# THIS FILE WAS AUTO GENERATED FROM THE K8S SWAGGER SPEC require "yaml" require "json" ::K8S::Kubernetes::Resource.define_object("CertificateSigningRequestSpec", namespace: "::K8S::Api::Certificates::V1beta1", properties: [ {name: "extra", kind: ::Hash(String, ::Array(String)), key: "extra", nilable: true, read_only: false, description: "Extra information about the requesting user. See user.Info interface for details."}, {name: "groups", kind: ::Array(String), key: "groups", nilable: true, read_only: false, description: "Group information about the requesting user. See user.Info interface for details."}, {name: "request", kind: String, key: "request", nilable: false, read_only: false, description: "Base64-encoded PKCS#10 CSR data"}, {name: "signer_name", kind: String, key: "signerName", nilable: true, read_only: false, description: "Requested signer for the request. It is a qualified name in the form: [`scope-hostname.io/name`. If empty, it will be defaulted:](`scope-hostname.io/name`. If empty, it will be defaulted:)\n 1. If it's a kubelet client certificate, it is assigned\n [\"kubernetes.io/kube-apiserver-client-kubelet\".](\"kubernetes.io/kube-apiserver-client-kubelet\".)\n 2. If it's a kubelet serving certificate, it is assigned\n [\"kubernetes.io/kubelet-serving\".](\"kubernetes.io/kubelet-serving\".)\n 3. Otherwise, it is assigned [\"kubernetes.io/legacy-unknown\".](\"kubernetes.io/legacy-unknown\".)\nDistribution of trust for signers happens out of band. You can select on this field using `spec.signerName`."}, {name: "uid", kind: String, key: "uid", nilable: true, read_only: false, description: "UID information about the requesting user. See user.Info interface for details."}, {name: "usages", kind: ::Array(String), key: "usages", nilable: true, read_only: false, description: "allowedUsages specifies a set of usage contexts the key will be valid for. See: [https://tools.ietf.org/html/rfc5280#section-4.2.1.3](https://tools.ietf.org/html/rfc5280#section-4.2.1.3)\n [https://tools.ietf.org/html/rfc5280#section-4.2.1.12](https://tools.ietf.org/html/rfc5280#section-4.2.1.12)\nValid values are:\n \"signing\",\n \"digital signature\",\n \"content commitment\",\n \"key encipherment\",\n \"key agreement\",\n \"data encipherment\",\n \"cert sign\",\n \"crl sign\",\n \"encipher only\",\n \"decipher only\",\n \"any\",\n \"server auth\",\n \"client auth\",\n \"code signing\",\n \"email protection\",\n [\"s/mime\",](\"s/mime\",)\n \"ipsec end system\",\n \"ipsec tunnel\",\n \"ipsec user\",\n \"timestamping\",\n \"ocsp signing\",\n \"microsoft sgc\",\n \"netscape sgc\""}, {name: "username", kind: String, key: "username", nilable: true, read_only: false, description: "Information about the requesting user. See user.Info interface for details."}, ] )