Dotnet Example, fixes #306 #359
run-acceptance-tests.yml
on: pull_request
Annotations
11 errors and 4 warnings
Unexpected file modified:
sdk/python/pulumi_kubernetes_cert_manager/cert_manager.py#L1
File modified:
@@ -23,7 +23,7 @@ __all__ = ['CertManagerArgs', 'CertManager']
class CertManagerArgs:
def __init__(__self__, *,
affinity: Optional[pulumi.Input['pulumi_kubernetes.core.v1.AffinityArgs']] = None,
- cainjector: Optional['CertManagerCaInjectorArgs'] = None,
+ cainjector: Optional[pulumi.Input['CertManagerCaInjectorArgs']] = None,
cluster_resource_namespace: Optional[pulumi.Input[str]] = None,
container_security_context: Optional[pulumi.Input['pulumi_kubernetes.core.v1.SecurityContextArgs']] = None,
deployment_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
@@ -150,11 +150,11 @@ class CertManagerArgs:
@Property
@pulumi.getter
- def cainjector(self) -> Optional['CertManagerCaInjectorArgs']:
+ def cainjector(self) -> Optional[pulumi.Input['CertManagerCaInjectorArgs']]:
return pulumi.get(self, "cainjector")
@cainjector.setter
- def cainjector(self, value: Optional['CertManagerCaInjectorArgs']):
+ def cainjector(self, value: Optional[pulumi.Input['CertManagerCaInjectorArgs']]):
pulumi.set(self, "cainjector", value)
@Property
@@ -485,7 +485,7 @@ class CertManager(pulumi.ComponentResource):
resource_name: str,
opts: Optional[pulumi.ResourceOptions] = None,
affinity: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.AffinityArgs']]] = None,
- cainjector: Optional[Union['CertManagerCaInjectorArgs', 'CertManagerCaInjectorArgsDict']] = None,
+ cainjector: Optional[pulumi.Input[Union['CertManagerCaInjectorArgs', 'CertManagerCaInjectorArgsDict']]] = None,
cluster_resource_namespace: Optional[pulumi.Input[str]] = None,
container_security_context: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.SecurityContextArgs']]] = None,
deployment_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
@@ -561,7 +561,7 @@ class CertManager(pulumi.ComponentResource):
resource_name: str,
opts: Optional[pulumi.ResourceOptions] = None,
affinity: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.AffinityArgs']]] = None,
- cainjector: Optional[Union['CertManagerCaInjectorArgs', 'CertManagerCaInjectorArgsDict']] = None,
+ cainjector: Optional[pulumi.Input[Union['CertManagerCaInjectorArgs', 'CertManagerCaInjectorArgsDict']]] = None,
cluster_resource_namespace: Optional[pulumi.Input[str]] = None,
container_security_context: Optional[pulumi.Input[pulumi.InputType['pulumi_kubernetes.core.v1.SecurityContextArgs']]] = None,
deployment_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
build_sdks (python)
Unexpected changes detected: 1. See file annotations for details.
|
Unexpected file modified:
sdk/go/kubernetes-cert-manager/certManager.go#L1
File modified:
@@ -88,7 +88,7 @@ type certManagerArgs struct {
// The set of arguments for constructing a CertManager resource.
type CertManagerArgs struct {
Affinity corev1.AffinityPtrInput
- Cainjector *CertManagerCaInjectorArgs
+ Cainjector CertManagerCaInjectorPtrInput
// Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources. By default, the same namespace as cert-manager is deployed within is used. This namespace will not be automatically created by the Helm chart.
ClusterResourceNamespace pulumi.StringPtrInput
// Container Security Context to be set on the controller component container. ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
@@ -104,10 +104,10 @@ type CertManagerArgs struct {
FeatureGates pulumi.StringPtrInput
Global *CertManagerGlobalArgs
// HelmOptions is an escape hatch that lets the end user control any aspect of the Helm deployment. This exposes the entirety of the underlying Helm Release component args.
- HelmOptions ReleasePtrInput
+ HelmOptions *ReleaseArgs
Http_proxy pulumi.StringPtrInput
Https_proxy pulumi.StringPtrInput
- Image *CertManagerImageArgs
+ Image CertManagerImagePtrInput
IngressShim *CertManagerIngressShimArgs
InstallCRDs pulumi.BoolPtrInput
No_proxy pulumi.StringArrayInput
|
Unexpected file modified:
sdk/go/kubernetes-cert-manager/pulumiTypes.go#L1
File modified:
@@ -57,9 +57,9 @@ type CertManagerCaInjectorArgs struct {
// Optional additional annotations to add to the cainjector Deployment
DeploymentAnnotations pulumi.StringMapInput `pulumi:"deploymentAnnotations"`
// Optional additional arguments for cainjector
- ExtraArgs pulumi.StringArrayInput `pulumi:"extraArgs"`
- Image *CertManagerImageArgs `pulumi:"image"`
- NodeSelector pulumi.StringMapInput `pulumi:"nodeSelector"`
+ ExtraArgs pulumi.StringArrayInput `pulumi:"extraArgs"`
+ Image CertManagerImagePtrInput `pulumi:"image"`
+ NodeSelector pulumi.StringMapInput `pulumi:"nodeSelector"`
// Optional additional annotations to add to the cainjector Pods
PodAnnotations pulumi.StringMapInput `pulumi:"podAnnotations"`
// Optional additional labels to add to the Webhook Pods
@@ -2037,8 +2037,8 @@ type CertManagerStartupAPICheckArgs struct {
BackoffLimit pulumi.IntPtrInput `pulumi:"backoffLimit"`
Enabled pulumi.BoolPtrInput `pulumi:"enabled"`
// Optional additional arguments for startupapicheck
- ExtraArgs pulumi.StringArrayInput `pulumi:"extraArgs"`
- Image *CertManagerImageArgs `pulumi:"image"`
+ ExtraArgs pulumi.StringArrayInput `pulumi:"extraArgs"`
+ Image CertManagerImagePtrInput `pulumi:"image"`
// Optional additional annotations to add to the startupapicheck Job
JobAnnotations pulumi.StringMapInput `pulumi:"jobAnnotations"`
NodeSelector pulumi.StringMapInput `pulumi:"nodeSelector"`
@@ -2568,8 +2568,8 @@ type CertManagerWebhookArgs struct {
// Optional additional arguments for webhook
ExtraArgs pulumi.StringArrayInput `pulumi:"extraArgs"`
// Specifies if the webhook should be started in hostNetwork mode. Required for use in some managed kubernetes clusters (such as AWS EKS) with custom CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
- HostNetwork pulumi.BoolPtrInput `pulumi:"hostNetwork"`
- Image *CertManagerImageArgs `pulumi:"image"`
+ HostNetwork pulumi.BoolPtrInput `pulumi:"hostNetwork"`
+ Image CertManagerImagePtrInput `pulumi:"image"`
// Liveness probe values. Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
LivenessProbe corev1.ProbePtrInput `pulumi:"livenessProbe"`
LoadBalancerIP pulumi.StringPtrInput `pulumi:"loadBalancerIP"`
|
build_sdks (go)
Unexpected changes detected: 2. See file annotations for details.
|
build_sdks (dotnet)
The job was canceled because "python" failed.
|
build_sdks (dotnet)
The operation was canceled.
|
build_sdks (java)
The job was canceled because "python" failed.
|
build_sdks (java)
The operation was canceled.
|
build_sdks (nodejs)
The job was canceled because "python" failed.
|
build_sdks (nodejs)
The operation was canceled.
|
lint
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
prerequisites
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
build_sdks (python)
This job uses deprecated functionality from the 'gradle/gradle-build-action' action. Consult the Job Summary for more details.
|
build_sdks (go)
This job uses deprecated functionality from the 'gradle/gradle-build-action' action. Consult the Job Summary for more details.
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
pulumi-kubernetes-cert-manager-provider.tar.gz
|
32.5 MB |
|