From ec3f7ecb1071249b1bfc090601428ef72a001900 Mon Sep 17 00:00:00 2001 From: Jaka Hudoklin Date: Fri, 27 Sep 2019 18:28:24 +0200 Subject: [PATCH] feat(k8s): improve aliased resource naming --- generators/k8s/default.nix | 27 ++++- lib/modules.nix | 50 ++++++++ modules/default.nix | 3 + modules/generated/v1.10.nix | 212 +++++++++++++++++----------------- modules/generated/v1.11.nix | 212 +++++++++++++++++----------------- modules/generated/v1.12.nix | 214 +++++++++++++++++------------------ modules/generated/v1.13.nix | 220 ++++++++++++++++++------------------ modules/generated/v1.7.nix | 190 +++++++++++++++---------------- modules/generated/v1.8.nix | 202 ++++++++++++++++----------------- modules/generated/v1.9.nix | 212 +++++++++++++++++----------------- modules/k8s.nix | 10 +- modules/submodules.nix | 46 +------- 12 files changed, 808 insertions(+), 790 deletions(-) create mode 100644 lib/modules.nix mode change 100644 => 100755 modules/generated/v1.10.nix mode change 100644 => 100755 modules/generated/v1.11.nix mode change 100644 => 100755 modules/generated/v1.12.nix mode change 100644 => 100755 modules/generated/v1.13.nix mode change 100644 => 100755 modules/generated/v1.7.nix mode change 100644 => 100755 modules/generated/v1.8.nix mode change 100644 => 100755 modules/generated/v1.9.nix diff --git a/generators/k8s/default.nix b/generators/k8s/default.nix index 6a2ea5b..7e6f3ed 100644 --- a/generators/k8s/default.nix +++ b/generators/k8s/default.nix @@ -199,17 +199,32 @@ let } ) swagger.definitions; + mapCharPairs = f: s1: s2: concatStrings (imap0 (i: c1: + f i c1 (if i >= stringLength s2 then "" else elemAt (stringToCharacters s2) i) + ) (stringToCharacters s1)); + + getAttrName = resource: kind: + mapCharPairs (i: c1: c2: + if hasPrefix "API" kind && i == 0 then "A" + else if i == 0 then c1 + else if c2 == "" || (toLower c2) != c1 then c1 + else c2 + ) resource kind; + genResourceTypes = swagger: mapAttrs' (name: path: let ref = refType (head path.post.parameters).schema; group' = path.post."x-kubernetes-group-version-kind".group; version' = path.post."x-kubernetes-group-version-kind".version; + kind' = path.post."x-kubernetes-group-version-kind".kind; + name' = last (splitString "/" name); + attrName = getAttrName name' kind'; in nameValuePair ref { - inherit ref; + inherit ref attrName; - name = last (splitString "/" name); + name = name'; group = if group' == "" then "core" else group'; version = version'; - kind = path.post."x-kubernetes-group-version-kind".kind; + kind = kind'; description = swagger.definitions.${ref}.description; defintion = refDefinition (head path.post.parameters).schema; }) @@ -369,7 +384,7 @@ let '') resourceTypes)} } // { ${concatStrings (mapAttrsToList (_: rt: '' - "${rt.name}" = ${genResourceOptions rt}; + "${rt.attrName}" = ${genResourceOptions rt}; '') latestResourceTypesByKind)} }; }; @@ -388,8 +403,8 @@ let resources = { ${concatStrings (mapAttrsToList (_: rt: '' - "${rt.name}" = - mkAliasDefinitions options.resources."${rt.group}"."${rt.version}"."${rt.kind}"; + "${rt.group}"."${rt.version}"."${rt.kind}" = + mkAliasDefinitions options.resources."${rt.attrName}"; '') latestResourceTypesByKind)} }; }; diff --git a/lib/modules.nix b/lib/modules.nix new file mode 100644 index 0000000..00b4fd2 --- /dev/null +++ b/lib/modules.nix @@ -0,0 +1,50 @@ +{ lib }: + +with lib; + +rec { + submoduleWithSpecialArgs = opts: specialArgs: + let + opts' = toList opts; + inherit (lib.modules) evalModules; + in + mkOptionType rec { + name = "submodule"; + check = x: isAttrs x || isFunction x; + merge = loc: defs: + let + coerce = def: if isFunction def then def else { config = def; }; + modules = opts' ++ map (def: { _file = def.file; imports = [(coerce def.value)]; }) defs; + in (evalModules { + inherit modules specialArgs; + prefix = loc; + }).config; + getSubOptions = prefix: (evalModules + { modules = opts'; inherit prefix specialArgs; + # This is a work-around due to the fact that some sub-modules, + # such as the one included in an attribute set, expects a "args" + # attribute to be given to the sub-module. As the option + # evaluation does not have any specific attribute name, we + # provide a default one for the documentation. + # + # This is mandatory as some option declaration might use the + # "name" attribute given as argument of the submodule and use it + # as the default of option declarations. + # + # Using lookalike unicode single angle quotation marks because + # of the docbook transformation the options receive. In all uses + # > and < wouldn't be encoded correctly so the encoded values + # would be used, and use of `<` and `>` would break the XML document. + # It shouldn't cause an issue since this is cosmetic for the manual. + args.name = "‹name›"; + }).options; + getSubModules = opts'; + substSubModules = m: submoduleWithSpecialArgs m specialArgs; + functor = (defaultFunctor name) // { + # Merging of submodules is done as part of mergeOptionDecls, as we have to annotate + # each submodule with its location. + payload = []; + binOp = lhs: rhs: []; + }; + }; +} diff --git a/modules/default.nix b/modules/default.nix index cb34fbd..86259d3 100644 --- a/modules/default.nix +++ b/modules/default.nix @@ -8,4 +8,7 @@ testing = ./testing.nix; test = ./test.nix; module = ./module.nix; + v1 = { + modules = ./v1/modules.nix; + }; } diff --git a/modules/generated/v1.10.nix b/modules/generated/v1.10.nix old mode 100644 new mode 100755 index 4beb4c6..0ac9e89 --- a/modules/generated/v1.10.nix +++ b/modules/generated/v1.10.nix @@ -27911,7 +27911,7 @@ in { }; } // { - "apiservices" = mkOption { + "APIServices" = mkOption { description = '' APIService represents a server for a particular GroupVersion. Name must be "version.group".''; type = (types.attrsOf @@ -27926,7 +27926,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Binding" "bindings" "Binding" "core" "v1")); default = { }; }; - "certificatesigningrequests" = mkOption { + "certificateSigningRequests" = mkOption { description = "Describes a certificate signing request"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.certificates.v1beta1.CertificateSigningRequest" @@ -27934,7 +27934,7 @@ in { "v1beta1")); default = { }; }; - "clusterroles" = mkOption { + "clusterRoles" = mkOption { description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; type = (types.attrsOf @@ -27942,7 +27942,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "clusterrolebindings" = mkOption { + "clusterRoleBindings" = mkOption { description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; type = (types.attrsOf @@ -27950,14 +27950,14 @@ in { "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1")); default = { }; }; - "configmaps" = mkOption { + "configMaps" = mkOption { description = "ConfigMap holds configuration data for pods to consume."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ConfigMap" "configmaps" "ConfigMap" "core" "v1")); default = { }; }; - "controllerrevisions" = mkOption { + "controllerRevisions" = mkOption { description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; type = (types.attrsOf @@ -27965,14 +27965,14 @@ in { "ControllerRevision" "apps" "v1")); default = { }; }; - "cronjobs" = mkOption { + "cronJobs" = mkOption { description = "CronJob represents the configuration of a single cron job."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1")); default = { }; }; - "customresourcedefinitions" = mkOption { + "customResourceDefinitions" = mkOption { description = "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format u003c.spec.nameu003e.u003c.spec.groupu003e."; type = (types.attrsOf (submoduleForDefinition @@ -27980,7 +27980,7 @@ in { "customresourcedefinitions" "CustomResourceDefinition" "apiextensions.k8s.io" "v1beta1")); default = { }; }; - "daemonsets" = mkOption { + "daemonSets" = mkOption { description = "DaemonSet represents the configuration of a daemon set."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" @@ -28035,7 +28035,7 @@ in { "policy" "v1beta1")); default = { }; }; - "horizontalpodautoscalers" = mkOption { + "horizontalPodAutoscalers" = mkOption { description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified."; type = (types.attrsOf @@ -28051,7 +28051,7 @@ in { "extensions" "v1beta1")); default = { }; }; - "initializerconfigurations" = mkOption { + "initializerConfigurations" = mkOption { description = "InitializerConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.admissionregistration.v1alpha1.InitializerConfiguration" @@ -28065,7 +28065,7 @@ in { (submoduleForDefinition "io.k8s.api.batch.v1.Job" "jobs" "Job" "batch" "v1")); default = { }; }; - "limitranges" = mkOption { + "limitRanges" = mkOption { description = "LimitRange sets resource usage limits for each kind of resource in a Namespace."; type = (types.attrsOf @@ -28073,7 +28073,7 @@ in { "v1")); default = { }; }; - "localsubjectaccessreviews" = mkOption { + "localSubjectAccessReviews" = mkOption { description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; type = (types.attrsOf @@ -28081,7 +28081,7 @@ in { "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "mutatingwebhookconfigurations" = mkOption { + "mutatingWebhookConfigurations" = mkOption { description = "MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object."; type = (types.attrsOf (submoduleForDefinition @@ -28098,7 +28098,7 @@ in { "v1")); default = { }; }; - "networkpolicies" = mkOption { + "networkPolicies" = mkOption { description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" @@ -28112,7 +28112,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Node" "nodes" "Node" "core" "v1")); default = { }; }; - "persistentvolumes" = mkOption { + "persistentVolumes" = mkOption { description = "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes"; type = (types.attrsOf @@ -28120,7 +28120,7 @@ in { "PersistentVolume" "core" "v1")); default = { }; }; - "persistentvolumeclaims" = mkOption { + "persistentVolumeClaims" = mkOption { description = "PersistentVolumeClaim is a user's request for and claim to a persistent volume"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PersistentVolumeClaim" @@ -28134,7 +28134,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Pod" "pods" "Pod" "core" "v1")); default = { }; }; - "poddisruptionbudgets" = mkOption { + "podDisruptionBudgets" = mkOption { description = "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods"; type = (types.attrsOf @@ -28142,7 +28142,7 @@ in { "poddisruptionbudgets" "PodDisruptionBudget" "policy" "v1beta1")); default = { }; }; - "podpresets" = mkOption { + "podPresets" = mkOption { description = "PodPreset is a policy resource that defines additional runtime requirements for a Pod."; type = (types.attrsOf @@ -28150,7 +28150,7 @@ in { "settings.k8s.io" "v1alpha1")); default = { }; }; - "podsecuritypolicies" = mkOption { + "podSecurityPolicies" = mkOption { description = "Pod Security Policy governs the ability to make requests that affect the Security Context that will be applied to a pod and container."; type = (types.attrsOf @@ -28158,14 +28158,14 @@ in { "podsecuritypolicies" "PodSecurityPolicy" "extensions" "v1beta1")); default = { }; }; - "podtemplates" = mkOption { + "podTemplates" = mkOption { description = "PodTemplate describes a template for creating copies of a predefined pod."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PodTemplate" "podtemplates" "PodTemplate" "core" "v1")); default = { }; }; - "priorityclasses" = mkOption { + "priorityClasses" = mkOption { description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; type = (types.attrsOf @@ -28173,7 +28173,7 @@ in { "PriorityClass" "scheduling.k8s.io" "v1alpha1")); default = { }; }; - "replicasets" = mkOption { + "replicaSets" = mkOption { description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time."; type = (types.attrsOf @@ -28181,14 +28181,14 @@ in { "v1")); default = { }; }; - "replicationcontrollers" = mkOption { + "replicationControllers" = mkOption { description = "ReplicationController represents the configuration of a replication controller."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ReplicationController" "replicationcontrollers" "ReplicationController" "core" "v1")); default = { }; }; - "resourcequotas" = mkOption { + "resourceQuotas" = mkOption { description = "ResourceQuota sets aggregate quota restrictions enforced per namespace"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ResourceQuota" "resourcequotas" @@ -28202,7 +28202,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "rolebindings" = mkOption { + "roleBindings" = mkOption { description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; type = (types.attrsOf @@ -28217,7 +28217,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Secret" "secrets" "Secret" "core" "v1")); default = { }; }; - "selfsubjectaccessreviews" = mkOption { + "selfSubjectAccessReviews" = mkOption { description = '' SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action''; type = (types.attrsOf @@ -28225,7 +28225,7 @@ in { "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "selfsubjectrulesreviews" = mkOption { + "selfSubjectRulesReviews" = mkOption { description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; type = (types.attrsOf @@ -28240,7 +28240,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Service" "services" "Service" "core" "v1")); default = { }; }; - "serviceaccounts" = mkOption { + "serviceAccounts" = mkOption { description = "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets"; type = (types.attrsOf @@ -28248,7 +28248,7 @@ in { "ServiceAccount" "core" "v1")); default = { }; }; - "statefulsets" = mkOption { + "statefulSets" = mkOption { description = '' StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. @@ -28259,7 +28259,7 @@ in { "apps" "v1")); default = { }; }; - "storageclasses" = mkOption { + "storageClasses" = mkOption { description = '' StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. @@ -28269,7 +28269,7 @@ in { "StorageClass" "storage.k8s.io" "v1")); default = { }; }; - "subjectaccessreviews" = mkOption { + "subjectAccessReviews" = mkOption { description = "SubjectAccessReview checks whether or not a user or group can perform an action."; type = (types.attrsOf @@ -28277,7 +28277,7 @@ in { "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "tokenreviews" = mkOption { + "tokenReviews" = mkOption { description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; type = (types.attrsOf @@ -28285,7 +28285,7 @@ in { "TokenReview" "authentication.k8s.io" "v1")); default = { }; }; - "validatingwebhookconfigurations" = mkOption { + "validatingWebhookConfigurations" = mkOption { description = "ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it."; type = (types.attrsOf (submoduleForDefinition @@ -28294,7 +28294,7 @@ in { "admissionregistration.k8s.io" "v1beta1")); default = { }; }; - "volumeattachments" = mkOption { + "volumeAttachments" = mkOption { description = '' VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node. @@ -28809,77 +28809,77 @@ in { ]; resources = { - "apiservices" = - mkAliasDefinitions options.resources."apiregistration.k8s.io"."v1"."APIService"; - "bindings" = mkAliasDefinitions options.resources."core"."v1"."Binding"; - "certificatesigningrequests" = mkAliasDefinitions - options.resources."certificates.k8s.io"."v1beta1"."CertificateSigningRequest"; - "clusterroles" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRole"; - "clusterrolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRoleBinding"; - "configmaps" = mkAliasDefinitions options.resources."core"."v1"."ConfigMap"; - "controllerrevisions" = mkAliasDefinitions options.resources."apps"."v1"."ControllerRevision"; - "cronjobs" = mkAliasDefinitions options.resources."batch"."v2alpha1"."CronJob"; - "customresourcedefinitions" = mkAliasDefinitions - options.resources."apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition"; - "daemonsets" = mkAliasDefinitions options.resources."apps"."v1"."DaemonSet"; - "deployments" = mkAliasDefinitions options.resources."apps"."v1"."Deployment"; - "rollback" = mkAliasDefinitions options.resources."apps"."v1beta1"."DeploymentRollback"; - "endpoints" = mkAliasDefinitions options.resources."core"."v1"."Endpoints"; - "events" = mkAliasDefinitions options.resources."core"."v1"."Event"; - "eviction" = mkAliasDefinitions options.resources."policy"."v1beta1"."Eviction"; - "horizontalpodautoscalers" = - mkAliasDefinitions options.resources."autoscaling"."v2beta1"."HorizontalPodAutoscaler"; - "ingresses" = mkAliasDefinitions options.resources."extensions"."v1beta1"."Ingress"; - "initializerconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration"; - "jobs" = mkAliasDefinitions options.resources."batch"."v1"."Job"; - "limitranges" = mkAliasDefinitions options.resources."core"."v1"."LimitRange"; - "localsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."LocalSubjectAccessReview"; - "mutatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration"; - "namespaces" = mkAliasDefinitions options.resources."core"."v1"."Namespace"; - "networkpolicies" = - mkAliasDefinitions options.resources."networking.k8s.io"."v1"."NetworkPolicy"; - "nodes" = mkAliasDefinitions options.resources."core"."v1"."Node"; - "persistentvolumes" = mkAliasDefinitions options.resources."core"."v1"."PersistentVolume"; - "persistentvolumeclaims" = - mkAliasDefinitions options.resources."core"."v1"."PersistentVolumeClaim"; - "pods" = mkAliasDefinitions options.resources."core"."v1"."Pod"; - "poddisruptionbudgets" = - mkAliasDefinitions options.resources."policy"."v1beta1"."PodDisruptionBudget"; - "podpresets" = mkAliasDefinitions options.resources."settings.k8s.io"."v1alpha1"."PodPreset"; - "podsecuritypolicies" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."PodSecurityPolicy"; - "podtemplates" = mkAliasDefinitions options.resources."core"."v1"."PodTemplate"; - "priorityclasses" = - mkAliasDefinitions options.resources."scheduling.k8s.io"."v1alpha1"."PriorityClass"; - "replicasets" = mkAliasDefinitions options.resources."apps"."v1"."ReplicaSet"; - "replicationcontrollers" = - mkAliasDefinitions options.resources."core"."v1"."ReplicationController"; - "resourcequotas" = mkAliasDefinitions options.resources."core"."v1"."ResourceQuota"; - "roles" = mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."Role"; - "rolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."RoleBinding"; - "secrets" = mkAliasDefinitions options.resources."core"."v1"."Secret"; - "selfsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectAccessReview"; - "selfsubjectrulesreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectRulesReview"; - "services" = mkAliasDefinitions options.resources."core"."v1"."Service"; - "serviceaccounts" = mkAliasDefinitions options.resources."core"."v1"."ServiceAccount"; - "statefulsets" = mkAliasDefinitions options.resources."apps"."v1"."StatefulSet"; - "storageclasses" = mkAliasDefinitions options.resources."storage.k8s.io"."v1"."StorageClass"; - "subjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SubjectAccessReview"; - "tokenreviews" = - mkAliasDefinitions options.resources."authentication.k8s.io"."v1"."TokenReview"; - "validatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration"; - "volumeattachments" = - mkAliasDefinitions options.resources."storage.k8s.io"."v1beta1"."VolumeAttachment"; + "apiregistration.k8s.io"."v1"."APIService" = + mkAliasDefinitions options.resources."APIServices"; + "core"."v1"."Binding" = mkAliasDefinitions options.resources."bindings"; + "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = + mkAliasDefinitions options.resources."certificateSigningRequests"; + "rbac.authorization.k8s.io"."v1"."ClusterRole" = + mkAliasDefinitions options.resources."clusterRoles"; + "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = + mkAliasDefinitions options.resources."clusterRoleBindings"; + "core"."v1"."ConfigMap" = mkAliasDefinitions options.resources."configMaps"; + "apps"."v1"."ControllerRevision" = mkAliasDefinitions options.resources."controllerRevisions"; + "batch"."v2alpha1"."CronJob" = mkAliasDefinitions options.resources."cronJobs"; + "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = + mkAliasDefinitions options.resources."customResourceDefinitions"; + "apps"."v1"."DaemonSet" = mkAliasDefinitions options.resources."daemonSets"; + "apps"."v1"."Deployment" = mkAliasDefinitions options.resources."deployments"; + "apps"."v1beta1"."DeploymentRollback" = mkAliasDefinitions options.resources."rollback"; + "core"."v1"."Endpoints" = mkAliasDefinitions options.resources."endpoints"; + "core"."v1"."Event" = mkAliasDefinitions options.resources."events"; + "policy"."v1beta1"."Eviction" = mkAliasDefinitions options.resources."eviction"; + "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = + mkAliasDefinitions options.resources."horizontalPodAutoscalers"; + "extensions"."v1beta1"."Ingress" = mkAliasDefinitions options.resources."ingresses"; + "admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration" = + mkAliasDefinitions options.resources."initializerConfigurations"; + "batch"."v1"."Job" = mkAliasDefinitions options.resources."jobs"; + "core"."v1"."LimitRange" = mkAliasDefinitions options.resources."limitRanges"; + "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = + mkAliasDefinitions options.resources."localSubjectAccessReviews"; + "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = + mkAliasDefinitions options.resources."mutatingWebhookConfigurations"; + "core"."v1"."Namespace" = mkAliasDefinitions options.resources."namespaces"; + "networking.k8s.io"."v1"."NetworkPolicy" = + mkAliasDefinitions options.resources."networkPolicies"; + "core"."v1"."Node" = mkAliasDefinitions options.resources."nodes"; + "core"."v1"."PersistentVolume" = mkAliasDefinitions options.resources."persistentVolumes"; + "core"."v1"."PersistentVolumeClaim" = + mkAliasDefinitions options.resources."persistentVolumeClaims"; + "core"."v1"."Pod" = mkAliasDefinitions options.resources."pods"; + "policy"."v1beta1"."PodDisruptionBudget" = + mkAliasDefinitions options.resources."podDisruptionBudgets"; + "settings.k8s.io"."v1alpha1"."PodPreset" = mkAliasDefinitions options.resources."podPresets"; + "extensions"."v1beta1"."PodSecurityPolicy" = + mkAliasDefinitions options.resources."podSecurityPolicies"; + "core"."v1"."PodTemplate" = mkAliasDefinitions options.resources."podTemplates"; + "scheduling.k8s.io"."v1alpha1"."PriorityClass" = + mkAliasDefinitions options.resources."priorityClasses"; + "apps"."v1"."ReplicaSet" = mkAliasDefinitions options.resources."replicaSets"; + "core"."v1"."ReplicationController" = + mkAliasDefinitions options.resources."replicationControllers"; + "core"."v1"."ResourceQuota" = mkAliasDefinitions options.resources."resourceQuotas"; + "rbac.authorization.k8s.io"."v1"."Role" = mkAliasDefinitions options.resources."roles"; + "rbac.authorization.k8s.io"."v1"."RoleBinding" = + mkAliasDefinitions options.resources."roleBindings"; + "core"."v1"."Secret" = mkAliasDefinitions options.resources."secrets"; + "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = + mkAliasDefinitions options.resources."selfSubjectAccessReviews"; + "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = + mkAliasDefinitions options.resources."selfSubjectRulesReviews"; + "core"."v1"."Service" = mkAliasDefinitions options.resources."services"; + "core"."v1"."ServiceAccount" = mkAliasDefinitions options.resources."serviceAccounts"; + "apps"."v1"."StatefulSet" = mkAliasDefinitions options.resources."statefulSets"; + "storage.k8s.io"."v1"."StorageClass" = mkAliasDefinitions options.resources."storageClasses"; + "authorization.k8s.io"."v1"."SubjectAccessReview" = + mkAliasDefinitions options.resources."subjectAccessReviews"; + "authentication.k8s.io"."v1"."TokenReview" = + mkAliasDefinitions options.resources."tokenReviews"; + "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = + mkAliasDefinitions options.resources."validatingWebhookConfigurations"; + "storage.k8s.io"."v1beta1"."VolumeAttachment" = + mkAliasDefinitions options.resources."volumeAttachments"; }; }; diff --git a/modules/generated/v1.11.nix b/modules/generated/v1.11.nix old mode 100644 new mode 100755 index ab1f44a..0a75f0f --- a/modules/generated/v1.11.nix +++ b/modules/generated/v1.11.nix @@ -28456,7 +28456,7 @@ in { }; } // { - "apiservices" = mkOption { + "APIServices" = mkOption { description = '' APIService represents a server for a particular GroupVersion. Name must be "version.group".''; type = (types.attrsOf @@ -28471,7 +28471,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Binding" "bindings" "Binding" "core" "v1")); default = { }; }; - "certificatesigningrequests" = mkOption { + "certificateSigningRequests" = mkOption { description = "Describes a certificate signing request"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.certificates.v1beta1.CertificateSigningRequest" @@ -28479,7 +28479,7 @@ in { "v1beta1")); default = { }; }; - "clusterroles" = mkOption { + "clusterRoles" = mkOption { description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; type = (types.attrsOf @@ -28487,7 +28487,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "clusterrolebindings" = mkOption { + "clusterRoleBindings" = mkOption { description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; type = (types.attrsOf @@ -28495,14 +28495,14 @@ in { "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1")); default = { }; }; - "configmaps" = mkOption { + "configMaps" = mkOption { description = "ConfigMap holds configuration data for pods to consume."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ConfigMap" "configmaps" "ConfigMap" "core" "v1")); default = { }; }; - "controllerrevisions" = mkOption { + "controllerRevisions" = mkOption { description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; type = (types.attrsOf @@ -28510,14 +28510,14 @@ in { "ControllerRevision" "apps" "v1")); default = { }; }; - "cronjobs" = mkOption { + "cronJobs" = mkOption { description = "CronJob represents the configuration of a single cron job."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1")); default = { }; }; - "customresourcedefinitions" = mkOption { + "customResourceDefinitions" = mkOption { description = "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format u003c.spec.nameu003e.u003c.spec.groupu003e."; type = (types.attrsOf (submoduleForDefinition @@ -28525,7 +28525,7 @@ in { "customresourcedefinitions" "CustomResourceDefinition" "apiextensions.k8s.io" "v1beta1")); default = { }; }; - "daemonsets" = mkOption { + "daemonSets" = mkOption { description = "DaemonSet represents the configuration of a daemon set."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" @@ -28580,7 +28580,7 @@ in { "policy" "v1beta1")); default = { }; }; - "horizontalpodautoscalers" = mkOption { + "horizontalPodAutoscalers" = mkOption { description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified."; type = (types.attrsOf @@ -28596,7 +28596,7 @@ in { "extensions" "v1beta1")); default = { }; }; - "initializerconfigurations" = mkOption { + "initializerConfigurations" = mkOption { description = "InitializerConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.admissionregistration.v1alpha1.InitializerConfiguration" @@ -28610,7 +28610,7 @@ in { (submoduleForDefinition "io.k8s.api.batch.v1.Job" "jobs" "Job" "batch" "v1")); default = { }; }; - "limitranges" = mkOption { + "limitRanges" = mkOption { description = "LimitRange sets resource usage limits for each kind of resource in a Namespace."; type = (types.attrsOf @@ -28618,7 +28618,7 @@ in { "v1")); default = { }; }; - "localsubjectaccessreviews" = mkOption { + "localSubjectAccessReviews" = mkOption { description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; type = (types.attrsOf @@ -28626,7 +28626,7 @@ in { "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "mutatingwebhookconfigurations" = mkOption { + "mutatingWebhookConfigurations" = mkOption { description = "MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object."; type = (types.attrsOf (submoduleForDefinition @@ -28643,7 +28643,7 @@ in { "v1")); default = { }; }; - "networkpolicies" = mkOption { + "networkPolicies" = mkOption { description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" @@ -28657,7 +28657,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Node" "nodes" "Node" "core" "v1")); default = { }; }; - "persistentvolumes" = mkOption { + "persistentVolumes" = mkOption { description = "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes"; type = (types.attrsOf @@ -28665,7 +28665,7 @@ in { "PersistentVolume" "core" "v1")); default = { }; }; - "persistentvolumeclaims" = mkOption { + "persistentVolumeClaims" = mkOption { description = "PersistentVolumeClaim is a user's request for and claim to a persistent volume"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PersistentVolumeClaim" @@ -28679,7 +28679,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Pod" "pods" "Pod" "core" "v1")); default = { }; }; - "poddisruptionbudgets" = mkOption { + "podDisruptionBudgets" = mkOption { description = "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods"; type = (types.attrsOf @@ -28687,7 +28687,7 @@ in { "poddisruptionbudgets" "PodDisruptionBudget" "policy" "v1beta1")); default = { }; }; - "podpresets" = mkOption { + "podPresets" = mkOption { description = "PodPreset is a policy resource that defines additional runtime requirements for a Pod."; type = (types.attrsOf @@ -28695,7 +28695,7 @@ in { "settings.k8s.io" "v1alpha1")); default = { }; }; - "podsecuritypolicies" = mkOption { + "podSecurityPolicies" = mkOption { description = "PodSecurityPolicy governs the ability to make requests that affect the Security Context that will be applied to a pod and container. Deprecated: use PodSecurityPolicy from policy API Group instead."; type = (types.attrsOf @@ -28703,14 +28703,14 @@ in { "podsecuritypolicies" "PodSecurityPolicy" "extensions" "v1beta1")); default = { }; }; - "podtemplates" = mkOption { + "podTemplates" = mkOption { description = "PodTemplate describes a template for creating copies of a predefined pod."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PodTemplate" "podtemplates" "PodTemplate" "core" "v1")); default = { }; }; - "priorityclasses" = mkOption { + "priorityClasses" = mkOption { description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; type = (types.attrsOf @@ -28718,7 +28718,7 @@ in { "PriorityClass" "scheduling.k8s.io" "v1beta1")); default = { }; }; - "replicasets" = mkOption { + "replicaSets" = mkOption { description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time."; type = (types.attrsOf @@ -28726,14 +28726,14 @@ in { "v1")); default = { }; }; - "replicationcontrollers" = mkOption { + "replicationControllers" = mkOption { description = "ReplicationController represents the configuration of a replication controller."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ReplicationController" "replicationcontrollers" "ReplicationController" "core" "v1")); default = { }; }; - "resourcequotas" = mkOption { + "resourceQuotas" = mkOption { description = "ResourceQuota sets aggregate quota restrictions enforced per namespace"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ResourceQuota" "resourcequotas" @@ -28747,7 +28747,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "rolebindings" = mkOption { + "roleBindings" = mkOption { description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; type = (types.attrsOf @@ -28762,7 +28762,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Secret" "secrets" "Secret" "core" "v1")); default = { }; }; - "selfsubjectaccessreviews" = mkOption { + "selfSubjectAccessReviews" = mkOption { description = '' SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action''; type = (types.attrsOf @@ -28770,7 +28770,7 @@ in { "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "selfsubjectrulesreviews" = mkOption { + "selfSubjectRulesReviews" = mkOption { description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; type = (types.attrsOf @@ -28785,7 +28785,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Service" "services" "Service" "core" "v1")); default = { }; }; - "serviceaccounts" = mkOption { + "serviceAccounts" = mkOption { description = "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets"; type = (types.attrsOf @@ -28793,7 +28793,7 @@ in { "ServiceAccount" "core" "v1")); default = { }; }; - "statefulsets" = mkOption { + "statefulSets" = mkOption { description = '' StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. @@ -28804,7 +28804,7 @@ in { "apps" "v1")); default = { }; }; - "storageclasses" = mkOption { + "storageClasses" = mkOption { description = '' StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. @@ -28814,7 +28814,7 @@ in { "StorageClass" "storage.k8s.io" "v1")); default = { }; }; - "subjectaccessreviews" = mkOption { + "subjectAccessReviews" = mkOption { description = "SubjectAccessReview checks whether or not a user or group can perform an action."; type = (types.attrsOf @@ -28822,7 +28822,7 @@ in { "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "tokenreviews" = mkOption { + "tokenReviews" = mkOption { description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; type = (types.attrsOf @@ -28830,7 +28830,7 @@ in { "TokenReview" "authentication.k8s.io" "v1")); default = { }; }; - "validatingwebhookconfigurations" = mkOption { + "validatingWebhookConfigurations" = mkOption { description = "ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it."; type = (types.attrsOf (submoduleForDefinition @@ -28839,7 +28839,7 @@ in { "admissionregistration.k8s.io" "v1beta1")); default = { }; }; - "volumeattachments" = mkOption { + "volumeAttachments" = mkOption { description = '' VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node. @@ -29360,77 +29360,77 @@ in { ]; resources = { - "apiservices" = - mkAliasDefinitions options.resources."apiregistration.k8s.io"."v1"."APIService"; - "bindings" = mkAliasDefinitions options.resources."core"."v1"."Binding"; - "certificatesigningrequests" = mkAliasDefinitions - options.resources."certificates.k8s.io"."v1beta1"."CertificateSigningRequest"; - "clusterroles" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRole"; - "clusterrolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRoleBinding"; - "configmaps" = mkAliasDefinitions options.resources."core"."v1"."ConfigMap"; - "controllerrevisions" = mkAliasDefinitions options.resources."apps"."v1"."ControllerRevision"; - "cronjobs" = mkAliasDefinitions options.resources."batch"."v2alpha1"."CronJob"; - "customresourcedefinitions" = mkAliasDefinitions - options.resources."apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition"; - "daemonsets" = mkAliasDefinitions options.resources."apps"."v1"."DaemonSet"; - "deployments" = mkAliasDefinitions options.resources."apps"."v1"."Deployment"; - "rollback" = mkAliasDefinitions options.resources."apps"."v1beta1"."DeploymentRollback"; - "endpoints" = mkAliasDefinitions options.resources."core"."v1"."Endpoints"; - "events" = mkAliasDefinitions options.resources."core"."v1"."Event"; - "eviction" = mkAliasDefinitions options.resources."policy"."v1beta1"."Eviction"; - "horizontalpodautoscalers" = - mkAliasDefinitions options.resources."autoscaling"."v2beta1"."HorizontalPodAutoscaler"; - "ingresses" = mkAliasDefinitions options.resources."extensions"."v1beta1"."Ingress"; - "initializerconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration"; - "jobs" = mkAliasDefinitions options.resources."batch"."v1"."Job"; - "limitranges" = mkAliasDefinitions options.resources."core"."v1"."LimitRange"; - "localsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."LocalSubjectAccessReview"; - "mutatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration"; - "namespaces" = mkAliasDefinitions options.resources."core"."v1"."Namespace"; - "networkpolicies" = - mkAliasDefinitions options.resources."networking.k8s.io"."v1"."NetworkPolicy"; - "nodes" = mkAliasDefinitions options.resources."core"."v1"."Node"; - "persistentvolumes" = mkAliasDefinitions options.resources."core"."v1"."PersistentVolume"; - "persistentvolumeclaims" = - mkAliasDefinitions options.resources."core"."v1"."PersistentVolumeClaim"; - "pods" = mkAliasDefinitions options.resources."core"."v1"."Pod"; - "poddisruptionbudgets" = - mkAliasDefinitions options.resources."policy"."v1beta1"."PodDisruptionBudget"; - "podpresets" = mkAliasDefinitions options.resources."settings.k8s.io"."v1alpha1"."PodPreset"; - "podsecuritypolicies" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."PodSecurityPolicy"; - "podtemplates" = mkAliasDefinitions options.resources."core"."v1"."PodTemplate"; - "priorityclasses" = - mkAliasDefinitions options.resources."scheduling.k8s.io"."v1beta1"."PriorityClass"; - "replicasets" = mkAliasDefinitions options.resources."apps"."v1"."ReplicaSet"; - "replicationcontrollers" = - mkAliasDefinitions options.resources."core"."v1"."ReplicationController"; - "resourcequotas" = mkAliasDefinitions options.resources."core"."v1"."ResourceQuota"; - "roles" = mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."Role"; - "rolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."RoleBinding"; - "secrets" = mkAliasDefinitions options.resources."core"."v1"."Secret"; - "selfsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectAccessReview"; - "selfsubjectrulesreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectRulesReview"; - "services" = mkAliasDefinitions options.resources."core"."v1"."Service"; - "serviceaccounts" = mkAliasDefinitions options.resources."core"."v1"."ServiceAccount"; - "statefulsets" = mkAliasDefinitions options.resources."apps"."v1"."StatefulSet"; - "storageclasses" = mkAliasDefinitions options.resources."storage.k8s.io"."v1"."StorageClass"; - "subjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SubjectAccessReview"; - "tokenreviews" = - mkAliasDefinitions options.resources."authentication.k8s.io"."v1"."TokenReview"; - "validatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration"; - "volumeattachments" = - mkAliasDefinitions options.resources."storage.k8s.io"."v1beta1"."VolumeAttachment"; + "apiregistration.k8s.io"."v1"."APIService" = + mkAliasDefinitions options.resources."APIServices"; + "core"."v1"."Binding" = mkAliasDefinitions options.resources."bindings"; + "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = + mkAliasDefinitions options.resources."certificateSigningRequests"; + "rbac.authorization.k8s.io"."v1"."ClusterRole" = + mkAliasDefinitions options.resources."clusterRoles"; + "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = + mkAliasDefinitions options.resources."clusterRoleBindings"; + "core"."v1"."ConfigMap" = mkAliasDefinitions options.resources."configMaps"; + "apps"."v1"."ControllerRevision" = mkAliasDefinitions options.resources."controllerRevisions"; + "batch"."v2alpha1"."CronJob" = mkAliasDefinitions options.resources."cronJobs"; + "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = + mkAliasDefinitions options.resources."customResourceDefinitions"; + "apps"."v1"."DaemonSet" = mkAliasDefinitions options.resources."daemonSets"; + "apps"."v1"."Deployment" = mkAliasDefinitions options.resources."deployments"; + "apps"."v1beta1"."DeploymentRollback" = mkAliasDefinitions options.resources."rollback"; + "core"."v1"."Endpoints" = mkAliasDefinitions options.resources."endpoints"; + "core"."v1"."Event" = mkAliasDefinitions options.resources."events"; + "policy"."v1beta1"."Eviction" = mkAliasDefinitions options.resources."eviction"; + "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = + mkAliasDefinitions options.resources."horizontalPodAutoscalers"; + "extensions"."v1beta1"."Ingress" = mkAliasDefinitions options.resources."ingresses"; + "admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration" = + mkAliasDefinitions options.resources."initializerConfigurations"; + "batch"."v1"."Job" = mkAliasDefinitions options.resources."jobs"; + "core"."v1"."LimitRange" = mkAliasDefinitions options.resources."limitRanges"; + "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = + mkAliasDefinitions options.resources."localSubjectAccessReviews"; + "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = + mkAliasDefinitions options.resources."mutatingWebhookConfigurations"; + "core"."v1"."Namespace" = mkAliasDefinitions options.resources."namespaces"; + "networking.k8s.io"."v1"."NetworkPolicy" = + mkAliasDefinitions options.resources."networkPolicies"; + "core"."v1"."Node" = mkAliasDefinitions options.resources."nodes"; + "core"."v1"."PersistentVolume" = mkAliasDefinitions options.resources."persistentVolumes"; + "core"."v1"."PersistentVolumeClaim" = + mkAliasDefinitions options.resources."persistentVolumeClaims"; + "core"."v1"."Pod" = mkAliasDefinitions options.resources."pods"; + "policy"."v1beta1"."PodDisruptionBudget" = + mkAliasDefinitions options.resources."podDisruptionBudgets"; + "settings.k8s.io"."v1alpha1"."PodPreset" = mkAliasDefinitions options.resources."podPresets"; + "extensions"."v1beta1"."PodSecurityPolicy" = + mkAliasDefinitions options.resources."podSecurityPolicies"; + "core"."v1"."PodTemplate" = mkAliasDefinitions options.resources."podTemplates"; + "scheduling.k8s.io"."v1beta1"."PriorityClass" = + mkAliasDefinitions options.resources."priorityClasses"; + "apps"."v1"."ReplicaSet" = mkAliasDefinitions options.resources."replicaSets"; + "core"."v1"."ReplicationController" = + mkAliasDefinitions options.resources."replicationControllers"; + "core"."v1"."ResourceQuota" = mkAliasDefinitions options.resources."resourceQuotas"; + "rbac.authorization.k8s.io"."v1"."Role" = mkAliasDefinitions options.resources."roles"; + "rbac.authorization.k8s.io"."v1"."RoleBinding" = + mkAliasDefinitions options.resources."roleBindings"; + "core"."v1"."Secret" = mkAliasDefinitions options.resources."secrets"; + "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = + mkAliasDefinitions options.resources."selfSubjectAccessReviews"; + "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = + mkAliasDefinitions options.resources."selfSubjectRulesReviews"; + "core"."v1"."Service" = mkAliasDefinitions options.resources."services"; + "core"."v1"."ServiceAccount" = mkAliasDefinitions options.resources."serviceAccounts"; + "apps"."v1"."StatefulSet" = mkAliasDefinitions options.resources."statefulSets"; + "storage.k8s.io"."v1"."StorageClass" = mkAliasDefinitions options.resources."storageClasses"; + "authorization.k8s.io"."v1"."SubjectAccessReview" = + mkAliasDefinitions options.resources."subjectAccessReviews"; + "authentication.k8s.io"."v1"."TokenReview" = + mkAliasDefinitions options.resources."tokenReviews"; + "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = + mkAliasDefinitions options.resources."validatingWebhookConfigurations"; + "storage.k8s.io"."v1beta1"."VolumeAttachment" = + mkAliasDefinitions options.resources."volumeAttachments"; }; }; diff --git a/modules/generated/v1.12.nix b/modules/generated/v1.12.nix old mode 100644 new mode 100755 index 87016ba..7391dce --- a/modules/generated/v1.12.nix +++ b/modules/generated/v1.12.nix @@ -29212,7 +29212,7 @@ in { }; } // { - "apiservices" = mkOption { + "APIServices" = mkOption { description = '' APIService represents a server for a particular GroupVersion. Name must be "version.group".''; type = (types.attrsOf @@ -29227,7 +29227,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Binding" "bindings" "Binding" "core" "v1")); default = { }; }; - "certificatesigningrequests" = mkOption { + "certificateSigningRequests" = mkOption { description = "Describes a certificate signing request"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.certificates.v1beta1.CertificateSigningRequest" @@ -29235,7 +29235,7 @@ in { "v1beta1")); default = { }; }; - "clusterroles" = mkOption { + "clusterRoles" = mkOption { description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; type = (types.attrsOf @@ -29243,7 +29243,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "clusterrolebindings" = mkOption { + "clusterRoleBindings" = mkOption { description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; type = (types.attrsOf @@ -29251,14 +29251,14 @@ in { "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1")); default = { }; }; - "configmaps" = mkOption { + "configMaps" = mkOption { description = "ConfigMap holds configuration data for pods to consume."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ConfigMap" "configmaps" "ConfigMap" "core" "v1")); default = { }; }; - "controllerrevisions" = mkOption { + "controllerRevisions" = mkOption { description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; type = (types.attrsOf @@ -29266,14 +29266,14 @@ in { "ControllerRevision" "apps" "v1")); default = { }; }; - "cronjobs" = mkOption { + "cronJobs" = mkOption { description = "CronJob represents the configuration of a single cron job."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1")); default = { }; }; - "customresourcedefinitions" = mkOption { + "customResourceDefinitions" = mkOption { description = "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format u003c.spec.nameu003e.u003c.spec.groupu003e."; type = (types.attrsOf (submoduleForDefinition @@ -29281,7 +29281,7 @@ in { "customresourcedefinitions" "CustomResourceDefinition" "apiextensions.k8s.io" "v1beta1")); default = { }; }; - "daemonsets" = mkOption { + "daemonSets" = mkOption { description = "DaemonSet represents the configuration of a daemon set."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" @@ -29336,7 +29336,7 @@ in { "policy" "v1beta1")); default = { }; }; - "horizontalpodautoscalers" = mkOption { + "horizontalPodAutoscalers" = mkOption { description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified."; type = (types.attrsOf @@ -29352,7 +29352,7 @@ in { "extensions" "v1beta1")); default = { }; }; - "initializerconfigurations" = mkOption { + "initializerConfigurations" = mkOption { description = "InitializerConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.admissionregistration.v1alpha1.InitializerConfiguration" @@ -29373,7 +29373,7 @@ in { "coordination.k8s.io" "v1beta1")); default = { }; }; - "limitranges" = mkOption { + "limitRanges" = mkOption { description = "LimitRange sets resource usage limits for each kind of resource in a Namespace."; type = (types.attrsOf @@ -29381,7 +29381,7 @@ in { "v1")); default = { }; }; - "localsubjectaccessreviews" = mkOption { + "localSubjectAccessReviews" = mkOption { description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; type = (types.attrsOf @@ -29389,7 +29389,7 @@ in { "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "mutatingwebhookconfigurations" = mkOption { + "mutatingWebhookConfigurations" = mkOption { description = "MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object."; type = (types.attrsOf (submoduleForDefinition @@ -29406,7 +29406,7 @@ in { "v1")); default = { }; }; - "networkpolicies" = mkOption { + "networkPolicies" = mkOption { description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" @@ -29420,7 +29420,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Node" "nodes" "Node" "core" "v1")); default = { }; }; - "persistentvolumes" = mkOption { + "persistentVolumes" = mkOption { description = "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes"; type = (types.attrsOf @@ -29428,7 +29428,7 @@ in { "PersistentVolume" "core" "v1")); default = { }; }; - "persistentvolumeclaims" = mkOption { + "persistentVolumeClaims" = mkOption { description = "PersistentVolumeClaim is a user's request for and claim to a persistent volume"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PersistentVolumeClaim" @@ -29442,7 +29442,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Pod" "pods" "Pod" "core" "v1")); default = { }; }; - "poddisruptionbudgets" = mkOption { + "podDisruptionBudgets" = mkOption { description = "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods"; type = (types.attrsOf @@ -29450,7 +29450,7 @@ in { "poddisruptionbudgets" "PodDisruptionBudget" "policy" "v1beta1")); default = { }; }; - "podpresets" = mkOption { + "podPresets" = mkOption { description = "PodPreset is a policy resource that defines additional runtime requirements for a Pod."; type = (types.attrsOf @@ -29458,7 +29458,7 @@ in { "settings.k8s.io" "v1alpha1")); default = { }; }; - "podsecuritypolicies" = mkOption { + "podSecurityPolicies" = mkOption { description = "PodSecurityPolicy governs the ability to make requests that affect the Security Context that will be applied to a pod and container. Deprecated: use PodSecurityPolicy from policy API Group instead."; type = (types.attrsOf @@ -29466,14 +29466,14 @@ in { "podsecuritypolicies" "PodSecurityPolicy" "extensions" "v1beta1")); default = { }; }; - "podtemplates" = mkOption { + "podTemplates" = mkOption { description = "PodTemplate describes a template for creating copies of a predefined pod."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PodTemplate" "podtemplates" "PodTemplate" "core" "v1")); default = { }; }; - "priorityclasses" = mkOption { + "priorityClasses" = mkOption { description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; type = (types.attrsOf @@ -29481,7 +29481,7 @@ in { "PriorityClass" "scheduling.k8s.io" "v1beta1")); default = { }; }; - "replicasets" = mkOption { + "replicaSets" = mkOption { description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time."; type = (types.attrsOf @@ -29489,14 +29489,14 @@ in { "v1")); default = { }; }; - "replicationcontrollers" = mkOption { + "replicationControllers" = mkOption { description = "ReplicationController represents the configuration of a replication controller."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ReplicationController" "replicationcontrollers" "ReplicationController" "core" "v1")); default = { }; }; - "resourcequotas" = mkOption { + "resourceQuotas" = mkOption { description = "ResourceQuota sets aggregate quota restrictions enforced per namespace"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ResourceQuota" "resourcequotas" @@ -29510,7 +29510,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "rolebindings" = mkOption { + "roleBindings" = mkOption { description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; type = (types.attrsOf @@ -29525,7 +29525,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Secret" "secrets" "Secret" "core" "v1")); default = { }; }; - "selfsubjectaccessreviews" = mkOption { + "selfSubjectAccessReviews" = mkOption { description = '' SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action''; type = (types.attrsOf @@ -29533,7 +29533,7 @@ in { "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "selfsubjectrulesreviews" = mkOption { + "selfSubjectRulesReviews" = mkOption { description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; type = (types.attrsOf @@ -29548,7 +29548,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Service" "services" "Service" "core" "v1")); default = { }; }; - "serviceaccounts" = mkOption { + "serviceAccounts" = mkOption { description = "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets"; type = (types.attrsOf @@ -29556,7 +29556,7 @@ in { "ServiceAccount" "core" "v1")); default = { }; }; - "statefulsets" = mkOption { + "statefulSets" = mkOption { description = '' StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. @@ -29567,7 +29567,7 @@ in { "apps" "v1")); default = { }; }; - "storageclasses" = mkOption { + "storageClasses" = mkOption { description = '' StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. @@ -29577,7 +29577,7 @@ in { "StorageClass" "storage.k8s.io" "v1")); default = { }; }; - "subjectaccessreviews" = mkOption { + "subjectAccessReviews" = mkOption { description = "SubjectAccessReview checks whether or not a user or group can perform an action."; type = (types.attrsOf @@ -29585,7 +29585,7 @@ in { "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "tokenreviews" = mkOption { + "tokenReviews" = mkOption { description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; type = (types.attrsOf @@ -29593,7 +29593,7 @@ in { "TokenReview" "authentication.k8s.io" "v1")); default = { }; }; - "validatingwebhookconfigurations" = mkOption { + "validatingWebhookConfigurations" = mkOption { description = "ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it."; type = (types.attrsOf (submoduleForDefinition @@ -29602,7 +29602,7 @@ in { "admissionregistration.k8s.io" "v1beta1")); default = { }; }; - "volumeattachments" = mkOption { + "volumeAttachments" = mkOption { description = '' VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node. @@ -30135,78 +30135,78 @@ in { ]; resources = { - "apiservices" = - mkAliasDefinitions options.resources."apiregistration.k8s.io"."v1"."APIService"; - "bindings" = mkAliasDefinitions options.resources."core"."v1"."Binding"; - "certificatesigningrequests" = mkAliasDefinitions - options.resources."certificates.k8s.io"."v1beta1"."CertificateSigningRequest"; - "clusterroles" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRole"; - "clusterrolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRoleBinding"; - "configmaps" = mkAliasDefinitions options.resources."core"."v1"."ConfigMap"; - "controllerrevisions" = mkAliasDefinitions options.resources."apps"."v1"."ControllerRevision"; - "cronjobs" = mkAliasDefinitions options.resources."batch"."v2alpha1"."CronJob"; - "customresourcedefinitions" = mkAliasDefinitions - options.resources."apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition"; - "daemonsets" = mkAliasDefinitions options.resources."apps"."v1"."DaemonSet"; - "deployments" = mkAliasDefinitions options.resources."apps"."v1"."Deployment"; - "rollback" = mkAliasDefinitions options.resources."apps"."v1beta1"."DeploymentRollback"; - "endpoints" = mkAliasDefinitions options.resources."core"."v1"."Endpoints"; - "events" = mkAliasDefinitions options.resources."core"."v1"."Event"; - "eviction" = mkAliasDefinitions options.resources."policy"."v1beta1"."Eviction"; - "horizontalpodautoscalers" = - mkAliasDefinitions options.resources."autoscaling"."v2beta2"."HorizontalPodAutoscaler"; - "ingresses" = mkAliasDefinitions options.resources."extensions"."v1beta1"."Ingress"; - "initializerconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration"; - "jobs" = mkAliasDefinitions options.resources."batch"."v1"."Job"; - "leases" = mkAliasDefinitions options.resources."coordination.k8s.io"."v1beta1"."Lease"; - "limitranges" = mkAliasDefinitions options.resources."core"."v1"."LimitRange"; - "localsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."LocalSubjectAccessReview"; - "mutatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration"; - "namespaces" = mkAliasDefinitions options.resources."core"."v1"."Namespace"; - "networkpolicies" = - mkAliasDefinitions options.resources."networking.k8s.io"."v1"."NetworkPolicy"; - "nodes" = mkAliasDefinitions options.resources."core"."v1"."Node"; - "persistentvolumes" = mkAliasDefinitions options.resources."core"."v1"."PersistentVolume"; - "persistentvolumeclaims" = - mkAliasDefinitions options.resources."core"."v1"."PersistentVolumeClaim"; - "pods" = mkAliasDefinitions options.resources."core"."v1"."Pod"; - "poddisruptionbudgets" = - mkAliasDefinitions options.resources."policy"."v1beta1"."PodDisruptionBudget"; - "podpresets" = mkAliasDefinitions options.resources."settings.k8s.io"."v1alpha1"."PodPreset"; - "podsecuritypolicies" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."PodSecurityPolicy"; - "podtemplates" = mkAliasDefinitions options.resources."core"."v1"."PodTemplate"; - "priorityclasses" = - mkAliasDefinitions options.resources."scheduling.k8s.io"."v1beta1"."PriorityClass"; - "replicasets" = mkAliasDefinitions options.resources."apps"."v1"."ReplicaSet"; - "replicationcontrollers" = - mkAliasDefinitions options.resources."core"."v1"."ReplicationController"; - "resourcequotas" = mkAliasDefinitions options.resources."core"."v1"."ResourceQuota"; - "roles" = mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."Role"; - "rolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."RoleBinding"; - "secrets" = mkAliasDefinitions options.resources."core"."v1"."Secret"; - "selfsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectAccessReview"; - "selfsubjectrulesreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectRulesReview"; - "services" = mkAliasDefinitions options.resources."core"."v1"."Service"; - "serviceaccounts" = mkAliasDefinitions options.resources."core"."v1"."ServiceAccount"; - "statefulsets" = mkAliasDefinitions options.resources."apps"."v1"."StatefulSet"; - "storageclasses" = mkAliasDefinitions options.resources."storage.k8s.io"."v1"."StorageClass"; - "subjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SubjectAccessReview"; - "tokenreviews" = - mkAliasDefinitions options.resources."authentication.k8s.io"."v1"."TokenReview"; - "validatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration"; - "volumeattachments" = - mkAliasDefinitions options.resources."storage.k8s.io"."v1beta1"."VolumeAttachment"; + "apiregistration.k8s.io"."v1"."APIService" = + mkAliasDefinitions options.resources."APIServices"; + "core"."v1"."Binding" = mkAliasDefinitions options.resources."bindings"; + "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = + mkAliasDefinitions options.resources."certificateSigningRequests"; + "rbac.authorization.k8s.io"."v1"."ClusterRole" = + mkAliasDefinitions options.resources."clusterRoles"; + "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = + mkAliasDefinitions options.resources."clusterRoleBindings"; + "core"."v1"."ConfigMap" = mkAliasDefinitions options.resources."configMaps"; + "apps"."v1"."ControllerRevision" = mkAliasDefinitions options.resources."controllerRevisions"; + "batch"."v2alpha1"."CronJob" = mkAliasDefinitions options.resources."cronJobs"; + "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = + mkAliasDefinitions options.resources."customResourceDefinitions"; + "apps"."v1"."DaemonSet" = mkAliasDefinitions options.resources."daemonSets"; + "apps"."v1"."Deployment" = mkAliasDefinitions options.resources."deployments"; + "apps"."v1beta1"."DeploymentRollback" = mkAliasDefinitions options.resources."rollback"; + "core"."v1"."Endpoints" = mkAliasDefinitions options.resources."endpoints"; + "core"."v1"."Event" = mkAliasDefinitions options.resources."events"; + "policy"."v1beta1"."Eviction" = mkAliasDefinitions options.resources."eviction"; + "autoscaling"."v2beta2"."HorizontalPodAutoscaler" = + mkAliasDefinitions options.resources."horizontalPodAutoscalers"; + "extensions"."v1beta1"."Ingress" = mkAliasDefinitions options.resources."ingresses"; + "admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration" = + mkAliasDefinitions options.resources."initializerConfigurations"; + "batch"."v1"."Job" = mkAliasDefinitions options.resources."jobs"; + "coordination.k8s.io"."v1beta1"."Lease" = mkAliasDefinitions options.resources."leases"; + "core"."v1"."LimitRange" = mkAliasDefinitions options.resources."limitRanges"; + "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = + mkAliasDefinitions options.resources."localSubjectAccessReviews"; + "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = + mkAliasDefinitions options.resources."mutatingWebhookConfigurations"; + "core"."v1"."Namespace" = mkAliasDefinitions options.resources."namespaces"; + "networking.k8s.io"."v1"."NetworkPolicy" = + mkAliasDefinitions options.resources."networkPolicies"; + "core"."v1"."Node" = mkAliasDefinitions options.resources."nodes"; + "core"."v1"."PersistentVolume" = mkAliasDefinitions options.resources."persistentVolumes"; + "core"."v1"."PersistentVolumeClaim" = + mkAliasDefinitions options.resources."persistentVolumeClaims"; + "core"."v1"."Pod" = mkAliasDefinitions options.resources."pods"; + "policy"."v1beta1"."PodDisruptionBudget" = + mkAliasDefinitions options.resources."podDisruptionBudgets"; + "settings.k8s.io"."v1alpha1"."PodPreset" = mkAliasDefinitions options.resources."podPresets"; + "extensions"."v1beta1"."PodSecurityPolicy" = + mkAliasDefinitions options.resources."podSecurityPolicies"; + "core"."v1"."PodTemplate" = mkAliasDefinitions options.resources."podTemplates"; + "scheduling.k8s.io"."v1beta1"."PriorityClass" = + mkAliasDefinitions options.resources."priorityClasses"; + "apps"."v1"."ReplicaSet" = mkAliasDefinitions options.resources."replicaSets"; + "core"."v1"."ReplicationController" = + mkAliasDefinitions options.resources."replicationControllers"; + "core"."v1"."ResourceQuota" = mkAliasDefinitions options.resources."resourceQuotas"; + "rbac.authorization.k8s.io"."v1"."Role" = mkAliasDefinitions options.resources."roles"; + "rbac.authorization.k8s.io"."v1"."RoleBinding" = + mkAliasDefinitions options.resources."roleBindings"; + "core"."v1"."Secret" = mkAliasDefinitions options.resources."secrets"; + "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = + mkAliasDefinitions options.resources."selfSubjectAccessReviews"; + "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = + mkAliasDefinitions options.resources."selfSubjectRulesReviews"; + "core"."v1"."Service" = mkAliasDefinitions options.resources."services"; + "core"."v1"."ServiceAccount" = mkAliasDefinitions options.resources."serviceAccounts"; + "apps"."v1"."StatefulSet" = mkAliasDefinitions options.resources."statefulSets"; + "storage.k8s.io"."v1"."StorageClass" = mkAliasDefinitions options.resources."storageClasses"; + "authorization.k8s.io"."v1"."SubjectAccessReview" = + mkAliasDefinitions options.resources."subjectAccessReviews"; + "authentication.k8s.io"."v1"."TokenReview" = + mkAliasDefinitions options.resources."tokenReviews"; + "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = + mkAliasDefinitions options.resources."validatingWebhookConfigurations"; + "storage.k8s.io"."v1beta1"."VolumeAttachment" = + mkAliasDefinitions options.resources."volumeAttachments"; }; }; diff --git a/modules/generated/v1.13.nix b/modules/generated/v1.13.nix old mode 100644 new mode 100755 index 788304f..f86d2ba --- a/modules/generated/v1.13.nix +++ b/modules/generated/v1.13.nix @@ -29847,7 +29847,7 @@ in { }; } // { - "apiservices" = mkOption { + "APIServices" = mkOption { description = '' APIService represents a server for a particular GroupVersion. Name must be "version.group".''; type = (types.attrsOf @@ -29855,7 +29855,7 @@ in { "apiservices" "APIService" "apiregistration.k8s.io" "v1")); default = { }; }; - "auditsinks" = mkOption { + "auditSinks" = mkOption { description = "AuditSink represents a cluster level audit sink"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.auditregistration.v1alpha1.AuditSink" "auditsinks" @@ -29869,7 +29869,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Binding" "bindings" "Binding" "core" "v1")); default = { }; }; - "certificatesigningrequests" = mkOption { + "certificateSigningRequests" = mkOption { description = "Describes a certificate signing request"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.certificates.v1beta1.CertificateSigningRequest" @@ -29877,7 +29877,7 @@ in { "v1beta1")); default = { }; }; - "clusterroles" = mkOption { + "clusterRoles" = mkOption { description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; type = (types.attrsOf @@ -29885,7 +29885,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "clusterrolebindings" = mkOption { + "clusterRoleBindings" = mkOption { description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; type = (types.attrsOf @@ -29893,14 +29893,14 @@ in { "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1")); default = { }; }; - "configmaps" = mkOption { + "configMaps" = mkOption { description = "ConfigMap holds configuration data for pods to consume."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ConfigMap" "configmaps" "ConfigMap" "core" "v1")); default = { }; }; - "controllerrevisions" = mkOption { + "controllerRevisions" = mkOption { description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; type = (types.attrsOf @@ -29908,14 +29908,14 @@ in { "ControllerRevision" "apps" "v1")); default = { }; }; - "cronjobs" = mkOption { + "cronJobs" = mkOption { description = "CronJob represents the configuration of a single cron job."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1")); default = { }; }; - "customresourcedefinitions" = mkOption { + "customResourceDefinitions" = mkOption { description = "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format u003c.spec.nameu003e.u003c.spec.groupu003e."; type = (types.attrsOf (submoduleForDefinition @@ -29923,7 +29923,7 @@ in { "customresourcedefinitions" "CustomResourceDefinition" "apiextensions.k8s.io" "v1beta1")); default = { }; }; - "daemonsets" = mkOption { + "daemonSets" = mkOption { description = "DaemonSet represents the configuration of a daemon set."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" @@ -29978,7 +29978,7 @@ in { "policy" "v1beta1")); default = { }; }; - "horizontalpodautoscalers" = mkOption { + "horizontalPodAutoscalers" = mkOption { description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified."; type = (types.attrsOf @@ -29994,7 +29994,7 @@ in { "extensions" "v1beta1")); default = { }; }; - "initializerconfigurations" = mkOption { + "initializerConfigurations" = mkOption { description = "InitializerConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.admissionregistration.v1alpha1.InitializerConfiguration" @@ -30015,7 +30015,7 @@ in { "coordination.k8s.io" "v1beta1")); default = { }; }; - "limitranges" = mkOption { + "limitRanges" = mkOption { description = "LimitRange sets resource usage limits for each kind of resource in a Namespace."; type = (types.attrsOf @@ -30023,7 +30023,7 @@ in { "v1")); default = { }; }; - "localsubjectaccessreviews" = mkOption { + "localSubjectAccessReviews" = mkOption { description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; type = (types.attrsOf @@ -30031,7 +30031,7 @@ in { "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "mutatingwebhookconfigurations" = mkOption { + "mutatingWebhookConfigurations" = mkOption { description = "MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object."; type = (types.attrsOf (submoduleForDefinition @@ -30048,7 +30048,7 @@ in { "v1")); default = { }; }; - "networkpolicies" = mkOption { + "networkPolicies" = mkOption { description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" @@ -30062,7 +30062,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Node" "nodes" "Node" "core" "v1")); default = { }; }; - "persistentvolumes" = mkOption { + "persistentVolumes" = mkOption { description = "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes"; type = (types.attrsOf @@ -30070,7 +30070,7 @@ in { "PersistentVolume" "core" "v1")); default = { }; }; - "persistentvolumeclaims" = mkOption { + "persistentVolumeClaims" = mkOption { description = "PersistentVolumeClaim is a user's request for and claim to a persistent volume"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PersistentVolumeClaim" @@ -30084,7 +30084,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Pod" "pods" "Pod" "core" "v1")); default = { }; }; - "poddisruptionbudgets" = mkOption { + "podDisruptionBudgets" = mkOption { description = "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods"; type = (types.attrsOf @@ -30092,7 +30092,7 @@ in { "poddisruptionbudgets" "PodDisruptionBudget" "policy" "v1beta1")); default = { }; }; - "podpresets" = mkOption { + "podPresets" = mkOption { description = "PodPreset is a policy resource that defines additional runtime requirements for a Pod."; type = (types.attrsOf @@ -30100,7 +30100,7 @@ in { "settings.k8s.io" "v1alpha1")); default = { }; }; - "podsecuritypolicies" = mkOption { + "podSecurityPolicies" = mkOption { description = "PodSecurityPolicy governs the ability to make requests that affect the Security Context that will be applied to a pod and container. Deprecated: use PodSecurityPolicy from policy API Group instead."; type = (types.attrsOf @@ -30108,14 +30108,14 @@ in { "podsecuritypolicies" "PodSecurityPolicy" "extensions" "v1beta1")); default = { }; }; - "podtemplates" = mkOption { + "podTemplates" = mkOption { description = "PodTemplate describes a template for creating copies of a predefined pod."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PodTemplate" "podtemplates" "PodTemplate" "core" "v1")); default = { }; }; - "priorityclasses" = mkOption { + "priorityClasses" = mkOption { description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; type = (types.attrsOf @@ -30123,7 +30123,7 @@ in { "PriorityClass" "scheduling.k8s.io" "v1beta1")); default = { }; }; - "replicasets" = mkOption { + "replicaSets" = mkOption { description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time."; type = (types.attrsOf @@ -30131,14 +30131,14 @@ in { "v1")); default = { }; }; - "replicationcontrollers" = mkOption { + "replicationControllers" = mkOption { description = "ReplicationController represents the configuration of a replication controller."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ReplicationController" "replicationcontrollers" "ReplicationController" "core" "v1")); default = { }; }; - "resourcequotas" = mkOption { + "resourceQuotas" = mkOption { description = "ResourceQuota sets aggregate quota restrictions enforced per namespace"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ResourceQuota" "resourcequotas" @@ -30152,7 +30152,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "rolebindings" = mkOption { + "roleBindings" = mkOption { description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; type = (types.attrsOf @@ -30167,7 +30167,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Secret" "secrets" "Secret" "core" "v1")); default = { }; }; - "selfsubjectaccessreviews" = mkOption { + "selfSubjectAccessReviews" = mkOption { description = '' SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action''; type = (types.attrsOf @@ -30175,7 +30175,7 @@ in { "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "selfsubjectrulesreviews" = mkOption { + "selfSubjectRulesReviews" = mkOption { description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; type = (types.attrsOf @@ -30190,7 +30190,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Service" "services" "Service" "core" "v1")); default = { }; }; - "serviceaccounts" = mkOption { + "serviceAccounts" = mkOption { description = "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets"; type = (types.attrsOf @@ -30198,7 +30198,7 @@ in { "ServiceAccount" "core" "v1")); default = { }; }; - "statefulsets" = mkOption { + "statefulSets" = mkOption { description = '' StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. @@ -30209,7 +30209,7 @@ in { "apps" "v1")); default = { }; }; - "storageclasses" = mkOption { + "storageClasses" = mkOption { description = '' StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. @@ -30219,7 +30219,7 @@ in { "StorageClass" "storage.k8s.io" "v1")); default = { }; }; - "subjectaccessreviews" = mkOption { + "subjectAccessReviews" = mkOption { description = "SubjectAccessReview checks whether or not a user or group can perform an action."; type = (types.attrsOf @@ -30227,7 +30227,7 @@ in { "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "tokenreviews" = mkOption { + "tokenReviews" = mkOption { description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; type = (types.attrsOf @@ -30235,7 +30235,7 @@ in { "TokenReview" "authentication.k8s.io" "v1")); default = { }; }; - "validatingwebhookconfigurations" = mkOption { + "validatingWebhookConfigurations" = mkOption { description = "ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it."; type = (types.attrsOf (submoduleForDefinition @@ -30244,7 +30244,7 @@ in { "admissionregistration.k8s.io" "v1beta1")); default = { }; }; - "volumeattachments" = mkOption { + "volumeAttachments" = mkOption { description = '' VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node. @@ -30789,80 +30789,80 @@ in { ]; resources = { - "apiservices" = - mkAliasDefinitions options.resources."apiregistration.k8s.io"."v1"."APIService"; - "auditsinks" = - mkAliasDefinitions options.resources."auditregistration.k8s.io"."v1alpha1"."AuditSink"; - "bindings" = mkAliasDefinitions options.resources."core"."v1"."Binding"; - "certificatesigningrequests" = mkAliasDefinitions - options.resources."certificates.k8s.io"."v1beta1"."CertificateSigningRequest"; - "clusterroles" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRole"; - "clusterrolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRoleBinding"; - "configmaps" = mkAliasDefinitions options.resources."core"."v1"."ConfigMap"; - "controllerrevisions" = mkAliasDefinitions options.resources."apps"."v1"."ControllerRevision"; - "cronjobs" = mkAliasDefinitions options.resources."batch"."v2alpha1"."CronJob"; - "customresourcedefinitions" = mkAliasDefinitions - options.resources."apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition"; - "daemonsets" = mkAliasDefinitions options.resources."apps"."v1"."DaemonSet"; - "deployments" = mkAliasDefinitions options.resources."apps"."v1"."Deployment"; - "rollback" = mkAliasDefinitions options.resources."apps"."v1beta1"."DeploymentRollback"; - "endpoints" = mkAliasDefinitions options.resources."core"."v1"."Endpoints"; - "events" = mkAliasDefinitions options.resources."core"."v1"."Event"; - "eviction" = mkAliasDefinitions options.resources."policy"."v1beta1"."Eviction"; - "horizontalpodautoscalers" = - mkAliasDefinitions options.resources."autoscaling"."v2beta2"."HorizontalPodAutoscaler"; - "ingresses" = mkAliasDefinitions options.resources."extensions"."v1beta1"."Ingress"; - "initializerconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration"; - "jobs" = mkAliasDefinitions options.resources."batch"."v1"."Job"; - "leases" = mkAliasDefinitions options.resources."coordination.k8s.io"."v1beta1"."Lease"; - "limitranges" = mkAliasDefinitions options.resources."core"."v1"."LimitRange"; - "localsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."LocalSubjectAccessReview"; - "mutatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration"; - "namespaces" = mkAliasDefinitions options.resources."core"."v1"."Namespace"; - "networkpolicies" = - mkAliasDefinitions options.resources."networking.k8s.io"."v1"."NetworkPolicy"; - "nodes" = mkAliasDefinitions options.resources."core"."v1"."Node"; - "persistentvolumes" = mkAliasDefinitions options.resources."core"."v1"."PersistentVolume"; - "persistentvolumeclaims" = - mkAliasDefinitions options.resources."core"."v1"."PersistentVolumeClaim"; - "pods" = mkAliasDefinitions options.resources."core"."v1"."Pod"; - "poddisruptionbudgets" = - mkAliasDefinitions options.resources."policy"."v1beta1"."PodDisruptionBudget"; - "podpresets" = mkAliasDefinitions options.resources."settings.k8s.io"."v1alpha1"."PodPreset"; - "podsecuritypolicies" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."PodSecurityPolicy"; - "podtemplates" = mkAliasDefinitions options.resources."core"."v1"."PodTemplate"; - "priorityclasses" = - mkAliasDefinitions options.resources."scheduling.k8s.io"."v1beta1"."PriorityClass"; - "replicasets" = mkAliasDefinitions options.resources."apps"."v1"."ReplicaSet"; - "replicationcontrollers" = - mkAliasDefinitions options.resources."core"."v1"."ReplicationController"; - "resourcequotas" = mkAliasDefinitions options.resources."core"."v1"."ResourceQuota"; - "roles" = mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."Role"; - "rolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."RoleBinding"; - "secrets" = mkAliasDefinitions options.resources."core"."v1"."Secret"; - "selfsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectAccessReview"; - "selfsubjectrulesreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectRulesReview"; - "services" = mkAliasDefinitions options.resources."core"."v1"."Service"; - "serviceaccounts" = mkAliasDefinitions options.resources."core"."v1"."ServiceAccount"; - "statefulsets" = mkAliasDefinitions options.resources."apps"."v1"."StatefulSet"; - "storageclasses" = mkAliasDefinitions options.resources."storage.k8s.io"."v1"."StorageClass"; - "subjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SubjectAccessReview"; - "tokenreviews" = - mkAliasDefinitions options.resources."authentication.k8s.io"."v1"."TokenReview"; - "validatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration"; - "volumeattachments" = - mkAliasDefinitions options.resources."storage.k8s.io"."v1"."VolumeAttachment"; + "apiregistration.k8s.io"."v1"."APIService" = + mkAliasDefinitions options.resources."APIServices"; + "auditregistration.k8s.io"."v1alpha1"."AuditSink" = + mkAliasDefinitions options.resources."auditSinks"; + "core"."v1"."Binding" = mkAliasDefinitions options.resources."bindings"; + "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = + mkAliasDefinitions options.resources."certificateSigningRequests"; + "rbac.authorization.k8s.io"."v1"."ClusterRole" = + mkAliasDefinitions options.resources."clusterRoles"; + "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = + mkAliasDefinitions options.resources."clusterRoleBindings"; + "core"."v1"."ConfigMap" = mkAliasDefinitions options.resources."configMaps"; + "apps"."v1"."ControllerRevision" = mkAliasDefinitions options.resources."controllerRevisions"; + "batch"."v2alpha1"."CronJob" = mkAliasDefinitions options.resources."cronJobs"; + "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = + mkAliasDefinitions options.resources."customResourceDefinitions"; + "apps"."v1"."DaemonSet" = mkAliasDefinitions options.resources."daemonSets"; + "apps"."v1"."Deployment" = mkAliasDefinitions options.resources."deployments"; + "apps"."v1beta1"."DeploymentRollback" = mkAliasDefinitions options.resources."rollback"; + "core"."v1"."Endpoints" = mkAliasDefinitions options.resources."endpoints"; + "core"."v1"."Event" = mkAliasDefinitions options.resources."events"; + "policy"."v1beta1"."Eviction" = mkAliasDefinitions options.resources."eviction"; + "autoscaling"."v2beta2"."HorizontalPodAutoscaler" = + mkAliasDefinitions options.resources."horizontalPodAutoscalers"; + "extensions"."v1beta1"."Ingress" = mkAliasDefinitions options.resources."ingresses"; + "admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration" = + mkAliasDefinitions options.resources."initializerConfigurations"; + "batch"."v1"."Job" = mkAliasDefinitions options.resources."jobs"; + "coordination.k8s.io"."v1beta1"."Lease" = mkAliasDefinitions options.resources."leases"; + "core"."v1"."LimitRange" = mkAliasDefinitions options.resources."limitRanges"; + "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = + mkAliasDefinitions options.resources."localSubjectAccessReviews"; + "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = + mkAliasDefinitions options.resources."mutatingWebhookConfigurations"; + "core"."v1"."Namespace" = mkAliasDefinitions options.resources."namespaces"; + "networking.k8s.io"."v1"."NetworkPolicy" = + mkAliasDefinitions options.resources."networkPolicies"; + "core"."v1"."Node" = mkAliasDefinitions options.resources."nodes"; + "core"."v1"."PersistentVolume" = mkAliasDefinitions options.resources."persistentVolumes"; + "core"."v1"."PersistentVolumeClaim" = + mkAliasDefinitions options.resources."persistentVolumeClaims"; + "core"."v1"."Pod" = mkAliasDefinitions options.resources."pods"; + "policy"."v1beta1"."PodDisruptionBudget" = + mkAliasDefinitions options.resources."podDisruptionBudgets"; + "settings.k8s.io"."v1alpha1"."PodPreset" = mkAliasDefinitions options.resources."podPresets"; + "extensions"."v1beta1"."PodSecurityPolicy" = + mkAliasDefinitions options.resources."podSecurityPolicies"; + "core"."v1"."PodTemplate" = mkAliasDefinitions options.resources."podTemplates"; + "scheduling.k8s.io"."v1beta1"."PriorityClass" = + mkAliasDefinitions options.resources."priorityClasses"; + "apps"."v1"."ReplicaSet" = mkAliasDefinitions options.resources."replicaSets"; + "core"."v1"."ReplicationController" = + mkAliasDefinitions options.resources."replicationControllers"; + "core"."v1"."ResourceQuota" = mkAliasDefinitions options.resources."resourceQuotas"; + "rbac.authorization.k8s.io"."v1"."Role" = mkAliasDefinitions options.resources."roles"; + "rbac.authorization.k8s.io"."v1"."RoleBinding" = + mkAliasDefinitions options.resources."roleBindings"; + "core"."v1"."Secret" = mkAliasDefinitions options.resources."secrets"; + "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = + mkAliasDefinitions options.resources."selfSubjectAccessReviews"; + "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = + mkAliasDefinitions options.resources."selfSubjectRulesReviews"; + "core"."v1"."Service" = mkAliasDefinitions options.resources."services"; + "core"."v1"."ServiceAccount" = mkAliasDefinitions options.resources."serviceAccounts"; + "apps"."v1"."StatefulSet" = mkAliasDefinitions options.resources."statefulSets"; + "storage.k8s.io"."v1"."StorageClass" = mkAliasDefinitions options.resources."storageClasses"; + "authorization.k8s.io"."v1"."SubjectAccessReview" = + mkAliasDefinitions options.resources."subjectAccessReviews"; + "authentication.k8s.io"."v1"."TokenReview" = + mkAliasDefinitions options.resources."tokenReviews"; + "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = + mkAliasDefinitions options.resources."validatingWebhookConfigurations"; + "storage.k8s.io"."v1"."VolumeAttachment" = + mkAliasDefinitions options.resources."volumeAttachments"; }; }; diff --git a/modules/generated/v1.7.nix b/modules/generated/v1.7.nix old mode 100644 new mode 100755 index 96de85a..15de2f3 --- a/modules/generated/v1.7.nix +++ b/modules/generated/v1.7.nix @@ -12045,7 +12045,7 @@ in { }; } // { - "apiservices" = mkOption { + "APIServices" = mkOption { description = '' APIService represents a server for a particular GroupVersion. Name must be "version.group".''; type = (types.attrsOf (submoduleForDefinition @@ -12061,7 +12061,7 @@ in { "v1")); default = { }; }; - "certificatesigningrequests" = mkOption { + "certificateSigningRequests" = mkOption { description = "Describes a certificate signing request"; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.certificates.v1beta1.CertificateSigningRequest" @@ -12069,7 +12069,7 @@ in { "v1beta1")); default = { }; }; - "clusterroles" = mkOption { + "clusterRoles" = mkOption { description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; type = (types.attrsOf @@ -12077,7 +12077,7 @@ in { "clusterroles" "ClusterRole" "rbac.authorization.k8s.io" "v1beta1")); default = { }; }; - "clusterrolebindings" = mkOption { + "clusterRoleBindings" = mkOption { description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; type = (types.attrsOf @@ -12085,14 +12085,14 @@ in { "clusterrolebindings" "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1beta1")); default = { }; }; - "configmaps" = mkOption { + "configMaps" = mkOption { description = "ConfigMap holds configuration data for pods to consume."; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.api.v1.ConfigMap" "configmaps" "ConfigMap" "core" "v1")); default = { }; }; - "controllerrevisions" = mkOption { + "controllerRevisions" = mkOption { description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; type = (types.attrsOf @@ -12100,14 +12100,14 @@ in { "controllerrevisions" "ControllerRevision" "apps" "v1beta1")); default = { }; }; - "cronjobs" = mkOption { + "cronJobs" = mkOption { description = "CronJob represents the configuration of a single cron job."; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1")); default = { }; }; - "daemonsets" = mkOption { + "daemonSets" = mkOption { description = "DaemonSet represents the configuration of a daemon set."; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.extensions.v1beta1.DaemonSet" @@ -12163,7 +12163,7 @@ in { "Eviction" "policy" "v1beta1")); default = { }; }; - "externaladmissionhookconfigurations" = mkOption { + "externalAdmissionHookConfigurations" = mkOption { description = "ExternalAdmissionHookConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition @@ -12172,7 +12172,7 @@ in { "admissionregistration.k8s.io" "v1alpha1")); default = { }; }; - "horizontalpodautoscalers" = mkOption { + "horizontalPodAutoscalers" = mkOption { description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified."; type = (types.attrsOf (submoduleForDefinition @@ -12188,7 +12188,7 @@ in { "ingresses" "Ingress" "extensions" "v1beta1")); default = { }; }; - "initializerconfigurations" = mkOption { + "initializerConfigurations" = mkOption { description = "InitializerConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.admissionregistration.v1alpha1.InitializerConfiguration" @@ -12203,7 +12203,7 @@ in { "v1")); default = { }; }; - "limitranges" = mkOption { + "limitRanges" = mkOption { description = "LimitRange sets resource usage limits for each kind of resource in a Namespace."; type = (types.attrsOf @@ -12211,7 +12211,7 @@ in { "LimitRange" "core" "v1")); default = { }; }; - "localsubjectaccessreviews" = mkOption { + "localSubjectAccessReviews" = mkOption { description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; type = (types.attrsOf (submoduleForDefinition @@ -12227,7 +12227,7 @@ in { "core" "v1")); default = { }; }; - "networkpolicies" = mkOption { + "networkPolicies" = mkOption { description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.networking.v1.NetworkPolicy" @@ -12241,7 +12241,7 @@ in { (submoduleForDefinition "io.k8s.kubernetes.pkg.api.v1.Node" "nodes" "Node" "core" "v1")); default = { }; }; - "persistentvolumes" = mkOption { + "persistentVolumes" = mkOption { description = "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes"; type = (types.attrsOf @@ -12249,7 +12249,7 @@ in { "persistentvolumes" "PersistentVolume" "core" "v1")); default = { }; }; - "persistentvolumeclaims" = mkOption { + "persistentVolumeClaims" = mkOption { description = "PersistentVolumeClaim is a user's request for and claim to a persistent volume"; type = (types.attrsOf @@ -12264,7 +12264,7 @@ in { (submoduleForDefinition "io.k8s.kubernetes.pkg.api.v1.Pod" "pods" "Pod" "core" "v1")); default = { }; }; - "poddisruptionbudgets" = mkOption { + "podDisruptionBudgets" = mkOption { description = "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods"; type = (types.attrsOf @@ -12272,7 +12272,7 @@ in { "poddisruptionbudgets" "PodDisruptionBudget" "policy" "v1beta1")); default = { }; }; - "podpresets" = mkOption { + "podPresets" = mkOption { description = "PodPreset is a policy resource that defines additional runtime requirements for a Pod."; type = (types.attrsOf @@ -12280,7 +12280,7 @@ in { "podpresets" "PodPreset" "settings.k8s.io" "v1alpha1")); default = { }; }; - "podsecuritypolicies" = mkOption { + "podSecurityPolicies" = mkOption { description = "Pod Security Policy governs the ability to make requests that affect the Security Context that will be applied to a pod and container."; type = (types.attrsOf @@ -12288,21 +12288,21 @@ in { "podsecuritypolicies" "PodSecurityPolicy" "extensions" "v1beta1")); default = { }; }; - "podtemplates" = mkOption { + "podTemplates" = mkOption { description = "PodTemplate describes a template for creating copies of a predefined pod."; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.api.v1.PodTemplate" "podtemplates" "PodTemplate" "core" "v1")); default = { }; }; - "replicasets" = mkOption { + "replicaSets" = mkOption { description = "ReplicaSet represents the configuration of a ReplicaSet."; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.apis.extensions.v1beta1.ReplicaSet" "replicasets" "ReplicaSet" "extensions" "v1beta1")); default = { }; }; - "replicationcontrollers" = mkOption { + "replicationControllers" = mkOption { description = "ReplicationController represents the configuration of a replication controller."; type = (types.attrsOf @@ -12310,7 +12310,7 @@ in { "replicationcontrollers" "ReplicationController" "core" "v1")); default = { }; }; - "resourcequotas" = mkOption { + "resourceQuotas" = mkOption { description = "ResourceQuota sets aggregate quota restrictions enforced per namespace"; type = (types.attrsOf (submoduleForDefinition "io.k8s.kubernetes.pkg.api.v1.ResourceQuota" "resourcequotas" @@ -12325,7 +12325,7 @@ in { "rbac.authorization.k8s.io" "v1beta1")); default = { }; }; - "rolebindings" = mkOption { + "roleBindings" = mkOption { description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; type = (types.attrsOf @@ -12341,7 +12341,7 @@ in { "v1")); default = { }; }; - "selfsubjectaccessreviews" = mkOption { + "selfSubjectAccessReviews" = mkOption { description = '' SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action''; type = (types.attrsOf (submoduleForDefinition @@ -12357,7 +12357,7 @@ in { "v1")); default = { }; }; - "serviceaccounts" = mkOption { + "serviceAccounts" = mkOption { description = "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets"; type = (types.attrsOf @@ -12365,7 +12365,7 @@ in { "ServiceAccount" "core" "v1")); default = { }; }; - "statefulsets" = mkOption { + "statefulSets" = mkOption { description = '' StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. @@ -12376,7 +12376,7 @@ in { "statefulsets" "StatefulSet" "apps" "v1beta1")); default = { }; }; - "storageclasses" = mkOption { + "storageClasses" = mkOption { description = '' StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. @@ -12386,7 +12386,7 @@ in { "storageclasses" "StorageClass" "storage.k8s.io" "v1")); default = { }; }; - "subjectaccessreviews" = mkOption { + "subjectAccessReviews" = mkOption { description = "SubjectAccessReview checks whether or not a user or group can perform an action."; type = (types.attrsOf @@ -12394,7 +12394,7 @@ in { "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "thirdpartyresources" = mkOption { + "thirdPartyResources" = mkOption { description = "A ThirdPartyResource is a generic representation of a resource, it is used by add-ons and plugins to add new resource types to the API. It consists of one or more Versions of the api."; type = (types.attrsOf @@ -12402,7 +12402,7 @@ in { "thirdpartyresources" "ThirdPartyResource" "extensions" "v1beta1")); default = { }; }; - "tokenreviews" = mkOption { + "tokenReviews" = mkOption { description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; type = (types.attrsOf @@ -12771,70 +12771,70 @@ in { ]; resources = { - "apiservices" = - mkAliasDefinitions options.resources."apiregistration.k8s.io"."v1beta1"."APIService"; - "bindings" = mkAliasDefinitions options.resources."core"."v1"."Binding"; - "certificatesigningrequests" = mkAliasDefinitions - options.resources."certificates.k8s.io"."v1beta1"."CertificateSigningRequest"; - "clusterroles" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1beta1"."ClusterRole"; - "clusterrolebindings" = mkAliasDefinitions - options.resources."rbac.authorization.k8s.io"."v1beta1"."ClusterRoleBinding"; - "configmaps" = mkAliasDefinitions options.resources."core"."v1"."ConfigMap"; - "controllerrevisions" = - mkAliasDefinitions options.resources."apps"."v1beta1"."ControllerRevision"; - "cronjobs" = mkAliasDefinitions options.resources."batch"."v2alpha1"."CronJob"; - "daemonsets" = mkAliasDefinitions options.resources."extensions"."v1beta1"."DaemonSet"; - "deployments" = mkAliasDefinitions options.resources."apps"."v1beta1"."Deployment"; - "rollback" = mkAliasDefinitions options.resources."apps"."v1beta1"."DeploymentRollback"; - "endpoints" = mkAliasDefinitions options.resources."core"."v1"."Endpoints"; - "events" = mkAliasDefinitions options.resources."core"."v1"."Event"; - "eviction" = mkAliasDefinitions options.resources."policy"."v1beta1"."Eviction"; - "externaladmissionhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration"; - "horizontalpodautoscalers" = - mkAliasDefinitions options.resources."autoscaling"."v2alpha1"."HorizontalPodAutoscaler"; - "ingresses" = mkAliasDefinitions options.resources."extensions"."v1beta1"."Ingress"; - "initializerconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration"; - "jobs" = mkAliasDefinitions options.resources."batch"."v1"."Job"; - "limitranges" = mkAliasDefinitions options.resources."core"."v1"."LimitRange"; - "localsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."LocalSubjectAccessReview"; - "namespaces" = mkAliasDefinitions options.resources."core"."v1"."Namespace"; - "networkpolicies" = - mkAliasDefinitions options.resources."networking.k8s.io"."v1"."NetworkPolicy"; - "nodes" = mkAliasDefinitions options.resources."core"."v1"."Node"; - "persistentvolumes" = mkAliasDefinitions options.resources."core"."v1"."PersistentVolume"; - "persistentvolumeclaims" = - mkAliasDefinitions options.resources."core"."v1"."PersistentVolumeClaim"; - "pods" = mkAliasDefinitions options.resources."core"."v1"."Pod"; - "poddisruptionbudgets" = - mkAliasDefinitions options.resources."policy"."v1beta1"."PodDisruptionBudget"; - "podpresets" = mkAliasDefinitions options.resources."settings.k8s.io"."v1alpha1"."PodPreset"; - "podsecuritypolicies" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."PodSecurityPolicy"; - "podtemplates" = mkAliasDefinitions options.resources."core"."v1"."PodTemplate"; - "replicasets" = mkAliasDefinitions options.resources."extensions"."v1beta1"."ReplicaSet"; - "replicationcontrollers" = - mkAliasDefinitions options.resources."core"."v1"."ReplicationController"; - "resourcequotas" = mkAliasDefinitions options.resources."core"."v1"."ResourceQuota"; - "roles" = mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1beta1"."Role"; - "rolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1beta1"."RoleBinding"; - "secrets" = mkAliasDefinitions options.resources."core"."v1"."Secret"; - "selfsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectAccessReview"; - "services" = mkAliasDefinitions options.resources."core"."v1"."Service"; - "serviceaccounts" = mkAliasDefinitions options.resources."core"."v1"."ServiceAccount"; - "statefulsets" = mkAliasDefinitions options.resources."apps"."v1beta1"."StatefulSet"; - "storageclasses" = mkAliasDefinitions options.resources."storage.k8s.io"."v1"."StorageClass"; - "subjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SubjectAccessReview"; - "thirdpartyresources" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."ThirdPartyResource"; - "tokenreviews" = - mkAliasDefinitions options.resources."authentication.k8s.io"."v1"."TokenReview"; + "apiregistration.k8s.io"."v1beta1"."APIService" = + mkAliasDefinitions options.resources."APIServices"; + "core"."v1"."Binding" = mkAliasDefinitions options.resources."bindings"; + "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = + mkAliasDefinitions options.resources."certificateSigningRequests"; + "rbac.authorization.k8s.io"."v1beta1"."ClusterRole" = + mkAliasDefinitions options.resources."clusterRoles"; + "rbac.authorization.k8s.io"."v1beta1"."ClusterRoleBinding" = + mkAliasDefinitions options.resources."clusterRoleBindings"; + "core"."v1"."ConfigMap" = mkAliasDefinitions options.resources."configMaps"; + "apps"."v1beta1"."ControllerRevision" = + mkAliasDefinitions options.resources."controllerRevisions"; + "batch"."v2alpha1"."CronJob" = mkAliasDefinitions options.resources."cronJobs"; + "extensions"."v1beta1"."DaemonSet" = mkAliasDefinitions options.resources."daemonSets"; + "apps"."v1beta1"."Deployment" = mkAliasDefinitions options.resources."deployments"; + "apps"."v1beta1"."DeploymentRollback" = mkAliasDefinitions options.resources."rollback"; + "core"."v1"."Endpoints" = mkAliasDefinitions options.resources."endpoints"; + "core"."v1"."Event" = mkAliasDefinitions options.resources."events"; + "policy"."v1beta1"."Eviction" = mkAliasDefinitions options.resources."eviction"; + "admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration" = + mkAliasDefinitions options.resources."externalAdmissionHookConfigurations"; + "autoscaling"."v2alpha1"."HorizontalPodAutoscaler" = + mkAliasDefinitions options.resources."horizontalPodAutoscalers"; + "extensions"."v1beta1"."Ingress" = mkAliasDefinitions options.resources."ingresses"; + "admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration" = + mkAliasDefinitions options.resources."initializerConfigurations"; + "batch"."v1"."Job" = mkAliasDefinitions options.resources."jobs"; + "core"."v1"."LimitRange" = mkAliasDefinitions options.resources."limitRanges"; + "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = + mkAliasDefinitions options.resources."localSubjectAccessReviews"; + "core"."v1"."Namespace" = mkAliasDefinitions options.resources."namespaces"; + "networking.k8s.io"."v1"."NetworkPolicy" = + mkAliasDefinitions options.resources."networkPolicies"; + "core"."v1"."Node" = mkAliasDefinitions options.resources."nodes"; + "core"."v1"."PersistentVolume" = mkAliasDefinitions options.resources."persistentVolumes"; + "core"."v1"."PersistentVolumeClaim" = + mkAliasDefinitions options.resources."persistentVolumeClaims"; + "core"."v1"."Pod" = mkAliasDefinitions options.resources."pods"; + "policy"."v1beta1"."PodDisruptionBudget" = + mkAliasDefinitions options.resources."podDisruptionBudgets"; + "settings.k8s.io"."v1alpha1"."PodPreset" = mkAliasDefinitions options.resources."podPresets"; + "extensions"."v1beta1"."PodSecurityPolicy" = + mkAliasDefinitions options.resources."podSecurityPolicies"; + "core"."v1"."PodTemplate" = mkAliasDefinitions options.resources."podTemplates"; + "extensions"."v1beta1"."ReplicaSet" = mkAliasDefinitions options.resources."replicaSets"; + "core"."v1"."ReplicationController" = + mkAliasDefinitions options.resources."replicationControllers"; + "core"."v1"."ResourceQuota" = mkAliasDefinitions options.resources."resourceQuotas"; + "rbac.authorization.k8s.io"."v1beta1"."Role" = mkAliasDefinitions options.resources."roles"; + "rbac.authorization.k8s.io"."v1beta1"."RoleBinding" = + mkAliasDefinitions options.resources."roleBindings"; + "core"."v1"."Secret" = mkAliasDefinitions options.resources."secrets"; + "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = + mkAliasDefinitions options.resources."selfSubjectAccessReviews"; + "core"."v1"."Service" = mkAliasDefinitions options.resources."services"; + "core"."v1"."ServiceAccount" = mkAliasDefinitions options.resources."serviceAccounts"; + "apps"."v1beta1"."StatefulSet" = mkAliasDefinitions options.resources."statefulSets"; + "storage.k8s.io"."v1"."StorageClass" = mkAliasDefinitions options.resources."storageClasses"; + "authorization.k8s.io"."v1"."SubjectAccessReview" = + mkAliasDefinitions options.resources."subjectAccessReviews"; + "extensions"."v1beta1"."ThirdPartyResource" = + mkAliasDefinitions options.resources."thirdPartyResources"; + "authentication.k8s.io"."v1"."TokenReview" = + mkAliasDefinitions options.resources."tokenReviews"; }; }; diff --git a/modules/generated/v1.8.nix b/modules/generated/v1.8.nix old mode 100644 new mode 100755 index d3ac7b3..4199fa6 --- a/modules/generated/v1.8.nix +++ b/modules/generated/v1.8.nix @@ -24935,7 +24935,7 @@ in { }; } // { - "apiservices" = mkOption { + "APIServices" = mkOption { description = '' APIService represents a server for a particular GroupVersion. Name must be "version.group".''; type = (types.attrsOf (submoduleForDefinition @@ -24950,7 +24950,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Binding" "bindings" "Binding" "core" "v1")); default = { }; }; - "certificatesigningrequests" = mkOption { + "certificateSigningRequests" = mkOption { description = "Describes a certificate signing request"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.certificates.v1beta1.CertificateSigningRequest" @@ -24958,7 +24958,7 @@ in { "v1beta1")); default = { }; }; - "clusterroles" = mkOption { + "clusterRoles" = mkOption { description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; type = (types.attrsOf @@ -24966,7 +24966,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "clusterrolebindings" = mkOption { + "clusterRoleBindings" = mkOption { description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; type = (types.attrsOf @@ -24974,14 +24974,14 @@ in { "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1")); default = { }; }; - "configmaps" = mkOption { + "configMaps" = mkOption { description = "ConfigMap holds configuration data for pods to consume."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ConfigMap" "configmaps" "ConfigMap" "core" "v1")); default = { }; }; - "controllerrevisions" = mkOption { + "controllerRevisions" = mkOption { description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; type = (types.attrsOf @@ -24989,14 +24989,14 @@ in { "ControllerRevision" "apps" "v1beta2")); default = { }; }; - "cronjobs" = mkOption { + "cronJobs" = mkOption { description = "CronJob represents the configuration of a single cron job."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1")); default = { }; }; - "customresourcedefinitions" = mkOption { + "customResourceDefinitions" = mkOption { description = "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format u003c.spec.nameu003e.u003c.spec.groupu003e."; type = (types.attrsOf (submoduleForDefinition @@ -25004,7 +25004,7 @@ in { "customresourcedefinitions" "CustomResourceDefinition" "apiextensions.k8s.io" "v1beta1")); default = { }; }; - "daemonsets" = mkOption { + "daemonSets" = mkOption { description = "DaemonSet represents the configuration of a daemon set."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta2.DaemonSet" "daemonsets" "DaemonSet" @@ -25059,7 +25059,7 @@ in { "policy" "v1beta1")); default = { }; }; - "externaladmissionhookconfigurations" = mkOption { + "externalAdmissionHookConfigurations" = mkOption { description = "ExternalAdmissionHookConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition @@ -25068,7 +25068,7 @@ in { "admissionregistration.k8s.io" "v1alpha1")); default = { }; }; - "horizontalpodautoscalers" = mkOption { + "horizontalPodAutoscalers" = mkOption { description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified."; type = (types.attrsOf @@ -25084,7 +25084,7 @@ in { "extensions" "v1beta1")); default = { }; }; - "initializerconfigurations" = mkOption { + "initializerConfigurations" = mkOption { description = "InitializerConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.admissionregistration.v1alpha1.InitializerConfiguration" @@ -25098,7 +25098,7 @@ in { (submoduleForDefinition "io.k8s.api.batch.v1.Job" "jobs" "Job" "batch" "v1")); default = { }; }; - "limitranges" = mkOption { + "limitRanges" = mkOption { description = "LimitRange sets resource usage limits for each kind of resource in a Namespace."; type = (types.attrsOf @@ -25106,7 +25106,7 @@ in { "v1")); default = { }; }; - "localsubjectaccessreviews" = mkOption { + "localSubjectAccessReviews" = mkOption { description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; type = (types.attrsOf @@ -25122,7 +25122,7 @@ in { "v1")); default = { }; }; - "networkpolicies" = mkOption { + "networkPolicies" = mkOption { description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" @@ -25136,7 +25136,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Node" "nodes" "Node" "core" "v1")); default = { }; }; - "persistentvolumes" = mkOption { + "persistentVolumes" = mkOption { description = "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes"; type = (types.attrsOf @@ -25144,7 +25144,7 @@ in { "PersistentVolume" "core" "v1")); default = { }; }; - "persistentvolumeclaims" = mkOption { + "persistentVolumeClaims" = mkOption { description = "PersistentVolumeClaim is a user's request for and claim to a persistent volume"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PersistentVolumeClaim" @@ -25158,7 +25158,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Pod" "pods" "Pod" "core" "v1")); default = { }; }; - "poddisruptionbudgets" = mkOption { + "podDisruptionBudgets" = mkOption { description = "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods"; type = (types.attrsOf @@ -25166,7 +25166,7 @@ in { "poddisruptionbudgets" "PodDisruptionBudget" "policy" "v1beta1")); default = { }; }; - "podpresets" = mkOption { + "podPresets" = mkOption { description = "PodPreset is a policy resource that defines additional runtime requirements for a Pod."; type = (types.attrsOf @@ -25174,7 +25174,7 @@ in { "settings.k8s.io" "v1alpha1")); default = { }; }; - "podsecuritypolicies" = mkOption { + "podSecurityPolicies" = mkOption { description = "Pod Security Policy governs the ability to make requests that affect the Security Context that will be applied to a pod and container."; type = (types.attrsOf @@ -25182,14 +25182,14 @@ in { "podsecuritypolicies" "PodSecurityPolicy" "extensions" "v1beta1")); default = { }; }; - "podtemplates" = mkOption { + "podTemplates" = mkOption { description = "PodTemplate describes a template for creating copies of a predefined pod."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PodTemplate" "podtemplates" "PodTemplate" "core" "v1")); default = { }; }; - "priorityclasses" = mkOption { + "priorityClasses" = mkOption { description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; type = (types.attrsOf @@ -25197,21 +25197,21 @@ in { "PriorityClass" "scheduling.k8s.io" "v1alpha1")); default = { }; }; - "replicasets" = mkOption { + "replicaSets" = mkOption { description = "ReplicaSet represents the configuration of a ReplicaSet."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1beta2.ReplicaSet" "replicasets" "ReplicaSet" "apps" "v1beta2")); default = { }; }; - "replicationcontrollers" = mkOption { + "replicationControllers" = mkOption { description = "ReplicationController represents the configuration of a replication controller."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ReplicationController" "replicationcontrollers" "ReplicationController" "core" "v1")); default = { }; }; - "resourcequotas" = mkOption { + "resourceQuotas" = mkOption { description = "ResourceQuota sets aggregate quota restrictions enforced per namespace"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ResourceQuota" "resourcequotas" @@ -25225,7 +25225,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "rolebindings" = mkOption { + "roleBindings" = mkOption { description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; type = (types.attrsOf @@ -25240,7 +25240,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Secret" "secrets" "Secret" "core" "v1")); default = { }; }; - "selfsubjectaccessreviews" = mkOption { + "selfSubjectAccessReviews" = mkOption { description = '' SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action''; type = (types.attrsOf @@ -25248,7 +25248,7 @@ in { "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "selfsubjectrulesreviews" = mkOption { + "selfSubjectRulesReviews" = mkOption { description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; type = (types.attrsOf @@ -25263,7 +25263,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Service" "services" "Service" "core" "v1")); default = { }; }; - "serviceaccounts" = mkOption { + "serviceAccounts" = mkOption { description = "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets"; type = (types.attrsOf @@ -25271,7 +25271,7 @@ in { "ServiceAccount" "core" "v1")); default = { }; }; - "statefulsets" = mkOption { + "statefulSets" = mkOption { description = '' StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. @@ -25282,7 +25282,7 @@ in { "apps" "v1beta2")); default = { }; }; - "storageclasses" = mkOption { + "storageClasses" = mkOption { description = '' StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. @@ -25292,7 +25292,7 @@ in { "StorageClass" "storage.k8s.io" "v1")); default = { }; }; - "subjectaccessreviews" = mkOption { + "subjectAccessReviews" = mkOption { description = "SubjectAccessReview checks whether or not a user or group can perform an action."; type = (types.attrsOf @@ -25300,7 +25300,7 @@ in { "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "tokenreviews" = mkOption { + "tokenReviews" = mkOption { description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; type = (types.attrsOf @@ -25747,74 +25747,74 @@ in { ]; resources = { - "apiservices" = - mkAliasDefinitions options.resources."apiregistration.k8s.io"."v1beta1"."APIService"; - "bindings" = mkAliasDefinitions options.resources."core"."v1"."Binding"; - "certificatesigningrequests" = mkAliasDefinitions - options.resources."certificates.k8s.io"."v1beta1"."CertificateSigningRequest"; - "clusterroles" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRole"; - "clusterrolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRoleBinding"; - "configmaps" = mkAliasDefinitions options.resources."core"."v1"."ConfigMap"; - "controllerrevisions" = - mkAliasDefinitions options.resources."apps"."v1beta2"."ControllerRevision"; - "cronjobs" = mkAliasDefinitions options.resources."batch"."v2alpha1"."CronJob"; - "customresourcedefinitions" = mkAliasDefinitions - options.resources."apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition"; - "daemonsets" = mkAliasDefinitions options.resources."apps"."v1beta2"."DaemonSet"; - "deployments" = mkAliasDefinitions options.resources."apps"."v1beta2"."Deployment"; - "rollback" = mkAliasDefinitions options.resources."apps"."v1beta1"."DeploymentRollback"; - "endpoints" = mkAliasDefinitions options.resources."core"."v1"."Endpoints"; - "events" = mkAliasDefinitions options.resources."core"."v1"."Event"; - "eviction" = mkAliasDefinitions options.resources."policy"."v1beta1"."Eviction"; - "externaladmissionhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration"; - "horizontalpodautoscalers" = - mkAliasDefinitions options.resources."autoscaling"."v2beta1"."HorizontalPodAutoscaler"; - "ingresses" = mkAliasDefinitions options.resources."extensions"."v1beta1"."Ingress"; - "initializerconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration"; - "jobs" = mkAliasDefinitions options.resources."batch"."v1"."Job"; - "limitranges" = mkAliasDefinitions options.resources."core"."v1"."LimitRange"; - "localsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."LocalSubjectAccessReview"; - "namespaces" = mkAliasDefinitions options.resources."core"."v1"."Namespace"; - "networkpolicies" = - mkAliasDefinitions options.resources."networking.k8s.io"."v1"."NetworkPolicy"; - "nodes" = mkAliasDefinitions options.resources."core"."v1"."Node"; - "persistentvolumes" = mkAliasDefinitions options.resources."core"."v1"."PersistentVolume"; - "persistentvolumeclaims" = - mkAliasDefinitions options.resources."core"."v1"."PersistentVolumeClaim"; - "pods" = mkAliasDefinitions options.resources."core"."v1"."Pod"; - "poddisruptionbudgets" = - mkAliasDefinitions options.resources."policy"."v1beta1"."PodDisruptionBudget"; - "podpresets" = mkAliasDefinitions options.resources."settings.k8s.io"."v1alpha1"."PodPreset"; - "podsecuritypolicies" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."PodSecurityPolicy"; - "podtemplates" = mkAliasDefinitions options.resources."core"."v1"."PodTemplate"; - "priorityclasses" = - mkAliasDefinitions options.resources."scheduling.k8s.io"."v1alpha1"."PriorityClass"; - "replicasets" = mkAliasDefinitions options.resources."apps"."v1beta2"."ReplicaSet"; - "replicationcontrollers" = - mkAliasDefinitions options.resources."core"."v1"."ReplicationController"; - "resourcequotas" = mkAliasDefinitions options.resources."core"."v1"."ResourceQuota"; - "roles" = mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."Role"; - "rolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."RoleBinding"; - "secrets" = mkAliasDefinitions options.resources."core"."v1"."Secret"; - "selfsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectAccessReview"; - "selfsubjectrulesreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectRulesReview"; - "services" = mkAliasDefinitions options.resources."core"."v1"."Service"; - "serviceaccounts" = mkAliasDefinitions options.resources."core"."v1"."ServiceAccount"; - "statefulsets" = mkAliasDefinitions options.resources."apps"."v1beta2"."StatefulSet"; - "storageclasses" = mkAliasDefinitions options.resources."storage.k8s.io"."v1"."StorageClass"; - "subjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SubjectAccessReview"; - "tokenreviews" = - mkAliasDefinitions options.resources."authentication.k8s.io"."v1"."TokenReview"; + "apiregistration.k8s.io"."v1beta1"."APIService" = + mkAliasDefinitions options.resources."APIServices"; + "core"."v1"."Binding" = mkAliasDefinitions options.resources."bindings"; + "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = + mkAliasDefinitions options.resources."certificateSigningRequests"; + "rbac.authorization.k8s.io"."v1"."ClusterRole" = + mkAliasDefinitions options.resources."clusterRoles"; + "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = + mkAliasDefinitions options.resources."clusterRoleBindings"; + "core"."v1"."ConfigMap" = mkAliasDefinitions options.resources."configMaps"; + "apps"."v1beta2"."ControllerRevision" = + mkAliasDefinitions options.resources."controllerRevisions"; + "batch"."v2alpha1"."CronJob" = mkAliasDefinitions options.resources."cronJobs"; + "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = + mkAliasDefinitions options.resources."customResourceDefinitions"; + "apps"."v1beta2"."DaemonSet" = mkAliasDefinitions options.resources."daemonSets"; + "apps"."v1beta2"."Deployment" = mkAliasDefinitions options.resources."deployments"; + "apps"."v1beta1"."DeploymentRollback" = mkAliasDefinitions options.resources."rollback"; + "core"."v1"."Endpoints" = mkAliasDefinitions options.resources."endpoints"; + "core"."v1"."Event" = mkAliasDefinitions options.resources."events"; + "policy"."v1beta1"."Eviction" = mkAliasDefinitions options.resources."eviction"; + "admissionregistration.k8s.io"."v1alpha1"."ExternalAdmissionHookConfiguration" = + mkAliasDefinitions options.resources."externalAdmissionHookConfigurations"; + "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = + mkAliasDefinitions options.resources."horizontalPodAutoscalers"; + "extensions"."v1beta1"."Ingress" = mkAliasDefinitions options.resources."ingresses"; + "admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration" = + mkAliasDefinitions options.resources."initializerConfigurations"; + "batch"."v1"."Job" = mkAliasDefinitions options.resources."jobs"; + "core"."v1"."LimitRange" = mkAliasDefinitions options.resources."limitRanges"; + "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = + mkAliasDefinitions options.resources."localSubjectAccessReviews"; + "core"."v1"."Namespace" = mkAliasDefinitions options.resources."namespaces"; + "networking.k8s.io"."v1"."NetworkPolicy" = + mkAliasDefinitions options.resources."networkPolicies"; + "core"."v1"."Node" = mkAliasDefinitions options.resources."nodes"; + "core"."v1"."PersistentVolume" = mkAliasDefinitions options.resources."persistentVolumes"; + "core"."v1"."PersistentVolumeClaim" = + mkAliasDefinitions options.resources."persistentVolumeClaims"; + "core"."v1"."Pod" = mkAliasDefinitions options.resources."pods"; + "policy"."v1beta1"."PodDisruptionBudget" = + mkAliasDefinitions options.resources."podDisruptionBudgets"; + "settings.k8s.io"."v1alpha1"."PodPreset" = mkAliasDefinitions options.resources."podPresets"; + "extensions"."v1beta1"."PodSecurityPolicy" = + mkAliasDefinitions options.resources."podSecurityPolicies"; + "core"."v1"."PodTemplate" = mkAliasDefinitions options.resources."podTemplates"; + "scheduling.k8s.io"."v1alpha1"."PriorityClass" = + mkAliasDefinitions options.resources."priorityClasses"; + "apps"."v1beta2"."ReplicaSet" = mkAliasDefinitions options.resources."replicaSets"; + "core"."v1"."ReplicationController" = + mkAliasDefinitions options.resources."replicationControllers"; + "core"."v1"."ResourceQuota" = mkAliasDefinitions options.resources."resourceQuotas"; + "rbac.authorization.k8s.io"."v1"."Role" = mkAliasDefinitions options.resources."roles"; + "rbac.authorization.k8s.io"."v1"."RoleBinding" = + mkAliasDefinitions options.resources."roleBindings"; + "core"."v1"."Secret" = mkAliasDefinitions options.resources."secrets"; + "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = + mkAliasDefinitions options.resources."selfSubjectAccessReviews"; + "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = + mkAliasDefinitions options.resources."selfSubjectRulesReviews"; + "core"."v1"."Service" = mkAliasDefinitions options.resources."services"; + "core"."v1"."ServiceAccount" = mkAliasDefinitions options.resources."serviceAccounts"; + "apps"."v1beta2"."StatefulSet" = mkAliasDefinitions options.resources."statefulSets"; + "storage.k8s.io"."v1"."StorageClass" = mkAliasDefinitions options.resources."storageClasses"; + "authorization.k8s.io"."v1"."SubjectAccessReview" = + mkAliasDefinitions options.resources."subjectAccessReviews"; + "authentication.k8s.io"."v1"."TokenReview" = + mkAliasDefinitions options.resources."tokenReviews"; }; }; diff --git a/modules/generated/v1.9.nix b/modules/generated/v1.9.nix old mode 100644 new mode 100755 index 3db7e5b..270855a --- a/modules/generated/v1.9.nix +++ b/modules/generated/v1.9.nix @@ -26948,7 +26948,7 @@ in { }; } // { - "apiservices" = mkOption { + "APIServices" = mkOption { description = '' APIService represents a server for a particular GroupVersion. Name must be "version.group".''; type = (types.attrsOf (submoduleForDefinition @@ -26963,7 +26963,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Binding" "bindings" "Binding" "core" "v1")); default = { }; }; - "certificatesigningrequests" = mkOption { + "certificateSigningRequests" = mkOption { description = "Describes a certificate signing request"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.certificates.v1beta1.CertificateSigningRequest" @@ -26971,7 +26971,7 @@ in { "v1beta1")); default = { }; }; - "clusterroles" = mkOption { + "clusterRoles" = mkOption { description = "ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding."; type = (types.attrsOf @@ -26979,7 +26979,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "clusterrolebindings" = mkOption { + "clusterRoleBindings" = mkOption { description = "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject."; type = (types.attrsOf @@ -26987,14 +26987,14 @@ in { "ClusterRoleBinding" "rbac.authorization.k8s.io" "v1")); default = { }; }; - "configmaps" = mkOption { + "configMaps" = mkOption { description = "ConfigMap holds configuration data for pods to consume."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ConfigMap" "configmaps" "ConfigMap" "core" "v1")); default = { }; }; - "controllerrevisions" = mkOption { + "controllerRevisions" = mkOption { description = "ControllerRevision implements an immutable snapshot of state data. Clients are responsible for serializing and deserializing the objects that contain their internal state. Once a ControllerRevision has been successfully created, it can not be updated. The API Server will fail validation of all requests that attempt to mutate the Data field. ControllerRevisions may, however, be deleted. Note that, due to its use by both the DaemonSet and StatefulSet controllers for update and rollback, this object is beta. However, it may be subject to name and representation changes in future releases, and clients should not depend on its stability. It is primarily for internal use by controllers."; type = (types.attrsOf @@ -27002,14 +27002,14 @@ in { "ControllerRevision" "apps" "v1")); default = { }; }; - "cronjobs" = mkOption { + "cronJobs" = mkOption { description = "CronJob represents the configuration of a single cron job."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.batch.v2alpha1.CronJob" "cronjobs" "CronJob" "batch" "v2alpha1")); default = { }; }; - "customresourcedefinitions" = mkOption { + "customResourceDefinitions" = mkOption { description = "CustomResourceDefinition represents a resource that should be exposed on the API server. Its name MUST be in the format u003c.spec.nameu003e.u003c.spec.groupu003e."; type = (types.attrsOf (submoduleForDefinition @@ -27017,7 +27017,7 @@ in { "customresourcedefinitions" "CustomResourceDefinition" "apiextensions.k8s.io" "v1beta1")); default = { }; }; - "daemonsets" = mkOption { + "daemonSets" = mkOption { description = "DaemonSet represents the configuration of a daemon set."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.apps.v1.DaemonSet" "daemonsets" "DaemonSet" "apps" @@ -27072,7 +27072,7 @@ in { "policy" "v1beta1")); default = { }; }; - "horizontalpodautoscalers" = mkOption { + "horizontalPodAutoscalers" = mkOption { description = "HorizontalPodAutoscaler is the configuration for a horizontal pod autoscaler, which automatically manages the replica count of any resource implementing the scale subresource based on the metrics specified."; type = (types.attrsOf @@ -27088,7 +27088,7 @@ in { "extensions" "v1beta1")); default = { }; }; - "initializerconfigurations" = mkOption { + "initializerConfigurations" = mkOption { description = "InitializerConfiguration describes the configuration of initializers."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.admissionregistration.v1alpha1.InitializerConfiguration" @@ -27102,7 +27102,7 @@ in { (submoduleForDefinition "io.k8s.api.batch.v1.Job" "jobs" "Job" "batch" "v1")); default = { }; }; - "limitranges" = mkOption { + "limitRanges" = mkOption { description = "LimitRange sets resource usage limits for each kind of resource in a Namespace."; type = (types.attrsOf @@ -27110,7 +27110,7 @@ in { "v1")); default = { }; }; - "localsubjectaccessreviews" = mkOption { + "localSubjectAccessReviews" = mkOption { description = "LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking."; type = (types.attrsOf @@ -27118,7 +27118,7 @@ in { "localsubjectaccessreviews" "LocalSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "mutatingwebhookconfigurations" = mkOption { + "mutatingWebhookConfigurations" = mkOption { description = "MutatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and may change the object."; type = (types.attrsOf (submoduleForDefinition @@ -27135,7 +27135,7 @@ in { "v1")); default = { }; }; - "networkpolicies" = mkOption { + "networkPolicies" = mkOption { description = "NetworkPolicy describes what network traffic is allowed for a set of Pods"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.networking.v1.NetworkPolicy" "networkpolicies" @@ -27149,7 +27149,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Node" "nodes" "Node" "core" "v1")); default = { }; }; - "persistentvolumes" = mkOption { + "persistentVolumes" = mkOption { description = "PersistentVolume (PV) is a storage resource provisioned by an administrator. It is analogous to a node. More info: https://kubernetes.io/docs/concepts/storage/persistent-volumes"; type = (types.attrsOf @@ -27157,7 +27157,7 @@ in { "PersistentVolume" "core" "v1")); default = { }; }; - "persistentvolumeclaims" = mkOption { + "persistentVolumeClaims" = mkOption { description = "PersistentVolumeClaim is a user's request for and claim to a persistent volume"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PersistentVolumeClaim" @@ -27171,7 +27171,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Pod" "pods" "Pod" "core" "v1")); default = { }; }; - "poddisruptionbudgets" = mkOption { + "podDisruptionBudgets" = mkOption { description = "PodDisruptionBudget is an object to define the max disruption that can be caused to a collection of pods"; type = (types.attrsOf @@ -27179,7 +27179,7 @@ in { "poddisruptionbudgets" "PodDisruptionBudget" "policy" "v1beta1")); default = { }; }; - "podpresets" = mkOption { + "podPresets" = mkOption { description = "PodPreset is a policy resource that defines additional runtime requirements for a Pod."; type = (types.attrsOf @@ -27187,7 +27187,7 @@ in { "settings.k8s.io" "v1alpha1")); default = { }; }; - "podsecuritypolicies" = mkOption { + "podSecurityPolicies" = mkOption { description = "Pod Security Policy governs the ability to make requests that affect the Security Context that will be applied to a pod and container."; type = (types.attrsOf @@ -27195,14 +27195,14 @@ in { "podsecuritypolicies" "PodSecurityPolicy" "extensions" "v1beta1")); default = { }; }; - "podtemplates" = mkOption { + "podTemplates" = mkOption { description = "PodTemplate describes a template for creating copies of a predefined pod."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.PodTemplate" "podtemplates" "PodTemplate" "core" "v1")); default = { }; }; - "priorityclasses" = mkOption { + "priorityClasses" = mkOption { description = "PriorityClass defines mapping from a priority class name to the priority integer value. The value can be any valid integer."; type = (types.attrsOf @@ -27210,7 +27210,7 @@ in { "PriorityClass" "scheduling.k8s.io" "v1alpha1")); default = { }; }; - "replicasets" = mkOption { + "replicaSets" = mkOption { description = "ReplicaSet ensures that a specified number of pod replicas are running at any given time."; type = (types.attrsOf @@ -27218,14 +27218,14 @@ in { "v1")); default = { }; }; - "replicationcontrollers" = mkOption { + "replicationControllers" = mkOption { description = "ReplicationController represents the configuration of a replication controller."; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ReplicationController" "replicationcontrollers" "ReplicationController" "core" "v1")); default = { }; }; - "resourcequotas" = mkOption { + "resourceQuotas" = mkOption { description = "ResourceQuota sets aggregate quota restrictions enforced per namespace"; type = (types.attrsOf (submoduleForDefinition "io.k8s.api.core.v1.ResourceQuota" "resourcequotas" @@ -27239,7 +27239,7 @@ in { "rbac.authorization.k8s.io" "v1")); default = { }; }; - "rolebindings" = mkOption { + "roleBindings" = mkOption { description = "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace."; type = (types.attrsOf @@ -27254,7 +27254,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Secret" "secrets" "Secret" "core" "v1")); default = { }; }; - "selfsubjectaccessreviews" = mkOption { + "selfSubjectAccessReviews" = mkOption { description = '' SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action''; type = (types.attrsOf @@ -27262,7 +27262,7 @@ in { "selfsubjectaccessreviews" "SelfSubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "selfsubjectrulesreviews" = mkOption { + "selfSubjectRulesReviews" = mkOption { description = "SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server."; type = (types.attrsOf @@ -27277,7 +27277,7 @@ in { (submoduleForDefinition "io.k8s.api.core.v1.Service" "services" "Service" "core" "v1")); default = { }; }; - "serviceaccounts" = mkOption { + "serviceAccounts" = mkOption { description = "ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets"; type = (types.attrsOf @@ -27285,7 +27285,7 @@ in { "ServiceAccount" "core" "v1")); default = { }; }; - "statefulsets" = mkOption { + "statefulSets" = mkOption { description = '' StatefulSet represents a set of pods with consistent identities. Identities are defined as: - Network: A single stable DNS and hostname. @@ -27296,7 +27296,7 @@ in { "apps" "v1")); default = { }; }; - "storageclasses" = mkOption { + "storageClasses" = mkOption { description = '' StorageClass describes the parameters for a class of storage for which PersistentVolumes can be dynamically provisioned. @@ -27306,7 +27306,7 @@ in { "StorageClass" "storage.k8s.io" "v1")); default = { }; }; - "subjectaccessreviews" = mkOption { + "subjectAccessReviews" = mkOption { description = "SubjectAccessReview checks whether or not a user or group can perform an action."; type = (types.attrsOf @@ -27314,7 +27314,7 @@ in { "subjectaccessreviews" "SubjectAccessReview" "authorization.k8s.io" "v1")); default = { }; }; - "tokenreviews" = mkOption { + "tokenReviews" = mkOption { description = "TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver."; type = (types.attrsOf @@ -27322,7 +27322,7 @@ in { "TokenReview" "authentication.k8s.io" "v1")); default = { }; }; - "validatingwebhookconfigurations" = mkOption { + "validatingWebhookConfigurations" = mkOption { description = "ValidatingWebhookConfiguration describes the configuration of and admission webhook that accept or reject and object without changing it."; type = (types.attrsOf (submoduleForDefinition @@ -27331,7 +27331,7 @@ in { "admissionregistration.k8s.io" "v1beta1")); default = { }; }; - "volumeattachments" = mkOption { + "volumeAttachments" = mkOption { description = '' VolumeAttachment captures the intent to attach or detach the specified volume to/from the specified node. @@ -27828,77 +27828,77 @@ in { ]; resources = { - "apiservices" = - mkAliasDefinitions options.resources."apiregistration.k8s.io"."v1beta1"."APIService"; - "bindings" = mkAliasDefinitions options.resources."core"."v1"."Binding"; - "certificatesigningrequests" = mkAliasDefinitions - options.resources."certificates.k8s.io"."v1beta1"."CertificateSigningRequest"; - "clusterroles" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRole"; - "clusterrolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."ClusterRoleBinding"; - "configmaps" = mkAliasDefinitions options.resources."core"."v1"."ConfigMap"; - "controllerrevisions" = mkAliasDefinitions options.resources."apps"."v1"."ControllerRevision"; - "cronjobs" = mkAliasDefinitions options.resources."batch"."v2alpha1"."CronJob"; - "customresourcedefinitions" = mkAliasDefinitions - options.resources."apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition"; - "daemonsets" = mkAliasDefinitions options.resources."apps"."v1"."DaemonSet"; - "deployments" = mkAliasDefinitions options.resources."apps"."v1"."Deployment"; - "rollback" = mkAliasDefinitions options.resources."apps"."v1beta1"."DeploymentRollback"; - "endpoints" = mkAliasDefinitions options.resources."core"."v1"."Endpoints"; - "events" = mkAliasDefinitions options.resources."core"."v1"."Event"; - "eviction" = mkAliasDefinitions options.resources."policy"."v1beta1"."Eviction"; - "horizontalpodautoscalers" = - mkAliasDefinitions options.resources."autoscaling"."v2beta1"."HorizontalPodAutoscaler"; - "ingresses" = mkAliasDefinitions options.resources."extensions"."v1beta1"."Ingress"; - "initializerconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration"; - "jobs" = mkAliasDefinitions options.resources."batch"."v1"."Job"; - "limitranges" = mkAliasDefinitions options.resources."core"."v1"."LimitRange"; - "localsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."LocalSubjectAccessReview"; - "mutatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration"; - "namespaces" = mkAliasDefinitions options.resources."core"."v1"."Namespace"; - "networkpolicies" = - mkAliasDefinitions options.resources."networking.k8s.io"."v1"."NetworkPolicy"; - "nodes" = mkAliasDefinitions options.resources."core"."v1"."Node"; - "persistentvolumes" = mkAliasDefinitions options.resources."core"."v1"."PersistentVolume"; - "persistentvolumeclaims" = - mkAliasDefinitions options.resources."core"."v1"."PersistentVolumeClaim"; - "pods" = mkAliasDefinitions options.resources."core"."v1"."Pod"; - "poddisruptionbudgets" = - mkAliasDefinitions options.resources."policy"."v1beta1"."PodDisruptionBudget"; - "podpresets" = mkAliasDefinitions options.resources."settings.k8s.io"."v1alpha1"."PodPreset"; - "podsecuritypolicies" = - mkAliasDefinitions options.resources."extensions"."v1beta1"."PodSecurityPolicy"; - "podtemplates" = mkAliasDefinitions options.resources."core"."v1"."PodTemplate"; - "priorityclasses" = - mkAliasDefinitions options.resources."scheduling.k8s.io"."v1alpha1"."PriorityClass"; - "replicasets" = mkAliasDefinitions options.resources."apps"."v1"."ReplicaSet"; - "replicationcontrollers" = - mkAliasDefinitions options.resources."core"."v1"."ReplicationController"; - "resourcequotas" = mkAliasDefinitions options.resources."core"."v1"."ResourceQuota"; - "roles" = mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."Role"; - "rolebindings" = - mkAliasDefinitions options.resources."rbac.authorization.k8s.io"."v1"."RoleBinding"; - "secrets" = mkAliasDefinitions options.resources."core"."v1"."Secret"; - "selfsubjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectAccessReview"; - "selfsubjectrulesreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SelfSubjectRulesReview"; - "services" = mkAliasDefinitions options.resources."core"."v1"."Service"; - "serviceaccounts" = mkAliasDefinitions options.resources."core"."v1"."ServiceAccount"; - "statefulsets" = mkAliasDefinitions options.resources."apps"."v1"."StatefulSet"; - "storageclasses" = mkAliasDefinitions options.resources."storage.k8s.io"."v1"."StorageClass"; - "subjectaccessreviews" = - mkAliasDefinitions options.resources."authorization.k8s.io"."v1"."SubjectAccessReview"; - "tokenreviews" = - mkAliasDefinitions options.resources."authentication.k8s.io"."v1"."TokenReview"; - "validatingwebhookconfigurations" = mkAliasDefinitions - options.resources."admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration"; - "volumeattachments" = - mkAliasDefinitions options.resources."storage.k8s.io"."v1alpha1"."VolumeAttachment"; + "apiregistration.k8s.io"."v1beta1"."APIService" = + mkAliasDefinitions options.resources."APIServices"; + "core"."v1"."Binding" = mkAliasDefinitions options.resources."bindings"; + "certificates.k8s.io"."v1beta1"."CertificateSigningRequest" = + mkAliasDefinitions options.resources."certificateSigningRequests"; + "rbac.authorization.k8s.io"."v1"."ClusterRole" = + mkAliasDefinitions options.resources."clusterRoles"; + "rbac.authorization.k8s.io"."v1"."ClusterRoleBinding" = + mkAliasDefinitions options.resources."clusterRoleBindings"; + "core"."v1"."ConfigMap" = mkAliasDefinitions options.resources."configMaps"; + "apps"."v1"."ControllerRevision" = mkAliasDefinitions options.resources."controllerRevisions"; + "batch"."v2alpha1"."CronJob" = mkAliasDefinitions options.resources."cronJobs"; + "apiextensions.k8s.io"."v1beta1"."CustomResourceDefinition" = + mkAliasDefinitions options.resources."customResourceDefinitions"; + "apps"."v1"."DaemonSet" = mkAliasDefinitions options.resources."daemonSets"; + "apps"."v1"."Deployment" = mkAliasDefinitions options.resources."deployments"; + "apps"."v1beta1"."DeploymentRollback" = mkAliasDefinitions options.resources."rollback"; + "core"."v1"."Endpoints" = mkAliasDefinitions options.resources."endpoints"; + "core"."v1"."Event" = mkAliasDefinitions options.resources."events"; + "policy"."v1beta1"."Eviction" = mkAliasDefinitions options.resources."eviction"; + "autoscaling"."v2beta1"."HorizontalPodAutoscaler" = + mkAliasDefinitions options.resources."horizontalPodAutoscalers"; + "extensions"."v1beta1"."Ingress" = mkAliasDefinitions options.resources."ingresses"; + "admissionregistration.k8s.io"."v1alpha1"."InitializerConfiguration" = + mkAliasDefinitions options.resources."initializerConfigurations"; + "batch"."v1"."Job" = mkAliasDefinitions options.resources."jobs"; + "core"."v1"."LimitRange" = mkAliasDefinitions options.resources."limitRanges"; + "authorization.k8s.io"."v1"."LocalSubjectAccessReview" = + mkAliasDefinitions options.resources."localSubjectAccessReviews"; + "admissionregistration.k8s.io"."v1beta1"."MutatingWebhookConfiguration" = + mkAliasDefinitions options.resources."mutatingWebhookConfigurations"; + "core"."v1"."Namespace" = mkAliasDefinitions options.resources."namespaces"; + "networking.k8s.io"."v1"."NetworkPolicy" = + mkAliasDefinitions options.resources."networkPolicies"; + "core"."v1"."Node" = mkAliasDefinitions options.resources."nodes"; + "core"."v1"."PersistentVolume" = mkAliasDefinitions options.resources."persistentVolumes"; + "core"."v1"."PersistentVolumeClaim" = + mkAliasDefinitions options.resources."persistentVolumeClaims"; + "core"."v1"."Pod" = mkAliasDefinitions options.resources."pods"; + "policy"."v1beta1"."PodDisruptionBudget" = + mkAliasDefinitions options.resources."podDisruptionBudgets"; + "settings.k8s.io"."v1alpha1"."PodPreset" = mkAliasDefinitions options.resources."podPresets"; + "extensions"."v1beta1"."PodSecurityPolicy" = + mkAliasDefinitions options.resources."podSecurityPolicies"; + "core"."v1"."PodTemplate" = mkAliasDefinitions options.resources."podTemplates"; + "scheduling.k8s.io"."v1alpha1"."PriorityClass" = + mkAliasDefinitions options.resources."priorityClasses"; + "apps"."v1"."ReplicaSet" = mkAliasDefinitions options.resources."replicaSets"; + "core"."v1"."ReplicationController" = + mkAliasDefinitions options.resources."replicationControllers"; + "core"."v1"."ResourceQuota" = mkAliasDefinitions options.resources."resourceQuotas"; + "rbac.authorization.k8s.io"."v1"."Role" = mkAliasDefinitions options.resources."roles"; + "rbac.authorization.k8s.io"."v1"."RoleBinding" = + mkAliasDefinitions options.resources."roleBindings"; + "core"."v1"."Secret" = mkAliasDefinitions options.resources."secrets"; + "authorization.k8s.io"."v1"."SelfSubjectAccessReview" = + mkAliasDefinitions options.resources."selfSubjectAccessReviews"; + "authorization.k8s.io"."v1"."SelfSubjectRulesReview" = + mkAliasDefinitions options.resources."selfSubjectRulesReviews"; + "core"."v1"."Service" = mkAliasDefinitions options.resources."services"; + "core"."v1"."ServiceAccount" = mkAliasDefinitions options.resources."serviceAccounts"; + "apps"."v1"."StatefulSet" = mkAliasDefinitions options.resources."statefulSets"; + "storage.k8s.io"."v1"."StorageClass" = mkAliasDefinitions options.resources."storageClasses"; + "authorization.k8s.io"."v1"."SubjectAccessReview" = + mkAliasDefinitions options.resources."subjectAccessReviews"; + "authentication.k8s.io"."v1"."TokenReview" = + mkAliasDefinitions options.resources."tokenReviews"; + "admissionregistration.k8s.io"."v1beta1"."ValidatingWebhookConfiguration" = + mkAliasDefinitions options.resources."validatingWebhookConfigurations"; + "storage.k8s.io"."v1alpha1"."VolumeAttachment" = + mkAliasDefinitions options.resources."volumeAttachments"; }; }; diff --git a/modules/k8s.nix b/modules/k8s.nix index 82bade1..a27e27f 100644 --- a/modules/k8s.nix +++ b/modules/k8s.nix @@ -322,6 +322,7 @@ in { # import of yaml files (map (i: let + # load yaml file object = loadYAML i; groupVersion = splitString "/" object.apiVersion; name = object.metadata.name; @@ -331,7 +332,7 @@ in { then "core" else head groupVersion; kind = object.kind; in { - ${group}.${version}.${kind}.${name} = object; + resources.${group}.${version}.${kind}.${name} = object; }) cfg.imports)); kubernetes.objects = mkMerge [ @@ -341,13 +342,6 @@ in { cfg.api.resources.${type.group}.${type.version}.${type.kind} ) cfg.api.types)) - # latest resources - (flatten (map (type: - if type.name == null then [] - else mapAttrsToList (name: resource: moduleToAttrs resource) - cfg.api.resources.${type.name} - ) cfg.api.types)) - # passthru of child kubernetes objects if passthru is enabled on submodule # and submodule has k8s module loaded (flatten (mapAttrsToList (_: submodule: diff --git a/modules/submodules.nix b/modules/submodules.nix index 606724d..4615edc 100644 --- a/modules/submodules.nix +++ b/modules/submodules.nix @@ -1,6 +1,7 @@ { config, kubenix, pkgs, lib, ... }: with lib; +with import ../lib/modules.nix { inherit lib; }; let cfg = config.submodules; @@ -19,51 +20,6 @@ let ) ) config.submodules.defaults); - submoduleWithSpecialArgs = opts: specialArgs: - let - opts' = toList opts; - inherit (lib.modules) evalModules; - in - mkOptionType rec { - name = "submodule"; - check = x: isAttrs x || isFunction x; - merge = loc: defs: - let - coerce = def: if isFunction def then def else { config = def; }; - modules = opts' ++ map (def: { _file = def.file; imports = [(coerce def.value)]; }) defs; - in (evalModules { - inherit modules specialArgs; - prefix = loc; - }).config; - getSubOptions = prefix: (evalModules - { modules = opts'; inherit prefix specialArgs; - # This is a work-around due to the fact that some sub-modules, - # such as the one included in an attribute set, expects a "args" - # attribute to be given to the sub-module. As the option - # evaluation does not have any specific attribute name, we - # provide a default one for the documentation. - # - # This is mandatory as some option declaration might use the - # "name" attribute given as argument of the submodule and use it - # as the default of option declarations. - # - # Using lookalike unicode single angle quotation marks because - # of the docbook transformation the options receive. In all uses - # > and < wouldn't be encoded correctly so the encoded values - # would be used, and use of `<` and `>` would break the XML document. - # It shouldn't cause an issue since this is cosmetic for the manual. - args.name = "‹name›"; - }).options; - getSubModules = opts'; - substSubModules = m: submoduleWithSpecialArgs m specialArgs; - functor = (defaultFunctor name) // { - # Merging of submodules is done as part of mergeOptionDecls, as we have to annotate - # each submodule with its location. - payload = []; - binOp = lhs: rhs: []; - }; - }; - specialArgs = cfg.specialArgs // { parentConfig = config; };