import { type Certificate } from "https://deno.land/x/kubernetes_apis@v0.5.3/cert-manager/cert-manager.io@v1/mod.ts";
A Certificate resource should be created to ensure an up to date and signed
X.509 certificate is stored in the Kubernetes Secret resource named in spec.secretName
.
The stored certificate will be renewed before it expires (as configured by spec.renewBefore
).
Properties
optional
spec: { additionalOutputFormats?: Array<{ type: "DER" | "CombinedPEM" | c.UnexpectedEnumValue; }> | null; commonName?: string | null; dnsNames?: Array<string> | null; duration?: string | null; emailAddresses?: Array<string> | null; encodeUsagesInRequest?: boolean | null; ipAddresses?: Array<string> | null; isCA?: boolean | null; issuerRef: { group?: string | null; kind?: string | null; name: string; }; keystores?: { jks?: { alias?: string | null; create: boolean; passwordSecretRef: SecretRef; } | null; pkcs12?: { create: boolean; passwordSecretRef: SecretRef; profile?: | "LegacyRC2"
| "LegacyDES"
| "Modern2023"
| c.UnexpectedEnumValue
| null
| "RSA"
| "ECDSA"
| "Ed25519"
| c.UnexpectedEnumValue
| null
| "PKCS1"
| "PKCS8"
| c.UnexpectedEnumValue
| null
| "Never"
| "Always"
| c.UnexpectedEnumValue
| null
| "signing"
| "digital signature"
| "content commitment"
| "key encipherment"
| "key agreement"
| "data encipherment"
| "cert sign"
| "crl sign"
| "encipher only"
| "decipher only"
| "any"
| "server auth"
| "client auth"
| "code signing"
| "email protection"
| "s/mime"
| "ipsec end system"
| "ipsec tunnel"
| "ipsec user"
| "timestamping"
| "ocsp signing"
| "microsoft sgc"
| "netscape sgc"
| c.UnexpectedEnumValue
optional
status: { conditions?: Array<{ lastTransitionTime?: c.Time | null; message?: string | null; observedGeneration?: number | null; reason?: string | null; status: | "True"
| "False"
| "Unknown"
| c.UnexpectedEnumValue