Skip to content

Commit

Permalink
Separate resource description from list of resource fields
Browse files Browse the repository at this point in the history
  • Loading branch information
feloy committed Jan 6, 2021
1 parent 81048a3 commit 320360e
Show file tree
Hide file tree
Showing 83 changed files with 272 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ Kubelets use this API to obtain:

This API can be used to request client certificates to authenticate to kube-apiserver (with the "kubernetes.io/kube-apiserver-client" signerName), or to obtain certificates from custom non-Kubernetes signers.

<hr>

- **apiVersion**: certificates.k8s.io/v1

Expand All @@ -50,6 +51,7 @@ This API can be used to request client certificates to authenticate to kube-apis

CertificateSigningRequestSpec contains the certificate request.

<hr>

- **request** ([]byte), required

Expand Down Expand Up @@ -126,6 +128,7 @@ CertificateSigningRequestSpec contains the certificate request.

CertificateSigningRequestStatus contains conditions used to indicate approved/denied/failed status of the request, and the issued certificate.

<hr>

- **certificate** ([]byte)

Expand Down Expand Up @@ -211,6 +214,7 @@ CertificateSigningRequestStatus contains conditions used to indicate approved/de

CertificateSigningRequestList is a collection of CertificateSigningRequest objects

<hr>

- **apiVersion**: certificates.k8s.io/v1

Expand All @@ -233,6 +237,7 @@ CertificateSigningRequestList is a collection of CertificateSigningRequest objec



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 1

ServiceAccount binds together: * a name, understood by users, and perhaps by peripheral systems, for an identity * a principal that can be authenticated and authorized * a set of secrets

<hr>

- **apiVersion**: v1

Expand Down Expand Up @@ -51,6 +52,7 @@ ServiceAccount binds together: * a name, understood by users, and perhaps by per

ServiceAccountList is a list of ServiceAccount objects

<hr>

- **apiVersion**: v1

Expand All @@ -74,6 +76,7 @@ ServiceAccountList is a list of ServiceAccount objects



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 2

TokenRequest requests a token for a given service account.

<hr>

- **apiVersion**: authentication.k8s.io/v1

Expand All @@ -42,6 +43,7 @@ TokenRequest requests a token for a given service account.

TokenRequestSpec contains client provided parameters of a token request.

<hr>

- **audiences** ([]string), required

Expand Down Expand Up @@ -82,6 +84,7 @@ TokenRequestSpec contains client provided parameters of a token request.

TokenRequestStatus is the result of a token request.

<hr>

- **expirationTimestamp** (Time), required

Expand All @@ -102,6 +105,7 @@ TokenRequestStatus is the result of a token request.



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 3

TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.

<hr>

- **apiVersion**: authentication.k8s.io/v1

Expand All @@ -44,6 +45,7 @@ TokenReview attempts to authenticate a token to a known user. Note: TokenReview

TokenReviewSpec is a description of the token authentication request.

<hr>

- **audiences** ([]string)

Expand All @@ -61,6 +63,7 @@ TokenReviewSpec is a description of the token authentication request.

TokenReviewStatus is the result of the token authentication request.

<hr>

- **audiences** ([]string)

Expand Down Expand Up @@ -105,6 +108,7 @@ TokenReviewStatus is the result of the token authentication request.



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 6

ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand Down Expand Up @@ -79,6 +80,7 @@ ClusterRoleBinding references a ClusterRole, but not contain it. It can referen

ClusterRoleBindingList is a collection of ClusterRoleBindings

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand All @@ -102,6 +104,7 @@ ClusterRoleBindingList is a collection of ClusterRoleBindings



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 5

ClusterRole is a cluster level, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding or ClusterRoleBinding.

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand Down Expand Up @@ -75,6 +76,7 @@ ClusterRole is a cluster level, logical grouping of PolicyRules that can be refe

ClusterRoleList is a collection of ClusterRoles

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand All @@ -98,6 +100,7 @@ ClusterRoleList is a collection of ClusterRoles



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 1

LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.

<hr>

- **apiVersion**: authorization.k8s.io/v1

Expand All @@ -44,6 +45,7 @@ LocalSubjectAccessReview checks whether or not a user or group can perform an ac



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 8

RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand Down Expand Up @@ -79,6 +80,7 @@ RoleBinding references a role, but does not contain it. It can reference a Role

RoleBindingList is a collection of RoleBindings

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand All @@ -102,6 +104,7 @@ RoleBindingList is a collection of RoleBindings



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 7

Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand Down Expand Up @@ -64,6 +65,7 @@ Role is a namespaced, logical grouping of PolicyRules that can be referenced as

RoleList is a collection of Roles

<hr>

- **apiVersion**: rbac.authorization.k8s.io/v1

Expand All @@ -87,6 +89,7 @@ RoleList is a collection of Roles



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 2

SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action

<hr>

- **apiVersion**: authorization.k8s.io/v1

Expand All @@ -44,6 +45,7 @@ SelfSubjectAccessReview checks whether or the current user can perform an action

SelfSubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes and NonResourceAuthorizationAttributes must be set

<hr>

- **nonResourceAttributes** (NonResourceAttributes)

Expand Down Expand Up @@ -103,6 +105,7 @@ SelfSubjectAccessReviewSpec is a description of the access request. Exactly one



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 3

SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.

<hr>

- **apiVersion**: authorization.k8s.io/v1

Expand Down Expand Up @@ -94,6 +95,7 @@ SelfSubjectRulesReview enumerates the set of actions the current user can perfor



<hr>

- **namespace** (string)

Expand All @@ -107,6 +109,7 @@ SelfSubjectRulesReview enumerates the set of actions the current user can perfor



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 4

SubjectAccessReview checks whether or not a user or group can perform an action.

<hr>

- **apiVersion**: authorization.k8s.io/v1

Expand All @@ -44,6 +45,7 @@ SubjectAccessReview checks whether or not a user or group can perform an action.

SubjectAccessReviewSpec is a description of the access request. Exactly one of ResourceAuthorizationAttributes and NonResourceAuthorizationAttributes must be set

<hr>

- **extra** (map[string][]string)

Expand Down Expand Up @@ -119,6 +121,7 @@ SubjectAccessReviewSpec is a description of the access request. Exactly one of

SubjectAccessReviewStatus

<hr>

- **allowed** (boolean), required

Expand All @@ -144,6 +147,7 @@ SubjectAccessReviewStatus



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 4

APIService represents a server for a particular GroupVersion. Name must be "version.group".

<hr>

- **apiVersion**: apiregistration.k8s.io/v1

Expand All @@ -44,6 +45,7 @@ APIService represents a server for a particular GroupVersion. Name must be "vers

APIServiceSpec contains information for locating and communicating with a server. Only https is supported, though you are able to disable certificate verification.

<hr>

- **groupPriorityMinimum** (int32), required

Expand Down Expand Up @@ -98,6 +100,7 @@ APIServiceSpec contains information for locating and communicating with a server

APIServiceStatus contains derived information about an API server

<hr>

- **conditions** ([]APIServiceCondition)

Expand Down Expand Up @@ -141,6 +144,7 @@ APIServiceStatus contains derived information about an API server

APIServiceList is a list of APIService objects.

<hr>

- **apiVersion**: apiregistration.k8s.io/v1

Expand All @@ -162,6 +166,7 @@ APIServiceList is a list of APIService objects.



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 9

Binding ties one object to another; for example, a pod is bound to a node by a scheduler. Deprecated in 1.7, please use the bindings subresource of pods instead.

<hr>

- **apiVersion**: v1

Expand All @@ -41,6 +42,7 @@ Binding ties one object to another; for example, a pod is bound to a node by a s



<hr>



Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ weight: 10

ComponentStatus (and ComponentStatusList) holds the cluster validation info. Deprecated: This API is deprecated in v1.19+

<hr>

- **apiVersion**: v1

Expand Down Expand Up @@ -62,6 +63,7 @@ ComponentStatus (and ComponentStatusList) holds the cluster validation info. Dep

Status of all the conditions for the component as a list of ComponentStatus objects. Deprecated: This API is deprecated in v1.19+

<hr>

- **apiVersion**: v1

Expand All @@ -85,6 +87,7 @@ Status of all the conditions for the component as a list of ComponentStatus obje



<hr>



Expand Down
Loading

0 comments on commit 320360e

Please sign in to comment.