Skip to content

Commit f5362d4

Browse files
committed
Update kubevault graph
Signed-off-by: Tamal Saha <[email protected]>
1 parent 977be36 commit f5362d4

35 files changed

+961
-160
lines changed

go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ require (
4343
kmodules.xyz/custom-resources v0.25.1
4444
kmodules.xyz/go-containerregistry v0.0.11
4545
kmodules.xyz/monitoring-agent-api v0.25.1
46-
kmodules.xyz/resource-metadata v0.17.13-0.20230821151032-9c8a53c64c49
46+
kmodules.xyz/resource-metadata v0.17.13-0.20230822090641-4d20a61253c0
4747
kmodules.xyz/resource-metrics v0.25.2
4848
kmodules.xyz/sets v0.25.0
4949
kubeops.dev/scanner v0.0.13-0.20230610152531-83d060ed8780

go.sum

+2-2
Original file line numberDiff line numberDiff line change
@@ -2122,8 +2122,8 @@ kmodules.xyz/monitoring-agent-api v0.25.1 h1:E1H8U/vMfYQ8wevmJv6Lcj0Z4DF7cH3hZ2x
21222122
kmodules.xyz/monitoring-agent-api v0.25.1/go.mod h1:IphGzRWbuV00B3TLalcBs6+IlchSZVTwKDty+J3LLz4=
21232123
kmodules.xyz/offshoot-api v0.25.0 h1:Svq9da/+sg5afOjpgo9vx2J/Lu90Mo0aFxkdQmgKnGI=
21242124
kmodules.xyz/offshoot-api v0.25.0/go.mod h1:ysEBn7LJuT3+s8ynAQA/OG0BSsJugXa6KGtDLMRjlKo=
2125-
kmodules.xyz/resource-metadata v0.17.13-0.20230821151032-9c8a53c64c49 h1:IQqV1WMsSoleK//jxbAJkKqg/pohkFyiZWE4SlWOzeE=
2126-
kmodules.xyz/resource-metadata v0.17.13-0.20230821151032-9c8a53c64c49/go.mod h1:HQRA160+DS1rW4cqIuIT99rz94cl0EcICmkoIpuobSg=
2125+
kmodules.xyz/resource-metadata v0.17.13-0.20230822090641-4d20a61253c0 h1:bDcAb0UtF+EsMbwaSqvMrux2P/b00bj2PNLAMrynl9o=
2126+
kmodules.xyz/resource-metadata v0.17.13-0.20230822090641-4d20a61253c0/go.mod h1:HQRA160+DS1rW4cqIuIT99rz94cl0EcICmkoIpuobSg=
21272127
kmodules.xyz/resource-metrics v0.25.2 h1:BwCb6qyunvQBa0u8UUkw+wYG5/T4qtNtAKcHjSsk0JU=
21282128
kmodules.xyz/resource-metrics v0.25.2/go.mod h1:ZK/52NLuwMk+Jt0bmUtGQHtSxPLYYpsFILG7SJhYPg0=
21292129
kmodules.xyz/sets v0.25.0 h1:belY/3trp/M/CKc1TEteA40jb2uCIdwKHhjpvrIxG+8=

vendor/kmodules.xyz/resource-metadata/hub/resourceblockdefinitions/engine.kubevault.com/v1alpha1/elasticsearchroles.yaml

+37-5
Original file line numberDiff line numberDiff line change
@@ -14,24 +14,56 @@ spec:
1414
create: Never
1515
displayMode: List
1616
kind: Connection
17-
name: SecretAccessRequests
17+
name: Elasticsearch
1818
query:
19-
byLabel: offshoot
19+
byLabel: authz
2020
type: GraphQL
2121
ref:
22-
group: engine.kubevault.com
23-
kind: SecretAccessRequest
22+
group: kubedb.com
23+
kind: Elasticsearch
24+
- actions:
25+
create: Never
26+
displayMode: List
27+
kind: Connection
28+
name: VaultServers
29+
query:
30+
raw: |-
31+
query Find($src: String!, $targetGroup: String!, $targetKind: String!) {
32+
find(oid: $src) {
33+
authz(group: "engine.kubevault.com", kind: "SecretEngine") {
34+
refs: offshoot(group: $targetGroup, kind: $targetKind) {
35+
namespace
36+
name
37+
}
38+
}
39+
}
40+
}
41+
type: GraphQL
42+
ref:
43+
group: kubevault.com
44+
kind: VaultServer
2445
- actions:
2546
create: Never
2647
displayMode: List
2748
kind: Connection
2849
name: SecretEngine
2950
query:
30-
byLabel: offshoot
51+
byLabel: authz
3152
type: GraphQL
3253
ref:
3354
group: engine.kubevault.com
3455
kind: SecretEngine
56+
- actions:
57+
create: Never
58+
displayMode: List
59+
kind: Connection
60+
name: SecretAccessRequests
61+
query:
62+
byLabel: authz
63+
type: GraphQL
64+
ref:
65+
group: engine.kubevault.com
66+
kind: SecretAccessRequest
3567
resource:
3668
group: engine.kubevault.com
3769
kind: ElasticsearchRole

vendor/kmodules.xyz/resource-metadata/hub/resourceblockdefinitions/engine.kubevault.com/v1alpha1/mariadbroles.yaml

+37-5
Original file line numberDiff line numberDiff line change
@@ -14,24 +14,56 @@ spec:
1414
create: Never
1515
displayMode: List
1616
kind: Connection
17-
name: SecretAccessRequests
17+
name: MariaDB
1818
query:
19-
byLabel: offshoot
19+
byLabel: authz
2020
type: GraphQL
2121
ref:
22-
group: engine.kubevault.com
23-
kind: SecretAccessRequest
22+
group: kubedb.com
23+
kind: MariaDB
24+
- actions:
25+
create: Never
26+
displayMode: List
27+
kind: Connection
28+
name: VaultServers
29+
query:
30+
raw: |-
31+
query Find($src: String!, $targetGroup: String!, $targetKind: String!) {
32+
find(oid: $src) {
33+
authz(group: "engine.kubevault.com", kind: "SecretEngine") {
34+
refs: offshoot(group: $targetGroup, kind: $targetKind) {
35+
namespace
36+
name
37+
}
38+
}
39+
}
40+
}
41+
type: GraphQL
42+
ref:
43+
group: kubevault.com
44+
kind: VaultServer
2445
- actions:
2546
create: Never
2647
displayMode: List
2748
kind: Connection
2849
name: SecretEngine
2950
query:
30-
byLabel: offshoot
51+
byLabel: authz
3152
type: GraphQL
3253
ref:
3354
group: engine.kubevault.com
3455
kind: SecretEngine
56+
- actions:
57+
create: Never
58+
displayMode: List
59+
kind: Connection
60+
name: SecretAccessRequests
61+
query:
62+
byLabel: authz
63+
type: GraphQL
64+
ref:
65+
group: engine.kubevault.com
66+
kind: SecretAccessRequest
3567
resource:
3668
group: engine.kubevault.com
3769
kind: MariaDBRole

vendor/kmodules.xyz/resource-metadata/hub/resourceblockdefinitions/engine.kubevault.com/v1alpha1/mongodbroles.yaml

+37-5
Original file line numberDiff line numberDiff line change
@@ -14,24 +14,56 @@ spec:
1414
create: Never
1515
displayMode: List
1616
kind: Connection
17-
name: SecretAccessRequests
17+
name: MongoDB
1818
query:
19-
byLabel: offshoot
19+
byLabel: authz
2020
type: GraphQL
2121
ref:
22-
group: engine.kubevault.com
23-
kind: SecretAccessRequest
22+
group: kubedb.com
23+
kind: MongoDB
24+
- actions:
25+
create: Never
26+
displayMode: List
27+
kind: Connection
28+
name: VaultServers
29+
query:
30+
raw: |-
31+
query Find($src: String!, $targetGroup: String!, $targetKind: String!) {
32+
find(oid: $src) {
33+
authz(group: "engine.kubevault.com", kind: "SecretEngine") {
34+
refs: offshoot(group: $targetGroup, kind: $targetKind) {
35+
namespace
36+
name
37+
}
38+
}
39+
}
40+
}
41+
type: GraphQL
42+
ref:
43+
group: kubevault.com
44+
kind: VaultServer
2445
- actions:
2546
create: Never
2647
displayMode: List
2748
kind: Connection
2849
name: SecretEngine
2950
query:
30-
byLabel: offshoot
51+
byLabel: authz
3152
type: GraphQL
3253
ref:
3354
group: engine.kubevault.com
3455
kind: SecretEngine
56+
- actions:
57+
create: Never
58+
displayMode: List
59+
kind: Connection
60+
name: SecretAccessRequests
61+
query:
62+
byLabel: authz
63+
type: GraphQL
64+
ref:
65+
group: engine.kubevault.com
66+
kind: SecretAccessRequest
3567
resource:
3668
group: engine.kubevault.com
3769
kind: MongoDBRole

vendor/kmodules.xyz/resource-metadata/hub/resourceblockdefinitions/engine.kubevault.com/v1alpha1/mysqlroles.yaml

+37-5
Original file line numberDiff line numberDiff line change
@@ -14,24 +14,56 @@ spec:
1414
create: Never
1515
displayMode: List
1616
kind: Connection
17-
name: SecretAccessRequests
17+
name: MySQL
1818
query:
19-
byLabel: offshoot
19+
byLabel: authz
2020
type: GraphQL
2121
ref:
22-
group: engine.kubevault.com
23-
kind: SecretAccessRequest
22+
group: kubedb.com
23+
kind: MySQL
24+
- actions:
25+
create: Never
26+
displayMode: List
27+
kind: Connection
28+
name: VaultServers
29+
query:
30+
raw: |-
31+
query Find($src: String!, $targetGroup: String!, $targetKind: String!) {
32+
find(oid: $src) {
33+
authz(group: "engine.kubevault.com", kind: "SecretEngine") {
34+
refs: offshoot(group: $targetGroup, kind: $targetKind) {
35+
namespace
36+
name
37+
}
38+
}
39+
}
40+
}
41+
type: GraphQL
42+
ref:
43+
group: kubevault.com
44+
kind: VaultServer
2445
- actions:
2546
create: Never
2647
displayMode: List
2748
kind: Connection
2849
name: SecretEngine
2950
query:
30-
byLabel: offshoot
51+
byLabel: authz
3152
type: GraphQL
3253
ref:
3354
group: engine.kubevault.com
3455
kind: SecretEngine
56+
- actions:
57+
create: Never
58+
displayMode: List
59+
kind: Connection
60+
name: SecretAccessRequests
61+
query:
62+
byLabel: authz
63+
type: GraphQL
64+
ref:
65+
group: engine.kubevault.com
66+
kind: SecretAccessRequest
3567
resource:
3668
group: engine.kubevault.com
3769
kind: MySQLRole

vendor/kmodules.xyz/resource-metadata/hub/resourceblockdefinitions/engine.kubevault.com/v1alpha1/postgresroles.yaml

+37-5
Original file line numberDiff line numberDiff line change
@@ -14,24 +14,56 @@ spec:
1414
create: Never
1515
displayMode: List
1616
kind: Connection
17-
name: SecretAccessRequests
17+
name: Postgres
1818
query:
19-
byLabel: offshoot
19+
byLabel: authz
2020
type: GraphQL
2121
ref:
22-
group: engine.kubevault.com
23-
kind: SecretAccessRequest
22+
group: kubedb.com
23+
kind: Postgres
24+
- actions:
25+
create: Never
26+
displayMode: List
27+
kind: Connection
28+
name: VaultServers
29+
query:
30+
raw: |-
31+
query Find($src: String!, $targetGroup: String!, $targetKind: String!) {
32+
find(oid: $src) {
33+
authz(group: "engine.kubevault.com", kind: "SecretEngine") {
34+
refs: offshoot(group: $targetGroup, kind: $targetKind) {
35+
namespace
36+
name
37+
}
38+
}
39+
}
40+
}
41+
type: GraphQL
42+
ref:
43+
group: kubevault.com
44+
kind: VaultServer
2445
- actions:
2546
create: Never
2647
displayMode: List
2748
kind: Connection
2849
name: SecretEngine
2950
query:
30-
byLabel: offshoot
51+
byLabel: authz
3152
type: GraphQL
3253
ref:
3354
group: engine.kubevault.com
3455
kind: SecretEngine
56+
- actions:
57+
create: Never
58+
displayMode: List
59+
kind: Connection
60+
name: SecretAccessRequests
61+
query:
62+
byLabel: authz
63+
type: GraphQL
64+
ref:
65+
group: engine.kubevault.com
66+
kind: SecretAccessRequest
3567
resource:
3668
group: engine.kubevault.com
3769
kind: PostgresRole

vendor/kmodules.xyz/resource-metadata/hub/resourceblockdefinitions/engine.kubevault.com/v1alpha1/redisroles.yaml

+37-5
Original file line numberDiff line numberDiff line change
@@ -14,24 +14,56 @@ spec:
1414
create: Never
1515
displayMode: List
1616
kind: Connection
17-
name: SecretAccessRequests
17+
name: Redis
1818
query:
19-
byLabel: offshoot
19+
byLabel: authz
2020
type: GraphQL
2121
ref:
22-
group: engine.kubevault.com
23-
kind: SecretAccessRequest
22+
group: kubedb.com
23+
kind: Redis
24+
- actions:
25+
create: Never
26+
displayMode: List
27+
kind: Connection
28+
name: VaultServers
29+
query:
30+
raw: |-
31+
query Find($src: String!, $targetGroup: String!, $targetKind: String!) {
32+
find(oid: $src) {
33+
authz(group: "engine.kubevault.com", kind: "SecretEngine") {
34+
refs: offshoot(group: $targetGroup, kind: $targetKind) {
35+
namespace
36+
name
37+
}
38+
}
39+
}
40+
}
41+
type: GraphQL
42+
ref:
43+
group: kubevault.com
44+
kind: VaultServer
2445
- actions:
2546
create: Never
2647
displayMode: List
2748
kind: Connection
2849
name: SecretEngine
2950
query:
30-
byLabel: offshoot
51+
byLabel: authz
3152
type: GraphQL
3253
ref:
3354
group: engine.kubevault.com
3455
kind: SecretEngine
56+
- actions:
57+
create: Never
58+
displayMode: List
59+
kind: Connection
60+
name: SecretAccessRequests
61+
query:
62+
byLabel: authz
63+
type: GraphQL
64+
ref:
65+
group: engine.kubevault.com
66+
kind: SecretAccessRequest
3567
resource:
3668
group: engine.kubevault.com
3769
kind: RedisRole

0 commit comments

Comments
 (0)