mirror of
https://github.com/TECHNOFAB11/kubenix.git
synced 2025-12-12 16:10:05 +01:00
feat(k8s): expose attrName in list of kubernetes types
This commit is contained in:
parent
ff59c7d905
commit
bdc145e2bb
9 changed files with 551 additions and 0 deletions
|
|
@ -30269,522 +30269,609 @@ in {
|
|||
group = "admissionregistration.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "InitializerConfiguration";
|
||||
attrName = "initializerConfigurations";
|
||||
}
|
||||
{
|
||||
name = "mutatingwebhookconfigurations";
|
||||
group = "admissionregistration.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "MutatingWebhookConfiguration";
|
||||
attrName = "mutatingWebhookConfigurations";
|
||||
}
|
||||
{
|
||||
name = "validatingwebhookconfigurations";
|
||||
group = "admissionregistration.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "ValidatingWebhookConfiguration";
|
||||
attrName = "validatingWebhookConfigurations";
|
||||
}
|
||||
{
|
||||
name = "controllerrevisions";
|
||||
group = "apps";
|
||||
version = "v1";
|
||||
kind = "ControllerRevision";
|
||||
attrName = "controllerRevisions";
|
||||
}
|
||||
{
|
||||
name = "daemonsets";
|
||||
group = "apps";
|
||||
version = "v1";
|
||||
kind = "DaemonSet";
|
||||
attrName = "daemonSets";
|
||||
}
|
||||
{
|
||||
name = "deployments";
|
||||
group = "apps";
|
||||
version = "v1";
|
||||
kind = "Deployment";
|
||||
attrName = "deployments";
|
||||
}
|
||||
{
|
||||
name = "replicasets";
|
||||
group = "apps";
|
||||
version = "v1";
|
||||
kind = "ReplicaSet";
|
||||
attrName = "replicaSets";
|
||||
}
|
||||
{
|
||||
name = "statefulsets";
|
||||
group = "apps";
|
||||
version = "v1";
|
||||
kind = "StatefulSet";
|
||||
attrName = "statefulSets";
|
||||
}
|
||||
{
|
||||
name = "controllerrevisions";
|
||||
group = "apps";
|
||||
version = "v1beta1";
|
||||
kind = "ControllerRevision";
|
||||
attrName = "controllerRevisions";
|
||||
}
|
||||
{
|
||||
name = "deployments";
|
||||
group = "apps";
|
||||
version = "v1beta1";
|
||||
kind = "Deployment";
|
||||
attrName = "deployments";
|
||||
}
|
||||
{
|
||||
name = "rollback";
|
||||
group = "apps";
|
||||
version = "v1beta1";
|
||||
kind = "DeploymentRollback";
|
||||
attrName = "rollback";
|
||||
}
|
||||
{
|
||||
name = "statefulsets";
|
||||
group = "apps";
|
||||
version = "v1beta1";
|
||||
kind = "StatefulSet";
|
||||
attrName = "statefulSets";
|
||||
}
|
||||
{
|
||||
name = "controllerrevisions";
|
||||
group = "apps";
|
||||
version = "v1beta2";
|
||||
kind = "ControllerRevision";
|
||||
attrName = "controllerRevisions";
|
||||
}
|
||||
{
|
||||
name = "daemonsets";
|
||||
group = "apps";
|
||||
version = "v1beta2";
|
||||
kind = "DaemonSet";
|
||||
attrName = "daemonSets";
|
||||
}
|
||||
{
|
||||
name = "deployments";
|
||||
group = "apps";
|
||||
version = "v1beta2";
|
||||
kind = "Deployment";
|
||||
attrName = "deployments";
|
||||
}
|
||||
{
|
||||
name = "replicasets";
|
||||
group = "apps";
|
||||
version = "v1beta2";
|
||||
kind = "ReplicaSet";
|
||||
attrName = "replicaSets";
|
||||
}
|
||||
{
|
||||
name = "statefulsets";
|
||||
group = "apps";
|
||||
version = "v1beta2";
|
||||
kind = "StatefulSet";
|
||||
attrName = "statefulSets";
|
||||
}
|
||||
{
|
||||
name = "auditsinks";
|
||||
group = "auditregistration.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "AuditSink";
|
||||
attrName = "auditSinks";
|
||||
}
|
||||
{
|
||||
name = "tokenreviews";
|
||||
group = "authentication.k8s.io";
|
||||
version = "v1";
|
||||
kind = "TokenReview";
|
||||
attrName = "tokenReviews";
|
||||
}
|
||||
{
|
||||
name = "tokenreviews";
|
||||
group = "authentication.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "TokenReview";
|
||||
attrName = "tokenReviews";
|
||||
}
|
||||
{
|
||||
name = "localsubjectaccessreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "LocalSubjectAccessReview";
|
||||
attrName = "localSubjectAccessReviews";
|
||||
}
|
||||
{
|
||||
name = "selfsubjectaccessreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "SelfSubjectAccessReview";
|
||||
attrName = "selfSubjectAccessReviews";
|
||||
}
|
||||
{
|
||||
name = "selfsubjectrulesreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "SelfSubjectRulesReview";
|
||||
attrName = "selfSubjectRulesReviews";
|
||||
}
|
||||
{
|
||||
name = "subjectaccessreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "SubjectAccessReview";
|
||||
attrName = "subjectAccessReviews";
|
||||
}
|
||||
{
|
||||
name = "localsubjectaccessreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "LocalSubjectAccessReview";
|
||||
attrName = "localSubjectAccessReviews";
|
||||
}
|
||||
{
|
||||
name = "selfsubjectaccessreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "SelfSubjectAccessReview";
|
||||
attrName = "selfSubjectAccessReviews";
|
||||
}
|
||||
{
|
||||
name = "selfsubjectrulesreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "SelfSubjectRulesReview";
|
||||
attrName = "selfSubjectRulesReviews";
|
||||
}
|
||||
{
|
||||
name = "subjectaccessreviews";
|
||||
group = "authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "SubjectAccessReview";
|
||||
attrName = "subjectAccessReviews";
|
||||
}
|
||||
{
|
||||
name = "horizontalpodautoscalers";
|
||||
group = "autoscaling";
|
||||
version = "v1";
|
||||
kind = "HorizontalPodAutoscaler";
|
||||
attrName = "horizontalPodAutoscalers";
|
||||
}
|
||||
{
|
||||
name = "horizontalpodautoscalers";
|
||||
group = "autoscaling";
|
||||
version = "v2beta1";
|
||||
kind = "HorizontalPodAutoscaler";
|
||||
attrName = "horizontalPodAutoscalers";
|
||||
}
|
||||
{
|
||||
name = "horizontalpodautoscalers";
|
||||
group = "autoscaling";
|
||||
version = "v2beta2";
|
||||
kind = "HorizontalPodAutoscaler";
|
||||
attrName = "horizontalPodAutoscalers";
|
||||
}
|
||||
{
|
||||
name = "jobs";
|
||||
group = "batch";
|
||||
version = "v1";
|
||||
kind = "Job";
|
||||
attrName = "jobs";
|
||||
}
|
||||
{
|
||||
name = "cronjobs";
|
||||
group = "batch";
|
||||
version = "v1beta1";
|
||||
kind = "CronJob";
|
||||
attrName = "cronJobs";
|
||||
}
|
||||
{
|
||||
name = "cronjobs";
|
||||
group = "batch";
|
||||
version = "v2alpha1";
|
||||
kind = "CronJob";
|
||||
attrName = "cronJobs";
|
||||
}
|
||||
{
|
||||
name = "certificatesigningrequests";
|
||||
group = "certificates.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "CertificateSigningRequest";
|
||||
attrName = "certificateSigningRequests";
|
||||
}
|
||||
{
|
||||
name = "leases";
|
||||
group = "coordination.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "Lease";
|
||||
attrName = "leases";
|
||||
}
|
||||
{
|
||||
name = "bindings";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Binding";
|
||||
attrName = "bindings";
|
||||
}
|
||||
{
|
||||
name = "configmaps";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "ConfigMap";
|
||||
attrName = "configMaps";
|
||||
}
|
||||
{
|
||||
name = "endpoints";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Endpoints";
|
||||
attrName = "endpoints";
|
||||
}
|
||||
{
|
||||
name = "events";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Event";
|
||||
attrName = "events";
|
||||
}
|
||||
{
|
||||
name = "limitranges";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "LimitRange";
|
||||
attrName = "limitRanges";
|
||||
}
|
||||
{
|
||||
name = "namespaces";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Namespace";
|
||||
attrName = "namespaces";
|
||||
}
|
||||
{
|
||||
name = "nodes";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Node";
|
||||
attrName = "nodes";
|
||||
}
|
||||
{
|
||||
name = "persistentvolumes";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "PersistentVolume";
|
||||
attrName = "persistentVolumes";
|
||||
}
|
||||
{
|
||||
name = "persistentvolumeclaims";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "PersistentVolumeClaim";
|
||||
attrName = "persistentVolumeClaims";
|
||||
}
|
||||
{
|
||||
name = "pods";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Pod";
|
||||
attrName = "pods";
|
||||
}
|
||||
{
|
||||
name = "podtemplates";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "PodTemplate";
|
||||
attrName = "podTemplates";
|
||||
}
|
||||
{
|
||||
name = "replicationcontrollers";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "ReplicationController";
|
||||
attrName = "replicationControllers";
|
||||
}
|
||||
{
|
||||
name = "resourcequotas";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "ResourceQuota";
|
||||
attrName = "resourceQuotas";
|
||||
}
|
||||
{
|
||||
name = "secrets";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Secret";
|
||||
attrName = "secrets";
|
||||
}
|
||||
{
|
||||
name = "services";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "Service";
|
||||
attrName = "services";
|
||||
}
|
||||
{
|
||||
name = "serviceaccounts";
|
||||
group = "core";
|
||||
version = "v1";
|
||||
kind = "ServiceAccount";
|
||||
attrName = "serviceAccounts";
|
||||
}
|
||||
{
|
||||
name = "events";
|
||||
group = "events.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "Event";
|
||||
attrName = "events";
|
||||
}
|
||||
{
|
||||
name = "daemonsets";
|
||||
group = "extensions";
|
||||
version = "v1beta1";
|
||||
kind = "DaemonSet";
|
||||
attrName = "daemonSets";
|
||||
}
|
||||
{
|
||||
name = "deployments";
|
||||
group = "extensions";
|
||||
version = "v1beta1";
|
||||
kind = "Deployment";
|
||||
attrName = "deployments";
|
||||
}
|
||||
{
|
||||
name = "rollback";
|
||||
group = "extensions";
|
||||
version = "v1beta1";
|
||||
kind = "DeploymentRollback";
|
||||
attrName = "rollback";
|
||||
}
|
||||
{
|
||||
name = "ingresses";
|
||||
group = "extensions";
|
||||
version = "v1beta1";
|
||||
kind = "Ingress";
|
||||
attrName = "ingresses";
|
||||
}
|
||||
{
|
||||
name = "networkpolicies";
|
||||
group = "extensions";
|
||||
version = "v1beta1";
|
||||
kind = "NetworkPolicy";
|
||||
attrName = "networkPolicies";
|
||||
}
|
||||
{
|
||||
name = "podsecuritypolicies";
|
||||
group = "extensions";
|
||||
version = "v1beta1";
|
||||
kind = "PodSecurityPolicy";
|
||||
attrName = "podSecurityPolicies";
|
||||
}
|
||||
{
|
||||
name = "replicasets";
|
||||
group = "extensions";
|
||||
version = "v1beta1";
|
||||
kind = "ReplicaSet";
|
||||
attrName = "replicaSets";
|
||||
}
|
||||
{
|
||||
name = "networkpolicies";
|
||||
group = "networking.k8s.io";
|
||||
version = "v1";
|
||||
kind = "NetworkPolicy";
|
||||
attrName = "networkPolicies";
|
||||
}
|
||||
{
|
||||
name = "eviction";
|
||||
group = "policy";
|
||||
version = "v1beta1";
|
||||
kind = "Eviction";
|
||||
attrName = "eviction";
|
||||
}
|
||||
{
|
||||
name = "poddisruptionbudgets";
|
||||
group = "policy";
|
||||
version = "v1beta1";
|
||||
kind = "PodDisruptionBudget";
|
||||
attrName = "podDisruptionBudgets";
|
||||
}
|
||||
{
|
||||
name = "podsecuritypolicies";
|
||||
group = "policy";
|
||||
version = "v1beta1";
|
||||
kind = "PodSecurityPolicy";
|
||||
attrName = "podSecurityPolicies";
|
||||
}
|
||||
{
|
||||
name = "clusterroles";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "ClusterRole";
|
||||
attrName = "clusterRoles";
|
||||
}
|
||||
{
|
||||
name = "clusterrolebindings";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "ClusterRoleBinding";
|
||||
attrName = "clusterRoleBindings";
|
||||
}
|
||||
{
|
||||
name = "roles";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "Role";
|
||||
attrName = "roles";
|
||||
}
|
||||
{
|
||||
name = "rolebindings";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1";
|
||||
kind = "RoleBinding";
|
||||
attrName = "roleBindings";
|
||||
}
|
||||
{
|
||||
name = "clusterroles";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "ClusterRole";
|
||||
attrName = "clusterRoles";
|
||||
}
|
||||
{
|
||||
name = "clusterrolebindings";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "ClusterRoleBinding";
|
||||
attrName = "clusterRoleBindings";
|
||||
}
|
||||
{
|
||||
name = "roles";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "Role";
|
||||
attrName = "roles";
|
||||
}
|
||||
{
|
||||
name = "rolebindings";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "RoleBinding";
|
||||
attrName = "roleBindings";
|
||||
}
|
||||
{
|
||||
name = "clusterroles";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "ClusterRole";
|
||||
attrName = "clusterRoles";
|
||||
}
|
||||
{
|
||||
name = "clusterrolebindings";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "ClusterRoleBinding";
|
||||
attrName = "clusterRoleBindings";
|
||||
}
|
||||
{
|
||||
name = "roles";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "Role";
|
||||
attrName = "roles";
|
||||
}
|
||||
{
|
||||
name = "rolebindings";
|
||||
group = "rbac.authorization.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "RoleBinding";
|
||||
attrName = "roleBindings";
|
||||
}
|
||||
{
|
||||
name = "priorityclasses";
|
||||
group = "scheduling.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "PriorityClass";
|
||||
attrName = "priorityClasses";
|
||||
}
|
||||
{
|
||||
name = "priorityclasses";
|
||||
group = "scheduling.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "PriorityClass";
|
||||
attrName = "priorityClasses";
|
||||
}
|
||||
{
|
||||
name = "podpresets";
|
||||
group = "settings.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "PodPreset";
|
||||
attrName = "podPresets";
|
||||
}
|
||||
{
|
||||
name = "storageclasses";
|
||||
group = "storage.k8s.io";
|
||||
version = "v1";
|
||||
kind = "StorageClass";
|
||||
attrName = "storageClasses";
|
||||
}
|
||||
{
|
||||
name = "volumeattachments";
|
||||
group = "storage.k8s.io";
|
||||
version = "v1";
|
||||
kind = "VolumeAttachment";
|
||||
attrName = "volumeAttachments";
|
||||
}
|
||||
{
|
||||
name = "volumeattachments";
|
||||
group = "storage.k8s.io";
|
||||
version = "v1alpha1";
|
||||
kind = "VolumeAttachment";
|
||||
attrName = "volumeAttachments";
|
||||
}
|
||||
{
|
||||
name = "storageclasses";
|
||||
group = "storage.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "StorageClass";
|
||||
attrName = "storageClasses";
|
||||
}
|
||||
{
|
||||
name = "volumeattachments";
|
||||
group = "storage.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "VolumeAttachment";
|
||||
attrName = "volumeAttachments";
|
||||
}
|
||||
{
|
||||
name = "customresourcedefinitions";
|
||||
group = "apiextensions.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "CustomResourceDefinition";
|
||||
attrName = "customResourceDefinitions";
|
||||
}
|
||||
{
|
||||
name = "apiservices";
|
||||
group = "apiregistration.k8s.io";
|
||||
version = "v1";
|
||||
kind = "APIService";
|
||||
attrName = "APIServices";
|
||||
}
|
||||
{
|
||||
name = "apiservices";
|
||||
group = "apiregistration.k8s.io";
|
||||
version = "v1beta1";
|
||||
kind = "APIService";
|
||||
attrName = "APIServices";
|
||||
}
|
||||
];
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue