@@ -167,7 +167,6 @@ referring to matching issuers.
167167CertificateRequests will not be processed if the issuer does not match,
168168regardless of whether the requestor is bound by RBAC.
169169
170-
171170The following value will match _ all_ issuers:
172171```
173172issuerRef: {}
@@ -199,7 +198,6 @@ referring to matching issuers.
199198CertificateRequests will not be processed if the issuer does not match,
200199regardless of whether the requestor is bound by RBAC.
201200
202-
203201The following value will match _ all_ issuers:
204202```
205203issuerRef: {}
@@ -285,7 +283,6 @@ selector.
285283 MatchNames is the set of namespace names that select on
286284CertificateRequests that have been created in a matching namespace.
287285Accepts wildcards "* ".
288- TODO: add x-kubernetes-list-type: set in v1alpha2
289286<br />
290287 </td>
291288 <td>false</td>
@@ -385,7 +382,6 @@ CertificateRequest `spec.keyUsages` field.
385382If set, ` spec.keyUsages ` in a CertificateRequest must be a subset of the
386383specified values.
387384If ` [] ` or unset, no ` spec.keyUsages ` are allowed.
388- TODO: add x-kubernetes-list-type: set in v1alpha2
389385<br />
390386 </td>
391387 <td>false</td>
@@ -437,7 +433,6 @@ ALL validations for the request to be granted by this policy.
437433Accepts wildcards "* ".
438434If set, the related field must match the specified pattern.
439435
440-
441436NOTE:` value: "" ` paired with ` required: true ` establishes a policy that
442437will never grant a ` CertificateRequest ` , but other policies may.
443438<br />
@@ -473,7 +468,6 @@ To enable more advanced validation rules, approver-policy provides the
473468` cr ` (map) variable to the CEL expression containing ` namespace ` and
474469` name ` of the ` CertificateRequest ` resource.
475470
476-
477471Example (rule for namespaced DNSNames):
478472```
479473rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -540,10 +534,8 @@ ALL validations for the request to be granted by this policy.
540534Accepts wildcards "* ".
541535If set, the related field can only include items contained in the allowed values.
542536
543-
544537NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
545538will never grant a ` CertificateRequest ` , but other policies may.
546- TODO: add x-kubernetes-list-type: set in v1alpha2
547539<br />
548540 </td>
549541 <td>false</td>
@@ -577,7 +569,6 @@ To enable more advanced validation rules, approver-policy provides the
577569` cr ` (map) variable to the CEL expression containing ` namespace ` and
578570` name ` of the ` CertificateRequest ` resource.
579571
580-
581572Example (rule for namespaced DNSNames):
582573```
583574rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -644,10 +635,8 @@ ALL validations for the request to be granted by this policy.
644635Accepts wildcards "* ".
645636If set, the related field can only include items contained in the allowed values.
646637
647-
648638NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
649639will never grant a ` CertificateRequest ` , but other policies may.
650- TODO: add x-kubernetes-list-type: set in v1alpha2
651640<br />
652641 </td>
653642 <td>false</td>
@@ -681,7 +670,6 @@ To enable more advanced validation rules, approver-policy provides the
681670` cr ` (map) variable to the CEL expression containing ` namespace ` and
682671` name ` of the ` CertificateRequest ` resource.
683672
684-
685673Example (rule for namespaced DNSNames):
686674```
687675rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -748,10 +736,8 @@ ALL validations for the request to be granted by this policy.
748736Accepts wildcards "* ".
749737If set, the related field can only include items contained in the allowed values.
750738
751-
752739NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
753740will never grant a ` CertificateRequest ` , but other policies may.
754- TODO: add x-kubernetes-list-type: set in v1alpha2
755741<br />
756742 </td>
757743 <td>false</td>
@@ -785,7 +771,6 @@ To enable more advanced validation rules, approver-policy provides the
785771` cr ` (map) variable to the CEL expression containing ` namespace ` and
786772` name ` of the ` CertificateRequest ` resource.
787773
788-
789774Example (rule for namespaced DNSNames):
790775```
791776rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -942,10 +927,8 @@ ALL validations for the request to be granted by this policy.
942927Accepts wildcards "* ".
943928If set, the related field can only include items contained in the allowed values.
944929
945-
946930NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
947931will never grant a ` CertificateRequest ` , but other policies may.
948- TODO: add x-kubernetes-list-type: set in v1alpha2
949932<br />
950933 </td>
951934 <td>false</td>
@@ -979,7 +962,6 @@ To enable more advanced validation rules, approver-policy provides the
979962` cr ` (map) variable to the CEL expression containing ` namespace ` and
980963` name ` of the ` CertificateRequest ` resource.
981964
982-
983965Example (rule for namespaced DNSNames):
984966```
985967rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1046,10 +1028,8 @@ ALL validations for the request to be granted by this policy.
10461028Accepts wildcards "* ".
10471029If set, the related field can only include items contained in the allowed values.
10481030
1049-
10501031NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
10511032will never grant a ` CertificateRequest ` , but other policies may.
1052- TODO: add x-kubernetes-list-type: set in v1alpha2
10531033<br />
10541034 </td>
10551035 <td>false</td>
@@ -1083,7 +1063,6 @@ To enable more advanced validation rules, approver-policy provides the
10831063` cr ` (map) variable to the CEL expression containing ` namespace ` and
10841064` name ` of the ` CertificateRequest ` resource.
10851065
1086-
10871066Example (rule for namespaced DNSNames):
10881067```
10891068rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1151,10 +1130,8 @@ ALL validations for the request to be granted by this policy.
11511130Accepts wildcards "* ".
11521131If set, the related field can only include items contained in the allowed values.
11531132
1154-
11551133NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
11561134will never grant a ` CertificateRequest ` , but other policies may.
1157- TODO: add x-kubernetes-list-type: set in v1alpha2
11581135<br />
11591136 </td>
11601137 <td>false</td>
@@ -1188,7 +1165,6 @@ To enable more advanced validation rules, approver-policy provides the
11881165` cr ` (map) variable to the CEL expression containing ` namespace ` and
11891166` name ` of the ` CertificateRequest ` resource.
11901167
1191-
11921168Example (rule for namespaced DNSNames):
11931169```
11941170rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1256,10 +1232,8 @@ ALL validations for the request to be granted by this policy.
12561232Accepts wildcards "* ".
12571233If set, the related field can only include items contained in the allowed values.
12581234
1259-
12601235NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
12611236will never grant a ` CertificateRequest ` , but other policies may.
1262- TODO: add x-kubernetes-list-type: set in v1alpha2
12631237<br />
12641238 </td>
12651239 <td>false</td>
@@ -1293,7 +1267,6 @@ To enable more advanced validation rules, approver-policy provides the
12931267` cr ` (map) variable to the CEL expression containing ` namespace ` and
12941268` name ` of the ` CertificateRequest ` resource.
12951269
1296-
12971270Example (rule for namespaced DNSNames):
12981271```
12991272rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1360,10 +1333,8 @@ ALL validations for the request to be granted by this policy.
13601333Accepts wildcards "* ".
13611334If set, the related field can only include items contained in the allowed values.
13621335
1363-
13641336NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
13651337will never grant a ` CertificateRequest ` , but other policies may.
1366- TODO: add x-kubernetes-list-type: set in v1alpha2
13671338<br />
13681339 </td>
13691340 <td>false</td>
@@ -1397,7 +1368,6 @@ To enable more advanced validation rules, approver-policy provides the
13971368` cr ` (map) variable to the CEL expression containing ` namespace ` and
13981369` name ` of the ` CertificateRequest ` resource.
13991370
1400-
14011371Example (rule for namespaced DNSNames):
14021372```
14031373rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1464,10 +1434,8 @@ ALL validations for the request to be granted by this policy.
14641434Accepts wildcards "* ".
14651435If set, the related field can only include items contained in the allowed values.
14661436
1467-
14681437NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
14691438will never grant a ` CertificateRequest ` , but other policies may.
1470- TODO: add x-kubernetes-list-type: set in v1alpha2
14711439<br />
14721440 </td>
14731441 <td>false</td>
@@ -1501,7 +1469,6 @@ To enable more advanced validation rules, approver-policy provides the
15011469` cr ` (map) variable to the CEL expression containing ` namespace ` and
15021470` name ` of the ` CertificateRequest ` resource.
15031471
1504-
15051472Example (rule for namespaced DNSNames):
15061473```
15071474rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1570,7 +1537,6 @@ ALL validations for the request to be granted by this policy.
15701537Accepts wildcards "* ".
15711538If set, the related field must match the specified pattern.
15721539
1573-
15741540NOTE:` value: "" ` paired with ` required: true ` establishes a policy that
15751541will never grant a ` CertificateRequest ` , but other policies may.
15761542<br />
@@ -1606,7 +1572,6 @@ To enable more advanced validation rules, approver-policy provides the
16061572` cr ` (map) variable to the CEL expression containing ` namespace ` and
16071573` name ` of the ` CertificateRequest ` resource.
16081574
1609-
16101575Example (rule for namespaced DNSNames):
16111576```
16121577rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1674,10 +1639,8 @@ ALL validations for the request to be granted by this policy.
16741639Accepts wildcards "* ".
16751640If set, the related field can only include items contained in the allowed values.
16761641
1677-
16781642NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
16791643will never grant a ` CertificateRequest ` , but other policies may.
1680- TODO: add x-kubernetes-list-type: set in v1alpha2
16811644<br />
16821645 </td>
16831646 <td>false</td>
@@ -1711,7 +1674,6 @@ To enable more advanced validation rules, approver-policy provides the
17111674` cr ` (map) variable to the CEL expression containing ` namespace ` and
17121675` name ` of the ` CertificateRequest ` resource.
17131676
1714-
17151677Example (rule for namespaced DNSNames):
17161678```
17171679rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1778,10 +1740,8 @@ ALL validations for the request to be granted by this policy.
17781740Accepts wildcards "* ".
17791741If set, the related field can only include items contained in the allowed values.
17801742
1781-
17821743NOTE:` values: [] ` paired with ` required: true ` establishes a policy that
17831744will never grant a ` CertificateRequest ` , but other policies may.
1784- TODO: add x-kubernetes-list-type: set in v1alpha2
17851745<br />
17861746 </td>
17871747 <td>false</td>
@@ -1815,7 +1775,6 @@ To enable more advanced validation rules, approver-policy provides the
18151775` cr ` (map) variable to the CEL expression containing ` namespace ` and
18161776` name ` of the ` CertificateRequest ` resource.
18171777
1818-
18191778Example (rule for namespaced DNSNames):
18201779```
18211780rule: self.endsWith(cr.namespace + '.svc.cluster.local')
0 commit comments