_key = kwargs['sshKey'] - if ssh_key_path is None and 'sshKeyPath' in kwargs: - ssh_key_path = kwargs['sshKeyPath'] - - _setter("address", address) - _setter("roles", roles) - _setter("user", user) + pulumi.set(__self__, "address", address) + pulumi.set(__self__, "roles", roles) + pulumi.set(__self__, "user", user) if docker_socket is not None: - _setter("docker_socket", docker_socket) + pulumi.set(__self__, "docker_socket", docker_socket) if hostname_override is not None: - _setter("hostname_override", hostname_override) + pulumi.set(__self__, "hostname_override", hostname_override) if internal_address is not None: - _setter("internal_address", internal_address) + pulumi.set(__self__, "internal_address", internal_address) if labels is not None: - _setter("labels", labels) + pulumi.set(__self__, "labels", labels) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if roles_deprecated is not None: warnings.warn("""Use role instead""", DeprecationWarning) pulumi.log.warn("""roles_deprecated is deprecated: Use role instead""") if roles_deprecated is not None: - _setter("roles_deprecated", roles_deprecated) + pulumi.set(__self__, "roles_deprecated", roles_deprecated) if ssh_agent_auth is not None: - _setter("ssh_agent_auth", ssh_agent_auth) + pulumi.set(__self__, "ssh_agent_auth", ssh_agent_auth) if ssh_cert is not None: - _setter("ssh_cert", ssh_cert) + pulumi.set(__self__, "ssh_cert", ssh_cert) if ssh_cert_path is not None: - _setter("ssh_cert_path", ssh_cert_path) + pulumi.set(__self__, "ssh_cert_path", ssh_cert_path) if ssh_key is not None: - _setter("ssh_key", ssh_key) + pulumi.set(__self__, "ssh_key", ssh_key) if ssh_key_path is not None: - _setter("ssh_key_path", ssh_key_path) + pulumi.set(__self__, "ssh_key_path", ssh_key_path) if taints is not None: - _setter("taints", taints) + pulumi.set(__self__, "taints", taints) @property @pulumi.getter @@ -7537,29 +5799,10 @@ def __init__(__self__, *, :param pulumi.Input[str] value: Taint value (string) :param pulumi.Input[str] effect: Taint effect. `NoExecute`, `NoSchedule` (default) and `PreferNoSchedule` are supported (string) """ - ClusterNodeTaintArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - key=key, - value=value, - effect=effect, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - key: Optional[pulumi.Input[str]] = None, - value: Optional[pulumi.Input[str]] = None, - effect: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if key is None: - raise TypeError("Missing 'key' argument") - if value is None: - raise TypeError("Missing 'value' argument") - - _setter("key", key) - _setter("value", value) + pulumi.set(__self__, "key", key) + pulumi.set(__self__, "value", value) if effect is not None: - _setter("effect", effect) + pulumi.set(__self__, "effect", effect) @property @pulumi.getter @@ -7611,34 +5854,13 @@ def __init__(__self__, *, :param pulumi.Input[str] password: Registry password (string) :param pulumi.Input[str] user: Registry user (string) """ - ClusterPrivateRegistryArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - url=url, - is_default=is_default, - password=password, - user=user, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - url: Optional[pulumi.Input[str]] = None, - is_default: Optional[pulumi.Input[bool]] = None, - password: Optional[pulumi.Input[str]] = None, - user: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if url is None: - raise TypeError("Missing 'url' argument") - if is_default is None and 'isDefault' in kwargs: - is_default = kwargs['isDefault'] - - _setter("url", url) + pulumi.set(__self__, "url", url) if is_default is not None: - _setter("is_default", is_default) + pulumi.set(__self__, "is_default", is_default) if password is not None: - _setter("password", password) + pulumi.set(__self__, "password", password) if user is not None: - _setter("user", user) + pulumi.set(__self__, "user", user) @property @pulumi.getter @@ -7698,25 +5920,10 @@ def __init__(__self__, *, :param pulumi.Input[bool] restore: RKE k8s cluster restore configuration (list maxitems:1) :param pulumi.Input[str] snapshot_name: Snapshot name (string) """ - ClusterRestoreArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - restore=restore, - snapshot_name=snapshot_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - restore: Optional[pulumi.Input[bool]] = None, - snapshot_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if snapshot_name is None and 'snapshotName' in kwargs: - snapshot_name = kwargs['snapshotName'] - if restore is not None: - _setter("restore", restore) + pulumi.set(__self__, "restore", restore) if snapshot_name is not None: - _setter("snapshot_name", snapshot_name) + pulumi.set(__self__, "snapshot_name", snapshot_name) @property @pulumi.getter @@ -7752,25 +5959,10 @@ def __init__(__self__, *, :param pulumi.Input[bool] ca_certificates: Rotate CA Certificates. Default `false` (bool) :param pulumi.Input[Sequence[pulumi.Input[str]]] services: RKE k8s cluster services (list maxitems:1) """ - ClusterRotateCertificatesArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - ca_certificates=ca_certificates, - services=services, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - ca_certificates: Optional[pulumi.Input[bool]] = None, - services: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if ca_certificates is None and 'caCertificates' in kwargs: - ca_certificates = kwargs['caCertificates'] - if ca_certificates is not None: - _setter("ca_certificates", ca_certificates) + pulumi.set(__self__, "ca_certificates", ca_certificates) if services is not None: - _setter("services", services) + pulumi.set(__self__, "services", services) @property @pulumi.getter(name="caCertificates") @@ -7876,221 +6068,80 @@ def __init__(__self__, *, :param pulumi.Input[str] weave_node: Docker image for weave_node (string) :param pulumi.Input[str] windows_pod_infra_container: Docker image for windows_pod_infra_container (string) """ - ClusterRunningSystemImageArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - aci_cni_deploy_container=aci_cni_deploy_container, - aci_controller_container=aci_controller_container, - aci_host_container=aci_host_container, - aci_mcast_container=aci_mcast_container, - aci_opflex_container=aci_opflex_container, - aci_ovs_container=aci_ovs_container, - alpine=alpine, - calico_cni=calico_cni, - calico_controllers=calico_controllers, - calico_ctl=calico_ctl, - calico_flex_vol=calico_flex_vol, - calico_node=calico_node, - canal_cni=canal_cni, - canal_flannel=canal_flannel, - canal_flex_vol=canal_flex_vol, - canal_node=canal_node, - cert_downloader=cert_downloader, - coredns=coredns, - coredns_autoscaler=coredns_autoscaler, - dnsmasq=dnsmasq, - etcd=etcd, - flannel=flannel, - flannel_cni=flannel_cni, - ingress=ingress, - ingress_backend=ingress_backend, - kube_dns=kube_dns, - kube_dns_autoscaler=kube_dns_autoscaler, - kube_dns_sidecar=kube_dns_sidecar, - kubernetes=kubernetes, - kubernetes_services_sidecar=kubernetes_services_sidecar, - metrics_server=metrics_server, - nginx_proxy=nginx_proxy, - nodelocal=nodelocal, - pod_infra_container=pod_infra_container, - weave_cni=weave_cni, - weave_node=weave_node, - windows_pod_infra_container=windows_pod_infra_container, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aci_cni_deploy_container: Optional[pulumi.Input[str]] = None, - aci_controller_container: Optional[pulumi.Input[str]] = None, - aci_host_container: Optional[pulumi.Input[str]] = None, - aci_mcast_container: Optional[pulumi.Input[str]] = None, - aci_opflex_container: Optional[pulumi.Input[str]] = None, - aci_ovs_container: Optional[pulumi.Input[str]] = None, - alpine: Optional[pulumi.Input[str]] = None, - calico_cni: Optional[pulumi.Input[str]] = None, - calico_controllers: Optional[pulumi.Input[str]] = None, - calico_ctl: Optional[pulumi.Input[str]] = None, - calico_flex_vol: Optional[pulumi.Input[str]] = None, - calico_node: Optional[pulumi.Input[str]] = None, - canal_cni: Optional[pulumi.Input[str]] = None, - canal_flannel: Optional[pulumi.Input[str]] = None, - canal_flex_vol: Optional[pulumi.Input[str]] = None, - canal_node: Optional[pulumi.Input[str]] = None, - cert_downloader: Optional[pulumi.Input[str]] = None, - coredns: Optional[pulumi.Input[str]] = None, - coredns_autoscaler: Optional[pulumi.Input[str]] = None, - dnsmasq: Optional[pulumi.Input[str]] = None, - etcd: Optional[pulumi.Input[str]] = None, - flannel: Optional[pulumi.Input[str]] = None, - flannel_cni: Optional[pulumi.Input[str]] = None, - ingress: Optional[pulumi.Input[str]] = None, - ingress_backend: Optional[pulumi.Input[str]] = None, - kube_dns: Optional[pulumi.Input[str]] = None, - kube_dns_autoscaler: Optional[pulumi.Input[str]] = None, - kube_dns_sidecar: Optional[pulumi.Input[str]] = None, - kubernetes: Optional[pulumi.Input[str]] = None, - kubernetes_services_sidecar: Optional[pulumi.Input[str]] = None, - metrics_server: Optional[pulumi.Input[str]] = None, - nginx_proxy: Optional[pulumi.Input[str]] = None, - nodelocal: Optional[pulumi.Input[str]] = None, - pod_infra_container: Optional[pulumi.Input[str]] = None, - weave_cni: Optional[pulumi.Input[str]] = None, - weave_node: Optional[pulumi.Input[str]] = None, - windows_pod_infra_container: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aci_cni_deploy_container is None and 'aciCniDeployContainer' in kwargs: - aci_cni_deploy_container = kwargs['aciCniDeployContainer'] - if aci_controller_container is None and 'aciControllerContainer' in kwargs: - aci_controller_container = kwargs['aciControllerContainer'] - if aci_host_container is None and 'aciHostContainer' in kwargs: - aci_host_container = kwargs['aciHostContainer'] - if aci_mcast_container is None and 'aciMcastContainer' in kwargs: - aci_mcast_container = kwargs['aciMcastContainer'] - if aci_opflex_container is None and 'aciOpflexContainer' in kwargs: - aci_opflex_container = kwargs['aciOpflexContainer'] - if aci_ovs_container is None and 'aciOvsContainer' in kwargs: - aci_ovs_container = kwargs['aciOvsContainer'] - if calico_cni is None and 'calicoCni' in kwargs: - calico_cni = kwargs['calicoCni'] - if calico_controllers is None and 'calicoControllers' in kwargs: - calico_controllers = kwargs['calicoControllers'] - if calico_ctl is None and 'calicoCtl' in kwargs: - calico_ctl = kwargs['calicoCtl'] - if calico_flex_vol is None and 'calicoFlexVol' in kwargs: - calico_flex_vol = kwargs['calicoFlexVol'] - if calico_node is None and 'calicoNode' in kwargs: - calico_node = kwargs['calicoNode'] - if canal_cni is None and 'canalCni' in kwargs: - canal_cni = kwargs['canalCni'] - if canal_flannel is None and 'canalFlannel' in kwargs: - canal_flannel = kwargs['canalFlannel'] - if canal_flex_vol is None and 'canalFlexVol' in kwargs: - canal_flex_vol = kwargs['canalFlexVol'] - if canal_node is None and 'canalNode' in kwargs: - canal_node = kwargs['canalNode'] - if cert_downloader is None and 'certDownloader' in kwargs: - cert_downloader = kwargs['certDownloader'] - if coredns_autoscaler is None and 'corednsAutoscaler' in kwargs: - coredns_autoscaler = kwargs['corednsAutoscaler'] - if flannel_cni is None and 'flannelCni' in kwargs: - flannel_cni = kwargs['flannelCni'] - if ingress_backend is None and 'ingressBackend' in kwargs: - ingress_backend = kwargs['ingressBackend'] - if kube_dns is None and 'kubeDns' in kwargs: - kube_dns = kwargs['kubeDns'] - if kube_dns_autoscaler is None and 'kubeDnsAutoscaler' in kwargs: - kube_dns_autoscaler = kwargs['kubeDnsAutoscaler'] - if kube_dns_sidecar is None and 'kubeDnsSidecar' in kwargs: - kube_dns_sidecar = kwargs['kubeDnsSidecar'] - if kubernetes_services_sidecar is None and 'kubernetesServicesSidecar' in kwargs: - kubernetes_services_sidecar = kwargs['kubernetesServicesSidecar'] - if metrics_server is None and 'metricsServer' in kwargs: - metrics_server = kwargs['metricsServer'] - if nginx_proxy is None and 'nginxProxy' in kwargs: - nginx_proxy = kwargs['nginxProxy'] - if pod_infra_container is None and 'podInfraContainer' in kwargs: - pod_infra_container = kwargs['podInfraContainer'] - if weave_cni is None and 'weaveCni' in kwargs: - weave_cni = kwargs['weaveCni'] - if weave_node is None and 'weaveNode' in kwargs: - weave_node = kwargs['weaveNode'] - if windows_pod_infra_container is None and 'windowsPodInfraContainer' in kwargs: - windows_pod_infra_container = kwargs['windowsPodInfraContainer'] - if aci_cni_deploy_container is not None: - _setter("aci_cni_deploy_container", aci_cni_deploy_container) + pulumi.set(__self__, "aci_cni_deploy_container", aci_cni_deploy_container) if aci_controller_container is not None: - _setter("aci_controller_container", aci_controller_container) + pulumi.set(__self__, "aci_controller_container", aci_controller_container) if aci_host_container is not None: - _setter("aci_host_container", aci_host_container) + pulumi.set(__self__, "aci_host_container", aci_host_container) if aci_mcast_container is not None: - _setter("aci_mcast_container", aci_mcast_container) + pulumi.set(__self__, "aci_mcast_container", aci_mcast_container) if aci_opflex_container is not None: - _setter("aci_opflex_container", aci_opflex_container) + pulumi.set(__self__, "aci_opflex_container", aci_opflex_container) if aci_ovs_container is not None: - _setter("aci_ovs_container", aci_ovs_container) + pulumi.set(__self__, "aci_ovs_container", aci_ovs_container) if alpine is not None: - _setter("alpine", alpine) + pulumi.set(__self__, "alpine", alpine) if calico_cni is not None: - _setter("calico_cni", calico_cni) + pulumi.set(__self__, "calico_cni", calico_cni) if calico_controllers is not None: - _setter("calico_controllers", calico_controllers) + pulumi.set(__self__, "calico_controllers", calico_controllers) if calico_ctl is not None: - _setter("calico_ctl", calico_ctl) + pulumi.set(__self__, "calico_ctl", calico_ctl) if calico_flex_vol is not None: - _setter("calico_flex_vol", calico_flex_vol) + pulumi.set(__self__, "calico_flex_vol", calico_flex_vol) if calico_node is not None: - _setter("calico_node", calico_node) + pulumi.set(__self__, "calico_node", calico_node) if canal_cni is not None: - _setter("canal_cni", canal_cni) + pulumi.set(__self__, "canal_cni", canal_cni) if canal_flannel is not None: - _setter("canal_flannel", canal_flannel) + pulumi.set(__self__, "canal_flannel", canal_flannel) if canal_flex_vol is not None: - _setter("canal_flex_vol", canal_flex_vol) + pulumi.set(__self__, "canal_flex_vol", canal_flex_vol) if canal_node is not None: - _setter("canal_node", canal_node) + pulumi.set(__self__, "canal_node", canal_node) if cert_downloader is not None: - _setter("cert_downloader", cert_downloader) + pulumi.set(__self__, "cert_downloader", cert_downloader) if coredns is not None: - _setter("coredns", coredns) + pulumi.set(__self__, "coredns", coredns) if coredns_autoscaler is not None: - _setter("coredns_autoscaler", coredns_autoscaler) + pulumi.set(__self__, "coredns_autoscaler", coredns_autoscaler) if dnsmasq is not None: - _setter("dnsmasq", dnsmasq) + pulumi.set(__self__, "dnsmasq", dnsmasq) if etcd is not None: - _setter("etcd", etcd) + pulumi.set(__self__, "etcd", etcd) if flannel is not None: - _setter("flannel", flannel) + pulumi.set(__self__, "flannel", flannel) if flannel_cni is not None: - _setter("flannel_cni", flannel_cni) + pulumi.set(__self__, "flannel_cni", flannel_cni) if ingress is not None: - _setter("ingress", ingress) + pulumi.set(__self__, "ingress", ingress) if ingress_backend is not None: - _setter("ingress_backend", ingress_backend) + pulumi.set(__self__, "ingress_backend", ingress_backend) if kube_dns is not None: - _setter("kube_dns", kube_dns) + pulumi.set(__self__, "kube_dns", kube_dns) if kube_dns_autoscaler is not None: - _setter("kube_dns_autoscaler", kube_dns_autoscaler) + pulumi.set(__self__, "kube_dns_autoscaler", kube_dns_autoscaler) if kube_dns_sidecar is not None: - _setter("kube_dns_sidecar", kube_dns_sidecar) + pulumi.set(__self__, "kube_dns_sidecar", kube_dns_sidecar) if kubernetes is not None: - _setter("kubernetes", kubernetes) + pulumi.set(__self__, "kubernetes", kubernetes) if kubernetes_services_sidecar is not None: - _setter("kubernetes_services_sidecar", kubernetes_services_sidecar) + pulumi.set(__self__, "kubernetes_services_sidecar", kubernetes_services_sidecar) if metrics_server is not None: - _setter("metrics_server", metrics_server) + pulumi.set(__self__, "metrics_server", metrics_server) if nginx_proxy is not None: - _setter("nginx_proxy", nginx_proxy) + pulumi.set(__self__, "nginx_proxy", nginx_proxy) if nodelocal is not None: - _setter("nodelocal", nodelocal) + pulumi.set(__self__, "nodelocal", nodelocal) if pod_infra_container is not None: - _setter("pod_infra_container", pod_infra_container) + pulumi.set(__self__, "pod_infra_container", pod_infra_container) if weave_cni is not None: - _setter("weave_cni", weave_cni) + pulumi.set(__self__, "weave_cni", weave_cni) if weave_node is not None: - _setter("weave_node", weave_node) + pulumi.set(__self__, "weave_node", weave_node) if windows_pod_infra_container is not None: - _setter("windows_pod_infra_container", windows_pod_infra_container) + pulumi.set(__self__, "windows_pod_infra_container", windows_pod_infra_container) @property @pulumi.getter(name="aciCniDeployContainer") @@ -8554,43 +6605,18 @@ def __init__(__self__, *, :param pulumi.Input['ClusterServicesKubeproxyArgs'] kubeproxy: Kubeproxy options for RKE services (list maxitems:1) :param pulumi.Input['ClusterServicesSchedulerArgs'] scheduler: Scheduler options for RKE services (list maxitems:1) """ - ClusterServicesArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - etcd=etcd, - kube_api=kube_api, - kube_controller=kube_controller, - kubelet=kubelet, - kubeproxy=kubeproxy, - scheduler=scheduler, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - etcd: Optional[pulumi.Input['ClusterServicesEtcdArgs']] = None, - kube_api: Optional[pulumi.Input['ClusterServicesKubeApiArgs']] = None, - kube_controller: Optional[pulumi.Input['ClusterServicesKubeControllerArgs']] = None, - kubelet: Optional[pulumi.Input['ClusterServicesKubeletArgs']] = None, - kubeproxy: Optional[pulumi.Input['ClusterServicesKubeproxyArgs']] = None, - scheduler: Optional[pulumi.Input['ClusterServicesSchedulerArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if kube_api is None and 'kubeApi' in kwargs: - kube_api = kwargs['kubeApi'] - if kube_controller is None and 'kubeController' in kwargs: - kube_controller = kwargs['kubeController'] - if etcd is not None: - _setter("etcd", etcd) + pulumi.set(__self__, "etcd", etcd) if kube_api is not None: - _setter("kube_api", kube_api) + pulumi.set(__self__, "kube_api", kube_api) if kube_controller is not None: - _setter("kube_controller", kube_controller) + pulumi.set(__self__, "kube_controller", kube_controller) if kubelet is not None: - _setter("kubelet", kubelet) + pulumi.set(__self__, "kubelet", kubelet) if kubeproxy is not None: - _setter("kubeproxy", kubeproxy) + pulumi.set(__self__, "kubeproxy", kubeproxy) if scheduler is not None: - _setter("scheduler", scheduler) + pulumi.set(__self__, "scheduler", scheduler) @property @pulumi.getter @@ -8700,87 +6726,36 @@ def __init__(__self__, *, :param pulumi.Input[bool] snapshot: Snapshot option for etcd service. Default `true` (bool) :param pulumi.Input[int] uid: Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int) """ - ClusterServicesEtcdArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - backup_config=backup_config, - ca_cert=ca_cert, - cert=cert, - creation=creation, - external_urls=external_urls, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - gid=gid, - image=image, - key=key, - path=path, - retention=retention, - snapshot=snapshot, - uid=uid, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - backup_config: Optional[pulumi.Input['ClusterServicesEtcdBackupConfigArgs']] = None, - ca_cert: Optional[pulumi.Input[str]] = None, - cert: Optional[pulumi.Input[str]] = None, - creation: Optional[pulumi.Input[str]] = None, - external_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - gid: Optional[pulumi.Input[int]] = None, - image: Optional[pulumi.Input[str]] = None, - key: Optional[pulumi.Input[str]] = None, - path: Optional[pulumi.Input[str]] = None, - retention: Optional[pulumi.Input[str]] = None, - snapshot: Optional[pulumi.Input[bool]] = None, - uid: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if backup_config is None and 'backupConfig' in kwargs: - backup_config = kwargs['backupConfig'] - if ca_cert is None and 'caCert' in kwargs: - ca_cert = kwargs['caCert'] - if external_urls is None and 'externalUrls' in kwargs: - external_urls = kwargs['externalUrls'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if backup_config is not None: - _setter("backup_config", backup_config) + pulumi.set(__self__, "backup_config", backup_config) if ca_cert is not None: - _setter("ca_cert", ca_cert) + pulumi.set(__self__, "ca_cert", ca_cert) if cert is not None: - _setter("cert", cert) + pulumi.set(__self__, "cert", cert) if creation is not None: - _setter("creation", creation) + pulumi.set(__self__, "creation", creation) if external_urls is not None: - _setter("external_urls", external_urls) + pulumi.set(__self__, "external_urls", external_urls) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if gid is not None: - _setter("gid", gid) + pulumi.set(__self__, "gid", gid) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if snapshot is not None: - _setter("snapshot", snapshot) + pulumi.set(__self__, "snapshot", snapshot) if uid is not None: - _setter("uid", uid) + pulumi.set(__self__, "uid", uid) @property @pulumi.getter(name="backupConfig") @@ -8980,45 +6955,18 @@ def __init__(__self__, *, :param pulumi.Input[bool] safe_timestamp: Safe timestamp for etcd backup. Default: `false` (bool) :param pulumi.Input[int] timeout: RKE node drain timeout (int) """ - ClusterServicesEtcdBackupConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - enabled=enabled, - interval_hours=interval_hours, - retention=retention, - s3_backup_config=s3_backup_config, - safe_timestamp=safe_timestamp, - timeout=timeout, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - enabled: Optional[pulumi.Input[bool]] = None, - interval_hours: Optional[pulumi.Input[int]] = None, - retention: Optional[pulumi.Input[int]] = None, - s3_backup_config: Optional[pulumi.Input['ClusterServicesEtcdBackupConfigS3BackupConfigArgs']] = None, - safe_timestamp: Optional[pulumi.Input[bool]] = None, - timeout: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if interval_hours is None and 'intervalHours' in kwargs: - interval_hours = kwargs['intervalHours'] - if s3_backup_config is None and 's3BackupConfig' in kwargs: - s3_backup_config = kwargs['s3BackupConfig'] - if safe_timestamp is None and 'safeTimestamp' in kwargs: - safe_timestamp = kwargs['safeTimestamp'] - if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) if interval_hours is not None: - _setter("interval_hours", interval_hours) + pulumi.set(__self__, "interval_hours", interval_hours) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if s3_backup_config is not None: - _setter("s3_backup_config", s3_backup_config) + pulumi.set(__self__, "s3_backup_config", s3_backup_config) if safe_timestamp is not None: - _setter("safe_timestamp", safe_timestamp) + pulumi.set(__self__, "safe_timestamp", safe_timestamp) if timeout is not None: - _setter("timeout", timeout) + pulumi.set(__self__, "timeout", timeout) @property @pulumi.getter @@ -9112,51 +7060,20 @@ def __init__(__self__, *, :param pulumi.Input[str] region: Region for S3 service (string) :param pulumi.Input[str] secret_key: Secret key for S3 service (string) """ - ClusterServicesEtcdBackupConfigS3BackupConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - access_key=access_key, - bucket_name=bucket_name, - custom_ca=custom_ca, - endpoint=endpoint, - folder=folder, - region=region, - secret_key=secret_key, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - access_key: Optional[pulumi.Input[str]] = None, - bucket_name: Optional[pulumi.Input[str]] = None, - custom_ca: Optional[pulumi.Input[str]] = None, - endpoint: Optional[pulumi.Input[str]] = None, - folder: Optional[pulumi.Input[str]] = None, - region: Optional[pulumi.Input[str]] = None, - secret_key: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if access_key is None and 'accessKey' in kwargs: - access_key = kwargs['accessKey'] - if bucket_name is None and 'bucketName' in kwargs: - bucket_name = kwargs['bucketName'] - if custom_ca is None and 'customCa' in kwargs: - custom_ca = kwargs['customCa'] - if secret_key is None and 'secretKey' in kwargs: - secret_key = kwargs['secretKey'] - if access_key is not None: - _setter("access_key", access_key) + pulumi.set(__self__, "access_key", access_key) if bucket_name is not None: - _setter("bucket_name", bucket_name) + pulumi.set(__self__, "bucket_name", bucket_name) if custom_ca is not None: - _setter("custom_ca", custom_ca) + pulumi.set(__self__, "custom_ca", custom_ca) if endpoint is not None: - _setter("endpoint", endpoint) + pulumi.set(__self__, "endpoint", endpoint) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if secret_key is not None: - _setter("secret_key", secret_key) + pulumi.set(__self__, "secret_key", secret_key) @property @pulumi.getter(name="accessKey") @@ -9278,87 +7195,36 @@ def __init__(__self__, *, :param pulumi.Input[bool] snapshot: Snapshot option for etcd service. Default `true` (bool) :param pulumi.Input[int] uid: Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int) """ - ClusterServicesEtcdDeprecatedArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - backup_config=backup_config, - ca_cert=ca_cert, - cert=cert, - creation=creation, - external_urls=external_urls, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - gid=gid, - image=image, - key=key, - path=path, - retention=retention, - snapshot=snapshot, - uid=uid, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - backup_config: Optional[pulumi.Input['ClusterServicesEtcdDeprecatedBackupConfigArgs']] = None, - ca_cert: Optional[pulumi.Input[str]] = None, - cert: Optional[pulumi.Input[str]] = None, - creation: Optional[pulumi.Input[str]] = None, - external_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - gid: Optional[pulumi.Input[int]] = None, - image: Optional[pulumi.Input[str]] = None, - key: Optional[pulumi.Input[str]] = None, - path: Optional[pulumi.Input[str]] = None, - retention: Optional[pulumi.Input[str]] = None, - snapshot: Optional[pulumi.Input[bool]] = None, - uid: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if backup_config is None and 'backupConfig' in kwargs: - backup_config = kwargs['backupConfig'] - if ca_cert is None and 'caCert' in kwargs: - ca_cert = kwargs['caCert'] - if external_urls is None and 'externalUrls' in kwargs: - external_urls = kwargs['externalUrls'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if backup_config is not None: - _setter("backup_config", backup_config) + pulumi.set(__self__, "backup_config", backup_config) if ca_cert is not None: - _setter("ca_cert", ca_cert) + pulumi.set(__self__, "ca_cert", ca_cert) if cert is not None: - _setter("cert", cert) + pulumi.set(__self__, "cert", cert) if creation is not None: - _setter("creation", creation) + pulumi.set(__self__, "creation", creation) if external_urls is not None: - _setter("external_urls", external_urls) + pulumi.set(__self__, "external_urls", external_urls) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if gid is not None: - _setter("gid", gid) + pulumi.set(__self__, "gid", gid) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if snapshot is not None: - _setter("snapshot", snapshot) + pulumi.set(__self__, "snapshot", snapshot) if uid is not None: - _setter("uid", uid) + pulumi.set(__self__, "uid", uid) @property @pulumi.getter(name="backupConfig") @@ -9558,45 +7424,18 @@ def __init__(__self__, *, :param pulumi.Input[bool] safe_timestamp: Safe timestamp for etcd backup. Default: `false` (bool) :param pulumi.Input[int] timeout: RKE node drain timeout (int) """ - ClusterServicesEtcdDeprecatedBackupConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - enabled=enabled, - interval_hours=interval_hours, - retention=retention, - s3_backup_config=s3_backup_config, - safe_timestamp=safe_timestamp, - timeout=timeout, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - enabled: Optional[pulumi.Input[bool]] = None, - interval_hours: Optional[pulumi.Input[int]] = None, - retention: Optional[pulumi.Input[int]] = None, - s3_backup_config: Optional[pulumi.Input['ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfigArgs']] = None, - safe_timestamp: Optional[pulumi.Input[bool]] = None, - timeout: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if interval_hours is None and 'intervalHours' in kwargs: - interval_hours = kwargs['intervalHours'] - if s3_backup_config is None and 's3BackupConfig' in kwargs: - s3_backup_config = kwargs['s3BackupConfig'] - if safe_timestamp is None and 'safeTimestamp' in kwargs: - safe_timestamp = kwargs['safeTimestamp'] - if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) if interval_hours is not None: - _setter("interval_hours", interval_hours) + pulumi.set(__self__, "interval_hours", interval_hours) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if s3_backup_config is not None: - _setter("s3_backup_config", s3_backup_config) + pulumi.set(__self__, "s3_backup_config", s3_backup_config) if safe_timestamp is not None: - _setter("safe_timestamp", safe_timestamp) + pulumi.set(__self__, "safe_timestamp", safe_timestamp) if timeout is not None: - _setter("timeout", timeout) + pulumi.set(__self__, "timeout", timeout) @property @pulumi.getter @@ -9690,51 +7529,20 @@ def __init__(__self__, *, :param pulumi.Input[str] region: Region for S3 service (string) :param pulumi.Input[str] secret_key: Secret key for S3 service (string) """ - ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - access_key=access_key, - bucket_name=bucket_name, - custom_ca=custom_ca, - endpoint=endpoint, - folder=folder, - region=region, - secret_key=secret_key, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - access_key: Optional[pulumi.Input[str]] = None, - bucket_name: Optional[pulumi.Input[str]] = None, - custom_ca: Optional[pulumi.Input[str]] = None, - endpoint: Optional[pulumi.Input[str]] = None, - folder: Optional[pulumi.Input[str]] = None, - region: Optional[pulumi.Input[str]] = None, - secret_key: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if access_key is None and 'accessKey' in kwargs: - access_key = kwargs['accessKey'] - if bucket_name is None and 'bucketName' in kwargs: - bucket_name = kwargs['bucketName'] - if custom_ca is None and 'customCa' in kwargs: - custom_ca = kwargs['customCa'] - if secret_key is None and 'secretKey' in kwargs: - secret_key = kwargs['secretKey'] - if access_key is not None: - _setter("access_key", access_key) + pulumi.set(__self__, "access_key", access_key) if bucket_name is not None: - _setter("bucket_name", bucket_name) + pulumi.set(__self__, "bucket_name", bucket_name) if custom_ca is not None: - _setter("custom_ca", custom_ca) + pulumi.set(__self__, "custom_ca", custom_ca) if endpoint is not None: - _setter("endpoint", endpoint) + pulumi.set(__self__, "endpoint", endpoint) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if secret_key is not None: - _setter("secret_key", secret_key) + pulumi.set(__self__, "secret_key", secret_key) @property @pulumi.getter(name="accessKey") @@ -9848,79 +7656,28 @@ def __init__(__self__, *, :param pulumi.Input[str] service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) :param pulumi.Input[str] service_node_port_range: Service Node Port Range option for kube API service (string) """ - ClusterServicesKubeApiArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - always_pull_images=always_pull_images, - audit_log=audit_log, - event_rate_limit=event_rate_limit, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - pod_security_policy=pod_security_policy, - secrets_encryption_config=secrets_encryption_config, - service_cluster_ip_range=service_cluster_ip_range, - service_node_port_range=service_node_port_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - always_pull_images: Optional[pulumi.Input[bool]] = None, - audit_log: Optional[pulumi.Input['ClusterServicesKubeApiAuditLogArgs']] = None, - event_rate_limit: Optional[pulumi.Input['ClusterServicesKubeApiEventRateLimitArgs']] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - pod_security_policy: Optional[pulumi.Input[bool]] = None, - secrets_encryption_config: Optional[pulumi.Input['ClusterServicesKubeApiSecretsEncryptionConfigArgs']] = None, - service_cluster_ip_range: Optional[pulumi.Input[str]] = None, - service_node_port_range: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if always_pull_images is None and 'alwaysPullImages' in kwargs: - always_pull_images = kwargs['alwaysPullImages'] - if audit_log is None and 'auditLog' in kwargs: - audit_log = kwargs['auditLog'] - if event_rate_limit is None and 'eventRateLimit' in kwargs: - event_rate_limit = kwargs['eventRateLimit'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if pod_security_policy is None and 'podSecurityPolicy' in kwargs: - pod_security_policy = kwargs['podSecurityPolicy'] - if secrets_encryption_config is None and 'secretsEncryptionConfig' in kwargs: - secrets_encryption_config = kwargs['secretsEncryptionConfig'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if service_node_port_range is None and 'serviceNodePortRange' in kwargs: - service_node_port_range = kwargs['serviceNodePortRange'] - if always_pull_images is not None: - _setter("always_pull_images", always_pull_images) + pulumi.set(__self__, "always_pull_images", always_pull_images) if audit_log is not None: - _setter("audit_log", audit_log) + pulumi.set(__self__, "audit_log", audit_log) if event_rate_limit is not None: - _setter("event_rate_limit", event_rate_limit) + pulumi.set(__self__, "event_rate_limit", event_rate_limit) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if pod_security_policy is not None: - _setter("pod_security_policy", pod_security_policy) + pulumi.set(__self__, "pod_security_policy", pod_security_policy) if secrets_encryption_config is not None: - _setter("secrets_encryption_config", secrets_encryption_config) + pulumi.set(__self__, "secrets_encryption_config", secrets_encryption_config) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) if service_node_port_range is not None: - _setter("service_node_port_range", service_node_port_range) + pulumi.set(__self__, "service_node_port_range", service_node_port_range) @property @pulumi.getter(name="alwaysPullImages") @@ -10064,23 +7821,10 @@ def __init__(__self__, *, :param pulumi.Input['ClusterServicesKubeApiAuditLogConfigurationArgs'] configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param pulumi.Input[bool] enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiAuditLogArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional[pulumi.Input['ClusterServicesKubeApiAuditLogConfigurationArgs']] = None, - enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -10124,45 +7868,18 @@ def __init__(__self__, *, :param pulumi.Input[str] path: Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string) :param pulumi.Input[str] policy: Audit policy json encoded definition. `"apiVersion"` and `"kind":"Policy","rules"` fields are required in the json. Ex. `jsonencode({"apiVersion":"audit.k8s.io/v1","kind":"Policy","rules":[{"level":"RequestResponse","resources":[{"group":"","resources":["pods"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string) """ - ClusterServicesKubeApiAuditLogConfigurationArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - format=format, - max_age=max_age, - max_backup=max_backup, - max_size=max_size, - path=path, - policy=policy, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - format: Optional[pulumi.Input[str]] = None, - max_age: Optional[pulumi.Input[int]] = None, - max_backup: Optional[pulumi.Input[int]] = None, - max_size: Optional[pulumi.Input[int]] = None, - path: Optional[pulumi.Input[str]] = None, - policy: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if max_age is None and 'maxAge' in kwargs: - max_age = kwargs['maxAge'] - if max_backup is None and 'maxBackup' in kwargs: - max_backup = kwargs['maxBackup'] - if max_size is None and 'maxSize' in kwargs: - max_size = kwargs['maxSize'] - if format is not None: - _setter("format", format) + pulumi.set(__self__, "format", format) if max_age is not None: - _setter("max_age", max_age) + pulumi.set(__self__, "max_age", max_age) if max_backup is not None: - _setter("max_backup", max_backup) + pulumi.set(__self__, "max_backup", max_backup) if max_size is not None: - _setter("max_size", max_size) + pulumi.set(__self__, "max_size", max_size) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if policy is not None: - _setter("policy", policy) + pulumi.set(__self__, "policy", policy) @property @pulumi.getter @@ -10264,79 +7981,28 @@ def __init__(__self__, *, :param pulumi.Input[str] service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) :param pulumi.Input[str] service_node_port_range: Service Node Port Range option for kube API service (string) """ - ClusterServicesKubeApiDeprecatedArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - always_pull_images=always_pull_images, - audit_log=audit_log, - event_rate_limit=event_rate_limit, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - pod_security_policy=pod_security_policy, - secrets_encryption_config=secrets_encryption_config, - service_cluster_ip_range=service_cluster_ip_range, - service_node_port_range=service_node_port_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - always_pull_images: Optional[pulumi.Input[bool]] = None, - audit_log: Optional[pulumi.Input['ClusterServicesKubeApiDeprecatedAuditLogArgs']] = None, - event_rate_limit: Optional[pulumi.Input['ClusterServicesKubeApiDeprecatedEventRateLimitArgs']] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - pod_security_policy: Optional[pulumi.Input[bool]] = None, - secrets_encryption_config: Optional[pulumi.Input['ClusterServicesKubeApiDeprecatedSecretsEncryptionConfigArgs']] = None, - service_cluster_ip_range: Optional[pulumi.Input[str]] = None, - service_node_port_range: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if always_pull_images is None and 'alwaysPullImages' in kwargs: - always_pull_images = kwargs['alwaysPullImages'] - if audit_log is None and 'auditLog' in kwargs: - audit_log = kwargs['auditLog'] - if event_rate_limit is None and 'eventRateLimit' in kwargs: - event_rate_limit = kwargs['eventRateLimit'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if pod_security_policy is None and 'podSecurityPolicy' in kwargs: - pod_security_policy = kwargs['podSecurityPolicy'] - if secrets_encryption_config is None and 'secretsEncryptionConfig' in kwargs: - secrets_encryption_config = kwargs['secretsEncryptionConfig'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if service_node_port_range is None and 'serviceNodePortRange' in kwargs: - service_node_port_range = kwargs['serviceNodePortRange'] - if always_pull_images is not None: - _setter("always_pull_images", always_pull_images) + pulumi.set(__self__, "always_pull_images", always_pull_images) if audit_log is not None: - _setter("audit_log", audit_log) + pulumi.set(__self__, "audit_log", audit_log) if event_rate_limit is not None: - _setter("event_rate_limit", event_rate_limit) + pulumi.set(__self__, "event_rate_limit", event_rate_limit) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if pod_security_policy is not None: - _setter("pod_security_policy", pod_security_policy) + pulumi.set(__self__, "pod_security_policy", pod_security_policy) if secrets_encryption_config is not None: - _setter("secrets_encryption_config", secrets_encryption_config) + pulumi.set(__self__, "secrets_encryption_config", secrets_encryption_config) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) if service_node_port_range is not None: - _setter("service_node_port_range", service_node_port_range) + pulumi.set(__self__, "service_node_port_range", service_node_port_range) @property @pulumi.getter(name="alwaysPullImages") @@ -10480,23 +8146,10 @@ def __init__(__self__, *, :param pulumi.Input['ClusterServicesKubeApiDeprecatedAuditLogConfigurationArgs'] configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param pulumi.Input[bool] enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiDeprecatedAuditLogArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional[pulumi.Input['ClusterServicesKubeApiDeprecatedAuditLogConfigurationArgs']] = None, - enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -10540,45 +8193,18 @@ def __init__(__self__, *, :param pulumi.Input[str] path: Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string) :param pulumi.Input[str] policy: Audit policy json encoded definition. `"apiVersion"` and `"kind":"Policy","rules"` fields are required in the json. Ex. `jsonencode({"apiVersion":"audit.k8s.io/v1","kind":"Policy","rules":[{"level":"RequestResponse","resources":[{"group":"","resources":["pods"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string) """ - ClusterServicesKubeApiDeprecatedAuditLogConfigurationArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - format=format, - max_age=max_age, - max_backup=max_backup, - max_size=max_size, - path=path, - policy=policy, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - format: Optional[pulumi.Input[str]] = None, - max_age: Optional[pulumi.Input[int]] = None, - max_backup: Optional[pulumi.Input[int]] = None, - max_size: Optional[pulumi.Input[int]] = None, - path: Optional[pulumi.Input[str]] = None, - policy: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if max_age is None and 'maxAge' in kwargs: - max_age = kwargs['maxAge'] - if max_backup is None and 'maxBackup' in kwargs: - max_backup = kwargs['maxBackup'] - if max_size is None and 'maxSize' in kwargs: - max_size = kwargs['maxSize'] - if format is not None: - _setter("format", format) + pulumi.set(__self__, "format", format) if max_age is not None: - _setter("max_age", max_age) + pulumi.set(__self__, "max_age", max_age) if max_backup is not None: - _setter("max_backup", max_backup) + pulumi.set(__self__, "max_backup", max_backup) if max_size is not None: - _setter("max_size", max_size) + pulumi.set(__self__, "max_size", max_size) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if policy is not None: - _setter("policy", policy) + pulumi.set(__self__, "policy", policy) @property @pulumi.getter @@ -10662,23 +8288,10 @@ def __init__(__self__, *, :param pulumi.Input[str] configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param pulumi.Input[bool] enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiDeprecatedEventRateLimitArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional[pulumi.Input[str]] = None, - enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -10714,25 +8327,10 @@ def __init__(__self__, *, :param pulumi.Input[str] custom_config: Secrets encryption yaml encoded custom configuration. `"apiVersion"` and `"kind":"EncryptionConfiguration"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string) :param pulumi.Input[bool] enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiDeprecatedSecretsEncryptionConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - custom_config=custom_config, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - custom_config: Optional[pulumi.Input[str]] = None, - enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if custom_config is None and 'customConfig' in kwargs: - custom_config = kwargs['customConfig'] - if custom_config is not None: - _setter("custom_config", custom_config) + pulumi.set(__self__, "custom_config", custom_config) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter(name="customConfig") @@ -10768,23 +8366,10 @@ def __init__(__self__, *, :param pulumi.Input[str] configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param pulumi.Input[bool] enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiEventRateLimitArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional[pulumi.Input[str]] = None, - enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -10820,25 +8405,10 @@ def __init__(__self__, *, :param pulumi.Input[str] custom_config: Secrets encryption yaml encoded custom configuration. `"apiVersion"` and `"kind":"EncryptionConfiguration"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string) :param pulumi.Input[bool] enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiSecretsEncryptionConfigArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - custom_config=custom_config, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - custom_config: Optional[pulumi.Input[str]] = None, - enabled: Optional[pulumi.Input[bool]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if custom_config is None and 'customConfig' in kwargs: - custom_config = kwargs['customConfig'] - if custom_config is not None: - _setter("custom_config", custom_config) + pulumi.set(__self__, "custom_config", custom_config) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter(name="customConfig") @@ -10882,49 +8452,18 @@ def __init__(__self__, *, :param pulumi.Input[str] image: Docker image for scheduler service (string) :param pulumi.Input[str] service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) """ - ClusterServicesKubeControllerArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_cidr=cluster_cidr, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - service_cluster_ip_range=service_cluster_ip_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_cidr: Optional[pulumi.Input[str]] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - service_cluster_ip_range: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_cidr is None and 'clusterCidr' in kwargs: - cluster_cidr = kwargs['clusterCidr'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if cluster_cidr is not None: - _setter("cluster_cidr", cluster_cidr) + pulumi.set(__self__, "cluster_cidr", cluster_cidr) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) @property @pulumi.getter(name="clusterCidr") @@ -11016,49 +8555,18 @@ def __init__(__self__, *, :param pulumi.Input[str] image: Docker image for scheduler service (string) :param pulumi.Input[str] service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) """ - ClusterServicesKubeControllerDeprecatedArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_cidr=cluster_cidr, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - service_cluster_ip_range=service_cluster_ip_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_cidr: Optional[pulumi.Input[str]] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - service_cluster_ip_range: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_cidr is None and 'clusterCidr' in kwargs: - cluster_cidr = kwargs['clusterCidr'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if cluster_cidr is not None: - _setter("cluster_cidr", cluster_cidr) + pulumi.set(__self__, "cluster_cidr", cluster_cidr) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) @property @pulumi.getter(name="clusterCidr") @@ -11146,37 +8654,14 @@ def __init__(__self__, *, :param pulumi.Input[Sequence[pulumi.Input[str]]] extra_envs: Extra environment for scheduler service (list) :param pulumi.Input[str] image: Docker image for scheduler service (string) """ - ClusterServicesKubeProxyDeprecatedArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -11240,37 +8725,14 @@ def __init__(__self__, *, :param pulumi.Input[Sequence[pulumi.Input[str]]] extra_envs: Extra environment for scheduler service (list) :param pulumi.Input[str] image: Docker image for scheduler service (string) """ - ClusterServicesKubeSchedulerDeprecatedArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -11344,67 +8806,24 @@ def __init__(__self__, *, :param pulumi.Input[str] image: Docker image for scheduler service (string) :param pulumi.Input[str] infra_container_image: Infra container image for kubelet service (string) """ - ClusterServicesKubeletArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_dns_server=cluster_dns_server, - cluster_domain=cluster_domain, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - fail_swap_on=fail_swap_on, - generate_serving_certificate=generate_serving_certificate, - image=image, - infra_container_image=infra_container_image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_dns_server: Optional[pulumi.Input[str]] = None, - cluster_domain: Optional[pulumi.Input[str]] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - fail_swap_on: Optional[pulumi.Input[bool]] = None, - generate_serving_certificate: Optional[pulumi.Input[bool]] = None, - image: Optional[pulumi.Input[str]] = None, - infra_container_image: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_dns_server is None and 'clusterDnsServer' in kwargs: - cluster_dns_server = kwargs['clusterDnsServer'] - if cluster_domain is None and 'clusterDomain' in kwargs: - cluster_domain = kwargs['clusterDomain'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if fail_swap_on is None and 'failSwapOn' in kwargs: - fail_swap_on = kwargs['failSwapOn'] - if generate_serving_certificate is None and 'generateServingCertificate' in kwargs: - generate_serving_certificate = kwargs['generateServingCertificate'] - if infra_container_image is None and 'infraContainerImage' in kwargs: - infra_container_image = kwargs['infraContainerImage'] - if cluster_dns_server is not None: - _setter("cluster_dns_server", cluster_dns_server) + pulumi.set(__self__, "cluster_dns_server", cluster_dns_server) if cluster_domain is not None: - _setter("cluster_domain", cluster_domain) + pulumi.set(__self__, "cluster_domain", cluster_domain) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if fail_swap_on is not None: - _setter("fail_swap_on", fail_swap_on) + pulumi.set(__self__, "fail_swap_on", fail_swap_on) if generate_serving_certificate is not None: - _setter("generate_serving_certificate", generate_serving_certificate) + pulumi.set(__self__, "generate_serving_certificate", generate_serving_certificate) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if infra_container_image is not None: - _setter("infra_container_image", infra_container_image) + pulumi.set(__self__, "infra_container_image", infra_container_image) @property @pulumi.getter(name="clusterDnsServer") @@ -11538,67 +8957,24 @@ def __init__(__self__, *, :param pulumi.Input[str] image: Docker image for scheduler service (string) :param pulumi.Input[str] infra_container_image: Infra container image for kubelet service (string) """ - ClusterServicesKubeletDeprecatedArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_dns_server=cluster_dns_server, - cluster_domain=cluster_domain, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - fail_swap_on=fail_swap_on, - generate_serving_certificate=generate_serving_certificate, - image=image, - infra_container_image=infra_container_image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_dns_server: Optional[pulumi.Input[str]] = None, - cluster_domain: Optional[pulumi.Input[str]] = None, - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - fail_swap_on: Optional[pulumi.Input[bool]] = None, - generate_serving_certificate: Optional[pulumi.Input[bool]] = None, - image: Optional[pulumi.Input[str]] = None, - infra_container_image: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_dns_server is None and 'clusterDnsServer' in kwargs: - cluster_dns_server = kwargs['clusterDnsServer'] - if cluster_domain is None and 'clusterDomain' in kwargs: - cluster_domain = kwargs['clusterDomain'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if fail_swap_on is None and 'failSwapOn' in kwargs: - fail_swap_on = kwargs['failSwapOn'] - if generate_serving_certificate is None and 'generateServingCertificate' in kwargs: - generate_serving_certificate = kwargs['generateServingCertificate'] - if infra_container_image is None and 'infraContainerImage' in kwargs: - infra_container_image = kwargs['infraContainerImage'] - if cluster_dns_server is not None: - _setter("cluster_dns_server", cluster_dns_server) + pulumi.set(__self__, "cluster_dns_server", cluster_dns_server) if cluster_domain is not None: - _setter("cluster_domain", cluster_domain) + pulumi.set(__self__, "cluster_domain", cluster_domain) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if fail_swap_on is not None: - _setter("fail_swap_on", fail_swap_on) + pulumi.set(__self__, "fail_swap_on", fail_swap_on) if generate_serving_certificate is not None: - _setter("generate_serving_certificate", generate_serving_certificate) + pulumi.set(__self__, "generate_serving_certificate", generate_serving_certificate) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if infra_container_image is not None: - _setter("infra_container_image", infra_container_image) + pulumi.set(__self__, "infra_container_image", infra_container_image) @property @pulumi.getter(name="clusterDnsServer") @@ -11722,37 +9098,14 @@ def __init__(__self__, *, :param pulumi.Input[Sequence[pulumi.Input[str]]] extra_envs: Extra environment for scheduler service (list) :param pulumi.Input[str] image: Docker image for scheduler service (string) """ - ClusterServicesKubeproxyArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -11816,37 +9169,14 @@ def __init__(__self__, *, :param pulumi.Input[Sequence[pulumi.Input[str]]] extra_envs: Extra environment for scheduler service (list) :param pulumi.Input[str] image: Docker image for scheduler service (string) """ - ClusterServicesSchedulerArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[pulumi.Input[Mapping[str, Any]]] = None, - extra_binds: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - extra_envs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - image: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -11976,221 +9306,80 @@ def __init__(__self__, *, :param pulumi.Input[str] weave_node: Docker image for weave_node (string) :param pulumi.Input[str] windows_pod_infra_container: Docker image for windows_pod_infra_container (string) """ - ClusterSystemImagesArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - aci_cni_deploy_container=aci_cni_deploy_container, - aci_controller_container=aci_controller_container, - aci_host_container=aci_host_container, - aci_mcast_container=aci_mcast_container, - aci_opflex_container=aci_opflex_container, - aci_ovs_container=aci_ovs_container, - alpine=alpine, - calico_cni=calico_cni, - calico_controllers=calico_controllers, - calico_ctl=calico_ctl, - calico_flex_vol=calico_flex_vol, - calico_node=calico_node, - canal_cni=canal_cni, - canal_flannel=canal_flannel, - canal_flex_vol=canal_flex_vol, - canal_node=canal_node, - cert_downloader=cert_downloader, - coredns=coredns, - coredns_autoscaler=coredns_autoscaler, - dnsmasq=dnsmasq, - etcd=etcd, - flannel=flannel, - flannel_cni=flannel_cni, - ingress=ingress, - ingress_backend=ingress_backend, - kube_dns=kube_dns, - kube_dns_autoscaler=kube_dns_autoscaler, - kube_dns_sidecar=kube_dns_sidecar, - kubernetes=kubernetes, - kubernetes_services_sidecar=kubernetes_services_sidecar, - metrics_server=metrics_server, - nginx_proxy=nginx_proxy, - nodelocal=nodelocal, - pod_infra_container=pod_infra_container, - weave_cni=weave_cni, - weave_node=weave_node, - windows_pod_infra_container=windows_pod_infra_container, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aci_cni_deploy_container: Optional[pulumi.Input[str]] = None, - aci_controller_container: Optional[pulumi.Input[str]] = None, - aci_host_container: Optional[pulumi.Input[str]] = None, - aci_mcast_container: Optional[pulumi.Input[str]] = None, - aci_opflex_container: Optional[pulumi.Input[str]] = None, - aci_ovs_container: Optional[pulumi.Input[str]] = None, - alpine: Optional[pulumi.Input[str]] = None, - calico_cni: Optional[pulumi.Input[str]] = None, - calico_controllers: Optional[pulumi.Input[str]] = None, - calico_ctl: Optional[pulumi.Input[str]] = None, - calico_flex_vol: Optional[pulumi.Input[str]] = None, - calico_node: Optional[pulumi.Input[str]] = None, - canal_cni: Optional[pulumi.Input[str]] = None, - canal_flannel: Optional[pulumi.Input[str]] = None, - canal_flex_vol: Optional[pulumi.Input[str]] = None, - canal_node: Optional[pulumi.Input[str]] = None, - cert_downloader: Optional[pulumi.Input[str]] = None, - coredns: Optional[pulumi.Input[str]] = None, - coredns_autoscaler: Optional[pulumi.Input[str]] = None, - dnsmasq: Optional[pulumi.Input[str]] = None, - etcd: Optional[pulumi.Input[str]] = None, - flannel: Optional[pulumi.Input[str]] = None, - flannel_cni: Optional[pulumi.Input[str]] = None, - ingress: Optional[pulumi.Input[str]] = None, - ingress_backend: Optional[pulumi.Input[str]] = None, - kube_dns: Optional[pulumi.Input[str]] = None, - kube_dns_autoscaler: Optional[pulumi.Input[str]] = None, - kube_dns_sidecar: Optional[pulumi.Input[str]] = None, - kubernetes: Optional[pulumi.Input[str]] = None, - kubernetes_services_sidecar: Optional[pulumi.Input[str]] = None, - metrics_server: Optional[pulumi.Input[str]] = None, - nginx_proxy: Optional[pulumi.Input[str]] = None, - nodelocal: Optional[pulumi.Input[str]] = None, - pod_infra_container: Optional[pulumi.Input[str]] = None, - weave_cni: Optional[pulumi.Input[str]] = None, - weave_node: Optional[pulumi.Input[str]] = None, - windows_pod_infra_container: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aci_cni_deploy_container is None and 'aciCniDeployContainer' in kwargs: - aci_cni_deploy_container = kwargs['aciCniDeployContainer'] - if aci_controller_container is None and 'aciControllerContainer' in kwargs: - aci_controller_container = kwargs['aciControllerContainer'] - if aci_host_container is None and 'aciHostContainer' in kwargs: - aci_host_container = kwargs['aciHostContainer'] - if aci_mcast_container is None and 'aciMcastContainer' in kwargs: - aci_mcast_container = kwargs['aciMcastContainer'] - if aci_opflex_container is None and 'aciOpflexContainer' in kwargs: - aci_opflex_container = kwargs['aciOpflexContainer'] - if aci_ovs_container is None and 'aciOvsContainer' in kwargs: - aci_ovs_container = kwargs['aciOvsContainer'] - if calico_cni is None and 'calicoCni' in kwargs: - calico_cni = kwargs['calicoCni'] - if calico_controllers is None and 'calicoControllers' in kwargs: - calico_controllers = kwargs['calicoControllers'] - if calico_ctl is None and 'calicoCtl' in kwargs: - calico_ctl = kwargs['calicoCtl'] - if calico_flex_vol is None and 'calicoFlexVol' in kwargs: - calico_flex_vol = kwargs['calicoFlexVol'] - if calico_node is None and 'calicoNode' in kwargs: - calico_node = kwargs['calicoNode'] - if canal_cni is None and 'canalCni' in kwargs: - canal_cni = kwargs['canalCni'] - if canal_flannel is None and 'canalFlannel' in kwargs: - canal_flannel = kwargs['canalFlannel'] - if canal_flex_vol is None and 'canalFlexVol' in kwargs: - canal_flex_vol = kwargs['canalFlexVol'] - if canal_node is None and 'canalNode' in kwargs: - canal_node = kwargs['canalNode'] - if cert_downloader is None and 'certDownloader' in kwargs: - cert_downloader = kwargs['certDownloader'] - if coredns_autoscaler is None and 'corednsAutoscaler' in kwargs: - coredns_autoscaler = kwargs['corednsAutoscaler'] - if flannel_cni is None and 'flannelCni' in kwargs: - flannel_cni = kwargs['flannelCni'] - if ingress_backend is None and 'ingressBackend' in kwargs: - ingress_backend = kwargs['ingressBackend'] - if kube_dns is None and 'kubeDns' in kwargs: - kube_dns = kwargs['kubeDns'] - if kube_dns_autoscaler is None and 'kubeDnsAutoscaler' in kwargs: - kube_dns_autoscaler = kwargs['kubeDnsAutoscaler'] - if kube_dns_sidecar is None and 'kubeDnsSidecar' in kwargs: - kube_dns_sidecar = kwargs['kubeDnsSidecar'] - if kubernetes_services_sidecar is None and 'kubernetesServicesSidecar' in kwargs: - kubernetes_services_sidecar = kwargs['kubernetesServicesSidecar'] - if metrics_server is None and 'metricsServer' in kwargs: - metrics_server = kwargs['metricsServer'] - if nginx_proxy is None and 'nginxProxy' in kwargs: - nginx_proxy = kwargs['nginxProxy'] - if pod_infra_container is None and 'podInfraContainer' in kwargs: - pod_infra_container = kwargs['podInfraContainer'] - if weave_cni is None and 'weaveCni' in kwargs: - weave_cni = kwargs['weaveCni'] - if weave_node is None and 'weaveNode' in kwargs: - weave_node = kwargs['weaveNode'] - if windows_pod_infra_container is None and 'windowsPodInfraContainer' in kwargs: - windows_pod_infra_container = kwargs['windowsPodInfraContainer'] - if aci_cni_deploy_container is not None: - _setter("aci_cni_deploy_container", aci_cni_deploy_container) + pulumi.set(__self__, "aci_cni_deploy_container", aci_cni_deploy_container) if aci_controller_container is not None: - _setter("aci_controller_container", aci_controller_container) + pulumi.set(__self__, "aci_controller_container", aci_controller_container) if aci_host_container is not None: - _setter("aci_host_container", aci_host_container) + pulumi.set(__self__, "aci_host_container", aci_host_container) if aci_mcast_container is not None: - _setter("aci_mcast_container", aci_mcast_container) + pulumi.set(__self__, "aci_mcast_container", aci_mcast_container) if aci_opflex_container is not None: - _setter("aci_opflex_container", aci_opflex_container) + pulumi.set(__self__, "aci_opflex_container", aci_opflex_container) if aci_ovs_container is not None: - _setter("aci_ovs_container", aci_ovs_container) + pulumi.set(__self__, "aci_ovs_container", aci_ovs_container) if alpine is not None: - _setter("alpine", alpine) + pulumi.set(__self__, "alpine", alpine) if calico_cni is not None: - _setter("calico_cni", calico_cni) + pulumi.set(__self__, "calico_cni", calico_cni) if calico_controllers is not None: - _setter("calico_controllers", calico_controllers) + pulumi.set(__self__, "calico_controllers", calico_controllers) if calico_ctl is not None: - _setter("calico_ctl", calico_ctl) + pulumi.set(__self__, "calico_ctl", calico_ctl) if calico_flex_vol is not None: - _setter("calico_flex_vol", calico_flex_vol) + pulumi.set(__self__, "calico_flex_vol", calico_flex_vol) if calico_node is not None: - _setter("calico_node", calico_node) + pulumi.set(__self__, "calico_node", calico_node) if canal_cni is not None: - _setter("canal_cni", canal_cni) + pulumi.set(__self__, "canal_cni", canal_cni) if canal_flannel is not None: - _setter("canal_flannel", canal_flannel) + pulumi.set(__self__, "canal_flannel", canal_flannel) if canal_flex_vol is not None: - _setter("canal_flex_vol", canal_flex_vol) + pulumi.set(__self__, "canal_flex_vol", canal_flex_vol) if canal_node is not None: - _setter("canal_node", canal_node) + pulumi.set(__self__, "canal_node", canal_node) if cert_downloader is not None: - _setter("cert_downloader", cert_downloader) + pulumi.set(__self__, "cert_downloader", cert_downloader) if coredns is not None: - _setter("coredns", coredns) + pulumi.set(__self__, "coredns", coredns) if coredns_autoscaler is not None: - _setter("coredns_autoscaler", coredns_autoscaler) + pulumi.set(__self__, "coredns_autoscaler", coredns_autoscaler) if dnsmasq is not None: - _setter("dnsmasq", dnsmasq) + pulumi.set(__self__, "dnsmasq", dnsmasq) if etcd is not None: - _setter("etcd", etcd) + pulumi.set(__self__, "etcd", etcd) if flannel is not None: - _setter("flannel", flannel) + pulumi.set(__self__, "flannel", flannel) if flannel_cni is not None: - _setter("flannel_cni", flannel_cni) + pulumi.set(__self__, "flannel_cni", flannel_cni) if ingress is not None: - _setter("ingress", ingress) + pulumi.set(__self__, "ingress", ingress) if ingress_backend is not None: - _setter("ingress_backend", ingress_backend) + pulumi.set(__self__, "ingress_backend", ingress_backend) if kube_dns is not None: - _setter("kube_dns", kube_dns) + pulumi.set(__self__, "kube_dns", kube_dns) if kube_dns_autoscaler is not None: - _setter("kube_dns_autoscaler", kube_dns_autoscaler) + pulumi.set(__self__, "kube_dns_autoscaler", kube_dns_autoscaler) if kube_dns_sidecar is not None: - _setter("kube_dns_sidecar", kube_dns_sidecar) + pulumi.set(__self__, "kube_dns_sidecar", kube_dns_sidecar) if kubernetes is not None: - _setter("kubernetes", kubernetes) + pulumi.set(__self__, "kubernetes", kubernetes) if kubernetes_services_sidecar is not None: - _setter("kubernetes_services_sidecar", kubernetes_services_sidecar) + pulumi.set(__self__, "kubernetes_services_sidecar", kubernetes_services_sidecar) if metrics_server is not None: - _setter("metrics_server", metrics_server) + pulumi.set(__self__, "metrics_server", metrics_server) if nginx_proxy is not None: - _setter("nginx_proxy", nginx_proxy) + pulumi.set(__self__, "nginx_proxy", nginx_proxy) if nodelocal is not None: - _setter("nodelocal", nodelocal) + pulumi.set(__self__, "nodelocal", nodelocal) if pod_infra_container is not None: - _setter("pod_infra_container", pod_infra_container) + pulumi.set(__self__, "pod_infra_container", pod_infra_container) if weave_cni is not None: - _setter("weave_cni", weave_cni) + pulumi.set(__self__, "weave_cni", weave_cni) if weave_node is not None: - _setter("weave_node", weave_node) + pulumi.set(__self__, "weave_node", weave_node) if windows_pod_infra_container is not None: - _setter("windows_pod_infra_container", windows_pod_infra_container) + pulumi.set(__self__, "windows_pod_infra_container", windows_pod_infra_container) @property @pulumi.getter(name="aciCniDeployContainer") @@ -12650,37 +9839,14 @@ def __init__(__self__, *, :param pulumi.Input[str] max_unavailable_controlplane: RKE max unavailable controlplane nodes (string) :param pulumi.Input[str] max_unavailable_worker: RKE max unavailable worker nodes (string) """ - ClusterUpgradeStrategyArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - drain=drain, - drain_input=drain_input, - max_unavailable_controlplane=max_unavailable_controlplane, - max_unavailable_worker=max_unavailable_worker, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - drain: Optional[pulumi.Input[bool]] = None, - drain_input: Optional[pulumi.Input['ClusterUpgradeStrategyDrainInputArgs']] = None, - max_unavailable_controlplane: Optional[pulumi.Input[str]] = None, - max_unavailable_worker: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if drain_input is None and 'drainInput' in kwargs: - drain_input = kwargs['drainInput'] - if max_unavailable_controlplane is None and 'maxUnavailableControlplane' in kwargs: - max_unavailable_controlplane = kwargs['maxUnavailableControlplane'] - if max_unavailable_worker is None and 'maxUnavailableWorker' in kwargs: - max_unavailable_worker = kwargs['maxUnavailableWorker'] - if drain is not None: - _setter("drain", drain) + pulumi.set(__self__, "drain", drain) if drain_input is not None: - _setter("drain_input", drain_input) + pulumi.set(__self__, "drain_input", drain_input) if max_unavailable_controlplane is not None: - _setter("max_unavailable_controlplane", max_unavailable_controlplane) + pulumi.set(__self__, "max_unavailable_controlplane", max_unavailable_controlplane) if max_unavailable_worker is not None: - _setter("max_unavailable_worker", max_unavailable_worker) + pulumi.set(__self__, "max_unavailable_worker", max_unavailable_worker) @property @pulumi.getter @@ -12746,41 +9912,16 @@ def __init__(__self__, *, :param pulumi.Input[bool] ignore_daemon_sets: Ignore RKE daemon sets (bool) :param pulumi.Input[int] timeout: RKE node drain timeout (int) """ - ClusterUpgradeStrategyDrainInputArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - delete_local_data=delete_local_data, - force=force, - grace_period=grace_period, - ignore_daemon_sets=ignore_daemon_sets, - timeout=timeout, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - delete_local_data: Optional[pulumi.Input[bool]] = None, - force: Optional[pulumi.Input[bool]] = None, - grace_period: Optional[pulumi.Input[int]] = None, - ignore_daemon_sets: Optional[pulumi.Input[bool]] = None, - timeout: Optional[pulumi.Input[int]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if delete_local_data is None and 'deleteLocalData' in kwargs: - delete_local_data = kwargs['deleteLocalData'] - if grace_period is None and 'gracePeriod' in kwargs: - grace_period = kwargs['gracePeriod'] - if ignore_daemon_sets is None and 'ignoreDaemonSets' in kwargs: - ignore_daemon_sets = kwargs['ignoreDaemonSets'] - if delete_local_data is not None: - _setter("delete_local_data", delete_local_data) + pulumi.set(__self__, "delete_local_data", delete_local_data) if force is not None: - _setter("force", force) + pulumi.set(__self__, "force", force) if grace_period is not None: - _setter("grace_period", grace_period) + pulumi.set(__self__, "grace_period", grace_period) if ignore_daemon_sets is not None: - _setter("ignore_daemon_sets", ignore_daemon_sets) + pulumi.set(__self__, "ignore_daemon_sets", ignore_daemon_sets) if timeout is not None: - _setter("timeout", timeout) + pulumi.set(__self__, "timeout", timeout) @property @pulumi.getter(name="deleteLocalData") @@ -12852,25 +9993,10 @@ def __init__(__self__, *, :param pulumi.Input[str] address: Address ip for node (string) :param pulumi.Input[str] node_name: Name of the host provisioned via docker machine (string) """ - ClusterWorkerHostArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[pulumi.Input[str]] = None, - node_name: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter diff --git a/sdk/python/pulumi_rke/_utilities.py b/sdk/python/pulumi_rke/_utilities.py index 2936b65a..2d9a3c84 100644 --- a/sdk/python/pulumi_rke/_utilities.py +++ b/sdk/python/pulumi_rke/_utilities.py @@ -246,24 +246,5 @@ def lifted_func(*args, opts=None, **kwargs): return (lambda _: lifted_func) - -def configure(val, cls: type, input: bool): - def _apply(v): - if isinstance(v, typing.Mapping): - def _setter(key, value): - v[key] = value - cls._configure(_setter, **v) - return v - - # Check that cls has a static _configure method. External classes may - # not have it if it was generated with older codegen. - if hasattr(cls, "_configure"): - if isinstance(val, typing.Mapping): - return _apply(val) - elif input and val is not None and not isinstance(val, cls): - return pulumi.Output.from_input(val).apply(_apply) - - return val - def get_plugin_download_url(): return None diff --git a/sdk/python/pulumi_rke/cluster.py b/sdk/python/pulumi_rke/cluster.py index 0d73531b..3eddf702 100644 --- a/sdk/python/pulumi_rke/cluster.py +++ b/sdk/python/pulumi_rke/cluster.py @@ -6,7 +6,7 @@ import warnings import pulumi import pulumi.runtime -from typing import Any, Callable, Mapping, Optional, Sequence, Union, overload +from typing import Any, Mapping, Optional, Sequence, Union, overload from . import _utilities from . import outputs from ._inputs import * @@ -102,266 +102,111 @@ def __init__(__self__, *, :param pulumi.Input[bool] update_only: Skip idempotent deployment of control and etcd plane. Default `false` (bool) :param pulumi.Input['ClusterUpgradeStrategyArgs'] upgrade_strategy: RKE k8s cluster upgrade strategy (list maxitems:1) """ - ClusterArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - addon_job_timeout=addon_job_timeout, - addons=addons, - addons_includes=addons_includes, - authentication=authentication, - authorization=authorization, - bastion_host=bastion_host, - cert_dir=cert_dir, - cloud_provider=cloud_provider, - cluster_name=cluster_name, - cluster_yaml=cluster_yaml, - custom_certs=custom_certs, - delay_on_creation=delay_on_creation, - dind=dind, - dind_dns_server=dind_dns_server, - dind_storage_driver=dind_storage_driver, - disable_port_check=disable_port_check, - dns=dns, - enable_cri_dockerd=enable_cri_dockerd, - ignore_docker_version=ignore_docker_version, - ingress=ingress, - kubernetes_version=kubernetes_version, - monitoring=monitoring, - network=network, - nodes=nodes, - nodes_confs=nodes_confs, - prefix_path=prefix_path, - private_registries=private_registries, - restore=restore, - rotate_certificates=rotate_certificates, - services=services, - services_etcd_deprecated=services_etcd_deprecated, - services_kube_api_deprecated=services_kube_api_deprecated, - services_kube_controller_deprecated=services_kube_controller_deprecated, - services_kube_proxy_deprecated=services_kube_proxy_deprecated, - services_kube_scheduler_deprecated=services_kube_scheduler_deprecated, - services_kubelet_deprecated=services_kubelet_deprecated, - ssh_agent_auth=ssh_agent_auth, - ssh_cert_path=ssh_cert_path, - ssh_key_path=ssh_key_path, - system_images=system_images, - update_only=update_only, - upgrade_strategy=upgrade_strategy, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - addon_job_timeout: Optional[pulumi.Input[int]] = None, - addons: Optional[pulumi.Input[str]] = None, - addons_includes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - authentication: Optional[pulumi.Input['ClusterAuthenticationArgs']] = None, - authorization: Optional[pulumi.Input['ClusterAuthorizationArgs']] = None, - bastion_host: Optional[pulumi.Input['ClusterBastionHostArgs']] = None, - cert_dir: Optional[pulumi.Input[str]] = None, - cloud_provider: Optional[pulumi.Input['ClusterCloudProviderArgs']] = None, - cluster_name: Optional[pulumi.Input[str]] = None, - cluster_yaml: Optional[pulumi.Input[str]] = None, - custom_certs: Optional[pulumi.Input[bool]] = None, - delay_on_creation: Optional[pulumi.Input[int]] = None, - dind: Optional[pulumi.Input[bool]] = None, - dind_dns_server: Optional[pulumi.Input[str]] = None, - dind_storage_driver: Optional[pulumi.Input[str]] = None, - disable_port_check: Optional[pulumi.Input[bool]] = None, - dns: Optional[pulumi.Input['ClusterDnsArgs']] = None, - enable_cri_dockerd: Optional[pulumi.Input[bool]] = None, - ignore_docker_version: Optional[pulumi.Input[bool]] = None, - ingress: Optional[pulumi.Input['ClusterIngressArgs']] = None, - kubernetes_version: Optional[pulumi.Input[str]] = None, - monitoring: Optional[pulumi.Input['ClusterMonitoringArgs']] = None, - network: Optional[pulumi.Input['ClusterNetworkArgs']] = None, - nodes: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterNodeArgs']]]] = None, - nodes_confs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - prefix_path: Optional[pulumi.Input[str]] = None, - private_registries: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterPrivateRegistryArgs']]]] = None, - restore: Optional[pulumi.Input['ClusterRestoreArgs']] = None, - rotate_certificates: Optional[pulumi.Input['ClusterRotateCertificatesArgs']] = None, - services: Optional[pulumi.Input['ClusterServicesArgs']] = None, - services_etcd_deprecated: Optional[pulumi.Input['ClusterServicesEtcdDeprecatedArgs']] = None, - services_kube_api_deprecated: Optional[pulumi.Input['ClusterServicesKubeApiDeprecatedArgs']] = None, - services_kube_controller_deprecated: Optional[pulumi.Input['ClusterServicesKubeControllerDeprecatedArgs']] = None, - services_kube_proxy_deprecated: Optional[pulumi.Input['ClusterServicesKubeProxyDeprecatedArgs']] = None, - services_kube_scheduler_deprecated: Optional[pulumi.Input['ClusterServicesKubeSchedulerDeprecatedArgs']] = None, - services_kubelet_deprecated: Optional[pulumi.Input['ClusterServicesKubeletDeprecatedArgs']] = None, - ssh_agent_auth: Optional[pulumi.Input[bool]] = None, - ssh_cert_path: Optional[pulumi.Input[str]] = None, - ssh_key_path: Optional[pulumi.Input[str]] = None, - system_images: Optional[pulumi.Input['ClusterSystemImagesArgs']] = None, - update_only: Optional[pulumi.Input[bool]] = None, - upgrade_strategy: Optional[pulumi.Input['ClusterUpgradeStrategyArgs']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if addon_job_timeout is None and 'addonJobTimeout' in kwargs: - addon_job_timeout = kwargs['addonJobTimeout'] - if addons_includes is None and 'addonsIncludes' in kwargs: - addons_includes = kwargs['addonsIncludes'] - if bastion_host is None and 'bastionHost' in kwargs: - bastion_host = kwargs['bastionHost'] - if cert_dir is None and 'certDir' in kwargs: - cert_dir = kwargs['certDir'] - if cloud_provider is None and 'cloudProvider' in kwargs: - cloud_provider = kwargs['cloudProvider'] - if cluster_name is None and 'clusterName' in kwargs: - cluster_name = kwargs['clusterName'] - if cluster_yaml is None and 'clusterYaml' in kwargs: - cluster_yaml = kwargs['clusterYaml'] - if custom_certs is None and 'customCerts' in kwargs: - custom_certs = kwargs['customCerts'] - if delay_on_creation is None and 'delayOnCreation' in kwargs: - delay_on_creation = kwargs['delayOnCreation'] - if dind_dns_server is None and 'dindDnsServer' in kwargs: - dind_dns_server = kwargs['dindDnsServer'] - if dind_storage_driver is None and 'dindStorageDriver' in kwargs: - dind_storage_driver = kwargs['dindStorageDriver'] - if disable_port_check is None and 'disablePortCheck' in kwargs: - disable_port_check = kwargs['disablePortCheck'] - if enable_cri_dockerd is None and 'enableCriDockerd' in kwargs: - enable_cri_dockerd = kwargs['enableCriDockerd'] - if ignore_docker_version is None and 'ignoreDockerVersion' in kwargs: - ignore_docker_version = kwargs['ignoreDockerVersion'] - if kubernetes_version is None and 'kubernetesVersion' in kwargs: - kubernetes_version = kwargs['kubernetesVersion'] - if nodes_confs is None and 'nodesConfs' in kwargs: - nodes_confs = kwargs['nodesConfs'] - if prefix_path is None and 'prefixPath' in kwargs: - prefix_path = kwargs['prefixPath'] - if private_registries is None and 'privateRegistries' in kwargs: - private_registries = kwargs['privateRegistries'] - if rotate_certificates is None and 'rotateCertificates' in kwargs: - rotate_certificates = kwargs['rotateCertificates'] - if services_etcd_deprecated is None and 'servicesEtcdDeprecated' in kwargs: - services_etcd_deprecated = kwargs['servicesEtcdDeprecated'] - if services_kube_api_deprecated is None and 'servicesKubeApiDeprecated' in kwargs: - services_kube_api_deprecated = kwargs['servicesKubeApiDeprecated'] - if services_kube_controller_deprecated is None and 'servicesKubeControllerDeprecated' in kwargs: - services_kube_controller_deprecated = kwargs['servicesKubeControllerDeprecated'] - if services_kube_proxy_deprecated is None and 'servicesKubeProxyDeprecated' in kwargs: - services_kube_proxy_deprecated = kwargs['servicesKubeProxyDeprecated'] - if services_kube_scheduler_deprecated is None and 'servicesKubeSchedulerDeprecated' in kwargs: - services_kube_scheduler_deprecated = kwargs['servicesKubeSchedulerDeprecated'] - if services_kubelet_deprecated is None and 'servicesKubeletDeprecated' in kwargs: - services_kubelet_deprecated = kwargs['servicesKubeletDeprecated'] - if ssh_agent_auth is None and 'sshAgentAuth' in kwargs: - ssh_agent_auth = kwargs['sshAgentAuth'] - if ssh_cert_path is None and 'sshCertPath' in kwargs: - ssh_cert_path = kwargs['sshCertPath'] - if ssh_key_path is None and 'sshKeyPath' in kwargs: - ssh_key_path = kwargs['sshKeyPath'] - if system_images is None and 'systemImages' in kwargs: - system_images = kwargs['systemImages'] - if update_only is None and 'updateOnly' in kwargs: - update_only = kwargs['updateOnly'] - if upgrade_strategy is None and 'upgradeStrategy' in kwargs: - upgrade_strategy = kwargs['upgradeStrategy'] - if addon_job_timeout is not None: - _setter("addon_job_timeout", addon_job_timeout) + pulumi.set(__self__, "addon_job_timeout", addon_job_timeout) if addons is not None: - _setter("addons", addons) + pulumi.set(__self__, "addons", addons) if addons_includes is not None: - _setter("addons_includes", addons_includes) + pulumi.set(__self__, "addons_includes", addons_includes) if authentication is not None: - _setter("authentication", authentication) + pulumi.set(__self__, "authentication", authentication) if authorization is not None: - _setter("authorization", authorization) + pulumi.set(__self__, "authorization", authorization) if bastion_host is not None: - _setter("bastion_host", bastion_host) + pulumi.set(__self__, "bastion_host", bastion_host) if cert_dir is not None: - _setter("cert_dir", cert_dir) + pulumi.set(__self__, "cert_dir", cert_dir) if cloud_provider is not None: - _setter("cloud_provider", cloud_provider) + pulumi.set(__self__, "cloud_provider", cloud_provider) if cluster_name is not None: - _setter("cluster_name", cluster_name) + pulumi.set(__self__, "cluster_name", cluster_name) if cluster_yaml is not None: - _setter("cluster_yaml", cluster_yaml) + pulumi.set(__self__, "cluster_yaml", cluster_yaml) if custom_certs is not None: - _setter("custom_certs", custom_certs) + pulumi.set(__self__, "custom_certs", custom_certs) if delay_on_creation is not None: - _setter("delay_on_creation", delay_on_creation) + pulumi.set(__self__, "delay_on_creation", delay_on_creation) if dind is not None: - _setter("dind", dind) + pulumi.set(__self__, "dind", dind) if dind_dns_server is not None: - _setter("dind_dns_server", dind_dns_server) + pulumi.set(__self__, "dind_dns_server", dind_dns_server) if dind_storage_driver is not None: - _setter("dind_storage_driver", dind_storage_driver) + pulumi.set(__self__, "dind_storage_driver", dind_storage_driver) if disable_port_check is not None: - _setter("disable_port_check", disable_port_check) + pulumi.set(__self__, "disable_port_check", disable_port_check) if dns is not None: - _setter("dns", dns) + pulumi.set(__self__, "dns", dns) if enable_cri_dockerd is not None: - _setter("enable_cri_dockerd", enable_cri_dockerd) + pulumi.set(__self__, "enable_cri_dockerd", enable_cri_dockerd) if ignore_docker_version is not None: - _setter("ignore_docker_version", ignore_docker_version) + pulumi.set(__self__, "ignore_docker_version", ignore_docker_version) if ingress is not None: - _setter("ingress", ingress) + pulumi.set(__self__, "ingress", ingress) if kubernetes_version is not None: - _setter("kubernetes_version", kubernetes_version) + pulumi.set(__self__, "kubernetes_version", kubernetes_version) if monitoring is not None: - _setter("monitoring", monitoring) + pulumi.set(__self__, "monitoring", monitoring) if network is not None: - _setter("network", network) + pulumi.set(__self__, "network", network) if nodes is not None: - _setter("nodes", nodes) + pulumi.set(__self__, "nodes", nodes) if nodes_confs is not None: warnings.warn("""Use cluster_yaml instead""", DeprecationWarning) pulumi.log.warn("""nodes_confs is deprecated: Use cluster_yaml instead""") if nodes_confs is not None: - _setter("nodes_confs", nodes_confs) + pulumi.set(__self__, "nodes_confs", nodes_confs) if prefix_path is not None: - _setter("prefix_path", prefix_path) + pulumi.set(__self__, "prefix_path", prefix_path) if private_registries is not None: - _setter("private_registries", private_registries) + pulumi.set(__self__, "private_registries", private_registries) if restore is not None: - _setter("restore", restore) + pulumi.set(__self__, "restore", restore) if rotate_certificates is not None: - _setter("rotate_certificates", rotate_certificates) + pulumi.set(__self__, "rotate_certificates", rotate_certificates) if services is not None: - _setter("services", services) + pulumi.set(__self__, "services", services) if services_etcd_deprecated is not None: warnings.warn("""Use services.etcd instead""", DeprecationWarning) pulumi.log.warn("""services_etcd_deprecated is deprecated: Use services.etcd instead""") if services_etcd_deprecated is not None: - _setter("services_etcd_deprecated", services_etcd_deprecated) + pulumi.set(__self__, "services_etcd_deprecated", services_etcd_deprecated) if services_kube_api_deprecated is not None: warnings.warn("""Use services.kube_api instead""", DeprecationWarning) pulumi.log.warn("""services_kube_api_deprecated is deprecated: Use services.kube_api instead""") if services_kube_api_deprecated is not None: - _setter("services_kube_api_deprecated", services_kube_api_deprecated) + pulumi.set(__self__, "services_kube_api_deprecated", services_kube_api_deprecated) if services_kube_controller_deprecated is not None: warnings.warn("""Use services.kube_controller instead""", DeprecationWarning) pulumi.log.warn("""services_kube_controller_deprecated is deprecated: Use services.kube_controller instead""") if services_kube_controller_deprecated is not None: - _setter("services_kube_controller_deprecated", services_kube_controller_deprecated) + pulumi.set(__self__, "services_kube_controller_deprecated", services_kube_controller_deprecated) if services_kube_proxy_deprecated is not None: warnings.warn("""Use services.kubeproxy instead""", DeprecationWarning) pulumi.log.warn("""services_kube_proxy_deprecated is deprecated: Use services.kubeproxy instead""") if services_kube_proxy_deprecated is not None: - _setter("services_kube_proxy_deprecated", services_kube_proxy_deprecated) + pulumi.set(__self__, "services_kube_proxy_deprecated", services_kube_proxy_deprecated) if services_kube_scheduler_deprecated is not None: warnings.warn("""Use services.scheduler instead""", DeprecationWarning) pulumi.log.warn("""services_kube_scheduler_deprecated is deprecated: Use services.scheduler instead""") if services_kube_scheduler_deprecated is not None: - _setter("services_kube_scheduler_deprecated", services_kube_scheduler_deprecated) + pulumi.set(__self__, "services_kube_scheduler_deprecated", services_kube_scheduler_deprecated) if services_kubelet_deprecated is not None: warnings.warn("""Use services.kubelet instead""", DeprecationWarning) pulumi.log.warn("""services_kubelet_deprecated is deprecated: Use services.kubelet instead""") if services_kubelet_deprecated is not None: - _setter("services_kubelet_deprecated", services_kubelet_deprecated) + pulumi.set(__self__, "services_kubelet_deprecated", services_kubelet_deprecated) if ssh_agent_auth is not None: - _setter("ssh_agent_auth", ssh_agent_auth) + pulumi.set(__self__, "ssh_agent_auth", ssh_agent_auth) if ssh_cert_path is not None: - _setter("ssh_cert_path", ssh_cert_path) + pulumi.set(__self__, "ssh_cert_path", ssh_cert_path) if ssh_key_path is not None: - _setter("ssh_key_path", ssh_key_path) + pulumi.set(__self__, "ssh_key_path", ssh_key_path) if system_images is not None: - _setter("system_images", system_images) + pulumi.set(__self__, "system_images", system_images) if update_only is not None: - _setter("update_only", update_only) + pulumi.set(__self__, "update_only", update_only) if upgrade_strategy is not None: - _setter("upgrade_strategy", upgrade_strategy) + pulumi.set(__self__, "upgrade_strategy", upgrade_strategy) @property @pulumi.getter(name="addonJobTimeout") @@ -1011,375 +856,150 @@ def __init__(__self__, *, :param pulumi.Input['ClusterUpgradeStrategyArgs'] upgrade_strategy: RKE k8s cluster upgrade strategy (list maxitems:1) :param pulumi.Input[Sequence[pulumi.Input['ClusterWorkerHostArgs']]] worker_hosts: (Computed) RKE k8s cluster worker nodes (list) """ - _ClusterState._configure( - lambda key, value: pulumi.set(__self__, key, value), - addon_job_timeout=addon_job_timeout, - addons=addons, - addons_includes=addons_includes, - api_server_url=api_server_url, - authentication=authentication, - authorization=authorization, - bastion_host=bastion_host, - ca_crt=ca_crt, - cert_dir=cert_dir, - certificates=certificates, - client_cert=client_cert, - client_key=client_key, - cloud_provider=cloud_provider, - cluster_cidr=cluster_cidr, - cluster_dns_server=cluster_dns_server, - cluster_domain=cluster_domain, - cluster_name=cluster_name, - cluster_yaml=cluster_yaml, - control_plane_hosts=control_plane_hosts, - custom_certs=custom_certs, - delay_on_creation=delay_on_creation, - dind=dind, - dind_dns_server=dind_dns_server, - dind_storage_driver=dind_storage_driver, - disable_port_check=disable_port_check, - dns=dns, - enable_cri_dockerd=enable_cri_dockerd, - etcd_hosts=etcd_hosts, - ignore_docker_version=ignore_docker_version, - inactive_hosts=inactive_hosts, - ingress=ingress, - internal_kube_config_yaml=internal_kube_config_yaml, - kube_admin_user=kube_admin_user, - kube_config_yaml=kube_config_yaml, - kubernetes_version=kubernetes_version, - monitoring=monitoring, - network=network, - nodes=nodes, - nodes_confs=nodes_confs, - prefix_path=prefix_path, - private_registries=private_registries, - restore=restore, - rke_cluster_yaml=rke_cluster_yaml, - rke_state=rke_state, - rotate_certificates=rotate_certificates, - running_system_images=running_system_images, - services=services, - services_etcd_deprecated=services_etcd_deprecated, - services_kube_api_deprecated=services_kube_api_deprecated, - services_kube_controller_deprecated=services_kube_controller_deprecated, - services_kube_proxy_deprecated=services_kube_proxy_deprecated, - services_kube_scheduler_deprecated=services_kube_scheduler_deprecated, - services_kubelet_deprecated=services_kubelet_deprecated, - ssh_agent_auth=ssh_agent_auth, - ssh_cert_path=ssh_cert_path, - ssh_key_path=ssh_key_path, - system_images=system_images, - update_only=update_only, - upgrade_strategy=upgrade_strategy, - worker_hosts=worker_hosts, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - addon_job_timeout: Optional[pulumi.Input[int]] = None, - addons: Optional[pulumi.Input[str]] = None, - addons_includes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - api_server_url: Optional[pulumi.Input[str]] = None, - authentication: Optional[pulumi.Input['ClusterAuthenticationArgs']] = None, - authorization: Optional[pulumi.Input['ClusterAuthorizationArgs']] = None, - bastion_host: Optional[pulumi.Input['ClusterBastionHostArgs']] = None, - ca_crt: Optional[pulumi.Input[str]] = None, - cert_dir: Optional[pulumi.Input[str]] = None, - certificates: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterCertificateArgs']]]] = None, - client_cert: Optional[pulumi.Input[str]] = None, - client_key: Optional[pulumi.Input[str]] = None, - cloud_provider: Optional[pulumi.Input['ClusterCloudProviderArgs']] = None, - cluster_cidr: Optional[pulumi.Input[str]] = None, - cluster_dns_server: Optional[pulumi.Input[str]] = None, - cluster_domain: Optional[pulumi.Input[str]] = None, - cluster_name: Optional[pulumi.Input[str]] = None, - cluster_yaml: Optional[pulumi.Input[str]] = None, - control_plane_hosts: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterControlPlaneHostArgs']]]] = None, - custom_certs: Optional[pulumi.Input[bool]] = None, - delay_on_creation: Optional[pulumi.Input[int]] = None, - dind: Optional[pulumi.Input[bool]] = None, - dind_dns_server: Optional[pulumi.Input[str]] = None, - dind_storage_driver: Optional[pulumi.Input[str]] = None, - disable_port_check: Optional[pulumi.Input[bool]] = None, - dns: Optional[pulumi.Input['ClusterDnsArgs']] = None, - enable_cri_dockerd: Optional[pulumi.Input[bool]] = None, - etcd_hosts: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterEtcdHostArgs']]]] = None, - ignore_docker_version: Optional[pulumi.Input[bool]] = None, - inactive_hosts: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterInactiveHostArgs']]]] = None, - ingress: Optional[pulumi.Input['ClusterIngressArgs']] = None, - internal_kube_config_yaml: Optional[pulumi.Input[str]] = None, - kube_admin_user: Optional[pulumi.Input[str]] = None, - kube_config_yaml: Optional[pulumi.Input[str]] = None, - kubernetes_version: Optional[pulumi.Input[str]] = None, - monitoring: Optional[pulumi.Input['ClusterMonitoringArgs']] = None, - network: Optional[pulumi.Input['ClusterNetworkArgs']] = None, - nodes: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterNodeArgs']]]] = None, - nodes_confs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None, - prefix_path: Optional[pulumi.Input[str]] = None, - private_registries: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterPrivateRegistryArgs']]]] = None, - restore: Optional[pulumi.Input['ClusterRestoreArgs']] = None, - rke_cluster_yaml: Optional[pulumi.Input[str]] = None, - rke_state: Optional[pulumi.Input[str]] = None, - rotate_certificates: Optional[pulumi.Input['ClusterRotateCertificatesArgs']] = None, - running_system_images: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterRunningSystemImageArgs']]]] = None, - services: Optional[pulumi.Input['ClusterServicesArgs']] = None, - services_etcd_deprecated: Optional[pulumi.Input['ClusterServicesEtcdDeprecatedArgs']] = None, - services_kube_api_deprecated: Optional[pulumi.Input['ClusterServicesKubeApiDeprecatedArgs']] = None, - services_kube_controller_deprecated: Optional[pulumi.Input['ClusterServicesKubeControllerDeprecatedArgs']] = None, - services_kube_proxy_deprecated: Optional[pulumi.Input['ClusterServicesKubeProxyDeprecatedArgs']] = None, - services_kube_scheduler_deprecated: Optional[pulumi.Input['ClusterServicesKubeSchedulerDeprecatedArgs']] = None, - services_kubelet_deprecated: Optional[pulumi.Input['ClusterServicesKubeletDeprecatedArgs']] = None, - ssh_agent_auth: Optional[pulumi.Input[bool]] = None, - ssh_cert_path: Optional[pulumi.Input[str]] = None, - ssh_key_path: Optional[pulumi.Input[str]] = None, - system_images: Optional[pulumi.Input['ClusterSystemImagesArgs']] = None, - update_only: Optional[pulumi.Input[bool]] = None, - upgrade_strategy: Optional[pulumi.Input['ClusterUpgradeStrategyArgs']] = None, - worker_hosts: Optional[pulumi.Input[Sequence[pulumi.Input['ClusterWorkerHostArgs']]]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if addon_job_timeout is None and 'addonJobTimeout' in kwargs: - addon_job_timeout = kwargs['addonJobTimeout'] - if addons_includes is None and 'addonsIncludes' in kwargs: - addons_includes = kwargs['addonsIncludes'] - if api_server_url is None and 'apiServerUrl' in kwargs: - api_server_url = kwargs['apiServerUrl'] - if bastion_host is None and 'bastionHost' in kwargs: - bastion_host = kwargs['bastionHost'] - if ca_crt is None and 'caCrt' in kwargs: - ca_crt = kwargs['caCrt'] - if cert_dir is None and 'certDir' in kwargs: - cert_dir = kwargs['certDir'] - if client_cert is None and 'clientCert' in kwargs: - client_cert = kwargs['clientCert'] - if client_key is None and 'clientKey' in kwargs: - client_key = kwargs['clientKey'] - if cloud_provider is None and 'cloudProvider' in kwargs: - cloud_provider = kwargs['cloudProvider'] - if cluster_cidr is None and 'clusterCidr' in kwargs: - cluster_cidr = kwargs['clusterCidr'] - if cluster_dns_server is None and 'clusterDnsServer' in kwargs: - cluster_dns_server = kwargs['clusterDnsServer'] - if cluster_domain is None and 'clusterDomain' in kwargs: - cluster_domain = kwargs['clusterDomain'] - if cluster_name is None and 'clusterName' in kwargs: - cluster_name = kwargs['clusterName'] - if cluster_yaml is None and 'clusterYaml' in kwargs: - cluster_yaml = kwargs['clusterYaml'] - if control_plane_hosts is None and 'controlPlaneHosts' in kwargs: - control_plane_hosts = kwargs['controlPlaneHosts'] - if custom_certs is None and 'customCerts' in kwargs: - custom_certs = kwargs['customCerts'] - if delay_on_creation is None and 'delayOnCreation' in kwargs: - delay_on_creation = kwargs['delayOnCreation'] - if dind_dns_server is None and 'dindDnsServer' in kwargs: - dind_dns_server = kwargs['dindDnsServer'] - if dind_storage_driver is None and 'dindStorageDriver' in kwargs: - dind_storage_driver = kwargs['dindStorageDriver'] - if disable_port_check is None and 'disablePortCheck' in kwargs: - disable_port_check = kwargs['disablePortCheck'] - if enable_cri_dockerd is None and 'enableCriDockerd' in kwargs: - enable_cri_dockerd = kwargs['enableCriDockerd'] - if etcd_hosts is None and 'etcdHosts' in kwargs: - etcd_hosts = kwargs['etcdHosts'] - if ignore_docker_version is None and 'ignoreDockerVersion' in kwargs: - ignore_docker_version = kwargs['ignoreDockerVersion'] - if inactive_hosts is None and 'inactiveHosts' in kwargs: - inactive_hosts = kwargs['inactiveHosts'] - if internal_kube_config_yaml is None and 'internalKubeConfigYaml' in kwargs: - internal_kube_config_yaml = kwargs['internalKubeConfigYaml'] - if kube_admin_user is None and 'kubeAdminUser' in kwargs: - kube_admin_user = kwargs['kubeAdminUser'] - if kube_config_yaml is None and 'kubeConfigYaml' in kwargs: - kube_config_yaml = kwargs['kubeConfigYaml'] - if kubernetes_version is None and 'kubernetesVersion' in kwargs: - kubernetes_version = kwargs['kubernetesVersion'] - if nodes_confs is None and 'nodesConfs' in kwargs: - nodes_confs = kwargs['nodesConfs'] - if prefix_path is None and 'prefixPath' in kwargs: - prefix_path = kwargs['prefixPath'] - if private_registries is None and 'privateRegistries' in kwargs: - private_registries = kwargs['privateRegistries'] - if rke_cluster_yaml is None and 'rkeClusterYaml' in kwargs: - rke_cluster_yaml = kwargs['rkeClusterYaml'] - if rke_state is None and 'rkeState' in kwargs: - rke_state = kwargs['rkeState'] - if rotate_certificates is None and 'rotateCertificates' in kwargs: - rotate_certificates = kwargs['rotateCertificates'] - if running_system_images is None and 'runningSystemImages' in kwargs: - running_system_images = kwargs['runningSystemImages'] - if services_etcd_deprecated is None and 'servicesEtcdDeprecated' in kwargs: - services_etcd_deprecated = kwargs['servicesEtcdDeprecated'] - if services_kube_api_deprecated is None and 'servicesKubeApiDeprecated' in kwargs: - services_kube_api_deprecated = kwargs['servicesKubeApiDeprecated'] - if services_kube_controller_deprecated is None and 'servicesKubeControllerDeprecated' in kwargs: - services_kube_controller_deprecated = kwargs['servicesKubeControllerDeprecated'] - if services_kube_proxy_deprecated is None and 'servicesKubeProxyDeprecated' in kwargs: - services_kube_proxy_deprecated = kwargs['servicesKubeProxyDeprecated'] - if services_kube_scheduler_deprecated is None and 'servicesKubeSchedulerDeprecated' in kwargs: - services_kube_scheduler_deprecated = kwargs['servicesKubeSchedulerDeprecated'] - if services_kubelet_deprecated is None and 'servicesKubeletDeprecated' in kwargs: - services_kubelet_deprecated = kwargs['servicesKubeletDeprecated'] - if ssh_agent_auth is None and 'sshAgentAuth' in kwargs: - ssh_agent_auth = kwargs['sshAgentAuth'] - if ssh_cert_path is None and 'sshCertPath' in kwargs: - ssh_cert_path = kwargs['sshCertPath'] - if ssh_key_path is None and 'sshKeyPath' in kwargs: - ssh_key_path = kwargs['sshKeyPath'] - if system_images is None and 'systemImages' in kwargs: - system_images = kwargs['systemImages'] - if update_only is None and 'updateOnly' in kwargs: - update_only = kwargs['updateOnly'] - if upgrade_strategy is None and 'upgradeStrategy' in kwargs: - upgrade_strategy = kwargs['upgradeStrategy'] - if worker_hosts is None and 'workerHosts' in kwargs: - worker_hosts = kwargs['workerHosts'] - if addon_job_timeout is not None: - _setter("addon_job_timeout", addon_job_timeout) + pulumi.set(__self__, "addon_job_timeout", addon_job_timeout) if addons is not None: - _setter("addons", addons) + pulumi.set(__self__, "addons", addons) if addons_includes is not None: - _setter("addons_includes", addons_includes) + pulumi.set(__self__, "addons_includes", addons_includes) if api_server_url is not None: - _setter("api_server_url", api_server_url) + pulumi.set(__self__, "api_server_url", api_server_url) if authentication is not None: - _setter("authentication", authentication) + pulumi.set(__self__, "authentication", authentication) if authorization is not None: - _setter("authorization", authorization) + pulumi.set(__self__, "authorization", authorization) if bastion_host is not None: - _setter("bastion_host", bastion_host) + pulumi.set(__self__, "bastion_host", bastion_host) if ca_crt is not None: - _setter("ca_crt", ca_crt) + pulumi.set(__self__, "ca_crt", ca_crt) if cert_dir is not None: - _setter("cert_dir", cert_dir) + pulumi.set(__self__, "cert_dir", cert_dir) if certificates is not None: - _setter("certificates", certificates) + pulumi.set(__self__, "certificates", certificates) if client_cert is not None: - _setter("client_cert", client_cert) + pulumi.set(__self__, "client_cert", client_cert) if client_key is not None: - _setter("client_key", client_key) + pulumi.set(__self__, "client_key", client_key) if cloud_provider is not None: - _setter("cloud_provider", cloud_provider) + pulumi.set(__self__, "cloud_provider", cloud_provider) if cluster_cidr is not None: - _setter("cluster_cidr", cluster_cidr) + pulumi.set(__self__, "cluster_cidr", cluster_cidr) if cluster_dns_server is not None: - _setter("cluster_dns_server", cluster_dns_server) + pulumi.set(__self__, "cluster_dns_server", cluster_dns_server) if cluster_domain is not None: - _setter("cluster_domain", cluster_domain) + pulumi.set(__self__, "cluster_domain", cluster_domain) if cluster_name is not None: - _setter("cluster_name", cluster_name) + pulumi.set(__self__, "cluster_name", cluster_name) if cluster_yaml is not None: - _setter("cluster_yaml", cluster_yaml) + pulumi.set(__self__, "cluster_yaml", cluster_yaml) if control_plane_hosts is not None: - _setter("control_plane_hosts", control_plane_hosts) + pulumi.set(__self__, "control_plane_hosts", control_plane_hosts) if custom_certs is not None: - _setter("custom_certs", custom_certs) + pulumi.set(__self__, "custom_certs", custom_certs) if delay_on_creation is not None: - _setter("delay_on_creation", delay_on_creation) + pulumi.set(__self__, "delay_on_creation", delay_on_creation) if dind is not None: - _setter("dind", dind) + pulumi.set(__self__, "dind", dind) if dind_dns_server is not None: - _setter("dind_dns_server", dind_dns_server) + pulumi.set(__self__, "dind_dns_server", dind_dns_server) if dind_storage_driver is not None: - _setter("dind_storage_driver", dind_storage_driver) + pulumi.set(__self__, "dind_storage_driver", dind_storage_driver) if disable_port_check is not None: - _setter("disable_port_check", disable_port_check) + pulumi.set(__self__, "disable_port_check", disable_port_check) if dns is not None: - _setter("dns", dns) + pulumi.set(__self__, "dns", dns) if enable_cri_dockerd is not None: - _setter("enable_cri_dockerd", enable_cri_dockerd) + pulumi.set(__self__, "enable_cri_dockerd", enable_cri_dockerd) if etcd_hosts is not None: - _setter("etcd_hosts", etcd_hosts) + pulumi.set(__self__, "etcd_hosts", etcd_hosts) if ignore_docker_version is not None: - _setter("ignore_docker_version", ignore_docker_version) + pulumi.set(__self__, "ignore_docker_version", ignore_docker_version) if inactive_hosts is not None: - _setter("inactive_hosts", inactive_hosts) + pulumi.set(__self__, "inactive_hosts", inactive_hosts) if ingress is not None: - _setter("ingress", ingress) + pulumi.set(__self__, "ingress", ingress) if internal_kube_config_yaml is not None: warnings.warn("""Use kube_config_yaml instead""", DeprecationWarning) pulumi.log.warn("""internal_kube_config_yaml is deprecated: Use kube_config_yaml instead""") if internal_kube_config_yaml is not None: - _setter("internal_kube_config_yaml", internal_kube_config_yaml) + pulumi.set(__self__, "internal_kube_config_yaml", internal_kube_config_yaml) if kube_admin_user is not None: - _setter("kube_admin_user", kube_admin_user) + pulumi.set(__self__, "kube_admin_user", kube_admin_user) if kube_config_yaml is not None: - _setter("kube_config_yaml", kube_config_yaml) + pulumi.set(__self__, "kube_config_yaml", kube_config_yaml) if kubernetes_version is not None: - _setter("kubernetes_version", kubernetes_version) + pulumi.set(__self__, "kubernetes_version", kubernetes_version) if monitoring is not None: - _setter("monitoring", monitoring) + pulumi.set(__self__, "monitoring", monitoring) if network is not None: - _setter("network", network) + pulumi.set(__self__, "network", network) if nodes is not None: - _setter("nodes", nodes) + pulumi.set(__self__, "nodes", nodes) if nodes_confs is not None: warnings.warn("""Use cluster_yaml instead""", DeprecationWarning) pulumi.log.warn("""nodes_confs is deprecated: Use cluster_yaml instead""") if nodes_confs is not None: - _setter("nodes_confs", nodes_confs) + pulumi.set(__self__, "nodes_confs", nodes_confs) if prefix_path is not None: - _setter("prefix_path", prefix_path) + pulumi.set(__self__, "prefix_path", prefix_path) if private_registries is not None: - _setter("private_registries", private_registries) + pulumi.set(__self__, "private_registries", private_registries) if restore is not None: - _setter("restore", restore) + pulumi.set(__self__, "restore", restore) if rke_cluster_yaml is not None: - _setter("rke_cluster_yaml", rke_cluster_yaml) + pulumi.set(__self__, "rke_cluster_yaml", rke_cluster_yaml) if rke_state is not None: - _setter("rke_state", rke_state) + pulumi.set(__self__, "rke_state", rke_state) if rotate_certificates is not None: - _setter("rotate_certificates", rotate_certificates) + pulumi.set(__self__, "rotate_certificates", rotate_certificates) if running_system_images is not None: - _setter("running_system_images", running_system_images) + pulumi.set(__self__, "running_system_images", running_system_images) if services is not None: - _setter("services", services) + pulumi.set(__self__, "services", services) if services_etcd_deprecated is not None: warnings.warn("""Use services.etcd instead""", DeprecationWarning) pulumi.log.warn("""services_etcd_deprecated is deprecated: Use services.etcd instead""") if services_etcd_deprecated is not None: - _setter("services_etcd_deprecated", services_etcd_deprecated) + pulumi.set(__self__, "services_etcd_deprecated", services_etcd_deprecated) if services_kube_api_deprecated is not None: warnings.warn("""Use services.kube_api instead""", DeprecationWarning) pulumi.log.warn("""services_kube_api_deprecated is deprecated: Use services.kube_api instead""") if services_kube_api_deprecated is not None: - _setter("services_kube_api_deprecated", services_kube_api_deprecated) + pulumi.set(__self__, "services_kube_api_deprecated", services_kube_api_deprecated) if services_kube_controller_deprecated is not None: warnings.warn("""Use services.kube_controller instead""", DeprecationWarning) pulumi.log.warn("""services_kube_controller_deprecated is deprecated: Use services.kube_controller instead""") if services_kube_controller_deprecated is not None: - _setter("services_kube_controller_deprecated", services_kube_controller_deprecated) + pulumi.set(__self__, "services_kube_controller_deprecated", services_kube_controller_deprecated) if services_kube_proxy_deprecated is not None: warnings.warn("""Use services.kubeproxy instead""", DeprecationWarning) pulumi.log.warn("""services_kube_proxy_deprecated is deprecated: Use services.kubeproxy instead""") if services_kube_proxy_deprecated is not None: - _setter("services_kube_proxy_deprecated", services_kube_proxy_deprecated) + pulumi.set(__self__, "services_kube_proxy_deprecated", services_kube_proxy_deprecated) if services_kube_scheduler_deprecated is not None: warnings.warn("""Use services.scheduler instead""", DeprecationWarning) pulumi.log.warn("""services_kube_scheduler_deprecated is deprecated: Use services.scheduler instead""") if services_kube_scheduler_deprecated is not None: - _setter("services_kube_scheduler_deprecated", services_kube_scheduler_deprecated) + pulumi.set(__self__, "services_kube_scheduler_deprecated", services_kube_scheduler_deprecated) if services_kubelet_deprecated is not None: warnings.warn("""Use services.kubelet instead""", DeprecationWarning) pulumi.log.warn("""services_kubelet_deprecated is deprecated: Use services.kubelet instead""") if services_kubelet_deprecated is not None: - _setter("services_kubelet_deprecated", services_kubelet_deprecated) + pulumi.set(__self__, "services_kubelet_deprecated", services_kubelet_deprecated) if ssh_agent_auth is not None: - _setter("ssh_agent_auth", ssh_agent_auth) + pulumi.set(__self__, "ssh_agent_auth", ssh_agent_auth) if ssh_cert_path is not None: - _setter("ssh_cert_path", ssh_cert_path) + pulumi.set(__self__, "ssh_cert_path", ssh_cert_path) if ssh_key_path is not None: - _setter("ssh_key_path", ssh_key_path) + pulumi.set(__self__, "ssh_key_path", ssh_key_path) if system_images is not None: - _setter("system_images", system_images) + pulumi.set(__self__, "system_images", system_images) if update_only is not None: - _setter("update_only", update_only) + pulumi.set(__self__, "update_only", update_only) if upgrade_strategy is not None: - _setter("upgrade_strategy", upgrade_strategy) + pulumi.set(__self__, "upgrade_strategy", upgrade_strategy) if worker_hosts is not None: - _setter("worker_hosts", worker_hosts) + pulumi.set(__self__, "worker_hosts", worker_hosts) @property @pulumi.getter(name="addonJobTimeout") @@ -2259,10 +1879,6 @@ def __init__(__self__, resource_name: str, *args, **kwargs): if resource_args is not None: __self__._internal_init(resource_name, opts, **resource_args.__dict__) else: - kwargs = kwargs or {} - def _setter(key, value): - kwargs[key] = value - ClusterArgs._configure(_setter, **kwargs) __self__._internal_init(resource_name, *args, **kwargs) def _internal_init(__self__, @@ -2322,14 +1938,10 @@ def _internal_init(__self__, __props__.__dict__["addon_job_timeout"] = addon_job_timeout __props__.__dict__["addons"] = addons __props__.__dict__["addons_includes"] = addons_includes - authentication = _utilities.configure(authentication, ClusterAuthenticationArgs, True) __props__.__dict__["authentication"] = authentication - authorization = _utilities.configure(authorization, ClusterAuthorizationArgs, True) __props__.__dict__["authorization"] = authorization - bastion_host = _utilities.configure(bastion_host, ClusterBastionHostArgs, True) __props__.__dict__["bastion_host"] = bastion_host __props__.__dict__["cert_dir"] = cert_dir - cloud_provider = _utilities.configure(cloud_provider, ClusterCloudProviderArgs, True) __props__.__dict__["cloud_provider"] = cloud_provider __props__.__dict__["cluster_name"] = cluster_name __props__.__dict__["cluster_yaml"] = None if cluster_yaml is None else pulumi.Output.secret(cluster_yaml) @@ -2339,46 +1951,31 @@ def _internal_init(__self__, __props__.__dict__["dind_dns_server"] = dind_dns_server __props__.__dict__["dind_storage_driver"] = dind_storage_driver __props__.__dict__["disable_port_check"] = disable_port_check - dns = _utilities.configure(dns, ClusterDnsArgs, True) __props__.__dict__["dns"] = dns __props__.__dict__["enable_cri_dockerd"] = enable_cri_dockerd __props__.__dict__["ignore_docker_version"] = ignore_docker_version - ingress = _utilities.configure(ingress, ClusterIngressArgs, True) __props__.__dict__["ingress"] = ingress __props__.__dict__["kubernetes_version"] = kubernetes_version - monitoring = _utilities.configure(monitoring, ClusterMonitoringArgs, True) __props__.__dict__["monitoring"] = monitoring - network = _utilities.configure(network, ClusterNetworkArgs, True) __props__.__dict__["network"] = network __props__.__dict__["nodes"] = nodes __props__.__dict__["nodes_confs"] = nodes_confs __props__.__dict__["prefix_path"] = prefix_path __props__.__dict__["private_registries"] = private_registries - restore = _utilities.configure(restore, ClusterRestoreArgs, True) __props__.__dict__["restore"] = restore - rotate_certificates = _utilities.configure(rotate_certificates, ClusterRotateCertificatesArgs, True) __props__.__dict__["rotate_certificates"] = rotate_certificates - services = _utilities.configure(services, ClusterServicesArgs, True) __props__.__dict__["services"] = services - services_etcd_deprecated = _utilities.configure(services_etcd_deprecated, ClusterServicesEtcdDeprecatedArgs, True) __props__.__dict__["services_etcd_deprecated"] = services_etcd_deprecated - services_kube_api_deprecated = _utilities.configure(services_kube_api_deprecated, ClusterServicesKubeApiDeprecatedArgs, True) __props__.__dict__["services_kube_api_deprecated"] = services_kube_api_deprecated - services_kube_controller_deprecated = _utilities.configure(services_kube_controller_deprecated, ClusterServicesKubeControllerDeprecatedArgs, True) __props__.__dict__["services_kube_controller_deprecated"] = services_kube_controller_deprecated - services_kube_proxy_deprecated = _utilities.configure(services_kube_proxy_deprecated, ClusterServicesKubeProxyDeprecatedArgs, True) __props__.__dict__["services_kube_proxy_deprecated"] = services_kube_proxy_deprecated - services_kube_scheduler_deprecated = _utilities.configure(services_kube_scheduler_deprecated, ClusterServicesKubeSchedulerDeprecatedArgs, True) __props__.__dict__["services_kube_scheduler_deprecated"] = services_kube_scheduler_deprecated - services_kubelet_deprecated = _utilities.configure(services_kubelet_deprecated, ClusterServicesKubeletDeprecatedArgs, True) __props__.__dict__["services_kubelet_deprecated"] = services_kubelet_deprecated __props__.__dict__["ssh_agent_auth"] = ssh_agent_auth __props__.__dict__["ssh_cert_path"] = ssh_cert_path __props__.__dict__["ssh_key_path"] = ssh_key_path - system_images = _utilities.configure(system_images, ClusterSystemImagesArgs, True) __props__.__dict__["system_images"] = system_images __props__.__dict__["update_only"] = update_only - upgrade_strategy = _utilities.configure(upgrade_strategy, ClusterUpgradeStrategyArgs, True) __props__.__dict__["upgrade_strategy"] = upgrade_strategy __props__.__dict__["api_server_url"] = None __props__.__dict__["ca_crt"] = None diff --git a/sdk/python/pulumi_rke/config/__init__.pyi b/sdk/python/pulumi_rke/config/__init__.pyi index e7bc8871..684cfdab 100644 --- a/sdk/python/pulumi_rke/config/__init__.pyi +++ b/sdk/python/pulumi_rke/config/__init__.pyi @@ -6,7 +6,7 @@ import copy import warnings import pulumi import pulumi.runtime -from typing import Any, Callable, Mapping, Optional, Sequence, Union, overload +from typing import Any, Mapping, Optional, Sequence, Union, overload from .. import _utilities debug: bool diff --git a/sdk/python/pulumi_rke/config/vars.py b/sdk/python/pulumi_rke/config/vars.py index 288206ce..0ba171dd 100644 --- a/sdk/python/pulumi_rke/config/vars.py +++ b/sdk/python/pulumi_rke/config/vars.py @@ -6,7 +6,7 @@ import warnings import pulumi import pulumi.runtime -from typing import Any, Callable, Mapping, Optional, Sequence, Union, overload +from typing import Any, Mapping, Optional, Sequence, Union, overload from .. import _utilities import types diff --git a/sdk/python/pulumi_rke/outputs.py b/sdk/python/pulumi_rke/outputs.py index f77120a7..02f6208d 100644 --- a/sdk/python/pulumi_rke/outputs.py +++ b/sdk/python/pulumi_rke/outputs.py @@ -6,7 +6,7 @@ import warnings import pulumi import pulumi.runtime -from typing import Any, Callable, Mapping, Optional, Sequence, Union, overload +from typing import Any, Mapping, Optional, Sequence, Union, overload from . import _utilities from . import outputs @@ -110,27 +110,12 @@ def __init__(__self__, *, :param str strategy: Authentication strategy that will be used in RKE k8s cluster. Default: `x509` (string) :param 'ClusterAuthenticationWebhookArgs' webhook: Webhook configuration options (list maxitem: 1) """ - ClusterAuthentication._configure( - lambda key, value: pulumi.set(__self__, key, value), - sans=sans, - strategy=strategy, - webhook=webhook, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - sans: Optional[Sequence[str]] = None, - strategy: Optional[str] = None, - webhook: Optional['outputs.ClusterAuthenticationWebhook'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if sans is not None: - _setter("sans", sans) + pulumi.set(__self__, "sans", sans) if strategy is not None: - _setter("strategy", strategy) + pulumi.set(__self__, "strategy", strategy) if webhook is not None: - _setter("webhook", webhook) + pulumi.set(__self__, "webhook", webhook) @property @pulumi.getter @@ -185,27 +170,10 @@ def __init__(__self__, *, :param str cache_timeout: Controls how long to cache authentication decisions (string) :param str config_file: Multiline string that represent a custom webhook config file (string) """ - ClusterAuthenticationWebhook._configure( - lambda key, value: pulumi.set(__self__, key, value), - cache_timeout=cache_timeout, - config_file=config_file, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cache_timeout: Optional[str] = None, - config_file: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cache_timeout is None and 'cacheTimeout' in kwargs: - cache_timeout = kwargs['cacheTimeout'] - if config_file is None and 'configFile' in kwargs: - config_file = kwargs['configFile'] - if cache_timeout is not None: - _setter("cache_timeout", cache_timeout) + pulumi.set(__self__, "cache_timeout", cache_timeout) if config_file is not None: - _setter("config_file", config_file) + pulumi.set(__self__, "config_file", config_file) @property @pulumi.getter(name="cacheTimeout") @@ -233,23 +201,10 @@ def __init__(__self__, *, :param str mode: RKE mode for authorization. `rbac` and `none` modes are available. Default `rbac` (string) :param Mapping[str, Any] options: Network provider options (map) """ - ClusterAuthorization._configure( - lambda key, value: pulumi.set(__self__, key, value), - mode=mode, - options=options, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - mode: Optional[str] = None, - options: Optional[Mapping[str, Any]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if mode is not None: - _setter("mode", mode) + pulumi.set(__self__, "mode", mode) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) @property @pulumi.getter @@ -318,65 +273,22 @@ def __init__(__self__, *, :param str ssh_key: SSH Private Key (string) :param str ssh_key_path: SSH Private Key Path (string) """ - ClusterBastionHost._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - user=user, - ignore_proxy_env_vars=ignore_proxy_env_vars, - port=port, - ssh_agent_auth=ssh_agent_auth, - ssh_cert=ssh_cert, - ssh_cert_path=ssh_cert_path, - ssh_key=ssh_key, - ssh_key_path=ssh_key_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[str] = None, - user: Optional[str] = None, - ignore_proxy_env_vars: Optional[bool] = None, - port: Optional[str] = None, - ssh_agent_auth: Optional[bool] = None, - ssh_cert: Optional[str] = None, - ssh_cert_path: Optional[str] = None, - ssh_key: Optional[str] = None, - ssh_key_path: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if address is None: - raise TypeError("Missing 'address' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if ignore_proxy_env_vars is None and 'ignoreProxyEnvVars' in kwargs: - ignore_proxy_env_vars = kwargs['ignoreProxyEnvVars'] - if ssh_agent_auth is None and 'sshAgentAuth' in kwargs: - ssh_agent_auth = kwargs['sshAgentAuth'] - if ssh_cert is None and 'sshCert' in kwargs: - ssh_cert = kwargs['sshCert'] - if ssh_cert_path is None and 'sshCertPath' in kwargs: - ssh_cert_path = kwargs['sshCertPath'] - if ssh_key is None and 'sshKey' in kwargs: - ssh_key = kwargs['sshKey'] - if ssh_key_path is None and 'sshKeyPath' in kwargs: - ssh_key_path = kwargs['sshKeyPath'] - - _setter("address", address) - _setter("user", user) + pulumi.set(__self__, "address", address) + pulumi.set(__self__, "user", user) if ignore_proxy_env_vars is not None: - _setter("ignore_proxy_env_vars", ignore_proxy_env_vars) + pulumi.set(__self__, "ignore_proxy_env_vars", ignore_proxy_env_vars) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if ssh_agent_auth is not None: - _setter("ssh_agent_auth", ssh_agent_auth) + pulumi.set(__self__, "ssh_agent_auth", ssh_agent_auth) if ssh_cert is not None: - _setter("ssh_cert", ssh_cert) + pulumi.set(__self__, "ssh_cert", ssh_cert) if ssh_cert_path is not None: - _setter("ssh_cert_path", ssh_cert_path) + pulumi.set(__self__, "ssh_cert_path", ssh_cert_path) if ssh_key is not None: - _setter("ssh_key", ssh_key) + pulumi.set(__self__, "ssh_key", ssh_key) if ssh_key_path is not None: - _setter("ssh_key_path", ssh_key_path) + pulumi.set(__self__, "ssh_key_path", ssh_key_path) @property @pulumi.getter @@ -502,81 +414,32 @@ def __init__(__self__, *, :param str name: Name of virtualcenter config for Vsphere Cloud Provider config (string) :param str path: Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string) """ - ClusterCertificate._configure( - lambda key, value: pulumi.set(__self__, key, value), - certificate=certificate, - common_name=common_name, - config=config, - config_env_name=config_env_name, - config_path=config_path, - env_name=env_name, - id=id, - key=key, - key_env_name=key_env_name, - key_path=key_path, - name=name, - ou_name=ou_name, - path=path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - certificate: Optional[str] = None, - common_name: Optional[str] = None, - config: Optional[str] = None, - config_env_name: Optional[str] = None, - config_path: Optional[str] = None, - env_name: Optional[str] = None, - id: Optional[str] = None, - key: Optional[str] = None, - key_env_name: Optional[str] = None, - key_path: Optional[str] = None, - name: Optional[str] = None, - ou_name: Optional[str] = None, - path: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if common_name is None and 'commonName' in kwargs: - common_name = kwargs['commonName'] - if config_env_name is None and 'configEnvName' in kwargs: - config_env_name = kwargs['configEnvName'] - if config_path is None and 'configPath' in kwargs: - config_path = kwargs['configPath'] - if env_name is None and 'envName' in kwargs: - env_name = kwargs['envName'] - if key_env_name is None and 'keyEnvName' in kwargs: - key_env_name = kwargs['keyEnvName'] - if key_path is None and 'keyPath' in kwargs: - key_path = kwargs['keyPath'] - if ou_name is None and 'ouName' in kwargs: - ou_name = kwargs['ouName'] - if certificate is not None: - _setter("certificate", certificate) + pulumi.set(__self__, "certificate", certificate) if common_name is not None: - _setter("common_name", common_name) + pulumi.set(__self__, "common_name", common_name) if config is not None: - _setter("config", config) + pulumi.set(__self__, "config", config) if config_env_name is not None: - _setter("config_env_name", config_env_name) + pulumi.set(__self__, "config_env_name", config_env_name) if config_path is not None: - _setter("config_path", config_path) + pulumi.set(__self__, "config_path", config_path) if env_name is not None: - _setter("env_name", env_name) + pulumi.set(__self__, "env_name", env_name) if id is not None: - _setter("id", id) + pulumi.set(__self__, "id", id) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if key_env_name is not None: - _setter("key_env_name", key_env_name) + pulumi.set(__self__, "key_env_name", key_env_name) if key_path is not None: - _setter("key_path", key_path) + pulumi.set(__self__, "key_path", key_path) if name is not None: - _setter("name", name) + pulumi.set(__self__, "name", name) if ou_name is not None: - _setter("ou_name", ou_name) + pulumi.set(__self__, "ou_name", ou_name) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) @property @pulumi.getter @@ -718,80 +581,27 @@ def __init__(__self__, *, :param 'ClusterCloudProviderVsphereCloudConfigArgs' vsphere_cloud_config: Use vsphere_cloud_provider instead :param 'ClusterCloudProviderVsphereCloudProviderArgs' vsphere_cloud_provider: Vsphere Cloud Provider config [rke-vsphere-cloud-provider](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/vsphere/) Extra argument `name` is required on `virtual_center` configuration. (list maxitems:1) """ - ClusterCloudProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - name=name, - aws_cloud_config=aws_cloud_config, - aws_cloud_provider=aws_cloud_provider, - azure_cloud_config=azure_cloud_config, - azure_cloud_provider=azure_cloud_provider, - custom_cloud_config=custom_cloud_config, - custom_cloud_provider=custom_cloud_provider, - openstack_cloud_config=openstack_cloud_config, - openstack_cloud_provider=openstack_cloud_provider, - vsphere_cloud_config=vsphere_cloud_config, - vsphere_cloud_provider=vsphere_cloud_provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - name: Optional[str] = None, - aws_cloud_config: Optional['outputs.ClusterCloudProviderAwsCloudConfig'] = None, - aws_cloud_provider: Optional['outputs.ClusterCloudProviderAwsCloudProvider'] = None, - azure_cloud_config: Optional['outputs.ClusterCloudProviderAzureCloudConfig'] = None, - azure_cloud_provider: Optional['outputs.ClusterCloudProviderAzureCloudProvider'] = None, - custom_cloud_config: Optional[str] = None, - custom_cloud_provider: Optional[str] = None, - openstack_cloud_config: Optional['outputs.ClusterCloudProviderOpenstackCloudConfig'] = None, - openstack_cloud_provider: Optional['outputs.ClusterCloudProviderOpenstackCloudProvider'] = None, - vsphere_cloud_config: Optional['outputs.ClusterCloudProviderVsphereCloudConfig'] = None, - vsphere_cloud_provider: Optional['outputs.ClusterCloudProviderVsphereCloudProvider'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if name is None: - raise TypeError("Missing 'name' argument") - if aws_cloud_config is None and 'awsCloudConfig' in kwargs: - aws_cloud_config = kwargs['awsCloudConfig'] - if aws_cloud_provider is None and 'awsCloudProvider' in kwargs: - aws_cloud_provider = kwargs['awsCloudProvider'] - if azure_cloud_config is None and 'azureCloudConfig' in kwargs: - azure_cloud_config = kwargs['azureCloudConfig'] - if azure_cloud_provider is None and 'azureCloudProvider' in kwargs: - azure_cloud_provider = kwargs['azureCloudProvider'] - if custom_cloud_config is None and 'customCloudConfig' in kwargs: - custom_cloud_config = kwargs['customCloudConfig'] - if custom_cloud_provider is None and 'customCloudProvider' in kwargs: - custom_cloud_provider = kwargs['customCloudProvider'] - if openstack_cloud_config is None and 'openstackCloudConfig' in kwargs: - openstack_cloud_config = kwargs['openstackCloudConfig'] - if openstack_cloud_provider is None and 'openstackCloudProvider' in kwargs: - openstack_cloud_provider = kwargs['openstackCloudProvider'] - if vsphere_cloud_config is None and 'vsphereCloudConfig' in kwargs: - vsphere_cloud_config = kwargs['vsphereCloudConfig'] - if vsphere_cloud_provider is None and 'vsphereCloudProvider' in kwargs: - vsphere_cloud_provider = kwargs['vsphereCloudProvider'] - - _setter("name", name) + pulumi.set(__self__, "name", name) if aws_cloud_config is not None: - _setter("aws_cloud_config", aws_cloud_config) + pulumi.set(__self__, "aws_cloud_config", aws_cloud_config) if aws_cloud_provider is not None: - _setter("aws_cloud_provider", aws_cloud_provider) + pulumi.set(__self__, "aws_cloud_provider", aws_cloud_provider) if azure_cloud_config is not None: - _setter("azure_cloud_config", azure_cloud_config) + pulumi.set(__self__, "azure_cloud_config", azure_cloud_config) if azure_cloud_provider is not None: - _setter("azure_cloud_provider", azure_cloud_provider) + pulumi.set(__self__, "azure_cloud_provider", azure_cloud_provider) if custom_cloud_config is not None: - _setter("custom_cloud_config", custom_cloud_config) + pulumi.set(__self__, "custom_cloud_config", custom_cloud_config) if custom_cloud_provider is not None: - _setter("custom_cloud_provider", custom_cloud_provider) + pulumi.set(__self__, "custom_cloud_provider", custom_cloud_provider) if openstack_cloud_config is not None: - _setter("openstack_cloud_config", openstack_cloud_config) + pulumi.set(__self__, "openstack_cloud_config", openstack_cloud_config) if openstack_cloud_provider is not None: - _setter("openstack_cloud_provider", openstack_cloud_provider) + pulumi.set(__self__, "openstack_cloud_provider", openstack_cloud_provider) if vsphere_cloud_config is not None: - _setter("vsphere_cloud_config", vsphere_cloud_config) + pulumi.set(__self__, "vsphere_cloud_config", vsphere_cloud_config) if vsphere_cloud_provider is not None: - _setter("vsphere_cloud_provider", vsphere_cloud_provider) + pulumi.set(__self__, "vsphere_cloud_provider", vsphere_cloud_provider) @property @pulumi.getter @@ -925,27 +735,10 @@ def __init__(__self__, *, :param 'ClusterCloudProviderAwsCloudConfigGlobalArgs' global_: (list maxitems:1) :param Sequence['ClusterCloudProviderAwsCloudConfigServiceOverrideArgs'] service_overrides: (list) """ - ClusterCloudProviderAwsCloudConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - service_overrides=service_overrides, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional['outputs.ClusterCloudProviderAwsCloudConfigGlobal'] = None, - service_overrides: Optional[Sequence['outputs.ClusterCloudProviderAwsCloudConfigServiceOverride']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if service_overrides is None and 'serviceOverrides' in kwargs: - service_overrides = kwargs['serviceOverrides'] - if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if service_overrides is not None: - _setter("service_overrides", service_overrides) + pulumi.set(__self__, "service_overrides", service_overrides) @property @pulumi.getter(name="global") @@ -1020,71 +813,26 @@ def __init__(__self__, *, :param str vpc: The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string) :param str zone: The AWS zone (string) """ - ClusterCloudProviderAwsCloudConfigGlobal._configure( - lambda key, value: pulumi.set(__self__, key, value), - disable_security_group_ingress=disable_security_group_ingress, - disable_strict_zone_check=disable_strict_zone_check, - elb_security_group=elb_security_group, - kubernetes_cluster_id=kubernetes_cluster_id, - kubernetes_cluster_tag=kubernetes_cluster_tag, - role_arn=role_arn, - route_table_id=route_table_id, - subnet_id=subnet_id, - vpc=vpc, - zone=zone, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - disable_security_group_ingress: Optional[bool] = None, - disable_strict_zone_check: Optional[bool] = None, - elb_security_group: Optional[str] = None, - kubernetes_cluster_id: Optional[str] = None, - kubernetes_cluster_tag: Optional[str] = None, - role_arn: Optional[str] = None, - route_table_id: Optional[str] = None, - subnet_id: Optional[str] = None, - vpc: Optional[str] = None, - zone: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if disable_security_group_ingress is None and 'disableSecurityGroupIngress' in kwargs: - disable_security_group_ingress = kwargs['disableSecurityGroupIngress'] - if disable_strict_zone_check is None and 'disableStrictZoneCheck' in kwargs: - disable_strict_zone_check = kwargs['disableStrictZoneCheck'] - if elb_security_group is None and 'elbSecurityGroup' in kwargs: - elb_security_group = kwargs['elbSecurityGroup'] - if kubernetes_cluster_id is None and 'kubernetesClusterId' in kwargs: - kubernetes_cluster_id = kwargs['kubernetesClusterId'] - if kubernetes_cluster_tag is None and 'kubernetesClusterTag' in kwargs: - kubernetes_cluster_tag = kwargs['kubernetesClusterTag'] - if role_arn is None and 'roleArn' in kwargs: - role_arn = kwargs['roleArn'] - if route_table_id is None and 'routeTableId' in kwargs: - route_table_id = kwargs['routeTableId'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if disable_security_group_ingress is not None: - _setter("disable_security_group_ingress", disable_security_group_ingress) + pulumi.set(__self__, "disable_security_group_ingress", disable_security_group_ingress) if disable_strict_zone_check is not None: - _setter("disable_strict_zone_check", disable_strict_zone_check) + pulumi.set(__self__, "disable_strict_zone_check", disable_strict_zone_check) if elb_security_group is not None: - _setter("elb_security_group", elb_security_group) + pulumi.set(__self__, "elb_security_group", elb_security_group) if kubernetes_cluster_id is not None: - _setter("kubernetes_cluster_id", kubernetes_cluster_id) + pulumi.set(__self__, "kubernetes_cluster_id", kubernetes_cluster_id) if kubernetes_cluster_tag is not None: - _setter("kubernetes_cluster_tag", kubernetes_cluster_tag) + pulumi.set(__self__, "kubernetes_cluster_tag", kubernetes_cluster_tag) if role_arn is not None: - _setter("role_arn", role_arn) + pulumi.set(__self__, "role_arn", role_arn) if route_table_id is not None: - _setter("route_table_id", route_table_id) + pulumi.set(__self__, "route_table_id", route_table_id) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if vpc is not None: - _setter("vpc", vpc) + pulumi.set(__self__, "vpc", vpc) if zone is not None: - _setter("zone", zone) + pulumi.set(__self__, "zone", zone) @property @pulumi.getter(name="disableSecurityGroupIngress") @@ -1207,50 +955,19 @@ def __init__(__self__, *, :param str signing_region: (string) :param str url: Registry URL (string) """ - ClusterCloudProviderAwsCloudConfigServiceOverride._configure( - lambda key, value: pulumi.set(__self__, key, value), - service=service, - key=key, - region=region, - signing_method=signing_method, - signing_name=signing_name, - signing_region=signing_region, - url=url, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - service: Optional[str] = None, - key: Optional[str] = None, - region: Optional[str] = None, - signing_method: Optional[str] = None, - signing_name: Optional[str] = None, - signing_region: Optional[str] = None, - url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if service is None: - raise TypeError("Missing 'service' argument") - if signing_method is None and 'signingMethod' in kwargs: - signing_method = kwargs['signingMethod'] - if signing_name is None and 'signingName' in kwargs: - signing_name = kwargs['signingName'] - if signing_region is None and 'signingRegion' in kwargs: - signing_region = kwargs['signingRegion'] - - _setter("service", service) + pulumi.set(__self__, "service", service) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if signing_method is not None: - _setter("signing_method", signing_method) + pulumi.set(__self__, "signing_method", signing_method) if signing_name is not None: - _setter("signing_name", signing_name) + pulumi.set(__self__, "signing_name", signing_name) if signing_region is not None: - _setter("signing_region", signing_region) + pulumi.set(__self__, "signing_region", signing_region) if url is not None: - _setter("url", url) + pulumi.set(__self__, "url", url) @property @pulumi.getter @@ -1340,27 +1057,10 @@ def __init__(__self__, *, :param 'ClusterCloudProviderAwsCloudProviderGlobalArgs' global_: (list maxitems:1) :param Sequence['ClusterCloudProviderAwsCloudProviderServiceOverrideArgs'] service_overrides: (list) """ - ClusterCloudProviderAwsCloudProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - service_overrides=service_overrides, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional['outputs.ClusterCloudProviderAwsCloudProviderGlobal'] = None, - service_overrides: Optional[Sequence['outputs.ClusterCloudProviderAwsCloudProviderServiceOverride']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if service_overrides is None and 'serviceOverrides' in kwargs: - service_overrides = kwargs['serviceOverrides'] - if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if service_overrides is not None: - _setter("service_overrides", service_overrides) + pulumi.set(__self__, "service_overrides", service_overrides) @property @pulumi.getter(name="global") @@ -1435,71 +1135,26 @@ def __init__(__self__, *, :param str vpc: The AWS VPC flag enables the possibility to run the master components on a different aws account, on a different cloud provider or on-premises. If the flag is set also the KubernetesClusterTag must be provided (string) :param str zone: The AWS zone (string) """ - ClusterCloudProviderAwsCloudProviderGlobal._configure( - lambda key, value: pulumi.set(__self__, key, value), - disable_security_group_ingress=disable_security_group_ingress, - disable_strict_zone_check=disable_strict_zone_check, - elb_security_group=elb_security_group, - kubernetes_cluster_id=kubernetes_cluster_id, - kubernetes_cluster_tag=kubernetes_cluster_tag, - role_arn=role_arn, - route_table_id=route_table_id, - subnet_id=subnet_id, - vpc=vpc, - zone=zone, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - disable_security_group_ingress: Optional[bool] = None, - disable_strict_zone_check: Optional[bool] = None, - elb_security_group: Optional[str] = None, - kubernetes_cluster_id: Optional[str] = None, - kubernetes_cluster_tag: Optional[str] = None, - role_arn: Optional[str] = None, - route_table_id: Optional[str] = None, - subnet_id: Optional[str] = None, - vpc: Optional[str] = None, - zone: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if disable_security_group_ingress is None and 'disableSecurityGroupIngress' in kwargs: - disable_security_group_ingress = kwargs['disableSecurityGroupIngress'] - if disable_strict_zone_check is None and 'disableStrictZoneCheck' in kwargs: - disable_strict_zone_check = kwargs['disableStrictZoneCheck'] - if elb_security_group is None and 'elbSecurityGroup' in kwargs: - elb_security_group = kwargs['elbSecurityGroup'] - if kubernetes_cluster_id is None and 'kubernetesClusterId' in kwargs: - kubernetes_cluster_id = kwargs['kubernetesClusterId'] - if kubernetes_cluster_tag is None and 'kubernetesClusterTag' in kwargs: - kubernetes_cluster_tag = kwargs['kubernetesClusterTag'] - if role_arn is None and 'roleArn' in kwargs: - role_arn = kwargs['roleArn'] - if route_table_id is None and 'routeTableId' in kwargs: - route_table_id = kwargs['routeTableId'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if disable_security_group_ingress is not None: - _setter("disable_security_group_ingress", disable_security_group_ingress) + pulumi.set(__self__, "disable_security_group_ingress", disable_security_group_ingress) if disable_strict_zone_check is not None: - _setter("disable_strict_zone_check", disable_strict_zone_check) + pulumi.set(__self__, "disable_strict_zone_check", disable_strict_zone_check) if elb_security_group is not None: - _setter("elb_security_group", elb_security_group) + pulumi.set(__self__, "elb_security_group", elb_security_group) if kubernetes_cluster_id is not None: - _setter("kubernetes_cluster_id", kubernetes_cluster_id) + pulumi.set(__self__, "kubernetes_cluster_id", kubernetes_cluster_id) if kubernetes_cluster_tag is not None: - _setter("kubernetes_cluster_tag", kubernetes_cluster_tag) + pulumi.set(__self__, "kubernetes_cluster_tag", kubernetes_cluster_tag) if role_arn is not None: - _setter("role_arn", role_arn) + pulumi.set(__self__, "role_arn", role_arn) if route_table_id is not None: - _setter("route_table_id", route_table_id) + pulumi.set(__self__, "route_table_id", route_table_id) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if vpc is not None: - _setter("vpc", vpc) + pulumi.set(__self__, "vpc", vpc) if zone is not None: - _setter("zone", zone) + pulumi.set(__self__, "zone", zone) @property @pulumi.getter(name="disableSecurityGroupIngress") @@ -1622,50 +1277,19 @@ def __init__(__self__, *, :param str signing_region: (string) :param str url: Registry URL (string) """ - ClusterCloudProviderAwsCloudProviderServiceOverride._configure( - lambda key, value: pulumi.set(__self__, key, value), - service=service, - key=key, - region=region, - signing_method=signing_method, - signing_name=signing_name, - signing_region=signing_region, - url=url, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - service: Optional[str] = None, - key: Optional[str] = None, - region: Optional[str] = None, - signing_method: Optional[str] = None, - signing_name: Optional[str] = None, - signing_region: Optional[str] = None, - url: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if service is None: - raise TypeError("Missing 'service' argument") - if signing_method is None and 'signingMethod' in kwargs: - signing_method = kwargs['signingMethod'] - if signing_name is None and 'signingName' in kwargs: - signing_name = kwargs['signingName'] - if signing_region is None and 'signingRegion' in kwargs: - signing_region = kwargs['signingRegion'] - - _setter("service", service) + pulumi.set(__self__, "service", service) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if signing_method is not None: - _setter("signing_method", signing_method) + pulumi.set(__self__, "signing_method", signing_method) if signing_name is not None: - _setter("signing_name", signing_name) + pulumi.set(__self__, "signing_name", signing_name) if signing_region is not None: - _setter("signing_region", signing_region) + pulumi.set(__self__, "signing_region", signing_region) if url is not None: - _setter("url", url) + pulumi.set(__self__, "url", url) @property @pulumi.getter @@ -1858,189 +1482,60 @@ def __init__(__self__, *, :param str vnet_name: (string) :param str vnet_resource_group: (string) """ - ClusterCloudProviderAzureCloudConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - aad_client_id=aad_client_id, - aad_client_secret=aad_client_secret, - subscription_id=subscription_id, - tenant_id=tenant_id, - aad_client_cert_password=aad_client_cert_password, - aad_client_cert_path=aad_client_cert_path, - cloud=cloud, - cloud_provider_backoff=cloud_provider_backoff, - cloud_provider_backoff_duration=cloud_provider_backoff_duration, - cloud_provider_backoff_exponent=cloud_provider_backoff_exponent, - cloud_provider_backoff_jitter=cloud_provider_backoff_jitter, - cloud_provider_backoff_retries=cloud_provider_backoff_retries, - cloud_provider_rate_limit=cloud_provider_rate_limit, - cloud_provider_rate_limit_bucket=cloud_provider_rate_limit_bucket, - cloud_provider_rate_limit_qps=cloud_provider_rate_limit_qps, - load_balancer_sku=load_balancer_sku, - location=location, - maximum_load_balancer_rule_count=maximum_load_balancer_rule_count, - primary_availability_set_name=primary_availability_set_name, - primary_scale_set_name=primary_scale_set_name, - resource_group=resource_group, - route_table_name=route_table_name, - security_group_name=security_group_name, - subnet_name=subnet_name, - use_instance_metadata=use_instance_metadata, - use_managed_identity_extension=use_managed_identity_extension, - vm_type=vm_type, - vnet_name=vnet_name, - vnet_resource_group=vnet_resource_group, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aad_client_id: Optional[str] = None, - aad_client_secret: Optional[str] = None, - subscription_id: Optional[str] = None, - tenant_id: Optional[str] = None, - aad_client_cert_password: Optional[str] = None, - aad_client_cert_path: Optional[str] = None, - cloud: Optional[str] = None, - cloud_provider_backoff: Optional[bool] = None, - cloud_provider_backoff_duration: Optional[int] = None, - cloud_provider_backoff_exponent: Optional[int] = None, - cloud_provider_backoff_jitter: Optional[int] = None, - cloud_provider_backoff_retries: Optional[int] = None, - cloud_provider_rate_limit: Optional[bool] = None, - cloud_provider_rate_limit_bucket: Optional[int] = None, - cloud_provider_rate_limit_qps: Optional[int] = None, - load_balancer_sku: Optional[str] = None, - location: Optional[str] = None, - maximum_load_balancer_rule_count: Optional[int] = None, - primary_availability_set_name: Optional[str] = None, - primary_scale_set_name: Optional[str] = None, - resource_group: Optional[str] = None, - route_table_name: Optional[str] = None, - security_group_name: Optional[str] = None, - subnet_name: Optional[str] = None, - use_instance_metadata: Optional[bool] = None, - use_managed_identity_extension: Optional[bool] = None, - vm_type: Optional[str] = None, - vnet_name: Optional[str] = None, - vnet_resource_group: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aad_client_id is None and 'aadClientId' in kwargs: - aad_client_id = kwargs['aadClientId'] - if aad_client_id is None: - raise TypeError("Missing 'aad_client_id' argument") - if aad_client_secret is None and 'aadClientSecret' in kwargs: - aad_client_secret = kwargs['aadClientSecret'] - if aad_client_secret is None: - raise TypeError("Missing 'aad_client_secret' argument") - if subscription_id is None and 'subscriptionId' in kwargs: - subscription_id = kwargs['subscriptionId'] - if subscription_id is None: - raise TypeError("Missing 'subscription_id' argument") - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_id is None: - raise TypeError("Missing 'tenant_id' argument") - if aad_client_cert_password is None and 'aadClientCertPassword' in kwargs: - aad_client_cert_password = kwargs['aadClientCertPassword'] - if aad_client_cert_path is None and 'aadClientCertPath' in kwargs: - aad_client_cert_path = kwargs['aadClientCertPath'] - if cloud_provider_backoff is None and 'cloudProviderBackoff' in kwargs: - cloud_provider_backoff = kwargs['cloudProviderBackoff'] - if cloud_provider_backoff_duration is None and 'cloudProviderBackoffDuration' in kwargs: - cloud_provider_backoff_duration = kwargs['cloudProviderBackoffDuration'] - if cloud_provider_backoff_exponent is None and 'cloudProviderBackoffExponent' in kwargs: - cloud_provider_backoff_exponent = kwargs['cloudProviderBackoffExponent'] - if cloud_provider_backoff_jitter is None and 'cloudProviderBackoffJitter' in kwargs: - cloud_provider_backoff_jitter = kwargs['cloudProviderBackoffJitter'] - if cloud_provider_backoff_retries is None and 'cloudProviderBackoffRetries' in kwargs: - cloud_provider_backoff_retries = kwargs['cloudProviderBackoffRetries'] - if cloud_provider_rate_limit is None and 'cloudProviderRateLimit' in kwargs: - cloud_provider_rate_limit = kwargs['cloudProviderRateLimit'] - if cloud_provider_rate_limit_bucket is None and 'cloudProviderRateLimitBucket' in kwargs: - cloud_provider_rate_limit_bucket = kwargs['cloudProviderRateLimitBucket'] - if cloud_provider_rate_limit_qps is None and 'cloudProviderRateLimitQps' in kwargs: - cloud_provider_rate_limit_qps = kwargs['cloudProviderRateLimitQps'] - if load_balancer_sku is None and 'loadBalancerSku' in kwargs: - load_balancer_sku = kwargs['loadBalancerSku'] - if maximum_load_balancer_rule_count is None and 'maximumLoadBalancerRuleCount' in kwargs: - maximum_load_balancer_rule_count = kwargs['maximumLoadBalancerRuleCount'] - if primary_availability_set_name is None and 'primaryAvailabilitySetName' in kwargs: - primary_availability_set_name = kwargs['primaryAvailabilitySetName'] - if primary_scale_set_name is None and 'primaryScaleSetName' in kwargs: - primary_scale_set_name = kwargs['primaryScaleSetName'] - if resource_group is None and 'resourceGroup' in kwargs: - resource_group = kwargs['resourceGroup'] - if route_table_name is None and 'routeTableName' in kwargs: - route_table_name = kwargs['routeTableName'] - if security_group_name is None and 'securityGroupName' in kwargs: - security_group_name = kwargs['securityGroupName'] - if subnet_name is None and 'subnetName' in kwargs: - subnet_name = kwargs['subnetName'] - if use_instance_metadata is None and 'useInstanceMetadata' in kwargs: - use_instance_metadata = kwargs['useInstanceMetadata'] - if use_managed_identity_extension is None and 'useManagedIdentityExtension' in kwargs: - use_managed_identity_extension = kwargs['useManagedIdentityExtension'] - if vm_type is None and 'vmType' in kwargs: - vm_type = kwargs['vmType'] - if vnet_name is None and 'vnetName' in kwargs: - vnet_name = kwargs['vnetName'] - if vnet_resource_group is None and 'vnetResourceGroup' in kwargs: - vnet_resource_group = kwargs['vnetResourceGroup'] - - _setter("aad_client_id", aad_client_id) - _setter("aad_client_secret", aad_client_secret) - _setter("subscription_id", subscription_id) - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "aad_client_id", aad_client_id) + pulumi.set(__self__, "aad_client_secret", aad_client_secret) + pulumi.set(__self__, "subscription_id", subscription_id) + pulumi.set(__self__, "tenant_id", tenant_id) if aad_client_cert_password is not None: - _setter("aad_client_cert_password", aad_client_cert_password) + pulumi.set(__self__, "aad_client_cert_password", aad_client_cert_password) if aad_client_cert_path is not None: - _setter("aad_client_cert_path", aad_client_cert_path) + pulumi.set(__self__, "aad_client_cert_path", aad_client_cert_path) if cloud is not None: - _setter("cloud", cloud) + pulumi.set(__self__, "cloud", cloud) if cloud_provider_backoff is not None: - _setter("cloud_provider_backoff", cloud_provider_backoff) + pulumi.set(__self__, "cloud_provider_backoff", cloud_provider_backoff) if cloud_provider_backoff_duration is not None: - _setter("cloud_provider_backoff_duration", cloud_provider_backoff_duration) + pulumi.set(__self__, "cloud_provider_backoff_duration", cloud_provider_backoff_duration) if cloud_provider_backoff_exponent is not None: - _setter("cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) + pulumi.set(__self__, "cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) if cloud_provider_backoff_jitter is not None: - _setter("cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) + pulumi.set(__self__, "cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) if cloud_provider_backoff_retries is not None: - _setter("cloud_provider_backoff_retries", cloud_provider_backoff_retries) + pulumi.set(__self__, "cloud_provider_backoff_retries", cloud_provider_backoff_retries) if cloud_provider_rate_limit is not None: - _setter("cloud_provider_rate_limit", cloud_provider_rate_limit) + pulumi.set(__self__, "cloud_provider_rate_limit", cloud_provider_rate_limit) if cloud_provider_rate_limit_bucket is not None: - _setter("cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) + pulumi.set(__self__, "cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) if cloud_provider_rate_limit_qps is not None: - _setter("cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) + pulumi.set(__self__, "cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) if load_balancer_sku is not None: - _setter("load_balancer_sku", load_balancer_sku) + pulumi.set(__self__, "load_balancer_sku", load_balancer_sku) if location is not None: - _setter("location", location) + pulumi.set(__self__, "location", location) if maximum_load_balancer_rule_count is not None: - _setter("maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) + pulumi.set(__self__, "maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) if primary_availability_set_name is not None: - _setter("primary_availability_set_name", primary_availability_set_name) + pulumi.set(__self__, "primary_availability_set_name", primary_availability_set_name) if primary_scale_set_name is not None: - _setter("primary_scale_set_name", primary_scale_set_name) + pulumi.set(__self__, "primary_scale_set_name", primary_scale_set_name) if resource_group is not None: - _setter("resource_group", resource_group) + pulumi.set(__self__, "resource_group", resource_group) if route_table_name is not None: - _setter("route_table_name", route_table_name) + pulumi.set(__self__, "route_table_name", route_table_name) if security_group_name is not None: - _setter("security_group_name", security_group_name) + pulumi.set(__self__, "security_group_name", security_group_name) if subnet_name is not None: - _setter("subnet_name", subnet_name) + pulumi.set(__self__, "subnet_name", subnet_name) if use_instance_metadata is not None: - _setter("use_instance_metadata", use_instance_metadata) + pulumi.set(__self__, "use_instance_metadata", use_instance_metadata) if use_managed_identity_extension is not None: - _setter("use_managed_identity_extension", use_managed_identity_extension) + pulumi.set(__self__, "use_managed_identity_extension", use_managed_identity_extension) if vm_type is not None: - _setter("vm_type", vm_type) + pulumi.set(__self__, "vm_type", vm_type) if vnet_name is not None: - _setter("vnet_name", vnet_name) + pulumi.set(__self__, "vnet_name", vnet_name) if vnet_resource_group is not None: - _setter("vnet_resource_group", vnet_resource_group) + pulumi.set(__self__, "vnet_resource_group", vnet_resource_group) @property @pulumi.getter(name="aadClientId") @@ -2403,189 +1898,60 @@ def __init__(__self__, *, :param str vnet_name: (string) :param str vnet_resource_group: (string) """ - ClusterCloudProviderAzureCloudProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - aad_client_id=aad_client_id, - aad_client_secret=aad_client_secret, - subscription_id=subscription_id, - tenant_id=tenant_id, - aad_client_cert_password=aad_client_cert_password, - aad_client_cert_path=aad_client_cert_path, - cloud=cloud, - cloud_provider_backoff=cloud_provider_backoff, - cloud_provider_backoff_duration=cloud_provider_backoff_duration, - cloud_provider_backoff_exponent=cloud_provider_backoff_exponent, - cloud_provider_backoff_jitter=cloud_provider_backoff_jitter, - cloud_provider_backoff_retries=cloud_provider_backoff_retries, - cloud_provider_rate_limit=cloud_provider_rate_limit, - cloud_provider_rate_limit_bucket=cloud_provider_rate_limit_bucket, - cloud_provider_rate_limit_qps=cloud_provider_rate_limit_qps, - load_balancer_sku=load_balancer_sku, - location=location, - maximum_load_balancer_rule_count=maximum_load_balancer_rule_count, - primary_availability_set_name=primary_availability_set_name, - primary_scale_set_name=primary_scale_set_name, - resource_group=resource_group, - route_table_name=route_table_name, - security_group_name=security_group_name, - subnet_name=subnet_name, - use_instance_metadata=use_instance_metadata, - use_managed_identity_extension=use_managed_identity_extension, - vm_type=vm_type, - vnet_name=vnet_name, - vnet_resource_group=vnet_resource_group, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aad_client_id: Optional[str] = None, - aad_client_secret: Optional[str] = None, - subscription_id: Optional[str] = None, - tenant_id: Optional[str] = None, - aad_client_cert_password: Optional[str] = None, - aad_client_cert_path: Optional[str] = None, - cloud: Optional[str] = None, - cloud_provider_backoff: Optional[bool] = None, - cloud_provider_backoff_duration: Optional[int] = None, - cloud_provider_backoff_exponent: Optional[int] = None, - cloud_provider_backoff_jitter: Optional[int] = None, - cloud_provider_backoff_retries: Optional[int] = None, - cloud_provider_rate_limit: Optional[bool] = None, - cloud_provider_rate_limit_bucket: Optional[int] = None, - cloud_provider_rate_limit_qps: Optional[int] = None, - load_balancer_sku: Optional[str] = None, - location: Optional[str] = None, - maximum_load_balancer_rule_count: Optional[int] = None, - primary_availability_set_name: Optional[str] = None, - primary_scale_set_name: Optional[str] = None, - resource_group: Optional[str] = None, - route_table_name: Optional[str] = None, - security_group_name: Optional[str] = None, - subnet_name: Optional[str] = None, - use_instance_metadata: Optional[bool] = None, - use_managed_identity_extension: Optional[bool] = None, - vm_type: Optional[str] = None, - vnet_name: Optional[str] = None, - vnet_resource_group: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aad_client_id is None and 'aadClientId' in kwargs: - aad_client_id = kwargs['aadClientId'] - if aad_client_id is None: - raise TypeError("Missing 'aad_client_id' argument") - if aad_client_secret is None and 'aadClientSecret' in kwargs: - aad_client_secret = kwargs['aadClientSecret'] - if aad_client_secret is None: - raise TypeError("Missing 'aad_client_secret' argument") - if subscription_id is None and 'subscriptionId' in kwargs: - subscription_id = kwargs['subscriptionId'] - if subscription_id is None: - raise TypeError("Missing 'subscription_id' argument") - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_id is None: - raise TypeError("Missing 'tenant_id' argument") - if aad_client_cert_password is None and 'aadClientCertPassword' in kwargs: - aad_client_cert_password = kwargs['aadClientCertPassword'] - if aad_client_cert_path is None and 'aadClientCertPath' in kwargs: - aad_client_cert_path = kwargs['aadClientCertPath'] - if cloud_provider_backoff is None and 'cloudProviderBackoff' in kwargs: - cloud_provider_backoff = kwargs['cloudProviderBackoff'] - if cloud_provider_backoff_duration is None and 'cloudProviderBackoffDuration' in kwargs: - cloud_provider_backoff_duration = kwargs['cloudProviderBackoffDuration'] - if cloud_provider_backoff_exponent is None and 'cloudProviderBackoffExponent' in kwargs: - cloud_provider_backoff_exponent = kwargs['cloudProviderBackoffExponent'] - if cloud_provider_backoff_jitter is None and 'cloudProviderBackoffJitter' in kwargs: - cloud_provider_backoff_jitter = kwargs['cloudProviderBackoffJitter'] - if cloud_provider_backoff_retries is None and 'cloudProviderBackoffRetries' in kwargs: - cloud_provider_backoff_retries = kwargs['cloudProviderBackoffRetries'] - if cloud_provider_rate_limit is None and 'cloudProviderRateLimit' in kwargs: - cloud_provider_rate_limit = kwargs['cloudProviderRateLimit'] - if cloud_provider_rate_limit_bucket is None and 'cloudProviderRateLimitBucket' in kwargs: - cloud_provider_rate_limit_bucket = kwargs['cloudProviderRateLimitBucket'] - if cloud_provider_rate_limit_qps is None and 'cloudProviderRateLimitQps' in kwargs: - cloud_provider_rate_limit_qps = kwargs['cloudProviderRateLimitQps'] - if load_balancer_sku is None and 'loadBalancerSku' in kwargs: - load_balancer_sku = kwargs['loadBalancerSku'] - if maximum_load_balancer_rule_count is None and 'maximumLoadBalancerRuleCount' in kwargs: - maximum_load_balancer_rule_count = kwargs['maximumLoadBalancerRuleCount'] - if primary_availability_set_name is None and 'primaryAvailabilitySetName' in kwargs: - primary_availability_set_name = kwargs['primaryAvailabilitySetName'] - if primary_scale_set_name is None and 'primaryScaleSetName' in kwargs: - primary_scale_set_name = kwargs['primaryScaleSetName'] - if resource_group is None and 'resourceGroup' in kwargs: - resource_group = kwargs['resourceGroup'] - if route_table_name is None and 'routeTableName' in kwargs: - route_table_name = kwargs['routeTableName'] - if security_group_name is None and 'securityGroupName' in kwargs: - security_group_name = kwargs['securityGroupName'] - if subnet_name is None and 'subnetName' in kwargs: - subnet_name = kwargs['subnetName'] - if use_instance_metadata is None and 'useInstanceMetadata' in kwargs: - use_instance_metadata = kwargs['useInstanceMetadata'] - if use_managed_identity_extension is None and 'useManagedIdentityExtension' in kwargs: - use_managed_identity_extension = kwargs['useManagedIdentityExtension'] - if vm_type is None and 'vmType' in kwargs: - vm_type = kwargs['vmType'] - if vnet_name is None and 'vnetName' in kwargs: - vnet_name = kwargs['vnetName'] - if vnet_resource_group is None and 'vnetResourceGroup' in kwargs: - vnet_resource_group = kwargs['vnetResourceGroup'] - - _setter("aad_client_id", aad_client_id) - _setter("aad_client_secret", aad_client_secret) - _setter("subscription_id", subscription_id) - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "aad_client_id", aad_client_id) + pulumi.set(__self__, "aad_client_secret", aad_client_secret) + pulumi.set(__self__, "subscription_id", subscription_id) + pulumi.set(__self__, "tenant_id", tenant_id) if aad_client_cert_password is not None: - _setter("aad_client_cert_password", aad_client_cert_password) + pulumi.set(__self__, "aad_client_cert_password", aad_client_cert_password) if aad_client_cert_path is not None: - _setter("aad_client_cert_path", aad_client_cert_path) + pulumi.set(__self__, "aad_client_cert_path", aad_client_cert_path) if cloud is not None: - _setter("cloud", cloud) + pulumi.set(__self__, "cloud", cloud) if cloud_provider_backoff is not None: - _setter("cloud_provider_backoff", cloud_provider_backoff) + pulumi.set(__self__, "cloud_provider_backoff", cloud_provider_backoff) if cloud_provider_backoff_duration is not None: - _setter("cloud_provider_backoff_duration", cloud_provider_backoff_duration) + pulumi.set(__self__, "cloud_provider_backoff_duration", cloud_provider_backoff_duration) if cloud_provider_backoff_exponent is not None: - _setter("cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) + pulumi.set(__self__, "cloud_provider_backoff_exponent", cloud_provider_backoff_exponent) if cloud_provider_backoff_jitter is not None: - _setter("cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) + pulumi.set(__self__, "cloud_provider_backoff_jitter", cloud_provider_backoff_jitter) if cloud_provider_backoff_retries is not None: - _setter("cloud_provider_backoff_retries", cloud_provider_backoff_retries) + pulumi.set(__self__, "cloud_provider_backoff_retries", cloud_provider_backoff_retries) if cloud_provider_rate_limit is not None: - _setter("cloud_provider_rate_limit", cloud_provider_rate_limit) + pulumi.set(__self__, "cloud_provider_rate_limit", cloud_provider_rate_limit) if cloud_provider_rate_limit_bucket is not None: - _setter("cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) + pulumi.set(__self__, "cloud_provider_rate_limit_bucket", cloud_provider_rate_limit_bucket) if cloud_provider_rate_limit_qps is not None: - _setter("cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) + pulumi.set(__self__, "cloud_provider_rate_limit_qps", cloud_provider_rate_limit_qps) if load_balancer_sku is not None: - _setter("load_balancer_sku", load_balancer_sku) + pulumi.set(__self__, "load_balancer_sku", load_balancer_sku) if location is not None: - _setter("location", location) + pulumi.set(__self__, "location", location) if maximum_load_balancer_rule_count is not None: - _setter("maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) + pulumi.set(__self__, "maximum_load_balancer_rule_count", maximum_load_balancer_rule_count) if primary_availability_set_name is not None: - _setter("primary_availability_set_name", primary_availability_set_name) + pulumi.set(__self__, "primary_availability_set_name", primary_availability_set_name) if primary_scale_set_name is not None: - _setter("primary_scale_set_name", primary_scale_set_name) + pulumi.set(__self__, "primary_scale_set_name", primary_scale_set_name) if resource_group is not None: - _setter("resource_group", resource_group) + pulumi.set(__self__, "resource_group", resource_group) if route_table_name is not None: - _setter("route_table_name", route_table_name) + pulumi.set(__self__, "route_table_name", route_table_name) if security_group_name is not None: - _setter("security_group_name", security_group_name) + pulumi.set(__self__, "security_group_name", security_group_name) if subnet_name is not None: - _setter("subnet_name", subnet_name) + pulumi.set(__self__, "subnet_name", subnet_name) if use_instance_metadata is not None: - _setter("use_instance_metadata", use_instance_metadata) + pulumi.set(__self__, "use_instance_metadata", use_instance_metadata) if use_managed_identity_extension is not None: - _setter("use_managed_identity_extension", use_managed_identity_extension) + pulumi.set(__self__, "use_managed_identity_extension", use_managed_identity_extension) if vm_type is not None: - _setter("vm_type", vm_type) + pulumi.set(__self__, "vm_type", vm_type) if vnet_name is not None: - _setter("vnet_name", vnet_name) + pulumi.set(__self__, "vnet_name", vnet_name) if vnet_resource_group is not None: - _setter("vnet_resource_group", vnet_resource_group) + pulumi.set(__self__, "vnet_resource_group", vnet_resource_group) @property @pulumi.getter(name="aadClientId") @@ -2853,42 +2219,15 @@ def __init__(__self__, *, :param 'ClusterCloudProviderOpenstackCloudConfigMetadataArgs' metadata: (list maxitems:1) :param 'ClusterCloudProviderOpenstackCloudConfigRouteArgs' route: (list maxitems:1) """ - ClusterCloudProviderOpenstackCloudConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - block_storage=block_storage, - load_balancer=load_balancer, - metadata=metadata, - route=route, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional['outputs.ClusterCloudProviderOpenstackCloudConfigGlobal'] = None, - block_storage: Optional['outputs.ClusterCloudProviderOpenstackCloudConfigBlockStorage'] = None, - load_balancer: Optional['outputs.ClusterCloudProviderOpenstackCloudConfigLoadBalancer'] = None, - metadata: Optional['outputs.ClusterCloudProviderOpenstackCloudConfigMetadata'] = None, - route: Optional['outputs.ClusterCloudProviderOpenstackCloudConfigRoute'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if global_ is None: - raise TypeError("Missing 'global_' argument") - if block_storage is None and 'blockStorage' in kwargs: - block_storage = kwargs['blockStorage'] - if load_balancer is None and 'loadBalancer' in kwargs: - load_balancer = kwargs['loadBalancer'] - - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if block_storage is not None: - _setter("block_storage", block_storage) + pulumi.set(__self__, "block_storage", block_storage) if load_balancer is not None: - _setter("load_balancer", load_balancer) + pulumi.set(__self__, "load_balancer", load_balancer) if metadata is not None: - _setter("metadata", metadata) + pulumi.set(__self__, "metadata", metadata) if route is not None: - _setter("route", route) + pulumi.set(__self__, "route", route) @property @pulumi.getter(name="global") @@ -2963,33 +2302,12 @@ def __init__(__self__, *, :param bool ignore_volume_az: (string) :param bool trust_device_path: (string) """ - ClusterCloudProviderOpenstackCloudConfigBlockStorage._configure( - lambda key, value: pulumi.set(__self__, key, value), - bs_version=bs_version, - ignore_volume_az=ignore_volume_az, - trust_device_path=trust_device_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - bs_version: Optional[str] = None, - ignore_volume_az: Optional[bool] = None, - trust_device_path: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if bs_version is None and 'bsVersion' in kwargs: - bs_version = kwargs['bsVersion'] - if ignore_volume_az is None and 'ignoreVolumeAz' in kwargs: - ignore_volume_az = kwargs['ignoreVolumeAz'] - if trust_device_path is None and 'trustDevicePath' in kwargs: - trust_device_path = kwargs['trustDevicePath'] - if bs_version is not None: - _setter("bs_version", bs_version) + pulumi.set(__self__, "bs_version", bs_version) if ignore_volume_az is not None: - _setter("ignore_volume_az", ignore_volume_az) + pulumi.set(__self__, "ignore_volume_az", ignore_volume_az) if trust_device_path is not None: - _setter("trust_device_path", trust_device_path) + pulumi.set(__self__, "trust_device_path", trust_device_path) @property @pulumi.getter(name="bsVersion") @@ -3074,77 +2392,26 @@ def __init__(__self__, *, :param str user_id: Required if `username` not provided. (string) :param str username: Required if `user_id` not provided. (string) """ - ClusterCloudProviderOpenstackCloudConfigGlobal._configure( - lambda key, value: pulumi.set(__self__, key, value), - auth_url=auth_url, - password=password, - ca_file=ca_file, - domain_id=domain_id, - domain_name=domain_name, - region=region, - tenant_id=tenant_id, - tenant_name=tenant_name, - trust_id=trust_id, - user_id=user_id, - username=username, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - auth_url: Optional[str] = None, - password: Optional[str] = None, - ca_file: Optional[str] = None, - domain_id: Optional[str] = None, - domain_name: Optional[str] = None, - region: Optional[str] = None, - tenant_id: Optional[str] = None, - tenant_name: Optional[str] = None, - trust_id: Optional[str] = None, - user_id: Optional[str] = None, - username: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if auth_url is None and 'authUrl' in kwargs: - auth_url = kwargs['authUrl'] - if auth_url is None: - raise TypeError("Missing 'auth_url' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if ca_file is None and 'caFile' in kwargs: - ca_file = kwargs['caFile'] - if domain_id is None and 'domainId' in kwargs: - domain_id = kwargs['domainId'] - if domain_name is None and 'domainName' in kwargs: - domain_name = kwargs['domainName'] - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_name is None and 'tenantName' in kwargs: - tenant_name = kwargs['tenantName'] - if trust_id is None and 'trustId' in kwargs: - trust_id = kwargs['trustId'] - if user_id is None and 'userId' in kwargs: - user_id = kwargs['userId'] - - _setter("auth_url", auth_url) - _setter("password", password) + pulumi.set(__self__, "auth_url", auth_url) + pulumi.set(__self__, "password", password) if ca_file is not None: - _setter("ca_file", ca_file) + pulumi.set(__self__, "ca_file", ca_file) if domain_id is not None: - _setter("domain_id", domain_id) + pulumi.set(__self__, "domain_id", domain_id) if domain_name is not None: - _setter("domain_name", domain_name) + pulumi.set(__self__, "domain_name", domain_name) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if tenant_id is not None: - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "tenant_id", tenant_id) if tenant_name is not None: - _setter("tenant_name", tenant_name) + pulumi.set(__self__, "tenant_name", tenant_name) if trust_id is not None: - _setter("trust_id", trust_id) + pulumi.set(__self__, "trust_id", trust_id) if user_id is not None: - _setter("user_id", user_id) + pulumi.set(__self__, "user_id", user_id) if username is not None: - _setter("username", username) + pulumi.set(__self__, "username", username) @property @pulumi.getter(name="authUrl") @@ -3299,81 +2566,28 @@ def __init__(__self__, *, :param str subnet_id: (string) :param bool use_octavia: (bool) """ - ClusterCloudProviderOpenstackCloudConfigLoadBalancer._configure( - lambda key, value: pulumi.set(__self__, key, value), - create_monitor=create_monitor, - floating_network_id=floating_network_id, - lb_method=lb_method, - lb_provider=lb_provider, - lb_version=lb_version, - manage_security_groups=manage_security_groups, - monitor_delay=monitor_delay, - monitor_max_retries=monitor_max_retries, - monitor_timeout=monitor_timeout, - subnet_id=subnet_id, - use_octavia=use_octavia, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - create_monitor: Optional[bool] = None, - floating_network_id: Optional[str] = None, - lb_method: Optional[str] = None, - lb_provider: Optional[str] = None, - lb_version: Optional[str] = None, - manage_security_groups: Optional[bool] = None, - monitor_delay: Optional[str] = None, - monitor_max_retries: Optional[int] = None, - monitor_timeout: Optional[str] = None, - subnet_id: Optional[str] = None, - use_octavia: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if create_monitor is None and 'createMonitor' in kwargs: - create_monitor = kwargs['createMonitor'] - if floating_network_id is None and 'floatingNetworkId' in kwargs: - floating_network_id = kwargs['floatingNetworkId'] - if lb_method is None and 'lbMethod' in kwargs: - lb_method = kwargs['lbMethod'] - if lb_provider is None and 'lbProvider' in kwargs: - lb_provider = kwargs['lbProvider'] - if lb_version is None and 'lbVersion' in kwargs: - lb_version = kwargs['lbVersion'] - if manage_security_groups is None and 'manageSecurityGroups' in kwargs: - manage_security_groups = kwargs['manageSecurityGroups'] - if monitor_delay is None and 'monitorDelay' in kwargs: - monitor_delay = kwargs['monitorDelay'] - if monitor_max_retries is None and 'monitorMaxRetries' in kwargs: - monitor_max_retries = kwargs['monitorMaxRetries'] - if monitor_timeout is None and 'monitorTimeout' in kwargs: - monitor_timeout = kwargs['monitorTimeout'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if use_octavia is None and 'useOctavia' in kwargs: - use_octavia = kwargs['useOctavia'] - if create_monitor is not None: - _setter("create_monitor", create_monitor) + pulumi.set(__self__, "create_monitor", create_monitor) if floating_network_id is not None: - _setter("floating_network_id", floating_network_id) + pulumi.set(__self__, "floating_network_id", floating_network_id) if lb_method is not None: - _setter("lb_method", lb_method) + pulumi.set(__self__, "lb_method", lb_method) if lb_provider is not None: - _setter("lb_provider", lb_provider) + pulumi.set(__self__, "lb_provider", lb_provider) if lb_version is not None: - _setter("lb_version", lb_version) + pulumi.set(__self__, "lb_version", lb_version) if manage_security_groups is not None: - _setter("manage_security_groups", manage_security_groups) + pulumi.set(__self__, "manage_security_groups", manage_security_groups) if monitor_delay is not None: - _setter("monitor_delay", monitor_delay) + pulumi.set(__self__, "monitor_delay", monitor_delay) if monitor_max_retries is not None: - _setter("monitor_max_retries", monitor_max_retries) + pulumi.set(__self__, "monitor_max_retries", monitor_max_retries) if monitor_timeout is not None: - _setter("monitor_timeout", monitor_timeout) + pulumi.set(__self__, "monitor_timeout", monitor_timeout) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if use_octavia is not None: - _setter("use_octavia", use_octavia) + pulumi.set(__self__, "use_octavia", use_octavia) @property @pulumi.getter(name="createMonitor") @@ -3492,27 +2706,10 @@ def __init__(__self__, *, :param int request_timeout: (int) :param str search_order: (string) """ - ClusterCloudProviderOpenstackCloudConfigMetadata._configure( - lambda key, value: pulumi.set(__self__, key, value), - request_timeout=request_timeout, - search_order=search_order, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - request_timeout: Optional[int] = None, - search_order: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if request_timeout is None and 'requestTimeout' in kwargs: - request_timeout = kwargs['requestTimeout'] - if search_order is None and 'searchOrder' in kwargs: - search_order = kwargs['searchOrder'] - if request_timeout is not None: - _setter("request_timeout", request_timeout) + pulumi.set(__self__, "request_timeout", request_timeout) if search_order is not None: - _setter("search_order", search_order) + pulumi.set(__self__, "search_order", search_order) @property @pulumi.getter(name="requestTimeout") @@ -3555,21 +2752,8 @@ def __init__(__self__, *, """ :param str router_id: (string) """ - ClusterCloudProviderOpenstackCloudConfigRoute._configure( - lambda key, value: pulumi.set(__self__, key, value), - router_id=router_id, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - router_id: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if router_id is None and 'routerId' in kwargs: - router_id = kwargs['routerId'] - if router_id is not None: - _setter("router_id", router_id) + pulumi.set(__self__, "router_id", router_id) @property @pulumi.getter(name="routerId") @@ -3616,42 +2800,15 @@ def __init__(__self__, *, :param 'ClusterCloudProviderOpenstackCloudProviderMetadataArgs' metadata: (list maxitems:1) :param 'ClusterCloudProviderOpenstackCloudProviderRouteArgs' route: (list maxitems:1) """ - ClusterCloudProviderOpenstackCloudProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - global_=global_, - block_storage=block_storage, - load_balancer=load_balancer, - metadata=metadata, - route=route, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - global_: Optional['outputs.ClusterCloudProviderOpenstackCloudProviderGlobal'] = None, - block_storage: Optional['outputs.ClusterCloudProviderOpenstackCloudProviderBlockStorage'] = None, - load_balancer: Optional['outputs.ClusterCloudProviderOpenstackCloudProviderLoadBalancer'] = None, - metadata: Optional['outputs.ClusterCloudProviderOpenstackCloudProviderMetadata'] = None, - route: Optional['outputs.ClusterCloudProviderOpenstackCloudProviderRoute'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - if global_ is None: - raise TypeError("Missing 'global_' argument") - if block_storage is None and 'blockStorage' in kwargs: - block_storage = kwargs['blockStorage'] - if load_balancer is None and 'loadBalancer' in kwargs: - load_balancer = kwargs['loadBalancer'] - - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if block_storage is not None: - _setter("block_storage", block_storage) + pulumi.set(__self__, "block_storage", block_storage) if load_balancer is not None: - _setter("load_balancer", load_balancer) + pulumi.set(__self__, "load_balancer", load_balancer) if metadata is not None: - _setter("metadata", metadata) + pulumi.set(__self__, "metadata", metadata) if route is not None: - _setter("route", route) + pulumi.set(__self__, "route", route) @property @pulumi.getter(name="global") @@ -3726,33 +2883,12 @@ def __init__(__self__, *, :param bool ignore_volume_az: (string) :param bool trust_device_path: (string) """ - ClusterCloudProviderOpenstackCloudProviderBlockStorage._configure( - lambda key, value: pulumi.set(__self__, key, value), - bs_version=bs_version, - ignore_volume_az=ignore_volume_az, - trust_device_path=trust_device_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - bs_version: Optional[str] = None, - ignore_volume_az: Optional[bool] = None, - trust_device_path: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if bs_version is None and 'bsVersion' in kwargs: - bs_version = kwargs['bsVersion'] - if ignore_volume_az is None and 'ignoreVolumeAz' in kwargs: - ignore_volume_az = kwargs['ignoreVolumeAz'] - if trust_device_path is None and 'trustDevicePath' in kwargs: - trust_device_path = kwargs['trustDevicePath'] - if bs_version is not None: - _setter("bs_version", bs_version) + pulumi.set(__self__, "bs_version", bs_version) if ignore_volume_az is not None: - _setter("ignore_volume_az", ignore_volume_az) + pulumi.set(__self__, "ignore_volume_az", ignore_volume_az) if trust_device_path is not None: - _setter("trust_device_path", trust_device_path) + pulumi.set(__self__, "trust_device_path", trust_device_path) @property @pulumi.getter(name="bsVersion") @@ -3837,77 +2973,26 @@ def __init__(__self__, *, :param str user_id: Required if `username` not provided. (string) :param str username: Required if `user_id` not provided. (string) """ - ClusterCloudProviderOpenstackCloudProviderGlobal._configure( - lambda key, value: pulumi.set(__self__, key, value), - auth_url=auth_url, - password=password, - ca_file=ca_file, - domain_id=domain_id, - domain_name=domain_name, - region=region, - tenant_id=tenant_id, - tenant_name=tenant_name, - trust_id=trust_id, - user_id=user_id, - username=username, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - auth_url: Optional[str] = None, - password: Optional[str] = None, - ca_file: Optional[str] = None, - domain_id: Optional[str] = None, - domain_name: Optional[str] = None, - region: Optional[str] = None, - tenant_id: Optional[str] = None, - tenant_name: Optional[str] = None, - trust_id: Optional[str] = None, - user_id: Optional[str] = None, - username: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if auth_url is None and 'authUrl' in kwargs: - auth_url = kwargs['authUrl'] - if auth_url is None: - raise TypeError("Missing 'auth_url' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if ca_file is None and 'caFile' in kwargs: - ca_file = kwargs['caFile'] - if domain_id is None and 'domainId' in kwargs: - domain_id = kwargs['domainId'] - if domain_name is None and 'domainName' in kwargs: - domain_name = kwargs['domainName'] - if tenant_id is None and 'tenantId' in kwargs: - tenant_id = kwargs['tenantId'] - if tenant_name is None and 'tenantName' in kwargs: - tenant_name = kwargs['tenantName'] - if trust_id is None and 'trustId' in kwargs: - trust_id = kwargs['trustId'] - if user_id is None and 'userId' in kwargs: - user_id = kwargs['userId'] - - _setter("auth_url", auth_url) - _setter("password", password) + pulumi.set(__self__, "auth_url", auth_url) + pulumi.set(__self__, "password", password) if ca_file is not None: - _setter("ca_file", ca_file) + pulumi.set(__self__, "ca_file", ca_file) if domain_id is not None: - _setter("domain_id", domain_id) + pulumi.set(__self__, "domain_id", domain_id) if domain_name is not None: - _setter("domain_name", domain_name) + pulumi.set(__self__, "domain_name", domain_name) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if tenant_id is not None: - _setter("tenant_id", tenant_id) + pulumi.set(__self__, "tenant_id", tenant_id) if tenant_name is not None: - _setter("tenant_name", tenant_name) + pulumi.set(__self__, "tenant_name", tenant_name) if trust_id is not None: - _setter("trust_id", trust_id) + pulumi.set(__self__, "trust_id", trust_id) if user_id is not None: - _setter("user_id", user_id) + pulumi.set(__self__, "user_id", user_id) if username is not None: - _setter("username", username) + pulumi.set(__self__, "username", username) @property @pulumi.getter(name="authUrl") @@ -4062,81 +3147,28 @@ def __init__(__self__, *, :param str subnet_id: (string) :param bool use_octavia: (bool) """ - ClusterCloudProviderOpenstackCloudProviderLoadBalancer._configure( - lambda key, value: pulumi.set(__self__, key, value), - create_monitor=create_monitor, - floating_network_id=floating_network_id, - lb_method=lb_method, - lb_provider=lb_provider, - lb_version=lb_version, - manage_security_groups=manage_security_groups, - monitor_delay=monitor_delay, - monitor_max_retries=monitor_max_retries, - monitor_timeout=monitor_timeout, - subnet_id=subnet_id, - use_octavia=use_octavia, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - create_monitor: Optional[bool] = None, - floating_network_id: Optional[str] = None, - lb_method: Optional[str] = None, - lb_provider: Optional[str] = None, - lb_version: Optional[str] = None, - manage_security_groups: Optional[bool] = None, - monitor_delay: Optional[str] = None, - monitor_max_retries: Optional[int] = None, - monitor_timeout: Optional[str] = None, - subnet_id: Optional[str] = None, - use_octavia: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if create_monitor is None and 'createMonitor' in kwargs: - create_monitor = kwargs['createMonitor'] - if floating_network_id is None and 'floatingNetworkId' in kwargs: - floating_network_id = kwargs['floatingNetworkId'] - if lb_method is None and 'lbMethod' in kwargs: - lb_method = kwargs['lbMethod'] - if lb_provider is None and 'lbProvider' in kwargs: - lb_provider = kwargs['lbProvider'] - if lb_version is None and 'lbVersion' in kwargs: - lb_version = kwargs['lbVersion'] - if manage_security_groups is None and 'manageSecurityGroups' in kwargs: - manage_security_groups = kwargs['manageSecurityGroups'] - if monitor_delay is None and 'monitorDelay' in kwargs: - monitor_delay = kwargs['monitorDelay'] - if monitor_max_retries is None and 'monitorMaxRetries' in kwargs: - monitor_max_retries = kwargs['monitorMaxRetries'] - if monitor_timeout is None and 'monitorTimeout' in kwargs: - monitor_timeout = kwargs['monitorTimeout'] - if subnet_id is None and 'subnetId' in kwargs: - subnet_id = kwargs['subnetId'] - if use_octavia is None and 'useOctavia' in kwargs: - use_octavia = kwargs['useOctavia'] - if create_monitor is not None: - _setter("create_monitor", create_monitor) + pulumi.set(__self__, "create_monitor", create_monitor) if floating_network_id is not None: - _setter("floating_network_id", floating_network_id) + pulumi.set(__self__, "floating_network_id", floating_network_id) if lb_method is not None: - _setter("lb_method", lb_method) + pulumi.set(__self__, "lb_method", lb_method) if lb_provider is not None: - _setter("lb_provider", lb_provider) + pulumi.set(__self__, "lb_provider", lb_provider) if lb_version is not None: - _setter("lb_version", lb_version) + pulumi.set(__self__, "lb_version", lb_version) if manage_security_groups is not None: - _setter("manage_security_groups", manage_security_groups) + pulumi.set(__self__, "manage_security_groups", manage_security_groups) if monitor_delay is not None: - _setter("monitor_delay", monitor_delay) + pulumi.set(__self__, "monitor_delay", monitor_delay) if monitor_max_retries is not None: - _setter("monitor_max_retries", monitor_max_retries) + pulumi.set(__self__, "monitor_max_retries", monitor_max_retries) if monitor_timeout is not None: - _setter("monitor_timeout", monitor_timeout) + pulumi.set(__self__, "monitor_timeout", monitor_timeout) if subnet_id is not None: - _setter("subnet_id", subnet_id) + pulumi.set(__self__, "subnet_id", subnet_id) if use_octavia is not None: - _setter("use_octavia", use_octavia) + pulumi.set(__self__, "use_octavia", use_octavia) @property @pulumi.getter(name="createMonitor") @@ -4255,27 +3287,10 @@ def __init__(__self__, *, :param int request_timeout: (int) :param str search_order: (string) """ - ClusterCloudProviderOpenstackCloudProviderMetadata._configure( - lambda key, value: pulumi.set(__self__, key, value), - request_timeout=request_timeout, - search_order=search_order, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - request_timeout: Optional[int] = None, - search_order: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if request_timeout is None and 'requestTimeout' in kwargs: - request_timeout = kwargs['requestTimeout'] - if search_order is None and 'searchOrder' in kwargs: - search_order = kwargs['searchOrder'] - if request_timeout is not None: - _setter("request_timeout", request_timeout) + pulumi.set(__self__, "request_timeout", request_timeout) if search_order is not None: - _setter("search_order", search_order) + pulumi.set(__self__, "search_order", search_order) @property @pulumi.getter(name="requestTimeout") @@ -4318,21 +3333,8 @@ def __init__(__self__, *, """ :param str router_id: (string) """ - ClusterCloudProviderOpenstackCloudProviderRoute._configure( - lambda key, value: pulumi.set(__self__, key, value), - router_id=router_id, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - router_id: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if router_id is None and 'routerId' in kwargs: - router_id = kwargs['routerId'] - if router_id is not None: - _setter("router_id", router_id) + pulumi.set(__self__, "router_id", router_id) @property @pulumi.getter(name="routerId") @@ -4377,41 +3379,14 @@ def __init__(__self__, *, :param 'ClusterCloudProviderVsphereCloudConfigGlobalArgs' global_: (list maxitems:1) :param 'ClusterCloudProviderVsphereCloudConfigNetworkArgs' network: RKE k8s cluster network configuration (list maxitems:1) """ - ClusterCloudProviderVsphereCloudConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - virtual_centers=virtual_centers, - workspace=workspace, - disk=disk, - global_=global_, - network=network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - virtual_centers: Optional[Sequence['outputs.ClusterCloudProviderVsphereCloudConfigVirtualCenter']] = None, - workspace: Optional['outputs.ClusterCloudProviderVsphereCloudConfigWorkspace'] = None, - disk: Optional['outputs.ClusterCloudProviderVsphereCloudConfigDisk'] = None, - global_: Optional['outputs.ClusterCloudProviderVsphereCloudConfigGlobal'] = None, - network: Optional['outputs.ClusterCloudProviderVsphereCloudConfigNetwork'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if virtual_centers is None and 'virtualCenters' in kwargs: - virtual_centers = kwargs['virtualCenters'] - if virtual_centers is None: - raise TypeError("Missing 'virtual_centers' argument") - if workspace is None: - raise TypeError("Missing 'workspace' argument") - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - - _setter("virtual_centers", virtual_centers) - _setter("workspace", workspace) + pulumi.set(__self__, "virtual_centers", virtual_centers) + pulumi.set(__self__, "workspace", workspace) if disk is not None: - _setter("disk", disk) + pulumi.set(__self__, "disk", disk) if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if network is not None: - _setter("network", network) + pulumi.set(__self__, "network", network) @property @pulumi.getter(name="virtualCenters") @@ -4478,21 +3453,8 @@ def __init__(__self__, *, """ :param str scsi_controller_type: (string) """ - ClusterCloudProviderVsphereCloudConfigDisk._configure( - lambda key, value: pulumi.set(__self__, key, value), - scsi_controller_type=scsi_controller_type, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - scsi_controller_type: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if scsi_controller_type is None and 'scsiControllerType' in kwargs: - scsi_controller_type = kwargs['scsiControllerType'] - if scsi_controller_type is not None: - _setter("scsi_controller_type", scsi_controller_type) + pulumi.set(__self__, "scsi_controller_type", scsi_controller_type) @property @pulumi.getter(name="scsiControllerType") @@ -4555,69 +3517,28 @@ def __init__(__self__, *, :param str vm_uuid: (string) :param str working_dir: (string) """ - ClusterCloudProviderVsphereCloudConfigGlobal._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - datacenters=datacenters, - datastore=datastore, - insecure_flag=insecure_flag, - password=password, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - user=user, - vm_name=vm_name, - vm_uuid=vm_uuid, - working_dir=working_dir, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[str] = None, - datacenters: Optional[str] = None, - datastore: Optional[str] = None, - insecure_flag: Optional[bool] = None, - password: Optional[str] = None, - port: Optional[str] = None, - soap_roundtrip_count: Optional[int] = None, - user: Optional[str] = None, - vm_name: Optional[str] = None, - vm_uuid: Optional[str] = None, - working_dir: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if insecure_flag is None and 'insecureFlag' in kwargs: - insecure_flag = kwargs['insecureFlag'] - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - if vm_name is None and 'vmName' in kwargs: - vm_name = kwargs['vmName'] - if vm_uuid is None and 'vmUuid' in kwargs: - vm_uuid = kwargs['vmUuid'] - if working_dir is None and 'workingDir' in kwargs: - working_dir = kwargs['workingDir'] - if datacenter is not None: - _setter("datacenter", datacenter) + pulumi.set(__self__, "datacenter", datacenter) if datacenters is not None: - _setter("datacenters", datacenters) + pulumi.set(__self__, "datacenters", datacenters) if datastore is not None: - _setter("datastore", datastore) + pulumi.set(__self__, "datastore", datastore) if insecure_flag is not None: - _setter("insecure_flag", insecure_flag) + pulumi.set(__self__, "insecure_flag", insecure_flag) if password is not None: - _setter("password", password) + pulumi.set(__self__, "password", password) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) if user is not None: - _setter("user", user) + pulumi.set(__self__, "user", user) if vm_name is not None: - _setter("vm_name", vm_name) + pulumi.set(__self__, "vm_name", vm_name) if vm_uuid is not None: - _setter("vm_uuid", vm_uuid) + pulumi.set(__self__, "vm_uuid", vm_uuid) if working_dir is not None: - _setter("working_dir", working_dir) + pulumi.set(__self__, "working_dir", working_dir) @property @pulumi.getter @@ -4732,21 +3653,8 @@ def __init__(__self__, *, """ :param str public_network: (string) """ - ClusterCloudProviderVsphereCloudConfigNetwork._configure( - lambda key, value: pulumi.set(__self__, key, value), - public_network=public_network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - public_network: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if public_network is None and 'publicNetwork' in kwargs: - public_network = kwargs['publicNetwork'] - if public_network is not None: - _setter("public_network", public_network) + pulumi.set(__self__, "public_network", public_network) @property @pulumi.getter(name="publicNetwork") @@ -4791,45 +3699,14 @@ def __init__(__self__, *, :param str port: Port used for SSH communication (string) :param int soap_roundtrip_count: (int) """ - ClusterCloudProviderVsphereCloudConfigVirtualCenter._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenters=datacenters, - name=name, - password=password, - user=user, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenters: Optional[str] = None, - name: Optional[str] = None, - password: Optional[str] = None, - user: Optional[str] = None, - port: Optional[str] = None, - soap_roundtrip_count: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenters is None: - raise TypeError("Missing 'datacenters' argument") - if name is None: - raise TypeError("Missing 'name' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - - _setter("datacenters", datacenters) - _setter("name", name) - _setter("password", password) - _setter("user", user) + pulumi.set(__self__, "datacenters", datacenters) + pulumi.set(__self__, "name", name) + pulumi.set(__self__, "password", password) + pulumi.set(__self__, "user", user) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) @property @pulumi.getter @@ -4914,41 +3791,14 @@ def __init__(__self__, *, :param str folder: Folder for S3 service. Available from Rancher v2.2.7 (string) :param str resourcepool_path: (string) """ - ClusterCloudProviderVsphereCloudConfigWorkspace._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - server=server, - default_datastore=default_datastore, - folder=folder, - resourcepool_path=resourcepool_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[str] = None, - server: Optional[str] = None, - default_datastore: Optional[str] = None, - folder: Optional[str] = None, - resourcepool_path: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenter is None: - raise TypeError("Missing 'datacenter' argument") - if server is None: - raise TypeError("Missing 'server' argument") - if default_datastore is None and 'defaultDatastore' in kwargs: - default_datastore = kwargs['defaultDatastore'] - if resourcepool_path is None and 'resourcepoolPath' in kwargs: - resourcepool_path = kwargs['resourcepoolPath'] - - _setter("datacenter", datacenter) - _setter("server", server) + pulumi.set(__self__, "datacenter", datacenter) + pulumi.set(__self__, "server", server) if default_datastore is not None: - _setter("default_datastore", default_datastore) + pulumi.set(__self__, "default_datastore", default_datastore) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if resourcepool_path is not None: - _setter("resourcepool_path", resourcepool_path) + pulumi.set(__self__, "resourcepool_path", resourcepool_path) @property @pulumi.getter @@ -5025,41 +3875,14 @@ def __init__(__self__, *, :param 'ClusterCloudProviderVsphereCloudProviderGlobalArgs' global_: (list maxitems:1) :param 'ClusterCloudProviderVsphereCloudProviderNetworkArgs' network: RKE k8s cluster network configuration (list maxitems:1) """ - ClusterCloudProviderVsphereCloudProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - virtual_centers=virtual_centers, - workspace=workspace, - disk=disk, - global_=global_, - network=network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - virtual_centers: Optional[Sequence['outputs.ClusterCloudProviderVsphereCloudProviderVirtualCenter']] = None, - workspace: Optional['outputs.ClusterCloudProviderVsphereCloudProviderWorkspace'] = None, - disk: Optional['outputs.ClusterCloudProviderVsphereCloudProviderDisk'] = None, - global_: Optional['outputs.ClusterCloudProviderVsphereCloudProviderGlobal'] = None, - network: Optional['outputs.ClusterCloudProviderVsphereCloudProviderNetwork'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if virtual_centers is None and 'virtualCenters' in kwargs: - virtual_centers = kwargs['virtualCenters'] - if virtual_centers is None: - raise TypeError("Missing 'virtual_centers' argument") - if workspace is None: - raise TypeError("Missing 'workspace' argument") - if global_ is None and 'global' in kwargs: - global_ = kwargs['global'] - - _setter("virtual_centers", virtual_centers) - _setter("workspace", workspace) + pulumi.set(__self__, "virtual_centers", virtual_centers) + pulumi.set(__self__, "workspace", workspace) if disk is not None: - _setter("disk", disk) + pulumi.set(__self__, "disk", disk) if global_ is not None: - _setter("global_", global_) + pulumi.set(__self__, "global_", global_) if network is not None: - _setter("network", network) + pulumi.set(__self__, "network", network) @property @pulumi.getter(name="virtualCenters") @@ -5126,21 +3949,8 @@ def __init__(__self__, *, """ :param str scsi_controller_type: (string) """ - ClusterCloudProviderVsphereCloudProviderDisk._configure( - lambda key, value: pulumi.set(__self__, key, value), - scsi_controller_type=scsi_controller_type, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - scsi_controller_type: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if scsi_controller_type is None and 'scsiControllerType' in kwargs: - scsi_controller_type = kwargs['scsiControllerType'] - if scsi_controller_type is not None: - _setter("scsi_controller_type", scsi_controller_type) + pulumi.set(__self__, "scsi_controller_type", scsi_controller_type) @property @pulumi.getter(name="scsiControllerType") @@ -5203,69 +4013,28 @@ def __init__(__self__, *, :param str vm_uuid: (string) :param str working_dir: (string) """ - ClusterCloudProviderVsphereCloudProviderGlobal._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - datacenters=datacenters, - datastore=datastore, - insecure_flag=insecure_flag, - password=password, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - user=user, - vm_name=vm_name, - vm_uuid=vm_uuid, - working_dir=working_dir, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[str] = None, - datacenters: Optional[str] = None, - datastore: Optional[str] = None, - insecure_flag: Optional[bool] = None, - password: Optional[str] = None, - port: Optional[str] = None, - soap_roundtrip_count: Optional[int] = None, - user: Optional[str] = None, - vm_name: Optional[str] = None, - vm_uuid: Optional[str] = None, - working_dir: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if insecure_flag is None and 'insecureFlag' in kwargs: - insecure_flag = kwargs['insecureFlag'] - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - if vm_name is None and 'vmName' in kwargs: - vm_name = kwargs['vmName'] - if vm_uuid is None and 'vmUuid' in kwargs: - vm_uuid = kwargs['vmUuid'] - if working_dir is None and 'workingDir' in kwargs: - working_dir = kwargs['workingDir'] - if datacenter is not None: - _setter("datacenter", datacenter) + pulumi.set(__self__, "datacenter", datacenter) if datacenters is not None: - _setter("datacenters", datacenters) + pulumi.set(__self__, "datacenters", datacenters) if datastore is not None: - _setter("datastore", datastore) + pulumi.set(__self__, "datastore", datastore) if insecure_flag is not None: - _setter("insecure_flag", insecure_flag) + pulumi.set(__self__, "insecure_flag", insecure_flag) if password is not None: - _setter("password", password) + pulumi.set(__self__, "password", password) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) if user is not None: - _setter("user", user) + pulumi.set(__self__, "user", user) if vm_name is not None: - _setter("vm_name", vm_name) + pulumi.set(__self__, "vm_name", vm_name) if vm_uuid is not None: - _setter("vm_uuid", vm_uuid) + pulumi.set(__self__, "vm_uuid", vm_uuid) if working_dir is not None: - _setter("working_dir", working_dir) + pulumi.set(__self__, "working_dir", working_dir) @property @pulumi.getter @@ -5380,21 +4149,8 @@ def __init__(__self__, *, """ :param str public_network: (string) """ - ClusterCloudProviderVsphereCloudProviderNetwork._configure( - lambda key, value: pulumi.set(__self__, key, value), - public_network=public_network, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - public_network: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if public_network is None and 'publicNetwork' in kwargs: - public_network = kwargs['publicNetwork'] - if public_network is not None: - _setter("public_network", public_network) + pulumi.set(__self__, "public_network", public_network) @property @pulumi.getter(name="publicNetwork") @@ -5439,45 +4195,14 @@ def __init__(__self__, *, :param str port: Port used for SSH communication (string) :param int soap_roundtrip_count: (int) """ - ClusterCloudProviderVsphereCloudProviderVirtualCenter._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenters=datacenters, - name=name, - password=password, - user=user, - port=port, - soap_roundtrip_count=soap_roundtrip_count, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenters: Optional[str] = None, - name: Optional[str] = None, - password: Optional[str] = None, - user: Optional[str] = None, - port: Optional[str] = None, - soap_roundtrip_count: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenters is None: - raise TypeError("Missing 'datacenters' argument") - if name is None: - raise TypeError("Missing 'name' argument") - if password is None: - raise TypeError("Missing 'password' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if soap_roundtrip_count is None and 'soapRoundtripCount' in kwargs: - soap_roundtrip_count = kwargs['soapRoundtripCount'] - - _setter("datacenters", datacenters) - _setter("name", name) - _setter("password", password) - _setter("user", user) + pulumi.set(__self__, "datacenters", datacenters) + pulumi.set(__self__, "name", name) + pulumi.set(__self__, "password", password) + pulumi.set(__self__, "user", user) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if soap_roundtrip_count is not None: - _setter("soap_roundtrip_count", soap_roundtrip_count) + pulumi.set(__self__, "soap_roundtrip_count", soap_roundtrip_count) @property @pulumi.getter @@ -5562,41 +4287,14 @@ def __init__(__self__, *, :param str folder: Folder for S3 service. Available from Rancher v2.2.7 (string) :param str resourcepool_path: (string) """ - ClusterCloudProviderVsphereCloudProviderWorkspace._configure( - lambda key, value: pulumi.set(__self__, key, value), - datacenter=datacenter, - server=server, - default_datastore=default_datastore, - folder=folder, - resourcepool_path=resourcepool_path, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - datacenter: Optional[str] = None, - server: Optional[str] = None, - default_datastore: Optional[str] = None, - folder: Optional[str] = None, - resourcepool_path: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if datacenter is None: - raise TypeError("Missing 'datacenter' argument") - if server is None: - raise TypeError("Missing 'server' argument") - if default_datastore is None and 'defaultDatastore' in kwargs: - default_datastore = kwargs['defaultDatastore'] - if resourcepool_path is None and 'resourcepoolPath' in kwargs: - resourcepool_path = kwargs['resourcepoolPath'] - - _setter("datacenter", datacenter) - _setter("server", server) + pulumi.set(__self__, "datacenter", datacenter) + pulumi.set(__self__, "server", server) if default_datastore is not None: - _setter("default_datastore", default_datastore) + pulumi.set(__self__, "default_datastore", default_datastore) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if resourcepool_path is not None: - _setter("resourcepool_path", resourcepool_path) + pulumi.set(__self__, "resourcepool_path", resourcepool_path) @property @pulumi.getter @@ -5665,25 +4363,10 @@ def __init__(__self__, *, :param str address: Address ip for node (string) :param str node_name: Name of the host provisioned via docker machine (string) """ - ClusterControlPlaneHost._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[str] = None, - node_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter @@ -5738,41 +4421,16 @@ def __init__(__self__, *, :param Sequence[str] reverse_cidrs: Reverse CIDRs (list) :param Sequence[str] upstream_nameservers: Upstream nameservers (list) """ - ClusterDns._configure( - lambda key, value: pulumi.set(__self__, key, value), - node_selector=node_selector, - nodelocal=nodelocal, - provider=provider, - reverse_cidrs=reverse_cidrs, - upstream_nameservers=upstream_nameservers, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - node_selector: Optional[Mapping[str, Any]] = None, - nodelocal: Optional['outputs.ClusterDnsNodelocal'] = None, - provider: Optional[str] = None, - reverse_cidrs: Optional[Sequence[str]] = None, - upstream_nameservers: Optional[Sequence[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if reverse_cidrs is None and 'reverseCidrs' in kwargs: - reverse_cidrs = kwargs['reverseCidrs'] - if upstream_nameservers is None and 'upstreamNameservers' in kwargs: - upstream_nameservers = kwargs['upstreamNameservers'] - if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) if nodelocal is not None: - _setter("nodelocal", nodelocal) + pulumi.set(__self__, "nodelocal", nodelocal) if provider is not None: - _setter("provider", provider) + pulumi.set(__self__, "provider", provider) if reverse_cidrs is not None: - _setter("reverse_cidrs", reverse_cidrs) + pulumi.set(__self__, "reverse_cidrs", reverse_cidrs) if upstream_nameservers is not None: - _setter("upstream_nameservers", upstream_nameservers) + pulumi.set(__self__, "upstream_nameservers", upstream_nameservers) @property @pulumi.getter(name="nodeSelector") @@ -5843,27 +4501,10 @@ def __init__(__self__, *, :param str ip_address: Nodelocal dns ip address (string) :param Mapping[str, Any] node_selector: Node selector key pair (map) """ - ClusterDnsNodelocal._configure( - lambda key, value: pulumi.set(__self__, key, value), - ip_address=ip_address, - node_selector=node_selector, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - ip_address: Optional[str] = None, - node_selector: Optional[Mapping[str, Any]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if ip_address is None and 'ipAddress' in kwargs: - ip_address = kwargs['ipAddress'] - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if ip_address is not None: - _setter("ip_address", ip_address) + pulumi.set(__self__, "ip_address", ip_address) if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) @property @pulumi.getter(name="ipAddress") @@ -5908,25 +4549,10 @@ def __init__(__self__, *, :param str address: Address ip for node (string) :param str node_name: Name of the host provisioned via docker machine (string) """ - ClusterEtcdHost._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[str] = None, - node_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter @@ -5971,25 +4597,10 @@ def __init__(__self__, *, :param str address: Address ip for node (string) :param str node_name: Name of the host provisioned via docker machine (string) """ - ClusterInactiveHost._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[str] = None, - node_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter @@ -6059,65 +4670,24 @@ def __init__(__self__, *, :param Mapping[str, Any] options: Network provider options (map) :param str provider: Monitoring provider (string) """ - ClusterIngress._configure( - lambda key, value: pulumi.set(__self__, key, value), - default_backend=default_backend, - dns_policy=dns_policy, - extra_args=extra_args, - http_port=http_port, - https_port=https_port, - network_mode=network_mode, - node_selector=node_selector, - options=options, - provider=provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - default_backend: Optional[bool] = None, - dns_policy: Optional[str] = None, - extra_args: Optional[Mapping[str, Any]] = None, - http_port: Optional[int] = None, - https_port: Optional[int] = None, - network_mode: Optional[str] = None, - node_selector: Optional[Mapping[str, Any]] = None, - options: Optional[Mapping[str, Any]] = None, - provider: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if default_backend is None and 'defaultBackend' in kwargs: - default_backend = kwargs['defaultBackend'] - if dns_policy is None and 'dnsPolicy' in kwargs: - dns_policy = kwargs['dnsPolicy'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if http_port is None and 'httpPort' in kwargs: - http_port = kwargs['httpPort'] - if https_port is None and 'httpsPort' in kwargs: - https_port = kwargs['httpsPort'] - if network_mode is None and 'networkMode' in kwargs: - network_mode = kwargs['networkMode'] - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if default_backend is not None: - _setter("default_backend", default_backend) + pulumi.set(__self__, "default_backend", default_backend) if dns_policy is not None: - _setter("dns_policy", dns_policy) + pulumi.set(__self__, "dns_policy", dns_policy) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if http_port is not None: - _setter("http_port", http_port) + pulumi.set(__self__, "http_port", http_port) if https_port is not None: - _setter("https_port", https_port) + pulumi.set(__self__, "https_port", https_port) if network_mode is not None: - _setter("network_mode", network_mode) + pulumi.set(__self__, "network_mode", network_mode) if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) if provider is not None: - _setter("provider", provider) + pulumi.set(__self__, "provider", provider) @property @pulumi.getter(name="defaultBackend") @@ -6217,29 +4787,12 @@ def __init__(__self__, *, :param Mapping[str, Any] options: Network provider options (map) :param str provider: Monitoring provider (string) """ - ClusterMonitoring._configure( - lambda key, value: pulumi.set(__self__, key, value), - node_selector=node_selector, - options=options, - provider=provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - node_selector: Optional[Mapping[str, Any]] = None, - options: Optional[Mapping[str, Any]] = None, - provider: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_selector is None and 'nodeSelector' in kwargs: - node_selector = kwargs['nodeSelector'] - if node_selector is not None: - _setter("node_selector", node_selector) + pulumi.set(__self__, "node_selector", node_selector) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) if provider is not None: - _setter("provider", provider) + pulumi.set(__self__, "provider", provider) @property @pulumi.getter(name="nodeSelector") @@ -6312,57 +4865,22 @@ def __init__(__self__, *, :param str plugin: Network provider plugin. `calico`, `canal` (default), `flannel`, `none` and `weave` are supported. (string) :param 'ClusterNetworkWeaveNetworkProviderArgs' weave_network_provider: Weave network provider config (list maxitems:1) """ - ClusterNetwork._configure( - lambda key, value: pulumi.set(__self__, key, value), - aci_network_provider=aci_network_provider, - calico_network_provider=calico_network_provider, - canal_network_provider=canal_network_provider, - flannel_network_provider=flannel_network_provider, - mtu=mtu, - options=options, - plugin=plugin, - weave_network_provider=weave_network_provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aci_network_provider: Optional['outputs.ClusterNetworkAciNetworkProvider'] = None, - calico_network_provider: Optional['outputs.ClusterNetworkCalicoNetworkProvider'] = None, - canal_network_provider: Optional['outputs.ClusterNetworkCanalNetworkProvider'] = None, - flannel_network_provider: Optional['outputs.ClusterNetworkFlannelNetworkProvider'] = None, - mtu: Optional[int] = None, - options: Optional[Mapping[str, Any]] = None, - plugin: Optional[str] = None, - weave_network_provider: Optional['outputs.ClusterNetworkWeaveNetworkProvider'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aci_network_provider is None and 'aciNetworkProvider' in kwargs: - aci_network_provider = kwargs['aciNetworkProvider'] - if calico_network_provider is None and 'calicoNetworkProvider' in kwargs: - calico_network_provider = kwargs['calicoNetworkProvider'] - if canal_network_provider is None and 'canalNetworkProvider' in kwargs: - canal_network_provider = kwargs['canalNetworkProvider'] - if flannel_network_provider is None and 'flannelNetworkProvider' in kwargs: - flannel_network_provider = kwargs['flannelNetworkProvider'] - if weave_network_provider is None and 'weaveNetworkProvider' in kwargs: - weave_network_provider = kwargs['weaveNetworkProvider'] - if aci_network_provider is not None: - _setter("aci_network_provider", aci_network_provider) + pulumi.set(__self__, "aci_network_provider", aci_network_provider) if calico_network_provider is not None: - _setter("calico_network_provider", calico_network_provider) + pulumi.set(__self__, "calico_network_provider", calico_network_provider) if canal_network_provider is not None: - _setter("canal_network_provider", canal_network_provider) + pulumi.set(__self__, "canal_network_provider", canal_network_provider) if flannel_network_provider is not None: - _setter("flannel_network_provider", flannel_network_provider) + pulumi.set(__self__, "flannel_network_provider", flannel_network_provider) if mtu is not None: - _setter("mtu", mtu) + pulumi.set(__self__, "mtu", mtu) if options is not None: - _setter("options", options) + pulumi.set(__self__, "options", options) if plugin is not None: - _setter("plugin", plugin) + pulumi.set(__self__, "plugin", plugin) if weave_network_provider is not None: - _setter("weave_network_provider", weave_network_provider) + pulumi.set(__self__, "weave_network_provider", weave_network_provider) @property @pulumi.getter(name="aciNetworkProvider") @@ -6539,174 +5057,33 @@ def __init__(__self__, *, :param str snat_port_range_start: Port start range for Source Network Address Translation on aci (string) :param str snat_ports_per_node: Ports per node for Source Network Address Translation on aci (string) """ - ClusterNetworkAciNetworkProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - aep=aep, - apic_hosts=apic_hosts, - apic_user_crt=apic_user_crt, - apic_user_key=apic_user_key, - apic_user_name=apic_user_name, - encap_type=encap_type, - extern_dynamic=extern_dynamic, - extern_static=extern_static, - infra_vlan=infra_vlan, - kube_api_vlan=kube_api_vlan, - l3out=l3out, - l3out_external_networks=l3out_external_networks, - mcast_range_end=mcast_range_end, - mcast_range_start=mcast_range_start, - node_subnet=node_subnet, - node_svc_subnet=node_svc_subnet, - service_vlan=service_vlan, - system_id=system_id, - token=token, - vrf_name=vrf_name, - vrf_tenant=vrf_tenant, - snat_port_range_end=snat_port_range_end, - snat_port_range_start=snat_port_range_start, - snat_ports_per_node=snat_ports_per_node, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aep: Optional[str] = None, - apic_hosts: Optional[Sequence[str]] = None, - apic_user_crt: Optional[str] = None, - apic_user_key: Optional[str] = None, - apic_user_name: Optional[str] = None, - encap_type: Optional[str] = None, - extern_dynamic: Optional[str] = None, - extern_static: Optional[str] = None, - infra_vlan: Optional[str] = None, - kube_api_vlan: Optional[str] = None, - l3out: Optional[str] = None, - l3out_external_networks: Optional[Sequence[str]] = None, - mcast_range_end: Optional[str] = None, - mcast_range_start: Optional[str] = None, - node_subnet: Optional[str] = None, - node_svc_subnet: Optional[str] = None, - service_vlan: Optional[str] = None, - system_id: Optional[str] = None, - token: Optional[str] = None, - vrf_name: Optional[str] = None, - vrf_tenant: Optional[str] = None, - snat_port_range_end: Optional[str] = None, - snat_port_range_start: Optional[str] = None, - snat_ports_per_node: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aep is None: - raise TypeError("Missing 'aep' argument") - if apic_hosts is None and 'apicHosts' in kwargs: - apic_hosts = kwargs['apicHosts'] - if apic_hosts is None: - raise TypeError("Missing 'apic_hosts' argument") - if apic_user_crt is None and 'apicUserCrt' in kwargs: - apic_user_crt = kwargs['apicUserCrt'] - if apic_user_crt is None: - raise TypeError("Missing 'apic_user_crt' argument") - if apic_user_key is None and 'apicUserKey' in kwargs: - apic_user_key = kwargs['apicUserKey'] - if apic_user_key is None: - raise TypeError("Missing 'apic_user_key' argument") - if apic_user_name is None and 'apicUserName' in kwargs: - apic_user_name = kwargs['apicUserName'] - if apic_user_name is None: - raise TypeError("Missing 'apic_user_name' argument") - if encap_type is None and 'encapType' in kwargs: - encap_type = kwargs['encapType'] - if encap_type is None: - raise TypeError("Missing 'encap_type' argument") - if extern_dynamic is None and 'externDynamic' in kwargs: - extern_dynamic = kwargs['externDynamic'] - if extern_dynamic is None: - raise TypeError("Missing 'extern_dynamic' argument") - if extern_static is None and 'externStatic' in kwargs: - extern_static = kwargs['externStatic'] - if extern_static is None: - raise TypeError("Missing 'extern_static' argument") - if infra_vlan is None and 'infraVlan' in kwargs: - infra_vlan = kwargs['infraVlan'] - if infra_vlan is None: - raise TypeError("Missing 'infra_vlan' argument") - if kube_api_vlan is None and 'kubeApiVlan' in kwargs: - kube_api_vlan = kwargs['kubeApiVlan'] - if kube_api_vlan is None: - raise TypeError("Missing 'kube_api_vlan' argument") - if l3out is None: - raise TypeError("Missing 'l3out' argument") - if l3out_external_networks is None and 'l3outExternalNetworks' in kwargs: - l3out_external_networks = kwargs['l3outExternalNetworks'] - if l3out_external_networks is None: - raise TypeError("Missing 'l3out_external_networks' argument") - if mcast_range_end is None and 'mcastRangeEnd' in kwargs: - mcast_range_end = kwargs['mcastRangeEnd'] - if mcast_range_end is None: - raise TypeError("Missing 'mcast_range_end' argument") - if mcast_range_start is None and 'mcastRangeStart' in kwargs: - mcast_range_start = kwargs['mcastRangeStart'] - if mcast_range_start is None: - raise TypeError("Missing 'mcast_range_start' argument") - if node_subnet is None and 'nodeSubnet' in kwargs: - node_subnet = kwargs['nodeSubnet'] - if node_subnet is None: - raise TypeError("Missing 'node_subnet' argument") - if node_svc_subnet is None and 'nodeSvcSubnet' in kwargs: - node_svc_subnet = kwargs['nodeSvcSubnet'] - if node_svc_subnet is None: - raise TypeError("Missing 'node_svc_subnet' argument") - if service_vlan is None and 'serviceVlan' in kwargs: - service_vlan = kwargs['serviceVlan'] - if service_vlan is None: - raise TypeError("Missing 'service_vlan' argument") - if system_id is None and 'systemId' in kwargs: - system_id = kwargs['systemId'] - if system_id is None: - raise TypeError("Missing 'system_id' argument") - if token is None: - raise TypeError("Missing 'token' argument") - if vrf_name is None and 'vrfName' in kwargs: - vrf_name = kwargs['vrfName'] - if vrf_name is None: - raise TypeError("Missing 'vrf_name' argument") - if vrf_tenant is None and 'vrfTenant' in kwargs: - vrf_tenant = kwargs['vrfTenant'] - if vrf_tenant is None: - raise TypeError("Missing 'vrf_tenant' argument") - if snat_port_range_end is None and 'snatPortRangeEnd' in kwargs: - snat_port_range_end = kwargs['snatPortRangeEnd'] - if snat_port_range_start is None and 'snatPortRangeStart' in kwargs: - snat_port_range_start = kwargs['snatPortRangeStart'] - if snat_ports_per_node is None and 'snatPortsPerNode' in kwargs: - snat_ports_per_node = kwargs['snatPortsPerNode'] - - _setter("aep", aep) - _setter("apic_hosts", apic_hosts) - _setter("apic_user_crt", apic_user_crt) - _setter("apic_user_key", apic_user_key) - _setter("apic_user_name", apic_user_name) - _setter("encap_type", encap_type) - _setter("extern_dynamic", extern_dynamic) - _setter("extern_static", extern_static) - _setter("infra_vlan", infra_vlan) - _setter("kube_api_vlan", kube_api_vlan) - _setter("l3out", l3out) - _setter("l3out_external_networks", l3out_external_networks) - _setter("mcast_range_end", mcast_range_end) - _setter("mcast_range_start", mcast_range_start) - _setter("node_subnet", node_subnet) - _setter("node_svc_subnet", node_svc_subnet) - _setter("service_vlan", service_vlan) - _setter("system_id", system_id) - _setter("token", token) - _setter("vrf_name", vrf_name) - _setter("vrf_tenant", vrf_tenant) + pulumi.set(__self__, "aep", aep) + pulumi.set(__self__, "apic_hosts", apic_hosts) + pulumi.set(__self__, "apic_user_crt", apic_user_crt) + pulumi.set(__self__, "apic_user_key", apic_user_key) + pulumi.set(__self__, "apic_user_name", apic_user_name) + pulumi.set(__self__, "encap_type", encap_type) + pulumi.set(__self__, "extern_dynamic", extern_dynamic) + pulumi.set(__self__, "extern_static", extern_static) + pulumi.set(__self__, "infra_vlan", infra_vlan) + pulumi.set(__self__, "kube_api_vlan", kube_api_vlan) + pulumi.set(__self__, "l3out", l3out) + pulumi.set(__self__, "l3out_external_networks", l3out_external_networks) + pulumi.set(__self__, "mcast_range_end", mcast_range_end) + pulumi.set(__self__, "mcast_range_start", mcast_range_start) + pulumi.set(__self__, "node_subnet", node_subnet) + pulumi.set(__self__, "node_svc_subnet", node_svc_subnet) + pulumi.set(__self__, "service_vlan", service_vlan) + pulumi.set(__self__, "system_id", system_id) + pulumi.set(__self__, "token", token) + pulumi.set(__self__, "vrf_name", vrf_name) + pulumi.set(__self__, "vrf_tenant", vrf_tenant) if snat_port_range_end is not None: - _setter("snat_port_range_end", snat_port_range_end) + pulumi.set(__self__, "snat_port_range_end", snat_port_range_end) if snat_port_range_start is not None: - _setter("snat_port_range_start", snat_port_range_start) + pulumi.set(__self__, "snat_port_range_start", snat_port_range_start) if snat_ports_per_node is not None: - _setter("snat_ports_per_node", snat_ports_per_node) + pulumi.set(__self__, "snat_ports_per_node", snat_ports_per_node) @property @pulumi.getter @@ -6923,21 +5300,8 @@ def __init__(__self__, *, """ :param str cloud_provider: RKE k8s cluster cloud provider configuration [rke-cloud-providers](https://rancher.com/docs/rke/latest/en/config-options/cloud-providers/) (list maxitems:1) """ - ClusterNetworkCalicoNetworkProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - cloud_provider=cloud_provider, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cloud_provider: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cloud_provider is None and 'cloudProvider' in kwargs: - cloud_provider = kwargs['cloudProvider'] - if cloud_provider is not None: - _setter("cloud_provider", cloud_provider) + pulumi.set(__self__, "cloud_provider", cloud_provider) @property @pulumi.getter(name="cloudProvider") @@ -6955,19 +5319,8 @@ def __init__(__self__, *, """ :param str iface: Flannel network interface (string) """ - ClusterNetworkCanalNetworkProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - iface=iface, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - iface: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if iface is not None: - _setter("iface", iface) + pulumi.set(__self__, "iface", iface) @property @pulumi.getter @@ -6985,19 +5338,8 @@ def __init__(__self__, *, """ :param str iface: Flannel network interface (string) """ - ClusterNetworkFlannelNetworkProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - iface=iface, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - iface: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if iface is not None: - _setter("iface", iface) + pulumi.set(__self__, "iface", iface) @property @pulumi.getter @@ -7015,20 +5357,7 @@ def __init__(__self__, *, """ :param str password: Registry password (string) """ - ClusterNetworkWeaveNetworkProvider._configure( - lambda key, value: pulumi.set(__self__, key, value), - password=password, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - password: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if password is None: - raise TypeError("Missing 'password' argument") - - _setter("password", password) + pulumi.set(__self__, "password", password) @property @pulumi.getter @@ -7110,102 +5439,35 @@ def __init__(__self__, *, :param str ssh_key_path: SSH Private Key Path (string) :param Sequence['ClusterNodeTaintArgs'] taints: Node taints (list) """ - ClusterNode._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - roles=roles, - user=user, - docker_socket=docker_socket, - hostname_override=hostname_override, - internal_address=internal_address, - labels=labels, - node_name=node_name, - port=port, - roles_deprecated=roles_deprecated, - ssh_agent_auth=ssh_agent_auth, - ssh_cert=ssh_cert, - ssh_cert_path=ssh_cert_path, - ssh_key=ssh_key, - ssh_key_path=ssh_key_path, - taints=taints, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[str] = None, - roles: Optional[Sequence[str]] = None, - user: Optional[str] = None, - docker_socket: Optional[str] = None, - hostname_override: Optional[str] = None, - internal_address: Optional[str] = None, - labels: Optional[Mapping[str, Any]] = None, - node_name: Optional[str] = None, - port: Optional[str] = None, - roles_deprecated: Optional[str] = None, - ssh_agent_auth: Optional[bool] = None, - ssh_cert: Optional[str] = None, - ssh_cert_path: Optional[str] = None, - ssh_key: Optional[str] = None, - ssh_key_path: Optional[str] = None, - taints: Optional[Sequence['outputs.ClusterNodeTaint']] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if address is None: - raise TypeError("Missing 'address' argument") - if roles is None: - raise TypeError("Missing 'roles' argument") - if user is None: - raise TypeError("Missing 'user' argument") - if docker_socket is None and 'dockerSocket' in kwargs: - docker_socket = kwargs['dockerSocket'] - if hostname_override is None and 'hostnameOverride' in kwargs: - hostname_override = kwargs['hostnameOverride'] - if internal_address is None and 'internalAddress' in kwargs: - internal_address = kwargs['internalAddress'] - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if roles_deprecated is None and 'rolesDeprecated' in kwargs: - roles_deprecated = kwargs['rolesDeprecated'] - if ssh_agent_auth is None and 'sshAgentAuth' in kwargs: - ssh_agent_auth = kwargs['sshAgentAuth'] - if ssh_cert is None and 'sshCert' in kwargs: - ssh_cert = kwargs['sshCert'] - if ssh_cert_path is None and 'sshCertPath' in kwargs: - ssh_cert_path = kwargs['sshCertPath'] - if ssh_key is None and 'sshKey' in kwargs: - ssh_key = kwargs['sshKey'] - if ssh_key_path is None and 'sshKeyPath' in kwargs: - ssh_key_path = kwargs['sshKeyPath'] - - _setter("address", address) - _setter("roles", roles) - _setter("user", user) + pulumi.set(__self__, "address", address) + pulumi.set(__self__, "roles", roles) + pulumi.set(__self__, "user", user) if docker_socket is not None: - _setter("docker_socket", docker_socket) + pulumi.set(__self__, "docker_socket", docker_socket) if hostname_override is not None: - _setter("hostname_override", hostname_override) + pulumi.set(__self__, "hostname_override", hostname_override) if internal_address is not None: - _setter("internal_address", internal_address) + pulumi.set(__self__, "internal_address", internal_address) if labels is not None: - _setter("labels", labels) + pulumi.set(__self__, "labels", labels) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) if port is not None: - _setter("port", port) + pulumi.set(__self__, "port", port) if roles_deprecated is not None: - _setter("roles_deprecated", roles_deprecated) + pulumi.set(__self__, "roles_deprecated", roles_deprecated) if ssh_agent_auth is not None: - _setter("ssh_agent_auth", ssh_agent_auth) + pulumi.set(__self__, "ssh_agent_auth", ssh_agent_auth) if ssh_cert is not None: - _setter("ssh_cert", ssh_cert) + pulumi.set(__self__, "ssh_cert", ssh_cert) if ssh_cert_path is not None: - _setter("ssh_cert_path", ssh_cert_path) + pulumi.set(__self__, "ssh_cert_path", ssh_cert_path) if ssh_key is not None: - _setter("ssh_key", ssh_key) + pulumi.set(__self__, "ssh_key", ssh_key) if ssh_key_path is not None: - _setter("ssh_key_path", ssh_key_path) + pulumi.set(__self__, "ssh_key_path", ssh_key_path) if taints is not None: - _setter("taints", taints) + pulumi.set(__self__, "taints", taints) @property @pulumi.getter @@ -7347,29 +5609,10 @@ def __init__(__self__, *, :param str value: Taint value (string) :param str effect: Taint effect. `NoExecute`, `NoSchedule` (default) and `PreferNoSchedule` are supported (string) """ - ClusterNodeTaint._configure( - lambda key, value: pulumi.set(__self__, key, value), - key=key, - value=value, - effect=effect, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - key: Optional[str] = None, - value: Optional[str] = None, - effect: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if key is None: - raise TypeError("Missing 'key' argument") - if value is None: - raise TypeError("Missing 'value' argument") - - _setter("key", key) - _setter("value", value) + pulumi.set(__self__, "key", key) + pulumi.set(__self__, "value", value) if effect is not None: - _setter("effect", effect) + pulumi.set(__self__, "effect", effect) @property @pulumi.getter @@ -7426,34 +5669,13 @@ def __init__(__self__, *, :param str password: Registry password (string) :param str user: Registry user (string) """ - ClusterPrivateRegistry._configure( - lambda key, value: pulumi.set(__self__, key, value), - url=url, - is_default=is_default, - password=password, - user=user, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - url: Optional[str] = None, - is_default: Optional[bool] = None, - password: Optional[str] = None, - user: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if url is None: - raise TypeError("Missing 'url' argument") - if is_default is None and 'isDefault' in kwargs: - is_default = kwargs['isDefault'] - - _setter("url", url) + pulumi.set(__self__, "url", url) if is_default is not None: - _setter("is_default", is_default) + pulumi.set(__self__, "is_default", is_default) if password is not None: - _setter("password", password) + pulumi.set(__self__, "password", password) if user is not None: - _setter("user", user) + pulumi.set(__self__, "user", user) @property @pulumi.getter @@ -7514,25 +5736,10 @@ def __init__(__self__, *, :param bool restore: RKE k8s cluster restore configuration (list maxitems:1) :param str snapshot_name: Snapshot name (string) """ - ClusterRestore._configure( - lambda key, value: pulumi.set(__self__, key, value), - restore=restore, - snapshot_name=snapshot_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - restore: Optional[bool] = None, - snapshot_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if snapshot_name is None and 'snapshotName' in kwargs: - snapshot_name = kwargs['snapshotName'] - if restore is not None: - _setter("restore", restore) + pulumi.set(__self__, "restore", restore) if snapshot_name is not None: - _setter("snapshot_name", snapshot_name) + pulumi.set(__self__, "snapshot_name", snapshot_name) @property @pulumi.getter @@ -7577,25 +5784,10 @@ def __init__(__self__, *, :param bool ca_certificates: Rotate CA Certificates. Default `false` (bool) :param Sequence[str] services: RKE k8s cluster services (list maxitems:1) """ - ClusterRotateCertificates._configure( - lambda key, value: pulumi.set(__self__, key, value), - ca_certificates=ca_certificates, - services=services, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - ca_certificates: Optional[bool] = None, - services: Optional[Sequence[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if ca_certificates is None and 'caCertificates' in kwargs: - ca_certificates = kwargs['caCertificates'] - if ca_certificates is not None: - _setter("ca_certificates", ca_certificates) + pulumi.set(__self__, "ca_certificates", ca_certificates) if services is not None: - _setter("services", services) + pulumi.set(__self__, "services", services) @property @pulumi.getter(name="caCertificates") @@ -7766,221 +5958,80 @@ def __init__(__self__, *, :param str weave_node: Docker image for weave_node (string) :param str windows_pod_infra_container: Docker image for windows_pod_infra_container (string) """ - ClusterRunningSystemImage._configure( - lambda key, value: pulumi.set(__self__, key, value), - aci_cni_deploy_container=aci_cni_deploy_container, - aci_controller_container=aci_controller_container, - aci_host_container=aci_host_container, - aci_mcast_container=aci_mcast_container, - aci_opflex_container=aci_opflex_container, - aci_ovs_container=aci_ovs_container, - alpine=alpine, - calico_cni=calico_cni, - calico_controllers=calico_controllers, - calico_ctl=calico_ctl, - calico_flex_vol=calico_flex_vol, - calico_node=calico_node, - canal_cni=canal_cni, - canal_flannel=canal_flannel, - canal_flex_vol=canal_flex_vol, - canal_node=canal_node, - cert_downloader=cert_downloader, - coredns=coredns, - coredns_autoscaler=coredns_autoscaler, - dnsmasq=dnsmasq, - etcd=etcd, - flannel=flannel, - flannel_cni=flannel_cni, - ingress=ingress, - ingress_backend=ingress_backend, - kube_dns=kube_dns, - kube_dns_autoscaler=kube_dns_autoscaler, - kube_dns_sidecar=kube_dns_sidecar, - kubernetes=kubernetes, - kubernetes_services_sidecar=kubernetes_services_sidecar, - metrics_server=metrics_server, - nginx_proxy=nginx_proxy, - nodelocal=nodelocal, - pod_infra_container=pod_infra_container, - weave_cni=weave_cni, - weave_node=weave_node, - windows_pod_infra_container=windows_pod_infra_container, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aci_cni_deploy_container: Optional[str] = None, - aci_controller_container: Optional[str] = None, - aci_host_container: Optional[str] = None, - aci_mcast_container: Optional[str] = None, - aci_opflex_container: Optional[str] = None, - aci_ovs_container: Optional[str] = None, - alpine: Optional[str] = None, - calico_cni: Optional[str] = None, - calico_controllers: Optional[str] = None, - calico_ctl: Optional[str] = None, - calico_flex_vol: Optional[str] = None, - calico_node: Optional[str] = None, - canal_cni: Optional[str] = None, - canal_flannel: Optional[str] = None, - canal_flex_vol: Optional[str] = None, - canal_node: Optional[str] = None, - cert_downloader: Optional[str] = None, - coredns: Optional[str] = None, - coredns_autoscaler: Optional[str] = None, - dnsmasq: Optional[str] = None, - etcd: Optional[str] = None, - flannel: Optional[str] = None, - flannel_cni: Optional[str] = None, - ingress: Optional[str] = None, - ingress_backend: Optional[str] = None, - kube_dns: Optional[str] = None, - kube_dns_autoscaler: Optional[str] = None, - kube_dns_sidecar: Optional[str] = None, - kubernetes: Optional[str] = None, - kubernetes_services_sidecar: Optional[str] = None, - metrics_server: Optional[str] = None, - nginx_proxy: Optional[str] = None, - nodelocal: Optional[str] = None, - pod_infra_container: Optional[str] = None, - weave_cni: Optional[str] = None, - weave_node: Optional[str] = None, - windows_pod_infra_container: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aci_cni_deploy_container is None and 'aciCniDeployContainer' in kwargs: - aci_cni_deploy_container = kwargs['aciCniDeployContainer'] - if aci_controller_container is None and 'aciControllerContainer' in kwargs: - aci_controller_container = kwargs['aciControllerContainer'] - if aci_host_container is None and 'aciHostContainer' in kwargs: - aci_host_container = kwargs['aciHostContainer'] - if aci_mcast_container is None and 'aciMcastContainer' in kwargs: - aci_mcast_container = kwargs['aciMcastContainer'] - if aci_opflex_container is None and 'aciOpflexContainer' in kwargs: - aci_opflex_container = kwargs['aciOpflexContainer'] - if aci_ovs_container is None and 'aciOvsContainer' in kwargs: - aci_ovs_container = kwargs['aciOvsContainer'] - if calico_cni is None and 'calicoCni' in kwargs: - calico_cni = kwargs['calicoCni'] - if calico_controllers is None and 'calicoControllers' in kwargs: - calico_controllers = kwargs['calicoControllers'] - if calico_ctl is None and 'calicoCtl' in kwargs: - calico_ctl = kwargs['calicoCtl'] - if calico_flex_vol is None and 'calicoFlexVol' in kwargs: - calico_flex_vol = kwargs['calicoFlexVol'] - if calico_node is None and 'calicoNode' in kwargs: - calico_node = kwargs['calicoNode'] - if canal_cni is None and 'canalCni' in kwargs: - canal_cni = kwargs['canalCni'] - if canal_flannel is None and 'canalFlannel' in kwargs: - canal_flannel = kwargs['canalFlannel'] - if canal_flex_vol is None and 'canalFlexVol' in kwargs: - canal_flex_vol = kwargs['canalFlexVol'] - if canal_node is None and 'canalNode' in kwargs: - canal_node = kwargs['canalNode'] - if cert_downloader is None and 'certDownloader' in kwargs: - cert_downloader = kwargs['certDownloader'] - if coredns_autoscaler is None and 'corednsAutoscaler' in kwargs: - coredns_autoscaler = kwargs['corednsAutoscaler'] - if flannel_cni is None and 'flannelCni' in kwargs: - flannel_cni = kwargs['flannelCni'] - if ingress_backend is None and 'ingressBackend' in kwargs: - ingress_backend = kwargs['ingressBackend'] - if kube_dns is None and 'kubeDns' in kwargs: - kube_dns = kwargs['kubeDns'] - if kube_dns_autoscaler is None and 'kubeDnsAutoscaler' in kwargs: - kube_dns_autoscaler = kwargs['kubeDnsAutoscaler'] - if kube_dns_sidecar is None and 'kubeDnsSidecar' in kwargs: - kube_dns_sidecar = kwargs['kubeDnsSidecar'] - if kubernetes_services_sidecar is None and 'kubernetesServicesSidecar' in kwargs: - kubernetes_services_sidecar = kwargs['kubernetesServicesSidecar'] - if metrics_server is None and 'metricsServer' in kwargs: - metrics_server = kwargs['metricsServer'] - if nginx_proxy is None and 'nginxProxy' in kwargs: - nginx_proxy = kwargs['nginxProxy'] - if pod_infra_container is None and 'podInfraContainer' in kwargs: - pod_infra_container = kwargs['podInfraContainer'] - if weave_cni is None and 'weaveCni' in kwargs: - weave_cni = kwargs['weaveCni'] - if weave_node is None and 'weaveNode' in kwargs: - weave_node = kwargs['weaveNode'] - if windows_pod_infra_container is None and 'windowsPodInfraContainer' in kwargs: - windows_pod_infra_container = kwargs['windowsPodInfraContainer'] - if aci_cni_deploy_container is not None: - _setter("aci_cni_deploy_container", aci_cni_deploy_container) + pulumi.set(__self__, "aci_cni_deploy_container", aci_cni_deploy_container) if aci_controller_container is not None: - _setter("aci_controller_container", aci_controller_container) + pulumi.set(__self__, "aci_controller_container", aci_controller_container) if aci_host_container is not None: - _setter("aci_host_container", aci_host_container) + pulumi.set(__self__, "aci_host_container", aci_host_container) if aci_mcast_container is not None: - _setter("aci_mcast_container", aci_mcast_container) + pulumi.set(__self__, "aci_mcast_container", aci_mcast_container) if aci_opflex_container is not None: - _setter("aci_opflex_container", aci_opflex_container) + pulumi.set(__self__, "aci_opflex_container", aci_opflex_container) if aci_ovs_container is not None: - _setter("aci_ovs_container", aci_ovs_container) + pulumi.set(__self__, "aci_ovs_container", aci_ovs_container) if alpine is not None: - _setter("alpine", alpine) + pulumi.set(__self__, "alpine", alpine) if calico_cni is not None: - _setter("calico_cni", calico_cni) + pulumi.set(__self__, "calico_cni", calico_cni) if calico_controllers is not None: - _setter("calico_controllers", calico_controllers) + pulumi.set(__self__, "calico_controllers", calico_controllers) if calico_ctl is not None: - _setter("calico_ctl", calico_ctl) + pulumi.set(__self__, "calico_ctl", calico_ctl) if calico_flex_vol is not None: - _setter("calico_flex_vol", calico_flex_vol) + pulumi.set(__self__, "calico_flex_vol", calico_flex_vol) if calico_node is not None: - _setter("calico_node", calico_node) + pulumi.set(__self__, "calico_node", calico_node) if canal_cni is not None: - _setter("canal_cni", canal_cni) + pulumi.set(__self__, "canal_cni", canal_cni) if canal_flannel is not None: - _setter("canal_flannel", canal_flannel) + pulumi.set(__self__, "canal_flannel", canal_flannel) if canal_flex_vol is not None: - _setter("canal_flex_vol", canal_flex_vol) + pulumi.set(__self__, "canal_flex_vol", canal_flex_vol) if canal_node is not None: - _setter("canal_node", canal_node) + pulumi.set(__self__, "canal_node", canal_node) if cert_downloader is not None: - _setter("cert_downloader", cert_downloader) + pulumi.set(__self__, "cert_downloader", cert_downloader) if coredns is not None: - _setter("coredns", coredns) + pulumi.set(__self__, "coredns", coredns) if coredns_autoscaler is not None: - _setter("coredns_autoscaler", coredns_autoscaler) + pulumi.set(__self__, "coredns_autoscaler", coredns_autoscaler) if dnsmasq is not None: - _setter("dnsmasq", dnsmasq) + pulumi.set(__self__, "dnsmasq", dnsmasq) if etcd is not None: - _setter("etcd", etcd) + pulumi.set(__self__, "etcd", etcd) if flannel is not None: - _setter("flannel", flannel) + pulumi.set(__self__, "flannel", flannel) if flannel_cni is not None: - _setter("flannel_cni", flannel_cni) + pulumi.set(__self__, "flannel_cni", flannel_cni) if ingress is not None: - _setter("ingress", ingress) + pulumi.set(__self__, "ingress", ingress) if ingress_backend is not None: - _setter("ingress_backend", ingress_backend) + pulumi.set(__self__, "ingress_backend", ingress_backend) if kube_dns is not None: - _setter("kube_dns", kube_dns) + pulumi.set(__self__, "kube_dns", kube_dns) if kube_dns_autoscaler is not None: - _setter("kube_dns_autoscaler", kube_dns_autoscaler) + pulumi.set(__self__, "kube_dns_autoscaler", kube_dns_autoscaler) if kube_dns_sidecar is not None: - _setter("kube_dns_sidecar", kube_dns_sidecar) + pulumi.set(__self__, "kube_dns_sidecar", kube_dns_sidecar) if kubernetes is not None: - _setter("kubernetes", kubernetes) + pulumi.set(__self__, "kubernetes", kubernetes) if kubernetes_services_sidecar is not None: - _setter("kubernetes_services_sidecar", kubernetes_services_sidecar) + pulumi.set(__self__, "kubernetes_services_sidecar", kubernetes_services_sidecar) if metrics_server is not None: - _setter("metrics_server", metrics_server) + pulumi.set(__self__, "metrics_server", metrics_server) if nginx_proxy is not None: - _setter("nginx_proxy", nginx_proxy) + pulumi.set(__self__, "nginx_proxy", nginx_proxy) if nodelocal is not None: - _setter("nodelocal", nodelocal) + pulumi.set(__self__, "nodelocal", nodelocal) if pod_infra_container is not None: - _setter("pod_infra_container", pod_infra_container) + pulumi.set(__self__, "pod_infra_container", pod_infra_container) if weave_cni is not None: - _setter("weave_cni", weave_cni) + pulumi.set(__self__, "weave_cni", weave_cni) if weave_node is not None: - _setter("weave_node", weave_node) + pulumi.set(__self__, "weave_node", weave_node) if windows_pod_infra_container is not None: - _setter("windows_pod_infra_container", windows_pod_infra_container) + pulumi.set(__self__, "windows_pod_infra_container", windows_pod_infra_container) @property @pulumi.getter(name="aciCniDeployContainer") @@ -8315,43 +6366,18 @@ def __init__(__self__, *, :param 'ClusterServicesKubeproxyArgs' kubeproxy: Kubeproxy options for RKE services (list maxitems:1) :param 'ClusterServicesSchedulerArgs' scheduler: Scheduler options for RKE services (list maxitems:1) """ - ClusterServices._configure( - lambda key, value: pulumi.set(__self__, key, value), - etcd=etcd, - kube_api=kube_api, - kube_controller=kube_controller, - kubelet=kubelet, - kubeproxy=kubeproxy, - scheduler=scheduler, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - etcd: Optional['outputs.ClusterServicesEtcd'] = None, - kube_api: Optional['outputs.ClusterServicesKubeApi'] = None, - kube_controller: Optional['outputs.ClusterServicesKubeController'] = None, - kubelet: Optional['outputs.ClusterServicesKubelet'] = None, - kubeproxy: Optional['outputs.ClusterServicesKubeproxy'] = None, - scheduler: Optional['outputs.ClusterServicesScheduler'] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if kube_api is None and 'kubeApi' in kwargs: - kube_api = kwargs['kubeApi'] - if kube_controller is None and 'kubeController' in kwargs: - kube_controller = kwargs['kubeController'] - if etcd is not None: - _setter("etcd", etcd) + pulumi.set(__self__, "etcd", etcd) if kube_api is not None: - _setter("kube_api", kube_api) + pulumi.set(__self__, "kube_api", kube_api) if kube_controller is not None: - _setter("kube_controller", kube_controller) + pulumi.set(__self__, "kube_controller", kube_controller) if kubelet is not None: - _setter("kubelet", kubelet) + pulumi.set(__self__, "kubelet", kubelet) if kubeproxy is not None: - _setter("kubeproxy", kubeproxy) + pulumi.set(__self__, "kubeproxy", kubeproxy) if scheduler is not None: - _setter("scheduler", scheduler) + pulumi.set(__self__, "scheduler", scheduler) @property @pulumi.getter @@ -8464,87 +6490,36 @@ def __init__(__self__, *, :param bool snapshot: Snapshot option for etcd service. Default `true` (bool) :param int uid: Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int) """ - ClusterServicesEtcd._configure( - lambda key, value: pulumi.set(__self__, key, value), - backup_config=backup_config, - ca_cert=ca_cert, - cert=cert, - creation=creation, - external_urls=external_urls, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - gid=gid, - image=image, - key=key, - path=path, - retention=retention, - snapshot=snapshot, - uid=uid, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - backup_config: Optional['outputs.ClusterServicesEtcdBackupConfig'] = None, - ca_cert: Optional[str] = None, - cert: Optional[str] = None, - creation: Optional[str] = None, - external_urls: Optional[Sequence[str]] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - gid: Optional[int] = None, - image: Optional[str] = None, - key: Optional[str] = None, - path: Optional[str] = None, - retention: Optional[str] = None, - snapshot: Optional[bool] = None, - uid: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if backup_config is None and 'backupConfig' in kwargs: - backup_config = kwargs['backupConfig'] - if ca_cert is None and 'caCert' in kwargs: - ca_cert = kwargs['caCert'] - if external_urls is None and 'externalUrls' in kwargs: - external_urls = kwargs['externalUrls'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if backup_config is not None: - _setter("backup_config", backup_config) + pulumi.set(__self__, "backup_config", backup_config) if ca_cert is not None: - _setter("ca_cert", ca_cert) + pulumi.set(__self__, "ca_cert", ca_cert) if cert is not None: - _setter("cert", cert) + pulumi.set(__self__, "cert", cert) if creation is not None: - _setter("creation", creation) + pulumi.set(__self__, "creation", creation) if external_urls is not None: - _setter("external_urls", external_urls) + pulumi.set(__self__, "external_urls", external_urls) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if gid is not None: - _setter("gid", gid) + pulumi.set(__self__, "gid", gid) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if snapshot is not None: - _setter("snapshot", snapshot) + pulumi.set(__self__, "snapshot", snapshot) if uid is not None: - _setter("uid", uid) + pulumi.set(__self__, "uid", uid) @property @pulumi.getter(name="backupConfig") @@ -8705,45 +6680,18 @@ def __init__(__self__, *, :param bool safe_timestamp: Safe timestamp for etcd backup. Default: `false` (bool) :param int timeout: RKE node drain timeout (int) """ - ClusterServicesEtcdBackupConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - enabled=enabled, - interval_hours=interval_hours, - retention=retention, - s3_backup_config=s3_backup_config, - safe_timestamp=safe_timestamp, - timeout=timeout, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - enabled: Optional[bool] = None, - interval_hours: Optional[int] = None, - retention: Optional[int] = None, - s3_backup_config: Optional['outputs.ClusterServicesEtcdBackupConfigS3BackupConfig'] = None, - safe_timestamp: Optional[bool] = None, - timeout: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if interval_hours is None and 'intervalHours' in kwargs: - interval_hours = kwargs['intervalHours'] - if s3_backup_config is None and 's3BackupConfig' in kwargs: - s3_backup_config = kwargs['s3BackupConfig'] - if safe_timestamp is None and 'safeTimestamp' in kwargs: - safe_timestamp = kwargs['safeTimestamp'] - if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) if interval_hours is not None: - _setter("interval_hours", interval_hours) + pulumi.set(__self__, "interval_hours", interval_hours) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if s3_backup_config is not None: - _setter("s3_backup_config", s3_backup_config) + pulumi.set(__self__, "s3_backup_config", s3_backup_config) if safe_timestamp is not None: - _setter("safe_timestamp", safe_timestamp) + pulumi.set(__self__, "safe_timestamp", safe_timestamp) if timeout is not None: - _setter("timeout", timeout) + pulumi.set(__self__, "timeout", timeout) @property @pulumi.getter @@ -8836,51 +6784,20 @@ def __init__(__self__, *, :param str region: Region for S3 service (string) :param str secret_key: Secret key for S3 service (string) """ - ClusterServicesEtcdBackupConfigS3BackupConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - access_key=access_key, - bucket_name=bucket_name, - custom_ca=custom_ca, - endpoint=endpoint, - folder=folder, - region=region, - secret_key=secret_key, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - access_key: Optional[str] = None, - bucket_name: Optional[str] = None, - custom_ca: Optional[str] = None, - endpoint: Optional[str] = None, - folder: Optional[str] = None, - region: Optional[str] = None, - secret_key: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if access_key is None and 'accessKey' in kwargs: - access_key = kwargs['accessKey'] - if bucket_name is None and 'bucketName' in kwargs: - bucket_name = kwargs['bucketName'] - if custom_ca is None and 'customCa' in kwargs: - custom_ca = kwargs['customCa'] - if secret_key is None and 'secretKey' in kwargs: - secret_key = kwargs['secretKey'] - if access_key is not None: - _setter("access_key", access_key) + pulumi.set(__self__, "access_key", access_key) if bucket_name is not None: - _setter("bucket_name", bucket_name) + pulumi.set(__self__, "bucket_name", bucket_name) if custom_ca is not None: - _setter("custom_ca", custom_ca) + pulumi.set(__self__, "custom_ca", custom_ca) if endpoint is not None: - _setter("endpoint", endpoint) + pulumi.set(__self__, "endpoint", endpoint) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if secret_key is not None: - _setter("secret_key", secret_key) + pulumi.set(__self__, "secret_key", secret_key) @property @pulumi.getter(name="accessKey") @@ -9001,87 +6918,36 @@ def __init__(__self__, *, :param bool snapshot: Snapshot option for etcd service. Default `true` (bool) :param int uid: Etcd service UID. Default: `0`. For Rancher v2.3.x or above (int) """ - ClusterServicesEtcdDeprecated._configure( - lambda key, value: pulumi.set(__self__, key, value), - backup_config=backup_config, - ca_cert=ca_cert, - cert=cert, - creation=creation, - external_urls=external_urls, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - gid=gid, - image=image, - key=key, - path=path, - retention=retention, - snapshot=snapshot, - uid=uid, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - backup_config: Optional['outputs.ClusterServicesEtcdDeprecatedBackupConfig'] = None, - ca_cert: Optional[str] = None, - cert: Optional[str] = None, - creation: Optional[str] = None, - external_urls: Optional[Sequence[str]] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - gid: Optional[int] = None, - image: Optional[str] = None, - key: Optional[str] = None, - path: Optional[str] = None, - retention: Optional[str] = None, - snapshot: Optional[bool] = None, - uid: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if backup_config is None and 'backupConfig' in kwargs: - backup_config = kwargs['backupConfig'] - if ca_cert is None and 'caCert' in kwargs: - ca_cert = kwargs['caCert'] - if external_urls is None and 'externalUrls' in kwargs: - external_urls = kwargs['externalUrls'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if backup_config is not None: - _setter("backup_config", backup_config) + pulumi.set(__self__, "backup_config", backup_config) if ca_cert is not None: - _setter("ca_cert", ca_cert) + pulumi.set(__self__, "ca_cert", ca_cert) if cert is not None: - _setter("cert", cert) + pulumi.set(__self__, "cert", cert) if creation is not None: - _setter("creation", creation) + pulumi.set(__self__, "creation", creation) if external_urls is not None: - _setter("external_urls", external_urls) + pulumi.set(__self__, "external_urls", external_urls) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if gid is not None: - _setter("gid", gid) + pulumi.set(__self__, "gid", gid) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if key is not None: - _setter("key", key) + pulumi.set(__self__, "key", key) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if snapshot is not None: - _setter("snapshot", snapshot) + pulumi.set(__self__, "snapshot", snapshot) if uid is not None: - _setter("uid", uid) + pulumi.set(__self__, "uid", uid) @property @pulumi.getter(name="backupConfig") @@ -9242,45 +7108,18 @@ def __init__(__self__, *, :param bool safe_timestamp: Safe timestamp for etcd backup. Default: `false` (bool) :param int timeout: RKE node drain timeout (int) """ - ClusterServicesEtcdDeprecatedBackupConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - enabled=enabled, - interval_hours=interval_hours, - retention=retention, - s3_backup_config=s3_backup_config, - safe_timestamp=safe_timestamp, - timeout=timeout, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - enabled: Optional[bool] = None, - interval_hours: Optional[int] = None, - retention: Optional[int] = None, - s3_backup_config: Optional['outputs.ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig'] = None, - safe_timestamp: Optional[bool] = None, - timeout: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if interval_hours is None and 'intervalHours' in kwargs: - interval_hours = kwargs['intervalHours'] - if s3_backup_config is None and 's3BackupConfig' in kwargs: - s3_backup_config = kwargs['s3BackupConfig'] - if safe_timestamp is None and 'safeTimestamp' in kwargs: - safe_timestamp = kwargs['safeTimestamp'] - if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) if interval_hours is not None: - _setter("interval_hours", interval_hours) + pulumi.set(__self__, "interval_hours", interval_hours) if retention is not None: - _setter("retention", retention) + pulumi.set(__self__, "retention", retention) if s3_backup_config is not None: - _setter("s3_backup_config", s3_backup_config) + pulumi.set(__self__, "s3_backup_config", s3_backup_config) if safe_timestamp is not None: - _setter("safe_timestamp", safe_timestamp) + pulumi.set(__self__, "safe_timestamp", safe_timestamp) if timeout is not None: - _setter("timeout", timeout) + pulumi.set(__self__, "timeout", timeout) @property @pulumi.getter @@ -9373,51 +7212,20 @@ def __init__(__self__, *, :param str region: Region for S3 service (string) :param str secret_key: Secret key for S3 service (string) """ - ClusterServicesEtcdDeprecatedBackupConfigS3BackupConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - access_key=access_key, - bucket_name=bucket_name, - custom_ca=custom_ca, - endpoint=endpoint, - folder=folder, - region=region, - secret_key=secret_key, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - access_key: Optional[str] = None, - bucket_name: Optional[str] = None, - custom_ca: Optional[str] = None, - endpoint: Optional[str] = None, - folder: Optional[str] = None, - region: Optional[str] = None, - secret_key: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if access_key is None and 'accessKey' in kwargs: - access_key = kwargs['accessKey'] - if bucket_name is None and 'bucketName' in kwargs: - bucket_name = kwargs['bucketName'] - if custom_ca is None and 'customCa' in kwargs: - custom_ca = kwargs['customCa'] - if secret_key is None and 'secretKey' in kwargs: - secret_key = kwargs['secretKey'] - if access_key is not None: - _setter("access_key", access_key) + pulumi.set(__self__, "access_key", access_key) if bucket_name is not None: - _setter("bucket_name", bucket_name) + pulumi.set(__self__, "bucket_name", bucket_name) if custom_ca is not None: - _setter("custom_ca", custom_ca) + pulumi.set(__self__, "custom_ca", custom_ca) if endpoint is not None: - _setter("endpoint", endpoint) + pulumi.set(__self__, "endpoint", endpoint) if folder is not None: - _setter("folder", folder) + pulumi.set(__self__, "folder", folder) if region is not None: - _setter("region", region) + pulumi.set(__self__, "region", region) if secret_key is not None: - _setter("secret_key", secret_key) + pulumi.set(__self__, "secret_key", secret_key) @property @pulumi.getter(name="accessKey") @@ -9538,79 +7346,28 @@ def __init__(__self__, *, :param str service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) :param str service_node_port_range: Service Node Port Range option for kube API service (string) """ - ClusterServicesKubeApi._configure( - lambda key, value: pulumi.set(__self__, key, value), - always_pull_images=always_pull_images, - audit_log=audit_log, - event_rate_limit=event_rate_limit, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - pod_security_policy=pod_security_policy, - secrets_encryption_config=secrets_encryption_config, - service_cluster_ip_range=service_cluster_ip_range, - service_node_port_range=service_node_port_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - always_pull_images: Optional[bool] = None, - audit_log: Optional['outputs.ClusterServicesKubeApiAuditLog'] = None, - event_rate_limit: Optional['outputs.ClusterServicesKubeApiEventRateLimit'] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - pod_security_policy: Optional[bool] = None, - secrets_encryption_config: Optional['outputs.ClusterServicesKubeApiSecretsEncryptionConfig'] = None, - service_cluster_ip_range: Optional[str] = None, - service_node_port_range: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if always_pull_images is None and 'alwaysPullImages' in kwargs: - always_pull_images = kwargs['alwaysPullImages'] - if audit_log is None and 'auditLog' in kwargs: - audit_log = kwargs['auditLog'] - if event_rate_limit is None and 'eventRateLimit' in kwargs: - event_rate_limit = kwargs['eventRateLimit'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if pod_security_policy is None and 'podSecurityPolicy' in kwargs: - pod_security_policy = kwargs['podSecurityPolicy'] - if secrets_encryption_config is None and 'secretsEncryptionConfig' in kwargs: - secrets_encryption_config = kwargs['secretsEncryptionConfig'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if service_node_port_range is None and 'serviceNodePortRange' in kwargs: - service_node_port_range = kwargs['serviceNodePortRange'] - if always_pull_images is not None: - _setter("always_pull_images", always_pull_images) + pulumi.set(__self__, "always_pull_images", always_pull_images) if audit_log is not None: - _setter("audit_log", audit_log) + pulumi.set(__self__, "audit_log", audit_log) if event_rate_limit is not None: - _setter("event_rate_limit", event_rate_limit) + pulumi.set(__self__, "event_rate_limit", event_rate_limit) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if pod_security_policy is not None: - _setter("pod_security_policy", pod_security_policy) + pulumi.set(__self__, "pod_security_policy", pod_security_policy) if secrets_encryption_config is not None: - _setter("secrets_encryption_config", secrets_encryption_config) + pulumi.set(__self__, "secrets_encryption_config", secrets_encryption_config) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) if service_node_port_range is not None: - _setter("service_node_port_range", service_node_port_range) + pulumi.set(__self__, "service_node_port_range", service_node_port_range) @property @pulumi.getter(name="alwaysPullImages") @@ -9710,23 +7467,10 @@ def __init__(__self__, *, :param 'ClusterServicesKubeApiAuditLogConfigurationArgs' configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param bool enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiAuditLog._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional['outputs.ClusterServicesKubeApiAuditLogConfiguration'] = None, - enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -9783,45 +7527,18 @@ def __init__(__self__, *, :param str path: Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string) :param str policy: Audit policy json encoded definition. `"apiVersion"` and `"kind":"Policy","rules"` fields are required in the json. Ex. `jsonencode({"apiVersion":"audit.k8s.io/v1","kind":"Policy","rules":[{"level":"RequestResponse","resources":[{"group":"","resources":["pods"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string) """ - ClusterServicesKubeApiAuditLogConfiguration._configure( - lambda key, value: pulumi.set(__self__, key, value), - format=format, - max_age=max_age, - max_backup=max_backup, - max_size=max_size, - path=path, - policy=policy, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - format: Optional[str] = None, - max_age: Optional[int] = None, - max_backup: Optional[int] = None, - max_size: Optional[int] = None, - path: Optional[str] = None, - policy: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if max_age is None and 'maxAge' in kwargs: - max_age = kwargs['maxAge'] - if max_backup is None and 'maxBackup' in kwargs: - max_backup = kwargs['maxBackup'] - if max_size is None and 'maxSize' in kwargs: - max_size = kwargs['maxSize'] - if format is not None: - _setter("format", format) + pulumi.set(__self__, "format", format) if max_age is not None: - _setter("max_age", max_age) + pulumi.set(__self__, "max_age", max_age) if max_backup is not None: - _setter("max_backup", max_backup) + pulumi.set(__self__, "max_backup", max_backup) if max_size is not None: - _setter("max_size", max_size) + pulumi.set(__self__, "max_size", max_size) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if policy is not None: - _setter("policy", policy) + pulumi.set(__self__, "policy", policy) @property @pulumi.getter @@ -9934,79 +7651,28 @@ def __init__(__self__, *, :param str service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) :param str service_node_port_range: Service Node Port Range option for kube API service (string) """ - ClusterServicesKubeApiDeprecated._configure( - lambda key, value: pulumi.set(__self__, key, value), - always_pull_images=always_pull_images, - audit_log=audit_log, - event_rate_limit=event_rate_limit, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - pod_security_policy=pod_security_policy, - secrets_encryption_config=secrets_encryption_config, - service_cluster_ip_range=service_cluster_ip_range, - service_node_port_range=service_node_port_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - always_pull_images: Optional[bool] = None, - audit_log: Optional['outputs.ClusterServicesKubeApiDeprecatedAuditLog'] = None, - event_rate_limit: Optional['outputs.ClusterServicesKubeApiDeprecatedEventRateLimit'] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - pod_security_policy: Optional[bool] = None, - secrets_encryption_config: Optional['outputs.ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig'] = None, - service_cluster_ip_range: Optional[str] = None, - service_node_port_range: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if always_pull_images is None and 'alwaysPullImages' in kwargs: - always_pull_images = kwargs['alwaysPullImages'] - if audit_log is None and 'auditLog' in kwargs: - audit_log = kwargs['auditLog'] - if event_rate_limit is None and 'eventRateLimit' in kwargs: - event_rate_limit = kwargs['eventRateLimit'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if pod_security_policy is None and 'podSecurityPolicy' in kwargs: - pod_security_policy = kwargs['podSecurityPolicy'] - if secrets_encryption_config is None and 'secretsEncryptionConfig' in kwargs: - secrets_encryption_config = kwargs['secretsEncryptionConfig'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if service_node_port_range is None and 'serviceNodePortRange' in kwargs: - service_node_port_range = kwargs['serviceNodePortRange'] - if always_pull_images is not None: - _setter("always_pull_images", always_pull_images) + pulumi.set(__self__, "always_pull_images", always_pull_images) if audit_log is not None: - _setter("audit_log", audit_log) + pulumi.set(__self__, "audit_log", audit_log) if event_rate_limit is not None: - _setter("event_rate_limit", event_rate_limit) + pulumi.set(__self__, "event_rate_limit", event_rate_limit) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if pod_security_policy is not None: - _setter("pod_security_policy", pod_security_policy) + pulumi.set(__self__, "pod_security_policy", pod_security_policy) if secrets_encryption_config is not None: - _setter("secrets_encryption_config", secrets_encryption_config) + pulumi.set(__self__, "secrets_encryption_config", secrets_encryption_config) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) if service_node_port_range is not None: - _setter("service_node_port_range", service_node_port_range) + pulumi.set(__self__, "service_node_port_range", service_node_port_range) @property @pulumi.getter(name="alwaysPullImages") @@ -10106,23 +7772,10 @@ def __init__(__self__, *, :param 'ClusterServicesKubeApiDeprecatedAuditLogConfigurationArgs' configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param bool enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiDeprecatedAuditLog._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional['outputs.ClusterServicesKubeApiDeprecatedAuditLogConfiguration'] = None, - enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -10179,45 +7832,18 @@ def __init__(__self__, *, :param str path: Audit log path. Default: `/var/log/kube-audit/audit-log.json` (string) :param str policy: Audit policy json encoded definition. `"apiVersion"` and `"kind":"Policy","rules"` fields are required in the json. Ex. `jsonencode({"apiVersion":"audit.k8s.io/v1","kind":"Policy","rules":[{"level":"RequestResponse","resources":[{"group":"","resources":["pods"]}]}]})` [More info](https://rancher.com/docs/rke/latest/en/config-options/audit-log/) (string) """ - ClusterServicesKubeApiDeprecatedAuditLogConfiguration._configure( - lambda key, value: pulumi.set(__self__, key, value), - format=format, - max_age=max_age, - max_backup=max_backup, - max_size=max_size, - path=path, - policy=policy, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - format: Optional[str] = None, - max_age: Optional[int] = None, - max_backup: Optional[int] = None, - max_size: Optional[int] = None, - path: Optional[str] = None, - policy: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if max_age is None and 'maxAge' in kwargs: - max_age = kwargs['maxAge'] - if max_backup is None and 'maxBackup' in kwargs: - max_backup = kwargs['maxBackup'] - if max_size is None and 'maxSize' in kwargs: - max_size = kwargs['maxSize'] - if format is not None: - _setter("format", format) + pulumi.set(__self__, "format", format) if max_age is not None: - _setter("max_age", max_age) + pulumi.set(__self__, "max_age", max_age) if max_backup is not None: - _setter("max_backup", max_backup) + pulumi.set(__self__, "max_backup", max_backup) if max_size is not None: - _setter("max_size", max_size) + pulumi.set(__self__, "max_size", max_size) if path is not None: - _setter("path", path) + pulumi.set(__self__, "path", path) if policy is not None: - _setter("policy", policy) + pulumi.set(__self__, "policy", policy) @property @pulumi.getter @@ -10277,23 +7903,10 @@ def __init__(__self__, *, :param str configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param bool enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiDeprecatedEventRateLimit._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional[str] = None, - enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -10338,25 +7951,10 @@ def __init__(__self__, *, :param str custom_config: Secrets encryption yaml encoded custom configuration. `"apiVersion"` and `"kind":"EncryptionConfiguration"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string) :param bool enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiDeprecatedSecretsEncryptionConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - custom_config=custom_config, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - custom_config: Optional[str] = None, - enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if custom_config is None and 'customConfig' in kwargs: - custom_config = kwargs['customConfig'] - if custom_config is not None: - _setter("custom_config", custom_config) + pulumi.set(__self__, "custom_config", custom_config) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter(name="customConfig") @@ -10384,23 +7982,10 @@ def __init__(__self__, *, :param str configuration: Event rate limit yaml encoded configuration. `"apiVersion"` and `"kind":"Configuration"` fields are required in the yaml. Ex. `apiVersion: eventratelimit.admission.k8s.io/v1alpha1\\nkind: Configuration\\nlimits:\\n- type: Server\\n burst: 30000\\n qps: 6000\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/rate-limiting/) (string) :param bool enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiEventRateLimit._configure( - lambda key, value: pulumi.set(__self__, key, value), - configuration=configuration, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - configuration: Optional[str] = None, - enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if configuration is not None: - _setter("configuration", configuration) + pulumi.set(__self__, "configuration", configuration) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter @@ -10445,25 +8030,10 @@ def __init__(__self__, *, :param str custom_config: Secrets encryption yaml encoded custom configuration. `"apiVersion"` and `"kind":"EncryptionConfiguration"` fields are required in the yaml. Ex. `apiVersion: apiserver.config.k8s.io/v1\\nkind: EncryptionConfiguration\\nresources:\\n- resources:\\n - secrets\\n providers:\\n - aescbc:\\n keys:\\n - name: k-fw5hn\\n secret: RTczRjFDODMwQzAyMDVBREU4NDJBMUZFNDhCNzM5N0I=\\n identity: {}\\n` [More info](https://rancher.com/docs/rke/latest/en/config-options/secrets-encryption/) (string) :param bool enabled: Enable secrets encryption (bool) """ - ClusterServicesKubeApiSecretsEncryptionConfig._configure( - lambda key, value: pulumi.set(__self__, key, value), - custom_config=custom_config, - enabled=enabled, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - custom_config: Optional[str] = None, - enabled: Optional[bool] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if custom_config is None and 'customConfig' in kwargs: - custom_config = kwargs['customConfig'] - if custom_config is not None: - _setter("custom_config", custom_config) + pulumi.set(__self__, "custom_config", custom_config) if enabled is not None: - _setter("enabled", enabled) + pulumi.set(__self__, "enabled", enabled) @property @pulumi.getter(name="customConfig") @@ -10524,49 +8094,18 @@ def __init__(__self__, *, :param str image: Docker image for scheduler service (string) :param str service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) """ - ClusterServicesKubeController._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_cidr=cluster_cidr, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - service_cluster_ip_range=service_cluster_ip_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_cidr: Optional[str] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - service_cluster_ip_range: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_cidr is None and 'clusterCidr' in kwargs: - cluster_cidr = kwargs['clusterCidr'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if cluster_cidr is not None: - _setter("cluster_cidr", cluster_cidr) + pulumi.set(__self__, "cluster_cidr", cluster_cidr) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) @property @pulumi.getter(name="clusterCidr") @@ -10659,49 +8198,18 @@ def __init__(__self__, *, :param str image: Docker image for scheduler service (string) :param str service_cluster_ip_range: Service Cluster ip Range option for kube controller service (string) """ - ClusterServicesKubeControllerDeprecated._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_cidr=cluster_cidr, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - service_cluster_ip_range=service_cluster_ip_range, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_cidr: Optional[str] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - service_cluster_ip_range: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_cidr is None and 'clusterCidr' in kwargs: - cluster_cidr = kwargs['clusterCidr'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if service_cluster_ip_range is None and 'serviceClusterIpRange' in kwargs: - service_cluster_ip_range = kwargs['serviceClusterIpRange'] - if cluster_cidr is not None: - _setter("cluster_cidr", cluster_cidr) + pulumi.set(__self__, "cluster_cidr", cluster_cidr) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if service_cluster_ip_range is not None: - _setter("service_cluster_ip_range", service_cluster_ip_range) + pulumi.set(__self__, "service_cluster_ip_range", service_cluster_ip_range) @property @pulumi.getter(name="clusterCidr") @@ -10786,37 +8294,14 @@ def __init__(__self__, *, :param Sequence[str] extra_envs: Extra environment for scheduler service (list) :param str image: Docker image for scheduler service (string) """ - ClusterServicesKubeProxyDeprecated._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -10885,37 +8370,14 @@ def __init__(__self__, *, :param Sequence[str] extra_envs: Extra environment for scheduler service (list) :param str image: Docker image for scheduler service (string) """ - ClusterServicesKubeSchedulerDeprecated._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -11004,67 +8466,24 @@ def __init__(__self__, *, :param str image: Docker image for scheduler service (string) :param str infra_container_image: Infra container image for kubelet service (string) """ - ClusterServicesKubelet._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_dns_server=cluster_dns_server, - cluster_domain=cluster_domain, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - fail_swap_on=fail_swap_on, - generate_serving_certificate=generate_serving_certificate, - image=image, - infra_container_image=infra_container_image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_dns_server: Optional[str] = None, - cluster_domain: Optional[str] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - fail_swap_on: Optional[bool] = None, - generate_serving_certificate: Optional[bool] = None, - image: Optional[str] = None, - infra_container_image: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_dns_server is None and 'clusterDnsServer' in kwargs: - cluster_dns_server = kwargs['clusterDnsServer'] - if cluster_domain is None and 'clusterDomain' in kwargs: - cluster_domain = kwargs['clusterDomain'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if fail_swap_on is None and 'failSwapOn' in kwargs: - fail_swap_on = kwargs['failSwapOn'] - if generate_serving_certificate is None and 'generateServingCertificate' in kwargs: - generate_serving_certificate = kwargs['generateServingCertificate'] - if infra_container_image is None and 'infraContainerImage' in kwargs: - infra_container_image = kwargs['infraContainerImage'] - if cluster_dns_server is not None: - _setter("cluster_dns_server", cluster_dns_server) + pulumi.set(__self__, "cluster_dns_server", cluster_dns_server) if cluster_domain is not None: - _setter("cluster_domain", cluster_domain) + pulumi.set(__self__, "cluster_domain", cluster_domain) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if fail_swap_on is not None: - _setter("fail_swap_on", fail_swap_on) + pulumi.set(__self__, "fail_swap_on", fail_swap_on) if generate_serving_certificate is not None: - _setter("generate_serving_certificate", generate_serving_certificate) + pulumi.set(__self__, "generate_serving_certificate", generate_serving_certificate) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if infra_container_image is not None: - _setter("infra_container_image", infra_container_image) + pulumi.set(__self__, "infra_container_image", infra_container_image) @property @pulumi.getter(name="clusterDnsServer") @@ -11193,67 +8612,24 @@ def __init__(__self__, *, :param str image: Docker image for scheduler service (string) :param str infra_container_image: Infra container image for kubelet service (string) """ - ClusterServicesKubeletDeprecated._configure( - lambda key, value: pulumi.set(__self__, key, value), - cluster_dns_server=cluster_dns_server, - cluster_domain=cluster_domain, - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - fail_swap_on=fail_swap_on, - generate_serving_certificate=generate_serving_certificate, - image=image, - infra_container_image=infra_container_image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - cluster_dns_server: Optional[str] = None, - cluster_domain: Optional[str] = None, - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - fail_swap_on: Optional[bool] = None, - generate_serving_certificate: Optional[bool] = None, - image: Optional[str] = None, - infra_container_image: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if cluster_dns_server is None and 'clusterDnsServer' in kwargs: - cluster_dns_server = kwargs['clusterDnsServer'] - if cluster_domain is None and 'clusterDomain' in kwargs: - cluster_domain = kwargs['clusterDomain'] - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if fail_swap_on is None and 'failSwapOn' in kwargs: - fail_swap_on = kwargs['failSwapOn'] - if generate_serving_certificate is None and 'generateServingCertificate' in kwargs: - generate_serving_certificate = kwargs['generateServingCertificate'] - if infra_container_image is None and 'infraContainerImage' in kwargs: - infra_container_image = kwargs['infraContainerImage'] - if cluster_dns_server is not None: - _setter("cluster_dns_server", cluster_dns_server) + pulumi.set(__self__, "cluster_dns_server", cluster_dns_server) if cluster_domain is not None: - _setter("cluster_domain", cluster_domain) + pulumi.set(__self__, "cluster_domain", cluster_domain) if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if fail_swap_on is not None: - _setter("fail_swap_on", fail_swap_on) + pulumi.set(__self__, "fail_swap_on", fail_swap_on) if generate_serving_certificate is not None: - _setter("generate_serving_certificate", generate_serving_certificate) + pulumi.set(__self__, "generate_serving_certificate", generate_serving_certificate) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) if infra_container_image is not None: - _setter("infra_container_image", infra_container_image) + pulumi.set(__self__, "infra_container_image", infra_container_image) @property @pulumi.getter(name="clusterDnsServer") @@ -11362,37 +8738,14 @@ def __init__(__self__, *, :param Sequence[str] extra_envs: Extra environment for scheduler service (list) :param str image: Docker image for scheduler service (string) """ - ClusterServicesKubeproxy._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -11461,37 +8814,14 @@ def __init__(__self__, *, :param Sequence[str] extra_envs: Extra environment for scheduler service (list) :param str image: Docker image for scheduler service (string) """ - ClusterServicesScheduler._configure( - lambda key, value: pulumi.set(__self__, key, value), - extra_args=extra_args, - extra_binds=extra_binds, - extra_envs=extra_envs, - image=image, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - extra_args: Optional[Mapping[str, Any]] = None, - extra_binds: Optional[Sequence[str]] = None, - extra_envs: Optional[Sequence[str]] = None, - image: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if extra_args is None and 'extraArgs' in kwargs: - extra_args = kwargs['extraArgs'] - if extra_binds is None and 'extraBinds' in kwargs: - extra_binds = kwargs['extraBinds'] - if extra_envs is None and 'extraEnvs' in kwargs: - extra_envs = kwargs['extraEnvs'] - if extra_args is not None: - _setter("extra_args", extra_args) + pulumi.set(__self__, "extra_args", extra_args) if extra_binds is not None: - _setter("extra_binds", extra_binds) + pulumi.set(__self__, "extra_binds", extra_binds) if extra_envs is not None: - _setter("extra_envs", extra_envs) + pulumi.set(__self__, "extra_envs", extra_envs) if image is not None: - _setter("image", image) + pulumi.set(__self__, "image", image) @property @pulumi.getter(name="extraArgs") @@ -11678,221 +9008,80 @@ def __init__(__self__, *, :param str weave_node: Docker image for weave_node (string) :param str windows_pod_infra_container: Docker image for windows_pod_infra_container (string) """ - ClusterSystemImages._configure( - lambda key, value: pulumi.set(__self__, key, value), - aci_cni_deploy_container=aci_cni_deploy_container, - aci_controller_container=aci_controller_container, - aci_host_container=aci_host_container, - aci_mcast_container=aci_mcast_container, - aci_opflex_container=aci_opflex_container, - aci_ovs_container=aci_ovs_container, - alpine=alpine, - calico_cni=calico_cni, - calico_controllers=calico_controllers, - calico_ctl=calico_ctl, - calico_flex_vol=calico_flex_vol, - calico_node=calico_node, - canal_cni=canal_cni, - canal_flannel=canal_flannel, - canal_flex_vol=canal_flex_vol, - canal_node=canal_node, - cert_downloader=cert_downloader, - coredns=coredns, - coredns_autoscaler=coredns_autoscaler, - dnsmasq=dnsmasq, - etcd=etcd, - flannel=flannel, - flannel_cni=flannel_cni, - ingress=ingress, - ingress_backend=ingress_backend, - kube_dns=kube_dns, - kube_dns_autoscaler=kube_dns_autoscaler, - kube_dns_sidecar=kube_dns_sidecar, - kubernetes=kubernetes, - kubernetes_services_sidecar=kubernetes_services_sidecar, - metrics_server=metrics_server, - nginx_proxy=nginx_proxy, - nodelocal=nodelocal, - pod_infra_container=pod_infra_container, - weave_cni=weave_cni, - weave_node=weave_node, - windows_pod_infra_container=windows_pod_infra_container, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - aci_cni_deploy_container: Optional[str] = None, - aci_controller_container: Optional[str] = None, - aci_host_container: Optional[str] = None, - aci_mcast_container: Optional[str] = None, - aci_opflex_container: Optional[str] = None, - aci_ovs_container: Optional[str] = None, - alpine: Optional[str] = None, - calico_cni: Optional[str] = None, - calico_controllers: Optional[str] = None, - calico_ctl: Optional[str] = None, - calico_flex_vol: Optional[str] = None, - calico_node: Optional[str] = None, - canal_cni: Optional[str] = None, - canal_flannel: Optional[str] = None, - canal_flex_vol: Optional[str] = None, - canal_node: Optional[str] = None, - cert_downloader: Optional[str] = None, - coredns: Optional[str] = None, - coredns_autoscaler: Optional[str] = None, - dnsmasq: Optional[str] = None, - etcd: Optional[str] = None, - flannel: Optional[str] = None, - flannel_cni: Optional[str] = None, - ingress: Optional[str] = None, - ingress_backend: Optional[str] = None, - kube_dns: Optional[str] = None, - kube_dns_autoscaler: Optional[str] = None, - kube_dns_sidecar: Optional[str] = None, - kubernetes: Optional[str] = None, - kubernetes_services_sidecar: Optional[str] = None, - metrics_server: Optional[str] = None, - nginx_proxy: Optional[str] = None, - nodelocal: Optional[str] = None, - pod_infra_container: Optional[str] = None, - weave_cni: Optional[str] = None, - weave_node: Optional[str] = None, - windows_pod_infra_container: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if aci_cni_deploy_container is None and 'aciCniDeployContainer' in kwargs: - aci_cni_deploy_container = kwargs['aciCniDeployContainer'] - if aci_controller_container is None and 'aciControllerContainer' in kwargs: - aci_controller_container = kwargs['aciControllerContainer'] - if aci_host_container is None and 'aciHostContainer' in kwargs: - aci_host_container = kwargs['aciHostContainer'] - if aci_mcast_container is None and 'aciMcastContainer' in kwargs: - aci_mcast_container = kwargs['aciMcastContainer'] - if aci_opflex_container is None and 'aciOpflexContainer' in kwargs: - aci_opflex_container = kwargs['aciOpflexContainer'] - if aci_ovs_container is None and 'aciOvsContainer' in kwargs: - aci_ovs_container = kwargs['aciOvsContainer'] - if calico_cni is None and 'calicoCni' in kwargs: - calico_cni = kwargs['calicoCni'] - if calico_controllers is None and 'calicoControllers' in kwargs: - calico_controllers = kwargs['calicoControllers'] - if calico_ctl is None and 'calicoCtl' in kwargs: - calico_ctl = kwargs['calicoCtl'] - if calico_flex_vol is None and 'calicoFlexVol' in kwargs: - calico_flex_vol = kwargs['calicoFlexVol'] - if calico_node is None and 'calicoNode' in kwargs: - calico_node = kwargs['calicoNode'] - if canal_cni is None and 'canalCni' in kwargs: - canal_cni = kwargs['canalCni'] - if canal_flannel is None and 'canalFlannel' in kwargs: - canal_flannel = kwargs['canalFlannel'] - if canal_flex_vol is None and 'canalFlexVol' in kwargs: - canal_flex_vol = kwargs['canalFlexVol'] - if canal_node is None and 'canalNode' in kwargs: - canal_node = kwargs['canalNode'] - if cert_downloader is None and 'certDownloader' in kwargs: - cert_downloader = kwargs['certDownloader'] - if coredns_autoscaler is None and 'corednsAutoscaler' in kwargs: - coredns_autoscaler = kwargs['corednsAutoscaler'] - if flannel_cni is None and 'flannelCni' in kwargs: - flannel_cni = kwargs['flannelCni'] - if ingress_backend is None and 'ingressBackend' in kwargs: - ingress_backend = kwargs['ingressBackend'] - if kube_dns is None and 'kubeDns' in kwargs: - kube_dns = kwargs['kubeDns'] - if kube_dns_autoscaler is None and 'kubeDnsAutoscaler' in kwargs: - kube_dns_autoscaler = kwargs['kubeDnsAutoscaler'] - if kube_dns_sidecar is None and 'kubeDnsSidecar' in kwargs: - kube_dns_sidecar = kwargs['kubeDnsSidecar'] - if kubernetes_services_sidecar is None and 'kubernetesServicesSidecar' in kwargs: - kubernetes_services_sidecar = kwargs['kubernetesServicesSidecar'] - if metrics_server is None and 'metricsServer' in kwargs: - metrics_server = kwargs['metricsServer'] - if nginx_proxy is None and 'nginxProxy' in kwargs: - nginx_proxy = kwargs['nginxProxy'] - if pod_infra_container is None and 'podInfraContainer' in kwargs: - pod_infra_container = kwargs['podInfraContainer'] - if weave_cni is None and 'weaveCni' in kwargs: - weave_cni = kwargs['weaveCni'] - if weave_node is None and 'weaveNode' in kwargs: - weave_node = kwargs['weaveNode'] - if windows_pod_infra_container is None and 'windowsPodInfraContainer' in kwargs: - windows_pod_infra_container = kwargs['windowsPodInfraContainer'] - if aci_cni_deploy_container is not None: - _setter("aci_cni_deploy_container", aci_cni_deploy_container) + pulumi.set(__self__, "aci_cni_deploy_container", aci_cni_deploy_container) if aci_controller_container is not None: - _setter("aci_controller_container", aci_controller_container) + pulumi.set(__self__, "aci_controller_container", aci_controller_container) if aci_host_container is not None: - _setter("aci_host_container", aci_host_container) + pulumi.set(__self__, "aci_host_container", aci_host_container) if aci_mcast_container is not None: - _setter("aci_mcast_container", aci_mcast_container) + pulumi.set(__self__, "aci_mcast_container", aci_mcast_container) if aci_opflex_container is not None: - _setter("aci_opflex_container", aci_opflex_container) + pulumi.set(__self__, "aci_opflex_container", aci_opflex_container) if aci_ovs_container is not None: - _setter("aci_ovs_container", aci_ovs_container) + pulumi.set(__self__, "aci_ovs_container", aci_ovs_container) if alpine is not None: - _setter("alpine", alpine) + pulumi.set(__self__, "alpine", alpine) if calico_cni is not None: - _setter("calico_cni", calico_cni) + pulumi.set(__self__, "calico_cni", calico_cni) if calico_controllers is not None: - _setter("calico_controllers", calico_controllers) + pulumi.set(__self__, "calico_controllers", calico_controllers) if calico_ctl is not None: - _setter("calico_ctl", calico_ctl) + pulumi.set(__self__, "calico_ctl", calico_ctl) if calico_flex_vol is not None: - _setter("calico_flex_vol", calico_flex_vol) + pulumi.set(__self__, "calico_flex_vol", calico_flex_vol) if calico_node is not None: - _setter("calico_node", calico_node) + pulumi.set(__self__, "calico_node", calico_node) if canal_cni is not None: - _setter("canal_cni", canal_cni) + pulumi.set(__self__, "canal_cni", canal_cni) if canal_flannel is not None: - _setter("canal_flannel", canal_flannel) + pulumi.set(__self__, "canal_flannel", canal_flannel) if canal_flex_vol is not None: - _setter("canal_flex_vol", canal_flex_vol) + pulumi.set(__self__, "canal_flex_vol", canal_flex_vol) if canal_node is not None: - _setter("canal_node", canal_node) + pulumi.set(__self__, "canal_node", canal_node) if cert_downloader is not None: - _setter("cert_downloader", cert_downloader) + pulumi.set(__self__, "cert_downloader", cert_downloader) if coredns is not None: - _setter("coredns", coredns) + pulumi.set(__self__, "coredns", coredns) if coredns_autoscaler is not None: - _setter("coredns_autoscaler", coredns_autoscaler) + pulumi.set(__self__, "coredns_autoscaler", coredns_autoscaler) if dnsmasq is not None: - _setter("dnsmasq", dnsmasq) + pulumi.set(__self__, "dnsmasq", dnsmasq) if etcd is not None: - _setter("etcd", etcd) + pulumi.set(__self__, "etcd", etcd) if flannel is not None: - _setter("flannel", flannel) + pulumi.set(__self__, "flannel", flannel) if flannel_cni is not None: - _setter("flannel_cni", flannel_cni) + pulumi.set(__self__, "flannel_cni", flannel_cni) if ingress is not None: - _setter("ingress", ingress) + pulumi.set(__self__, "ingress", ingress) if ingress_backend is not None: - _setter("ingress_backend", ingress_backend) + pulumi.set(__self__, "ingress_backend", ingress_backend) if kube_dns is not None: - _setter("kube_dns", kube_dns) + pulumi.set(__self__, "kube_dns", kube_dns) if kube_dns_autoscaler is not None: - _setter("kube_dns_autoscaler", kube_dns_autoscaler) + pulumi.set(__self__, "kube_dns_autoscaler", kube_dns_autoscaler) if kube_dns_sidecar is not None: - _setter("kube_dns_sidecar", kube_dns_sidecar) + pulumi.set(__self__, "kube_dns_sidecar", kube_dns_sidecar) if kubernetes is not None: - _setter("kubernetes", kubernetes) + pulumi.set(__self__, "kubernetes", kubernetes) if kubernetes_services_sidecar is not None: - _setter("kubernetes_services_sidecar", kubernetes_services_sidecar) + pulumi.set(__self__, "kubernetes_services_sidecar", kubernetes_services_sidecar) if metrics_server is not None: - _setter("metrics_server", metrics_server) + pulumi.set(__self__, "metrics_server", metrics_server) if nginx_proxy is not None: - _setter("nginx_proxy", nginx_proxy) + pulumi.set(__self__, "nginx_proxy", nginx_proxy) if nodelocal is not None: - _setter("nodelocal", nodelocal) + pulumi.set(__self__, "nodelocal", nodelocal) if pod_infra_container is not None: - _setter("pod_infra_container", pod_infra_container) + pulumi.set(__self__, "pod_infra_container", pod_infra_container) if weave_cni is not None: - _setter("weave_cni", weave_cni) + pulumi.set(__self__, "weave_cni", weave_cni) if weave_node is not None: - _setter("weave_node", weave_node) + pulumi.set(__self__, "weave_node", weave_node) if windows_pod_infra_container is not None: - _setter("windows_pod_infra_container", windows_pod_infra_container) + pulumi.set(__self__, "windows_pod_infra_container", windows_pod_infra_container) @property @pulumi.getter(name="aciCniDeployContainer") @@ -12225,37 +9414,14 @@ def __init__(__self__, *, :param str max_unavailable_controlplane: RKE max unavailable controlplane nodes (string) :param str max_unavailable_worker: RKE max unavailable worker nodes (string) """ - ClusterUpgradeStrategy._configure( - lambda key, value: pulumi.set(__self__, key, value), - drain=drain, - drain_input=drain_input, - max_unavailable_controlplane=max_unavailable_controlplane, - max_unavailable_worker=max_unavailable_worker, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - drain: Optional[bool] = None, - drain_input: Optional['outputs.ClusterUpgradeStrategyDrainInput'] = None, - max_unavailable_controlplane: Optional[str] = None, - max_unavailable_worker: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if drain_input is None and 'drainInput' in kwargs: - drain_input = kwargs['drainInput'] - if max_unavailable_controlplane is None and 'maxUnavailableControlplane' in kwargs: - max_unavailable_controlplane = kwargs['maxUnavailableControlplane'] - if max_unavailable_worker is None and 'maxUnavailableWorker' in kwargs: - max_unavailable_worker = kwargs['maxUnavailableWorker'] - if drain is not None: - _setter("drain", drain) + pulumi.set(__self__, "drain", drain) if drain_input is not None: - _setter("drain_input", drain_input) + pulumi.set(__self__, "drain_input", drain_input) if max_unavailable_controlplane is not None: - _setter("max_unavailable_controlplane", max_unavailable_controlplane) + pulumi.set(__self__, "max_unavailable_controlplane", max_unavailable_controlplane) if max_unavailable_worker is not None: - _setter("max_unavailable_worker", max_unavailable_worker) + pulumi.set(__self__, "max_unavailable_worker", max_unavailable_worker) @property @pulumi.getter @@ -12326,41 +9492,16 @@ def __init__(__self__, *, :param bool ignore_daemon_sets: Ignore RKE daemon sets (bool) :param int timeout: RKE node drain timeout (int) """ - ClusterUpgradeStrategyDrainInput._configure( - lambda key, value: pulumi.set(__self__, key, value), - delete_local_data=delete_local_data, - force=force, - grace_period=grace_period, - ignore_daemon_sets=ignore_daemon_sets, - timeout=timeout, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - delete_local_data: Optional[bool] = None, - force: Optional[bool] = None, - grace_period: Optional[int] = None, - ignore_daemon_sets: Optional[bool] = None, - timeout: Optional[int] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if delete_local_data is None and 'deleteLocalData' in kwargs: - delete_local_data = kwargs['deleteLocalData'] - if grace_period is None and 'gracePeriod' in kwargs: - grace_period = kwargs['gracePeriod'] - if ignore_daemon_sets is None and 'ignoreDaemonSets' in kwargs: - ignore_daemon_sets = kwargs['ignoreDaemonSets'] - if delete_local_data is not None: - _setter("delete_local_data", delete_local_data) + pulumi.set(__self__, "delete_local_data", delete_local_data) if force is not None: - _setter("force", force) + pulumi.set(__self__, "force", force) if grace_period is not None: - _setter("grace_period", grace_period) + pulumi.set(__self__, "grace_period", grace_period) if ignore_daemon_sets is not None: - _setter("ignore_daemon_sets", ignore_daemon_sets) + pulumi.set(__self__, "ignore_daemon_sets", ignore_daemon_sets) if timeout is not None: - _setter("timeout", timeout) + pulumi.set(__self__, "timeout", timeout) @property @pulumi.getter(name="deleteLocalData") @@ -12429,25 +9570,10 @@ def __init__(__self__, *, :param str address: Address ip for node (string) :param str node_name: Name of the host provisioned via docker machine (string) """ - ClusterWorkerHost._configure( - lambda key, value: pulumi.set(__self__, key, value), - address=address, - node_name=node_name, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - address: Optional[str] = None, - node_name: Optional[str] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if node_name is None and 'nodeName' in kwargs: - node_name = kwargs['nodeName'] - if address is not None: - _setter("address", address) + pulumi.set(__self__, "address", address) if node_name is not None: - _setter("node_name", node_name) + pulumi.set(__self__, "node_name", node_name) @property @pulumi.getter diff --git a/sdk/python/pulumi_rke/provider.py b/sdk/python/pulumi_rke/provider.py index 09b1b02a..6a176d80 100644 --- a/sdk/python/pulumi_rke/provider.py +++ b/sdk/python/pulumi_rke/provider.py @@ -6,7 +6,7 @@ import warnings import pulumi import pulumi.runtime -from typing import Any, Callable, Mapping, Optional, Sequence, Union, overload +from typing import Any, Mapping, Optional, Sequence, Union, overload from . import _utilities __all__ = ['ProviderArgs', 'Provider'] @@ -19,29 +19,14 @@ def __init__(__self__, *, """ The set of arguments for constructing a Provider resource. """ - ProviderArgs._configure( - lambda key, value: pulumi.set(__self__, key, value), - debug=debug, - log_file=log_file, - ) - @staticmethod - def _configure( - _setter: Callable[[Any, Any], None], - debug: Optional[pulumi.Input[bool]] = None, - log_file: Optional[pulumi.Input[str]] = None, - opts: Optional[pulumi.ResourceOptions] = None, - **kwargs): - if log_file is None and 'logFile' in kwargs: - log_file = kwargs['logFile'] - if debug is None: debug = (_utilities.get_env_bool('RKE_DEBUG') or False) if debug is not None: - _setter("debug", debug) + pulumi.set(__self__, "debug", debug) if log_file is None: log_file = _utilities.get_env('RKE_LOG_FILE') if log_file is not None: - _setter("log_file", log_file) + pulumi.set(__self__, "log_file", log_file) @property @pulumi.getter @@ -101,10 +86,6 @@ def __init__(__self__, resource_name: str, *args, **kwargs): if resource_args is not None: __self__._internal_init(resource_name, opts, **resource_args.__dict__) else: - kwargs = kwargs or {} - def _setter(key, value): - kwargs[key] = value - ProviderArgs._configure(_setter, **kwargs) __self__._internal_init(resource_name, *args, **kwargs) def _internal_init(__self__,