Skip to content

Commit cbc2b48

Browse files
kinghrothgarjsonnet-libs-bot
authored andcommitted
update: source github.com/jsonnet-libs/k8s@68d57927
1 parent 18c3587 commit cbc2b48

File tree

331 files changed

+156526
-68119
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

331 files changed

+156526
-68119
lines changed

0.8/_gen/generators/v1alpha1/acrAccessToken.libsonnet renamed to 0.16/_gen/generators/v1alpha1/acrAccessToken.libsonnet

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
local d = (import 'doc-util/main.libsonnet'),
3-
'#':: d.pkg(name='acrAccessToken', url='', help='"ACRAccessToken returns a Azure Container Registry token\\nthat can be used for pushing/pulling images.\\nNote: by default it will return an ACR Refresh Token with full access\\n(depending on the identity).\\nThis can be scoped down to the repository level using .spec.scope.\\nIn case scope is defined it will return an ACR Access Token.\\n\\n\\nSee docs: https://github.com/Azure/acr/blob/main/docs/AAD-OAuth.md"'),
3+
'#':: d.pkg(name='acrAccessToken', url='', help='"ACRAccessToken returns an Azure Container Registry token\\nthat can be used for pushing/pulling images.\\nNote: by default it will return an ACR Refresh Token with full access\\n(depending on the identity).\\nThis can be scoped down to the repository level using .spec.scope.\\nIn case scope is defined it will return an ACR Access Token.\\n\\nSee docs: https://github.com/Azure/acr/blob/main/docs/AAD-OAuth.md"'),
44
'#metadata':: d.obj(help='"ObjectMeta is metadata that all persisted resources must have, which includes all objects users must create."'),
55
metadata: {
66
'#withAnnotations':: d.fn(help='"Annotations is an unstructured key value map stored with a resource that may be set by external tools to store and retrieve arbitrary metadata. They are not queryable and should be preserved when modifying objects. More info: http://kubernetes.io/docs/user-guide/annotations"', args=[d.arg(name='annotations', type=d.T.object)]),
@@ -62,20 +62,20 @@
6262
secretRef: {
6363
'#clientId':: d.obj(help='"The Azure clientId of the service principle used for authentication."'),
6464
clientId: {
65-
'#withKey':: d.fn(help="\"The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be\\ndefaulted, in others it may be required.\"", args=[d.arg(name='key', type=d.T.string)]),
65+
'#withKey':: d.fn(help='"A key in the referenced Secret.\\nSome instances of this field may be defaulted, in others it may be required."', args=[d.arg(name='key', type=d.T.string)]),
6666
withKey(key): { spec+: { auth+: { servicePrincipal+: { secretRef+: { clientId+: { key: key } } } } } },
6767
'#withName':: d.fn(help='"The name of the Secret resource being referred to."', args=[d.arg(name='name', type=d.T.string)]),
6868
withName(name): { spec+: { auth+: { servicePrincipal+: { secretRef+: { clientId+: { name: name } } } } } },
69-
'#withNamespace':: d.fn(help='"Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults\\nto the namespace of the referent."', args=[d.arg(name='namespace', type=d.T.string)]),
69+
'#withNamespace':: d.fn(help='"The namespace of the Secret resource being referred to.\\nIgnored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent."', args=[d.arg(name='namespace', type=d.T.string)]),
7070
withNamespace(namespace): { spec+: { auth+: { servicePrincipal+: { secretRef+: { clientId+: { namespace: namespace } } } } } },
7171
},
7272
'#clientSecret':: d.obj(help='"The Azure ClientSecret of the service principle used for authentication."'),
7373
clientSecret: {
74-
'#withKey':: d.fn(help="\"The key of the entry in the Secret resource's `data` field to be used. Some instances of this field may be\\ndefaulted, in others it may be required.\"", args=[d.arg(name='key', type=d.T.string)]),
74+
'#withKey':: d.fn(help='"A key in the referenced Secret.\\nSome instances of this field may be defaulted, in others it may be required."', args=[d.arg(name='key', type=d.T.string)]),
7575
withKey(key): { spec+: { auth+: { servicePrincipal+: { secretRef+: { clientSecret+: { key: key } } } } } },
7676
'#withName':: d.fn(help='"The name of the Secret resource being referred to."', args=[d.arg(name='name', type=d.T.string)]),
7777
withName(name): { spec+: { auth+: { servicePrincipal+: { secretRef+: { clientSecret+: { name: name } } } } } },
78-
'#withNamespace':: d.fn(help='"Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults\\nto the namespace of the referent."', args=[d.arg(name='namespace', type=d.T.string)]),
78+
'#withNamespace':: d.fn(help='"The namespace of the Secret resource being referred to.\\nIgnored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent."', args=[d.arg(name='namespace', type=d.T.string)]),
7979
withNamespace(namespace): { spec+: { auth+: { servicePrincipal+: { secretRef+: { clientSecret+: { namespace: namespace } } } } } },
8080
},
8181
},
@@ -90,7 +90,7 @@
9090
withAudiencesMixin(audiences): { spec+: { auth+: { workloadIdentity+: { serviceAccountRef+: { audiences+: if std.isArray(v=audiences) then audiences else [audiences] } } } } },
9191
'#withName':: d.fn(help='"The name of the ServiceAccount resource being referred to."', args=[d.arg(name='name', type=d.T.string)]),
9292
withName(name): { spec+: { auth+: { workloadIdentity+: { serviceAccountRef+: { name: name } } } } },
93-
'#withNamespace':: d.fn(help='"Namespace of the resource being referred to. Ignored if referent is not cluster-scoped. cluster-scoped defaults\\nto the namespace of the referent."', args=[d.arg(name='namespace', type=d.T.string)]),
93+
'#withNamespace':: d.fn(help='"Namespace of the resource being referred to.\\nIgnored if referent is not cluster-scoped, otherwise defaults to the namespace of the referent."', args=[d.arg(name='namespace', type=d.T.string)]),
9494
withNamespace(namespace): { spec+: { auth+: { workloadIdentity+: { serviceAccountRef+: { namespace: namespace } } } } },
9595
},
9696
},
@@ -99,7 +99,7 @@
9999
withEnvironmentType(environmentType): { spec+: { environmentType: environmentType } },
100100
'#withRegistry':: d.fn(help='"the domain name of the ACR registry\\ne.g. foobarexample.azurecr.io"', args=[d.arg(name='registry', type=d.T.string)]),
101101
withRegistry(registry): { spec+: { registry: registry } },
102-
'#withScope':: d.fn(help='"Define the scope for the access token, e.g. pull/push access for a repository.\\nif not provided it will return a refresh token that has full scope.\\nNote: you need to pin it down to the repository level, there is no wildcard available.\\n\\n\\nexamples:\\nrepository:my-repository:pull,push\\nrepository:my-repository:pull\\n\\n\\nsee docs for details: https://docs.docker.com/registry/spec/auth/scope/"', args=[d.arg(name='scope', type=d.T.string)]),
102+
'#withScope':: d.fn(help='"Define the scope for the access token, e.g. pull/push access for a repository.\\nif not provided it will return a refresh token that has full scope.\\nNote: you need to pin it down to the repository level, there is no wildcard available.\\n\\nexamples:\\nrepository:my-repository:pull,push\\nrepository:my-repository:pull\\n\\nsee docs for details: https://docs.docker.com/registry/spec/auth/scope/"', args=[d.arg(name='scope', type=d.T.string)]),
103103
withScope(scope): { spec+: { scope: scope } },
104104
'#withTenantId':: d.fn(help='"TenantID configures the Azure Tenant to send requests to. Required for ServicePrincipal auth type."', args=[d.arg(name='tenantId', type=d.T.string)]),
105105
withTenantId(tenantId): { spec+: { tenantId: tenantId } },

0 commit comments

Comments
 (0)