fix(k8s): fix preffered version ordering

This commit is contained in:
Jaka Hudoklin 2019-02-28 14:02:25 +01:00
parent 9ee7262465
commit 9aa861350c
No known key found for this signature in database
GPG key ID: 6A08896BFD32BD95
8 changed files with 318 additions and 319 deletions

View file

@ -29187,7 +29187,7 @@ in {
} // { } // {
"apiservices" = mkOption { "apiservices" = mkOption {
description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\"."; description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\".";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1beta1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29205,13 +29205,13 @@ in {
"clusterroles" = mkOption { "clusterroles" = mkOption {
description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"clusterrolebindings" = mkOption { "clusterrolebindings" = mkOption {
description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29222,14 +29222,14 @@ in {
}; };
"controllerrevisions" = mkOption { "controllerrevisions" = mkOption {
description = "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1beta2/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1"));
default = {}; default = {};
}; };
"cronjobs" = mkOption { "cronjobs" = mkOption {
description = "CronJob represents the configuration of a single cron job."; description = "CronJob represents the configuration of a single cron job.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v1beta1.CronJob" "cronjobs" "CronJob" "batch" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1"));
default = {}; default = {};
}; };
@ -29240,14 +29240,14 @@ in {
}; };
"daemonsets" = mkOption { "daemonsets" = mkOption {
description = "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set."; description = "DaemonSet represents the configuration of a daemon set.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.DaemonSet" "daemonsets" "DaemonSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" "v1"));
default = {}; default = {};
}; };
"deployments" = mkOption { "deployments" = mkOption {
description = "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets."; description = "Deployment enables declarative updates for Pods and ReplicaSets.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.Deployment" "deployments" "Deployment" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.Deployment" "deployments" "Deployment" "apps" "v1"));
default = {}; default = {};
}; };
@ -29264,8 +29264,8 @@ in {
}; };
"events" = mkOption { "events" = mkOption {
description = "Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system."; description = "Event is a report of an event somewhere in the cluster.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.events.v1beta1.Event" "events" "Event" "events.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.Event" "events" "Event" "core" "v1"));
default = {}; default = {};
}; };
@ -29276,8 +29276,8 @@ in {
}; };
"horizontalpodautoscalers" = mkOption { "horizontalpodautoscalers" = mkOption {
description = "configuration of a horizontal pod autoscaler."; description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v2beta1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v2beta1"));
default = {}; default = {};
}; };
@ -29307,7 +29307,7 @@ in {
"localsubjectaccessreviews" = mkOption { "localsubjectaccessreviews" = mkOption {
description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29324,8 +29324,8 @@ in {
}; };
"networkpolicies" = mkOption { "networkpolicies" = mkOption {
description = "DEPRECATED 1.9 - This group version of NetworkPolicy is deprecated by networking/v1/NetworkPolicy. NetworkPolicy describes what network traffic is allowed for a set of Pods"; description = "NetworkPolicy describes what network traffic is allowed for a set of Pods";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "networking.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29384,8 +29384,8 @@ in {
}; };
"replicasets" = mkOption { "replicasets" = mkOption {
description = "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for more information. ReplicaSet ensures that a specified number of pod replicas are running at any given time."; description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.ReplicaSet" "replicasets" "ReplicaSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ReplicaSet" "replicasets" "ReplicaSet" "apps" "v1"));
default = {}; default = {};
}; };
@ -29403,13 +29403,13 @@ in {
"roles" = mkOption { "roles" = mkOption {
description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding."; description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"rolebindings" = mkOption { "rolebindings" = mkOption {
description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29421,13 +29421,13 @@ in {
"selfsubjectaccessreviews" = mkOption { "selfsubjectaccessreviews" = mkOption {
description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action"; description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"selfsubjectrulesreviews" = mkOption { "selfsubjectrulesreviews" = mkOption {
description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29444,26 +29444,26 @@ in {
}; };
"statefulsets" = mkOption { "statefulsets" = mkOption {
description = "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1beta2/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity."; description = "StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1"));
default = {}; default = {};
}; };
"storageclasses" = mkOption { "storageclasses" = mkOption {
description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name."; description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
"subjectaccessreviews" = mkOption { "subjectaccessreviews" = mkOption {
description = "SubjectAccessReview checks whether or not a user or group can perform an action."; description = "SubjectAccessReview checks whether or not a user or group can perform an action.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"tokenreviews" = mkOption { "tokenreviews" = mkOption {
description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1beta1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29475,43 +29475,43 @@ in {
"volumeattachments" = mkOption { "volumeattachments" = mkOption {
description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced."; description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1alpha1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
}; };
config = { config = {
"apiregistration.k8s.io"."v1beta1"."APIService" = config."apiservices"; "apiregistration.k8s.io"."v1"."APIService" = config."apiservices";
"core"."v1"."Binding" = config."bindings"; "core"."v1"."Binding" = config."bindings";
"certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests"; "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRole" = config."clusterroles"; "rbac.authorization.k8s.io"."v1"."ClusterRole" = config."clusterroles";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRoleBinding" = config."clusterrolebindings"; "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = config."clusterrolebindings";
"core"."v1"."ConfigMap" = config."configmaps"; "core"."v1"."ConfigMap" = config."configmaps";
"apps"."v1beta1"."ControllerRevision" = config."controllerrevisions"; "apps"."v1"."ControllerRevision" = config."controllerrevisions";
"batch"."v1beta1"."CronJob" = config."cronjobs"; "batch"."v2alpha1"."CronJob" = config."cronjobs";
"apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions"; "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions";
"extensions"."v1beta1"."DaemonSet" = config."daemonsets"; "apps"."v1"."DaemonSet" = config."daemonsets";
"apps"."v1beta1"."Deployment" = config."deployments"; "apps"."v1"."Deployment" = config."deployments";
"apps"."v1beta1"."DeploymentRollback" = config."rollback"; "apps"."v1beta1"."DeploymentRollback" = config."rollback";
"core"."v1"."Endpoints" = config."endpoints"; "core"."v1"."Endpoints" = config."endpoints";
"events.k8s.io"."v1beta1"."Event" = config."events"; "core"."v1"."Event" = config."events";
"policy"."v1beta1"."Eviction" = config."eviction"; "policy"."v1beta1"."Eviction" = config."eviction";
"autoscaling"."v1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers"; "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers";
"extensions"."v1beta1"."Ingress" = config."ingresses"; "extensions"."v1beta1"."Ingress" = config."ingresses";
@ -29521,13 +29521,13 @@ in {
"core"."v1"."LimitRange" = config."limitranges"; "core"."v1"."LimitRange" = config."limitranges";
"authorization.k8s.io"."v1beta1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews"; "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews";
"admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations";
"core"."v1"."Namespace" = config."namespaces"; "core"."v1"."Namespace" = config."namespaces";
"extensions"."v1beta1"."NetworkPolicy" = config."networkpolicies"; "networking.k8s.io"."v1"."NetworkPolicy" = config."networkpolicies";
"core"."v1"."Node" = config."nodes"; "core"."v1"."Node" = config."nodes";
@ -29547,37 +29547,37 @@ in {
"scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses"; "scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses";
"extensions"."v1beta1"."ReplicaSet" = config."replicasets"; "apps"."v1"."ReplicaSet" = config."replicasets";
"core"."v1"."ReplicationController" = config."replicationcontrollers"; "core"."v1"."ReplicationController" = config."replicationcontrollers";
"core"."v1"."ResourceQuota" = config."resourcequotas"; "core"."v1"."ResourceQuota" = config."resourcequotas";
"rbac.authorization.k8s.io"."v1alpha1"."Role" = config."roles"; "rbac.authorization.k8s.io"."v1"."Role" = config."roles";
"rbac.authorization.k8s.io"."v1alpha1"."RoleBinding" = config."rolebindings"; "rbac.authorization.k8s.io"."v1"."RoleBinding" = config."rolebindings";
"core"."v1"."Secret" = config."secrets"; "core"."v1"."Secret" = config."secrets";
"authorization.k8s.io"."v1beta1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews"; "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews";
"authorization.k8s.io"."v1beta1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews"; "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews";
"core"."v1"."Service" = config."services"; "core"."v1"."Service" = config."services";
"core"."v1"."ServiceAccount" = config."serviceaccounts"; "core"."v1"."ServiceAccount" = config."serviceaccounts";
"apps"."v1beta1"."StatefulSet" = config."statefulsets"; "apps"."v1"."StatefulSet" = config."statefulsets";
"storage.k8s.io"."v1beta1"."StorageClass" = config."storageclasses"; "storage.k8s.io"."v1"."StorageClass" = config."storageclasses";
"authorization.k8s.io"."v1beta1"."SubjectAccessReview" = config."subjectaccessreviews"; "authorization.k8s.io"."v1"."SubjectAccessReview" = config."subjectaccessreviews";
"authentication.k8s.io"."v1beta1"."TokenReview" = config."tokenreviews"; "authentication.k8s.io"."v1"."TokenReview" = config."tokenreviews";
"admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations";
"storage.k8s.io"."v1alpha1"."VolumeAttachment" = config."volumeattachments"; "storage.k8s.io"."v1beta1"."VolumeAttachment" = config."volumeattachments";
} // { } // {
inherit definitions; inherit definitions;

View file

@ -29720,7 +29720,7 @@ in {
} // { } // {
"apiservices" = mkOption { "apiservices" = mkOption {
description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\"."; description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\".";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1beta1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29738,13 +29738,13 @@ in {
"clusterroles" = mkOption { "clusterroles" = mkOption {
description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"clusterrolebindings" = mkOption { "clusterrolebindings" = mkOption {
description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29755,14 +29755,14 @@ in {
}; };
"controllerrevisions" = mkOption { "controllerrevisions" = mkOption {
description = "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1beta2/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1"));
default = {}; default = {};
}; };
"cronjobs" = mkOption { "cronjobs" = mkOption {
description = "CronJob represents the configuration of a single cron job."; description = "CronJob represents the configuration of a single cron job.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v1beta1.CronJob" "cronjobs" "CronJob" "batch" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1"));
default = {}; default = {};
}; };
@ -29773,14 +29773,14 @@ in {
}; };
"daemonsets" = mkOption { "daemonsets" = mkOption {
description = "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set."; description = "DaemonSet represents the configuration of a daemon set.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.DaemonSet" "daemonsets" "DaemonSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" "v1"));
default = {}; default = {};
}; };
"deployments" = mkOption { "deployments" = mkOption {
description = "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets."; description = "Deployment enables declarative updates for Pods and ReplicaSets.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.Deployment" "deployments" "Deployment" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.Deployment" "deployments" "Deployment" "apps" "v1"));
default = {}; default = {};
}; };
@ -29797,8 +29797,8 @@ in {
}; };
"events" = mkOption { "events" = mkOption {
description = "Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system."; description = "Event is a report of an event somewhere in the cluster.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.events.v1beta1.Event" "events" "Event" "events.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.Event" "events" "Event" "core" "v1"));
default = {}; default = {};
}; };
@ -29809,8 +29809,8 @@ in {
}; };
"horizontalpodautoscalers" = mkOption { "horizontalpodautoscalers" = mkOption {
description = "configuration of a horizontal pod autoscaler."; description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v2beta1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v2beta1"));
default = {}; default = {};
}; };
@ -29840,7 +29840,7 @@ in {
"localsubjectaccessreviews" = mkOption { "localsubjectaccessreviews" = mkOption {
description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29857,8 +29857,8 @@ in {
}; };
"networkpolicies" = mkOption { "networkpolicies" = mkOption {
description = "DEPRECATED 1.9 - This group version of NetworkPolicy is deprecated by networking/v1/NetworkPolicy. NetworkPolicy describes what network traffic is allowed for a set of Pods"; description = "NetworkPolicy describes what network traffic is allowed for a set of Pods";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "networking.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29912,13 +29912,13 @@ in {
"priorityclasses" = mkOption { "priorityclasses" = mkOption {
description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.scheduling.v1alpha1.PriorityClass" "priorityclasses" "PriorityClass" "scheduling.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.scheduling.v1beta1.PriorityClass" "priorityclasses" "PriorityClass" "scheduling.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
"replicasets" = mkOption { "replicasets" = mkOption {
description = "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for more information. ReplicaSet ensures that a specified number of pod replicas are running at any given time."; description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.ReplicaSet" "replicasets" "ReplicaSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ReplicaSet" "replicasets" "ReplicaSet" "apps" "v1"));
default = {}; default = {};
}; };
@ -29936,13 +29936,13 @@ in {
"roles" = mkOption { "roles" = mkOption {
description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding."; description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"rolebindings" = mkOption { "rolebindings" = mkOption {
description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29954,13 +29954,13 @@ in {
"selfsubjectaccessreviews" = mkOption { "selfsubjectaccessreviews" = mkOption {
description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action"; description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"selfsubjectrulesreviews" = mkOption { "selfsubjectrulesreviews" = mkOption {
description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -29977,26 +29977,26 @@ in {
}; };
"statefulsets" = mkOption { "statefulsets" = mkOption {
description = "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1beta2/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity."; description = "StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1"));
default = {}; default = {};
}; };
"storageclasses" = mkOption { "storageclasses" = mkOption {
description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name."; description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
"subjectaccessreviews" = mkOption { "subjectaccessreviews" = mkOption {
description = "SubjectAccessReview checks whether or not a user or group can perform an action."; description = "SubjectAccessReview checks whether or not a user or group can perform an action.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"tokenreviews" = mkOption { "tokenreviews" = mkOption {
description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1beta1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30008,43 +30008,43 @@ in {
"volumeattachments" = mkOption { "volumeattachments" = mkOption {
description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced."; description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1alpha1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
}; };
config = { config = {
"apiregistration.k8s.io"."v1beta1"."APIService" = config."apiservices"; "apiregistration.k8s.io"."v1"."APIService" = config."apiservices";
"core"."v1"."Binding" = config."bindings"; "core"."v1"."Binding" = config."bindings";
"certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests"; "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRole" = config."clusterroles"; "rbac.authorization.k8s.io"."v1"."ClusterRole" = config."clusterroles";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRoleBinding" = config."clusterrolebindings"; "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = config."clusterrolebindings";
"core"."v1"."ConfigMap" = config."configmaps"; "core"."v1"."ConfigMap" = config."configmaps";
"apps"."v1beta1"."ControllerRevision" = config."controllerrevisions"; "apps"."v1"."ControllerRevision" = config."controllerrevisions";
"batch"."v1beta1"."CronJob" = config."cronjobs"; "batch"."v2alpha1"."CronJob" = config."cronjobs";
"apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions"; "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions";
"extensions"."v1beta1"."DaemonSet" = config."daemonsets"; "apps"."v1"."DaemonSet" = config."daemonsets";
"apps"."v1beta1"."Deployment" = config."deployments"; "apps"."v1"."Deployment" = config."deployments";
"apps"."v1beta1"."DeploymentRollback" = config."rollback"; "apps"."v1beta1"."DeploymentRollback" = config."rollback";
"core"."v1"."Endpoints" = config."endpoints"; "core"."v1"."Endpoints" = config."endpoints";
"events.k8s.io"."v1beta1"."Event" = config."events"; "core"."v1"."Event" = config."events";
"policy"."v1beta1"."Eviction" = config."eviction"; "policy"."v1beta1"."Eviction" = config."eviction";
"autoscaling"."v1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers"; "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers";
"extensions"."v1beta1"."Ingress" = config."ingresses"; "extensions"."v1beta1"."Ingress" = config."ingresses";
@ -30054,13 +30054,13 @@ in {
"core"."v1"."LimitRange" = config."limitranges"; "core"."v1"."LimitRange" = config."limitranges";
"authorization.k8s.io"."v1beta1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews"; "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews";
"admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations";
"core"."v1"."Namespace" = config."namespaces"; "core"."v1"."Namespace" = config."namespaces";
"extensions"."v1beta1"."NetworkPolicy" = config."networkpolicies"; "networking.k8s.io"."v1"."NetworkPolicy" = config."networkpolicies";
"core"."v1"."Node" = config."nodes"; "core"."v1"."Node" = config."nodes";
@ -30078,39 +30078,39 @@ in {
"core"."v1"."PodTemplate" = config."podtemplates"; "core"."v1"."PodTemplate" = config."podtemplates";
"scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses"; "scheduling.k8s.io"."v1beta1"."PriorityClass" = config."priorityclasses";
"extensions"."v1beta1"."ReplicaSet" = config."replicasets"; "apps"."v1"."ReplicaSet" = config."replicasets";
"core"."v1"."ReplicationController" = config."replicationcontrollers"; "core"."v1"."ReplicationController" = config."replicationcontrollers";
"core"."v1"."ResourceQuota" = config."resourcequotas"; "core"."v1"."ResourceQuota" = config."resourcequotas";
"rbac.authorization.k8s.io"."v1alpha1"."Role" = config."roles"; "rbac.authorization.k8s.io"."v1"."Role" = config."roles";
"rbac.authorization.k8s.io"."v1alpha1"."RoleBinding" = config."rolebindings"; "rbac.authorization.k8s.io"."v1"."RoleBinding" = config."rolebindings";
"core"."v1"."Secret" = config."secrets"; "core"."v1"."Secret" = config."secrets";
"authorization.k8s.io"."v1beta1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews"; "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews";
"authorization.k8s.io"."v1beta1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews"; "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews";
"core"."v1"."Service" = config."services"; "core"."v1"."Service" = config."services";
"core"."v1"."ServiceAccount" = config."serviceaccounts"; "core"."v1"."ServiceAccount" = config."serviceaccounts";
"apps"."v1beta1"."StatefulSet" = config."statefulsets"; "apps"."v1"."StatefulSet" = config."statefulsets";
"storage.k8s.io"."v1beta1"."StorageClass" = config."storageclasses"; "storage.k8s.io"."v1"."StorageClass" = config."storageclasses";
"authorization.k8s.io"."v1beta1"."SubjectAccessReview" = config."subjectaccessreviews"; "authorization.k8s.io"."v1"."SubjectAccessReview" = config."subjectaccessreviews";
"authentication.k8s.io"."v1beta1"."TokenReview" = config."tokenreviews"; "authentication.k8s.io"."v1"."TokenReview" = config."tokenreviews";
"admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations";
"storage.k8s.io"."v1alpha1"."VolumeAttachment" = config."volumeattachments"; "storage.k8s.io"."v1beta1"."VolumeAttachment" = config."volumeattachments";
} // { } // {
inherit definitions; inherit definitions;

View file

@ -30511,7 +30511,7 @@ in {
} // { } // {
"apiservices" = mkOption { "apiservices" = mkOption {
description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\"."; description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\".";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1beta1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30529,13 +30529,13 @@ in {
"clusterroles" = mkOption { "clusterroles" = mkOption {
description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"clusterrolebindings" = mkOption { "clusterrolebindings" = mkOption {
description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30546,14 +30546,14 @@ in {
}; };
"controllerrevisions" = mkOption { "controllerrevisions" = mkOption {
description = "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1beta2/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1"));
default = {}; default = {};
}; };
"cronjobs" = mkOption { "cronjobs" = mkOption {
description = "CronJob represents the configuration of a single cron job."; description = "CronJob represents the configuration of a single cron job.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v1beta1.CronJob" "cronjobs" "CronJob" "batch" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1"));
default = {}; default = {};
}; };
@ -30564,14 +30564,14 @@ in {
}; };
"daemonsets" = mkOption { "daemonsets" = mkOption {
description = "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set."; description = "DaemonSet represents the configuration of a daemon set.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.DaemonSet" "daemonsets" "DaemonSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" "v1"));
default = {}; default = {};
}; };
"deployments" = mkOption { "deployments" = mkOption {
description = "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets."; description = "Deployment enables declarative updates for Pods and ReplicaSets.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.Deployment" "deployments" "Deployment" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.Deployment" "deployments" "Deployment" "apps" "v1"));
default = {}; default = {};
}; };
@ -30588,8 +30588,8 @@ in {
}; };
"events" = mkOption { "events" = mkOption {
description = "Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system."; description = "Event is a report of an event somewhere in the cluster.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.events.v1beta1.Event" "events" "Event" "events.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.Event" "events" "Event" "core" "v1"));
default = {}; default = {};
}; };
@ -30600,8 +30600,8 @@ in {
}; };
"horizontalpodautoscalers" = mkOption { "horizontalpodautoscalers" = mkOption {
description = "configuration of a horizontal pod autoscaler."; description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v2beta2.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v2beta2"));
default = {}; default = {};
}; };
@ -30637,7 +30637,7 @@ in {
"localsubjectaccessreviews" = mkOption { "localsubjectaccessreviews" = mkOption {
description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30654,8 +30654,8 @@ in {
}; };
"networkpolicies" = mkOption { "networkpolicies" = mkOption {
description = "DEPRECATED 1.9 - This group version of NetworkPolicy is deprecated by networking/v1/NetworkPolicy. NetworkPolicy describes what network traffic is allowed for a set of Pods"; description = "NetworkPolicy describes what network traffic is allowed for a set of Pods";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "networking.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30709,13 +30709,13 @@ in {
"priorityclasses" = mkOption { "priorityclasses" = mkOption {
description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.scheduling.v1alpha1.PriorityClass" "priorityclasses" "PriorityClass" "scheduling.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.scheduling.v1beta1.PriorityClass" "priorityclasses" "PriorityClass" "scheduling.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
"replicasets" = mkOption { "replicasets" = mkOption {
description = "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for more information. ReplicaSet ensures that a specified number of pod replicas are running at any given time."; description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.ReplicaSet" "replicasets" "ReplicaSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ReplicaSet" "replicasets" "ReplicaSet" "apps" "v1"));
default = {}; default = {};
}; };
@ -30733,13 +30733,13 @@ in {
"roles" = mkOption { "roles" = mkOption {
description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding."; description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"rolebindings" = mkOption { "rolebindings" = mkOption {
description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30751,13 +30751,13 @@ in {
"selfsubjectaccessreviews" = mkOption { "selfsubjectaccessreviews" = mkOption {
description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action"; description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"selfsubjectrulesreviews" = mkOption { "selfsubjectrulesreviews" = mkOption {
description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30774,26 +30774,26 @@ in {
}; };
"statefulsets" = mkOption { "statefulsets" = mkOption {
description = "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1beta2/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity."; description = "StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1"));
default = {}; default = {};
}; };
"storageclasses" = mkOption { "storageclasses" = mkOption {
description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name."; description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
"subjectaccessreviews" = mkOption { "subjectaccessreviews" = mkOption {
description = "SubjectAccessReview checks whether or not a user or group can perform an action."; description = "SubjectAccessReview checks whether or not a user or group can perform an action.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"tokenreviews" = mkOption { "tokenreviews" = mkOption {
description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1beta1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -30805,43 +30805,43 @@ in {
"volumeattachments" = mkOption { "volumeattachments" = mkOption {
description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced."; description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1alpha1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
}; };
config = { config = {
"apiregistration.k8s.io"."v1beta1"."APIService" = config."apiservices"; "apiregistration.k8s.io"."v1"."APIService" = config."apiservices";
"core"."v1"."Binding" = config."bindings"; "core"."v1"."Binding" = config."bindings";
"certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests"; "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRole" = config."clusterroles"; "rbac.authorization.k8s.io"."v1"."ClusterRole" = config."clusterroles";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRoleBinding" = config."clusterrolebindings"; "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = config."clusterrolebindings";
"core"."v1"."ConfigMap" = config."configmaps"; "core"."v1"."ConfigMap" = config."configmaps";
"apps"."v1beta1"."ControllerRevision" = config."controllerrevisions"; "apps"."v1"."ControllerRevision" = config."controllerrevisions";
"batch"."v1beta1"."CronJob" = config."cronjobs"; "batch"."v2alpha1"."CronJob" = config."cronjobs";
"apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions"; "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions";
"extensions"."v1beta1"."DaemonSet" = config."daemonsets"; "apps"."v1"."DaemonSet" = config."daemonsets";
"apps"."v1beta1"."Deployment" = config."deployments"; "apps"."v1"."Deployment" = config."deployments";
"apps"."v1beta1"."DeploymentRollback" = config."rollback"; "apps"."v1beta1"."DeploymentRollback" = config."rollback";
"core"."v1"."Endpoints" = config."endpoints"; "core"."v1"."Endpoints" = config."endpoints";
"events.k8s.io"."v1beta1"."Event" = config."events"; "core"."v1"."Event" = config."events";
"policy"."v1beta1"."Eviction" = config."eviction"; "policy"."v1beta1"."Eviction" = config."eviction";
"autoscaling"."v1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers"; "autoscaling"."v2beta2"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers";
"extensions"."v1beta1"."Ingress" = config."ingresses"; "extensions"."v1beta1"."Ingress" = config."ingresses";
@ -30853,13 +30853,13 @@ in {
"core"."v1"."LimitRange" = config."limitranges"; "core"."v1"."LimitRange" = config."limitranges";
"authorization.k8s.io"."v1beta1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews"; "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews";
"admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations";
"core"."v1"."Namespace" = config."namespaces"; "core"."v1"."Namespace" = config."namespaces";
"extensions"."v1beta1"."NetworkPolicy" = config."networkpolicies"; "networking.k8s.io"."v1"."NetworkPolicy" = config."networkpolicies";
"core"."v1"."Node" = config."nodes"; "core"."v1"."Node" = config."nodes";
@ -30877,39 +30877,39 @@ in {
"core"."v1"."PodTemplate" = config."podtemplates"; "core"."v1"."PodTemplate" = config."podtemplates";
"scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses"; "scheduling.k8s.io"."v1beta1"."PriorityClass" = config."priorityclasses";
"extensions"."v1beta1"."ReplicaSet" = config."replicasets"; "apps"."v1"."ReplicaSet" = config."replicasets";
"core"."v1"."ReplicationController" = config."replicationcontrollers"; "core"."v1"."ReplicationController" = config."replicationcontrollers";
"core"."v1"."ResourceQuota" = config."resourcequotas"; "core"."v1"."ResourceQuota" = config."resourcequotas";
"rbac.authorization.k8s.io"."v1alpha1"."Role" = config."roles"; "rbac.authorization.k8s.io"."v1"."Role" = config."roles";
"rbac.authorization.k8s.io"."v1alpha1"."RoleBinding" = config."rolebindings"; "rbac.authorization.k8s.io"."v1"."RoleBinding" = config."rolebindings";
"core"."v1"."Secret" = config."secrets"; "core"."v1"."Secret" = config."secrets";
"authorization.k8s.io"."v1beta1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews"; "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews";
"authorization.k8s.io"."v1beta1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews"; "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews";
"core"."v1"."Service" = config."services"; "core"."v1"."Service" = config."services";
"core"."v1"."ServiceAccount" = config."serviceaccounts"; "core"."v1"."ServiceAccount" = config."serviceaccounts";
"apps"."v1beta1"."StatefulSet" = config."statefulsets"; "apps"."v1"."StatefulSet" = config."statefulsets";
"storage.k8s.io"."v1beta1"."StorageClass" = config."storageclasses"; "storage.k8s.io"."v1"."StorageClass" = config."storageclasses";
"authorization.k8s.io"."v1beta1"."SubjectAccessReview" = config."subjectaccessreviews"; "authorization.k8s.io"."v1"."SubjectAccessReview" = config."subjectaccessreviews";
"authentication.k8s.io"."v1beta1"."TokenReview" = config."tokenreviews"; "authentication.k8s.io"."v1"."TokenReview" = config."tokenreviews";
"admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations";
"storage.k8s.io"."v1alpha1"."VolumeAttachment" = config."volumeattachments"; "storage.k8s.io"."v1beta1"."VolumeAttachment" = config."volumeattachments";
} // { } // {
inherit definitions; inherit definitions;

View file

@ -31123,7 +31123,7 @@ in {
} // { } // {
"apiservices" = mkOption { "apiservices" = mkOption {
description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\"."; description = "APIService represents a server for a particular GroupVersion. Name must be \"version.group\".";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1beta1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kube-aggregator.pkg.apis.apiregistration.v1.APIService" "apiservices" "APIService" "apiregistration.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -31147,13 +31147,13 @@ in {
"clusterroles" = mkOption { "clusterroles" = mkOption {
description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"clusterrolebindings" = mkOption { "clusterrolebindings" = mkOption {
description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -31164,14 +31164,14 @@ in {
}; };
"controllerrevisions" = mkOption { "controllerrevisions" = mkOption {
description = "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1beta2/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1"));
default = {}; default = {};
}; };
"cronjobs" = mkOption { "cronjobs" = mkOption {
description = "CronJob represents the configuration of a single cron job."; description = "CronJob represents the configuration of a single cron job.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v1beta1.CronJob" "cronjobs" "CronJob" "batch" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1"));
default = {}; default = {};
}; };
@ -31182,14 +31182,14 @@ in {
}; };
"daemonsets" = mkOption { "daemonsets" = mkOption {
description = "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set."; description = "DaemonSet represents the configuration of a daemon set.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.DaemonSet" "daemonsets" "DaemonSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" "v1"));
default = {}; default = {};
}; };
"deployments" = mkOption { "deployments" = mkOption {
description = "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets."; description = "Deployment enables declarative updates for Pods and ReplicaSets.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.Deployment" "deployments" "Deployment" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.Deployment" "deployments" "Deployment" "apps" "v1"));
default = {}; default = {};
}; };
@ -31206,8 +31206,8 @@ in {
}; };
"events" = mkOption { "events" = mkOption {
description = "Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system."; description = "Event is a report of an event somewhere in the cluster.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.events.v1beta1.Event" "events" "Event" "events.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.Event" "events" "Event" "core" "v1"));
default = {}; default = {};
}; };
@ -31218,8 +31218,8 @@ in {
}; };
"horizontalpodautoscalers" = mkOption { "horizontalpodautoscalers" = mkOption {
description = "configuration of a horizontal pod autoscaler."; description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v2beta2.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v2beta2"));
default = {}; default = {};
}; };
@ -31255,7 +31255,7 @@ in {
"localsubjectaccessreviews" = mkOption { "localsubjectaccessreviews" = mkOption {
description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -31272,8 +31272,8 @@ in {
}; };
"networkpolicies" = mkOption { "networkpolicies" = mkOption {
description = "DEPRECATED 1.9 - This group version of NetworkPolicy is deprecated by networking/v1/NetworkPolicy. NetworkPolicy describes what network traffic is allowed for a set of Pods"; description = "NetworkPolicy describes what network traffic is allowed for a set of Pods";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "networking.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -31327,13 +31327,13 @@ in {
"priorityclasses" = mkOption { "priorityclasses" = mkOption {
description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.scheduling.v1alpha1.PriorityClass" "priorityclasses" "PriorityClass" "scheduling.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.scheduling.v1beta1.PriorityClass" "priorityclasses" "PriorityClass" "scheduling.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
"replicasets" = mkOption { "replicasets" = mkOption {
description = "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for more information. ReplicaSet ensures that a specified number of pod replicas are running at any given time."; description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.ReplicaSet" "replicasets" "ReplicaSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ReplicaSet" "replicasets" "ReplicaSet" "apps" "v1"));
default = {}; default = {};
}; };
@ -31351,13 +31351,13 @@ in {
"roles" = mkOption { "roles" = mkOption {
description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding."; description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"rolebindings" = mkOption { "rolebindings" = mkOption {
description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -31369,13 +31369,13 @@ in {
"selfsubjectaccessreviews" = mkOption { "selfsubjectaccessreviews" = mkOption {
description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action"; description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"selfsubjectrulesreviews" = mkOption { "selfsubjectrulesreviews" = mkOption {
description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -31392,26 +31392,26 @@ in {
}; };
"statefulsets" = mkOption { "statefulsets" = mkOption {
description = "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1beta2/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity."; description = "StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1"));
default = {}; default = {};
}; };
"storageclasses" = mkOption { "storageclasses" = mkOption {
description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name."; description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
"subjectaccessreviews" = mkOption { "subjectaccessreviews" = mkOption {
description = "SubjectAccessReview checks whether or not a user or group can perform an action."; description = "SubjectAccessReview checks whether or not a user or group can perform an action.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"tokenreviews" = mkOption { "tokenreviews" = mkOption {
description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1beta1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -31423,13 +31423,13 @@ in {
"volumeattachments" = mkOption { "volumeattachments" = mkOption {
description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced."; description = "VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node.\n\nVolumeAttachment objects are non-namespaced.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1alpha1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1.VolumeAttachment" "volumeattachments" "VolumeAttachment" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
}; };
config = { config = {
"apiregistration.k8s.io"."v1beta1"."APIService" = config."apiservices"; "apiregistration.k8s.io"."v1"."APIService" = config."apiservices";
"auditregistration.k8s.io"."v1alpha1"."AuditSink" = config."auditsinks"; "auditregistration.k8s.io"."v1alpha1"."AuditSink" = config."auditsinks";
@ -31437,31 +31437,31 @@ in {
"certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests"; "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRole" = config."clusterroles"; "rbac.authorization.k8s.io"."v1"."ClusterRole" = config."clusterroles";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRoleBinding" = config."clusterrolebindings"; "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = config."clusterrolebindings";
"core"."v1"."ConfigMap" = config."configmaps"; "core"."v1"."ConfigMap" = config."configmaps";
"apps"."v1beta1"."ControllerRevision" = config."controllerrevisions"; "apps"."v1"."ControllerRevision" = config."controllerrevisions";
"batch"."v1beta1"."CronJob" = config."cronjobs"; "batch"."v2alpha1"."CronJob" = config."cronjobs";
"apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions"; "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions";
"extensions"."v1beta1"."DaemonSet" = config."daemonsets"; "apps"."v1"."DaemonSet" = config."daemonsets";
"apps"."v1beta1"."Deployment" = config."deployments"; "apps"."v1"."Deployment" = config."deployments";
"apps"."v1beta1"."DeploymentRollback" = config."rollback"; "apps"."v1beta1"."DeploymentRollback" = config."rollback";
"core"."v1"."Endpoints" = config."endpoints"; "core"."v1"."Endpoints" = config."endpoints";
"events.k8s.io"."v1beta1"."Event" = config."events"; "core"."v1"."Event" = config."events";
"policy"."v1beta1"."Eviction" = config."eviction"; "policy"."v1beta1"."Eviction" = config."eviction";
"autoscaling"."v1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers"; "autoscaling"."v2beta2"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers";
"extensions"."v1beta1"."Ingress" = config."ingresses"; "extensions"."v1beta1"."Ingress" = config."ingresses";
@ -31473,13 +31473,13 @@ in {
"core"."v1"."LimitRange" = config."limitranges"; "core"."v1"."LimitRange" = config."limitranges";
"authorization.k8s.io"."v1beta1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews"; "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews";
"admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations";
"core"."v1"."Namespace" = config."namespaces"; "core"."v1"."Namespace" = config."namespaces";
"extensions"."v1beta1"."NetworkPolicy" = config."networkpolicies"; "networking.k8s.io"."v1"."NetworkPolicy" = config."networkpolicies";
"core"."v1"."Node" = config."nodes"; "core"."v1"."Node" = config."nodes";
@ -31497,39 +31497,39 @@ in {
"core"."v1"."PodTemplate" = config."podtemplates"; "core"."v1"."PodTemplate" = config."podtemplates";
"scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses"; "scheduling.k8s.io"."v1beta1"."PriorityClass" = config."priorityclasses";
"extensions"."v1beta1"."ReplicaSet" = config."replicasets"; "apps"."v1"."ReplicaSet" = config."replicasets";
"core"."v1"."ReplicationController" = config."replicationcontrollers"; "core"."v1"."ReplicationController" = config."replicationcontrollers";
"core"."v1"."ResourceQuota" = config."resourcequotas"; "core"."v1"."ResourceQuota" = config."resourcequotas";
"rbac.authorization.k8s.io"."v1alpha1"."Role" = config."roles"; "rbac.authorization.k8s.io"."v1"."Role" = config."roles";
"rbac.authorization.k8s.io"."v1alpha1"."RoleBinding" = config."rolebindings"; "rbac.authorization.k8s.io"."v1"."RoleBinding" = config."rolebindings";
"core"."v1"."Secret" = config."secrets"; "core"."v1"."Secret" = config."secrets";
"authorization.k8s.io"."v1beta1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews"; "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews";
"authorization.k8s.io"."v1beta1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews"; "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews";
"core"."v1"."Service" = config."services"; "core"."v1"."Service" = config."services";
"core"."v1"."ServiceAccount" = config."serviceaccounts"; "core"."v1"."ServiceAccount" = config."serviceaccounts";
"apps"."v1beta1"."StatefulSet" = config."statefulsets"; "apps"."v1"."StatefulSet" = config."statefulsets";
"storage.k8s.io"."v1beta1"."StorageClass" = config."storageclasses"; "storage.k8s.io"."v1"."StorageClass" = config."storageclasses";
"authorization.k8s.io"."v1beta1"."SubjectAccessReview" = config."subjectaccessreviews"; "authorization.k8s.io"."v1"."SubjectAccessReview" = config."subjectaccessreviews";
"authentication.k8s.io"."v1beta1"."TokenReview" = config."tokenreviews"; "authentication.k8s.io"."v1"."TokenReview" = config."tokenreviews";
"admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations";
"storage.k8s.io"."v1alpha1"."VolumeAttachment" = config."volumeattachments"; "storage.k8s.io"."v1"."VolumeAttachment" = config."volumeattachments";
} // { } // {
inherit definitions; inherit definitions;

View file

@ -12361,13 +12361,13 @@ in {
"clusterroles" = mkOption { "clusterroles" = mkOption {
description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1alpha1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1beta1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
"clusterrolebindings" = mkOption { "clusterrolebindings" = mkOption {
description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1alpha1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1beta1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
@ -12432,8 +12432,8 @@ in {
}; };
"horizontalpodautoscalers" = mkOption { "horizontalpodautoscalers" = mkOption {
description = "configuration of a horizontal pod autoscaler."; description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.autoscaling.v1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.autoscaling.v2alpha1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v2alpha1"));
default = {}; default = {};
}; };
@ -12463,7 +12463,7 @@ in {
"localsubjectaccessreviews" = mkOption { "localsubjectaccessreviews" = mkOption {
description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authorization.v1beta1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authorization.v1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -12475,7 +12475,7 @@ in {
"networkpolicies" = mkOption { "networkpolicies" = mkOption {
description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; description = "NetworkPolicy describes what network traffic is allowed for a set of Pods";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.extensions.v1beta1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.networking.v1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "networking.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -12547,13 +12547,13 @@ in {
"roles" = mkOption { "roles" = mkOption {
description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding."; description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1alpha1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1beta1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
"rolebindings" = mkOption { "rolebindings" = mkOption {
description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1alpha1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.rbac.v1beta1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1beta1"));
default = {}; default = {};
}; };
@ -12565,7 +12565,7 @@ in {
"selfsubjectaccessreviews" = mkOption { "selfsubjectaccessreviews" = mkOption {
description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action"; description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authorization.v1beta1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authorization.v1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -12589,13 +12589,13 @@ in {
"storageclasses" = mkOption { "storageclasses" = mkOption {
description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name."; description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.storage.v1beta1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.storage.v1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
"subjectaccessreviews" = mkOption { "subjectaccessreviews" = mkOption {
description = "SubjectAccessReview checks whether or not a user or group can perform an action."; description = "SubjectAccessReview checks whether or not a user or group can perform an action.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authorization.v1beta1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authorization.v1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -12607,7 +12607,7 @@ in {
"tokenreviews" = mkOption { "tokenreviews" = mkOption {
description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authentication.v1beta1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.authentication.v1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1"));
default = {}; default = {};
}; };
}; };
@ -12619,9 +12619,9 @@ in {
"certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests"; "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRole" = config."clusterroles"; "rbac.authorization.k8s.io"."v1beta1"."ClusterRole" = config."clusterroles";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRoleBinding" = config."clusterrolebindings"; "rbac.authorization.k8s.io"."v1beta1"."ClusterRoleBinding" = config."clusterrolebindings";
"core"."v1"."ConfigMap" = config."configmaps"; "core"."v1"."ConfigMap" = config."configmaps";
@ -12643,7 +12643,7 @@ in {
"admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration" = config."externaladmissionhookconfigurations"; "admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration" = config."externaladmissionhookconfigurations";
"autoscaling"."v1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers"; "autoscaling"."v2alpha1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers";
"extensions"."v1beta1"."Ingress" = config."ingresses"; "extensions"."v1beta1"."Ingress" = config."ingresses";
@ -12653,11 +12653,11 @@ in {
"core"."v1"."LimitRange" = config."limitranges"; "core"."v1"."LimitRange" = config."limitranges";
"authorization.k8s.io"."v1beta1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews"; "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews";
"core"."v1"."Namespace" = config."namespaces"; "core"."v1"."Namespace" = config."namespaces";
"extensions"."v1beta1"."NetworkPolicy" = config."networkpolicies"; "networking.k8s.io"."v1"."NetworkPolicy" = config."networkpolicies";
"core"."v1"."Node" = config."nodes"; "core"."v1"."Node" = config."nodes";
@ -12681,13 +12681,13 @@ in {
"core"."v1"."ResourceQuota" = config."resourcequotas"; "core"."v1"."ResourceQuota" = config."resourcequotas";
"rbac.authorization.k8s.io"."v1alpha1"."Role" = config."roles"; "rbac.authorization.k8s.io"."v1beta1"."Role" = config."roles";
"rbac.authorization.k8s.io"."v1alpha1"."RoleBinding" = config."rolebindings"; "rbac.authorization.k8s.io"."v1beta1"."RoleBinding" = config."rolebindings";
"core"."v1"."Secret" = config."secrets"; "core"."v1"."Secret" = config."secrets";
"authorization.k8s.io"."v1beta1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews"; "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews";
"core"."v1"."Service" = config."services"; "core"."v1"."Service" = config."services";
@ -12695,13 +12695,13 @@ in {
"apps"."v1beta1"."StatefulSet" = config."statefulsets"; "apps"."v1beta1"."StatefulSet" = config."statefulsets";
"storage.k8s.io"."v1beta1"."StorageClass" = config."storageclasses"; "storage.k8s.io"."v1"."StorageClass" = config."storageclasses";
"authorization.k8s.io"."v1beta1"."SubjectAccessReview" = config."subjectaccessreviews"; "authorization.k8s.io"."v1"."SubjectAccessReview" = config."subjectaccessreviews";
"extensions"."v1beta1"."ThirdPartyResource" = config."thirdpartyresources"; "extensions"."v1beta1"."ThirdPartyResource" = config."thirdpartyresources";
"authentication.k8s.io"."v1beta1"."TokenReview" = config."tokenreviews"; "authentication.k8s.io"."v1"."TokenReview" = config."tokenreviews";
} // { } // {
inherit definitions; inherit definitions;

View file

@ -26030,13 +26030,13 @@ in {
"clusterroles" = mkOption { "clusterroles" = mkOption {
description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"clusterrolebindings" = mkOption { "clusterrolebindings" = mkOption {
description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -26047,14 +26047,14 @@ in {
}; };
"controllerrevisions" = mkOption { "controllerrevisions" = mkOption {
description = "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1beta2/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta2.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1beta2"));
default = {}; default = {};
}; };
"cronjobs" = mkOption { "cronjobs" = mkOption {
description = "CronJob represents the configuration of a single cron job."; description = "CronJob represents the configuration of a single cron job.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v1beta1.CronJob" "cronjobs" "CronJob" "batch" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1"));
default = {}; default = {};
}; };
@ -26065,14 +26065,14 @@ in {
}; };
"daemonsets" = mkOption { "daemonsets" = mkOption {
description = "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set."; description = "DaemonSet represents the configuration of a daemon set.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.DaemonSet" "daemonsets" "DaemonSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta2.DaemonSet" "daemonsets" "DaemonSet" "apps" "v1beta2"));
default = {}; default = {};
}; };
"deployments" = mkOption { "deployments" = mkOption {
description = "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets."; description = "Deployment enables declarative updates for Pods and ReplicaSets.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.Deployment" "deployments" "Deployment" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta2.Deployment" "deployments" "Deployment" "apps" "v1beta2"));
default = {}; default = {};
}; };
@ -26107,8 +26107,8 @@ in {
}; };
"horizontalpodautoscalers" = mkOption { "horizontalpodautoscalers" = mkOption {
description = "configuration of a horizontal pod autoscaler."; description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v2beta1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v2beta1"));
default = {}; default = {};
}; };
@ -26138,7 +26138,7 @@ in {
"localsubjectaccessreviews" = mkOption { "localsubjectaccessreviews" = mkOption {
description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -26150,7 +26150,7 @@ in {
"networkpolicies" = mkOption { "networkpolicies" = mkOption {
description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; description = "NetworkPolicy describes what network traffic is allowed for a set of Pods";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "networking.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -26209,8 +26209,8 @@ in {
}; };
"replicasets" = mkOption { "replicasets" = mkOption {
description = "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for more information. ReplicaSet represents the configuration of a ReplicaSet."; description = "ReplicaSet represents the configuration of a ReplicaSet.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.ReplicaSet" "replicasets" "ReplicaSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta2.ReplicaSet" "replicasets" "ReplicaSet" "apps" "v1beta2"));
default = {}; default = {};
}; };
@ -26228,13 +26228,13 @@ in {
"roles" = mkOption { "roles" = mkOption {
description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding."; description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"rolebindings" = mkOption { "rolebindings" = mkOption {
description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -26246,13 +26246,13 @@ in {
"selfsubjectaccessreviews" = mkOption { "selfsubjectaccessreviews" = mkOption {
description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action"; description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"selfsubjectrulesreviews" = mkOption { "selfsubjectrulesreviews" = mkOption {
description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -26269,26 +26269,26 @@ in {
}; };
"statefulsets" = mkOption { "statefulsets" = mkOption {
description = "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1beta2/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity."; description = "StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta2.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1beta2"));
default = {}; default = {};
}; };
"storageclasses" = mkOption { "storageclasses" = mkOption {
description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name."; description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
"subjectaccessreviews" = mkOption { "subjectaccessreviews" = mkOption {
description = "SubjectAccessReview checks whether or not a user or group can perform an action."; description = "SubjectAccessReview checks whether or not a user or group can perform an action.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"tokenreviews" = mkOption { "tokenreviews" = mkOption {
description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1beta1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1"));
default = {}; default = {};
}; };
}; };
@ -26300,21 +26300,21 @@ in {
"certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests"; "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRole" = config."clusterroles"; "rbac.authorization.k8s.io"."v1"."ClusterRole" = config."clusterroles";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRoleBinding" = config."clusterrolebindings"; "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = config."clusterrolebindings";
"core"."v1"."ConfigMap" = config."configmaps"; "core"."v1"."ConfigMap" = config."configmaps";
"apps"."v1beta1"."ControllerRevision" = config."controllerrevisions"; "apps"."v1beta2"."ControllerRevision" = config."controllerrevisions";
"batch"."v1beta1"."CronJob" = config."cronjobs"; "batch"."v2alpha1"."CronJob" = config."cronjobs";
"apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions"; "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions";
"extensions"."v1beta1"."DaemonSet" = config."daemonsets"; "apps"."v1beta2"."DaemonSet" = config."daemonsets";
"apps"."v1beta1"."Deployment" = config."deployments"; "apps"."v1beta2"."Deployment" = config."deployments";
"apps"."v1beta1"."DeploymentRollback" = config."rollback"; "apps"."v1beta1"."DeploymentRollback" = config."rollback";
@ -26326,7 +26326,7 @@ in {
"admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration" = config."externaladmissionhookconfigurations"; "admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration" = config."externaladmissionhookconfigurations";
"autoscaling"."v1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers"; "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers";
"extensions"."v1beta1"."Ingress" = config."ingresses"; "extensions"."v1beta1"."Ingress" = config."ingresses";
@ -26336,11 +26336,11 @@ in {
"core"."v1"."LimitRange" = config."limitranges"; "core"."v1"."LimitRange" = config."limitranges";
"authorization.k8s.io"."v1beta1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews"; "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews";
"core"."v1"."Namespace" = config."namespaces"; "core"."v1"."Namespace" = config."namespaces";
"extensions"."v1beta1"."NetworkPolicy" = config."networkpolicies"; "networking.k8s.io"."v1"."NetworkPolicy" = config."networkpolicies";
"core"."v1"."Node" = config."nodes"; "core"."v1"."Node" = config."nodes";
@ -26360,33 +26360,33 @@ in {
"scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses"; "scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses";
"extensions"."v1beta1"."ReplicaSet" = config."replicasets"; "apps"."v1beta2"."ReplicaSet" = config."replicasets";
"core"."v1"."ReplicationController" = config."replicationcontrollers"; "core"."v1"."ReplicationController" = config."replicationcontrollers";
"core"."v1"."ResourceQuota" = config."resourcequotas"; "core"."v1"."ResourceQuota" = config."resourcequotas";
"rbac.authorization.k8s.io"."v1alpha1"."Role" = config."roles"; "rbac.authorization.k8s.io"."v1"."Role" = config."roles";
"rbac.authorization.k8s.io"."v1alpha1"."RoleBinding" = config."rolebindings"; "rbac.authorization.k8s.io"."v1"."RoleBinding" = config."rolebindings";
"core"."v1"."Secret" = config."secrets"; "core"."v1"."Secret" = config."secrets";
"authorization.k8s.io"."v1beta1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews"; "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews";
"authorization.k8s.io"."v1beta1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews"; "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews";
"core"."v1"."Service" = config."services"; "core"."v1"."Service" = config."services";
"core"."v1"."ServiceAccount" = config."serviceaccounts"; "core"."v1"."ServiceAccount" = config."serviceaccounts";
"apps"."v1beta1"."StatefulSet" = config."statefulsets"; "apps"."v1beta2"."StatefulSet" = config."statefulsets";
"storage.k8s.io"."v1beta1"."StorageClass" = config."storageclasses"; "storage.k8s.io"."v1"."StorageClass" = config."storageclasses";
"authorization.k8s.io"."v1beta1"."SubjectAccessReview" = config."subjectaccessreviews"; "authorization.k8s.io"."v1"."SubjectAccessReview" = config."subjectaccessreviews";
"authentication.k8s.io"."v1beta1"."TokenReview" = config."tokenreviews"; "authentication.k8s.io"."v1"."TokenReview" = config."tokenreviews";
} // { } // {
inherit definitions; inherit definitions;

View file

@ -28207,13 +28207,13 @@ in {
"clusterroles" = mkOption { "clusterroles" = mkOption {
description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRole" "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"clusterrolebindings" = mkOption { "clusterrolebindings" = mkOption {
description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.ClusterRoleBinding" "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -28224,14 +28224,14 @@ in {
}; };
"controllerrevisions" = mkOption { "controllerrevisions" = mkOption {
description = "DEPRECATED - This group version of ControllerRevision is deprecated by apps/v1beta2/ControllerRevision. See the release notes for more information. ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ControllerRevision" "controllerrevisions" "ControllerRevision" "apps" "v1"));
default = {}; default = {};
}; };
"cronjobs" = mkOption { "cronjobs" = mkOption {
description = "CronJob represents the configuration of a single cron job."; description = "CronJob represents the configuration of a single cron job.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v1beta1.CronJob" "cronjobs" "CronJob" "batch" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1"));
default = {}; default = {};
}; };
@ -28242,14 +28242,14 @@ in {
}; };
"daemonsets" = mkOption { "daemonsets" = mkOption {
description = "DEPRECATED - This group version of DaemonSet is deprecated by apps/v1beta2/DaemonSet. See the release notes for more information. DaemonSet represents the configuration of a daemon set."; description = "DaemonSet represents the configuration of a daemon set.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.DaemonSet" "daemonsets" "DaemonSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" "v1"));
default = {}; default = {};
}; };
"deployments" = mkOption { "deployments" = mkOption {
description = "DEPRECATED - This group version of Deployment is deprecated by apps/v1beta2/Deployment. See the release notes for more information. Deployment enables declarative updates for Pods and ReplicaSets."; description = "Deployment enables declarative updates for Pods and ReplicaSets.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.Deployment" "deployments" "Deployment" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.Deployment" "deployments" "Deployment" "apps" "v1"));
default = {}; default = {};
}; };
@ -28266,8 +28266,8 @@ in {
}; };
"events" = mkOption { "events" = mkOption {
description = "Event is a report of an event somewhere in the cluster. It generally denotes some state change in the system."; description = "Event is a report of an event somewhere in the cluster.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.events.v1beta1.Event" "events" "Event" "events.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.Event" "events" "Event" "core" "v1"));
default = {}; default = {};
}; };
@ -28278,8 +28278,8 @@ in {
}; };
"horizontalpodautoscalers" = mkOption { "horizontalpodautoscalers" = mkOption {
description = "configuration of a horizontal pod autoscaler."; description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.autoscaling.v2beta1.HorizontalPodAutoscaler" "horizontalpodautoscalers" "HorizontalPodAutoscaler" "autoscaling" "v2beta1"));
default = {}; default = {};
}; };
@ -28309,7 +28309,7 @@ in {
"localsubjectaccessreviews" = mkOption { "localsubjectaccessreviews" = mkOption {
description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.LocalSubjectAccessReview" "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -28326,8 +28326,8 @@ in {
}; };
"networkpolicies" = mkOption { "networkpolicies" = mkOption {
description = "DEPRECATED 1.9 - This group version of NetworkPolicy is deprecated by networking/v1/NetworkPolicy. NetworkPolicy describes what network traffic is allowed for a set of Pods"; description = "NetworkPolicy describes what network traffic is allowed for a set of Pods";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" "NetworkPolicy" "networking.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -28386,8 +28386,8 @@ in {
}; };
"replicasets" = mkOption { "replicasets" = mkOption {
description = "DEPRECATED - This group version of ReplicaSet is deprecated by apps/v1beta2/ReplicaSet. See the release notes for more information. ReplicaSet ensures that a specified number of pod replicas are running at any given time."; description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.extensions.v1beta1.ReplicaSet" "replicasets" "ReplicaSet" "extensions" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.ReplicaSet" "replicasets" "ReplicaSet" "apps" "v1"));
default = {}; default = {};
}; };
@ -28405,13 +28405,13 @@ in {
"roles" = mkOption { "roles" = mkOption {
description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding."; description = "Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.Role" "roles" "Role" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"rolebindings" = mkOption { "rolebindings" = mkOption {
description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1alpha1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1alpha1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.rbac.v1.RoleBinding" "rolebindings" "RoleBinding" "rbac.authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -28423,13 +28423,13 @@ in {
"selfsubjectaccessreviews" = mkOption { "selfsubjectaccessreviews" = mkOption {
description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action"; description = "SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means \"in all namespaces\". Self is a special case, because users should always be able to check whether they can perform an action";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectAccessReview" "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"selfsubjectrulesreviews" = mkOption { "selfsubjectrulesreviews" = mkOption {
description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SelfSubjectRulesReview" "selfsubjectrulesreviews" "SelfSubjectRulesReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -28446,26 +28446,26 @@ in {
}; };
"statefulsets" = mkOption { "statefulsets" = mkOption {
description = "DEPRECATED - This group version of StatefulSet is deprecated by apps/v1beta2/StatefulSet. See the release notes for more information. StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity."; description = "StatefulSet represents a set of pods with consistent identities. Identities are defined as:\n - Network: A single stable DNS and hostname.\n - Storage: As many VolumeClaims as requested.\nThe StatefulSet guarantees that a given network identity will always map to the same storage identity.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.StatefulSet" "statefulsets" "StatefulSet" "apps" "v1"));
default = {}; default = {};
}; };
"storageclasses" = mkOption { "storageclasses" = mkOption {
description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name."; description = "StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned.\n\nStorageClasses are non-namespaced; the name of the storage class according to etcd is in ObjectMeta.Name.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1beta1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.storage.v1.StorageClass" "storageclasses" "StorageClass" "storage.k8s.io" "v1"));
default = {}; default = {};
}; };
"subjectaccessreviews" = mkOption { "subjectaccessreviews" = mkOption {
description = "SubjectAccessReview checks whether or not a user or group can perform an action."; description = "SubjectAccessReview checks whether or not a user or group can perform an action.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1beta1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authorization.v1.SubjectAccessReview" "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1"));
default = {}; default = {};
}; };
"tokenreviews" = mkOption { "tokenreviews" = mkOption {
description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.";
type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1beta1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1beta1")); type = (types.attrsOf (submoduleForDefinition "io.k8s.api.authentication.v1.TokenReview" "tokenreviews" "TokenReview" "authentication.k8s.io" "v1"));
default = {}; default = {};
}; };
@ -28489,31 +28489,31 @@ in {
"certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests"; "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = config."certificatesigningrequests";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRole" = config."clusterroles"; "rbac.authorization.k8s.io"."v1"."ClusterRole" = config."clusterroles";
"rbac.authorization.k8s.io"."v1alpha1"."ClusterRoleBinding" = config."clusterrolebindings"; "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = config."clusterrolebindings";
"core"."v1"."ConfigMap" = config."configmaps"; "core"."v1"."ConfigMap" = config."configmaps";
"apps"."v1beta1"."ControllerRevision" = config."controllerrevisions"; "apps"."v1"."ControllerRevision" = config."controllerrevisions";
"batch"."v1beta1"."CronJob" = config."cronjobs"; "batch"."v2alpha1"."CronJob" = config."cronjobs";
"apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions"; "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = config."customresourcedefinitions";
"extensions"."v1beta1"."DaemonSet" = config."daemonsets"; "apps"."v1"."DaemonSet" = config."daemonsets";
"apps"."v1beta1"."Deployment" = config."deployments"; "apps"."v1"."Deployment" = config."deployments";
"apps"."v1beta1"."DeploymentRollback" = config."rollback"; "apps"."v1beta1"."DeploymentRollback" = config."rollback";
"core"."v1"."Endpoints" = config."endpoints"; "core"."v1"."Endpoints" = config."endpoints";
"events.k8s.io"."v1beta1"."Event" = config."events"; "core"."v1"."Event" = config."events";
"policy"."v1beta1"."Eviction" = config."eviction"; "policy"."v1beta1"."Eviction" = config."eviction";
"autoscaling"."v1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers"; "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = config."horizontalpodautoscalers";
"extensions"."v1beta1"."Ingress" = config."ingresses"; "extensions"."v1beta1"."Ingress" = config."ingresses";
@ -28523,13 +28523,13 @@ in {
"core"."v1"."LimitRange" = config."limitranges"; "core"."v1"."LimitRange" = config."limitranges";
"authorization.k8s.io"."v1beta1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews"; "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = config."localsubjectaccessreviews";
"admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = config."mutatingwebhookconfigurations";
"core"."v1"."Namespace" = config."namespaces"; "core"."v1"."Namespace" = config."namespaces";
"extensions"."v1beta1"."NetworkPolicy" = config."networkpolicies"; "networking.k8s.io"."v1"."NetworkPolicy" = config."networkpolicies";
"core"."v1"."Node" = config."nodes"; "core"."v1"."Node" = config."nodes";
@ -28549,33 +28549,33 @@ in {
"scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses"; "scheduling.k8s.io"."v1alpha1"."PriorityClass" = config."priorityclasses";
"extensions"."v1beta1"."ReplicaSet" = config."replicasets"; "apps"."v1"."ReplicaSet" = config."replicasets";
"core"."v1"."ReplicationController" = config."replicationcontrollers"; "core"."v1"."ReplicationController" = config."replicationcontrollers";
"core"."v1"."ResourceQuota" = config."resourcequotas"; "core"."v1"."ResourceQuota" = config."resourcequotas";
"rbac.authorization.k8s.io"."v1alpha1"."Role" = config."roles"; "rbac.authorization.k8s.io"."v1"."Role" = config."roles";
"rbac.authorization.k8s.io"."v1alpha1"."RoleBinding" = config."rolebindings"; "rbac.authorization.k8s.io"."v1"."RoleBinding" = config."rolebindings";
"core"."v1"."Secret" = config."secrets"; "core"."v1"."Secret" = config."secrets";
"authorization.k8s.io"."v1beta1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews"; "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = config."selfsubjectaccessreviews";
"authorization.k8s.io"."v1beta1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews"; "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = config."selfsubjectrulesreviews";
"core"."v1"."Service" = config."services"; "core"."v1"."Service" = config."services";
"core"."v1"."ServiceAccount" = config."serviceaccounts"; "core"."v1"."ServiceAccount" = config."serviceaccounts";
"apps"."v1beta1"."StatefulSet" = config."statefulsets"; "apps"."v1"."StatefulSet" = config."statefulsets";
"storage.k8s.io"."v1beta1"."StorageClass" = config."storageclasses"; "storage.k8s.io"."v1"."StorageClass" = config."storageclasses";
"authorization.k8s.io"."v1beta1"."SubjectAccessReview" = config."subjectaccessreviews"; "authorization.k8s.io"."v1"."SubjectAccessReview" = config."subjectaccessreviews";
"authentication.k8s.io"."v1beta1"."TokenReview" = config."tokenreviews"; "authentication.k8s.io"."v1"."TokenReview" = config."tokenreviews";
"admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations"; "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = config."validatingwebhookconfigurations";

View file

@ -227,8 +227,7 @@ let
resourcesByKindOrderedByVersion = mapAttrs (kind: resources: resourcesByKindOrderedByVersion = mapAttrs (kind: resources:
reverseList (sort (r1: r2: reverseList (sort (r1: r2:
if compareVersions r1.version r2.version < 0 compareVersions r1.version r2.version > 0
then true else false
) resources) ) resources)
) resourcesByKind; ) resourcesByKind;