Skip to content

Commit 749e065

Browse files
committed
update generated docs for trust-manager + approver-policy
Signed-off-by: Ashley Davis <ashley.davis@cyberark.com>
1 parent 3f65b7e commit 749e065

File tree

4 files changed

+90
-57
lines changed

4 files changed

+90
-57
lines changed

content/docs/policy/approval/approver-policy/api-reference.md

Lines changed: 0 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,6 @@ referring to matching issuers.
167167
CertificateRequests will not be processed if the issuer does not match,
168168
regardless of whether the requestor is bound by RBAC.
169169

170-
171170
The following value will match _all_ issuers:
172171
```
173172
issuerRef: {}
@@ -199,7 +198,6 @@ referring to matching issuers.
199198
CertificateRequests will not be processed if the issuer does not match,
200199
regardless of whether the requestor is bound by RBAC.
201200

202-
203201
The following value will match _all_ issuers:
204202
```
205203
issuerRef: {}
@@ -285,7 +283,6 @@ selector.
285283
MatchNames is the set of namespace names that select on
286284
CertificateRequests that have been created in a matching namespace.
287285
Accepts wildcards "*".
288-
TODO: add x-kubernetes-list-type: set in v1alpha2
289286
<br/>
290287
</td>
291288
<td>false</td>
@@ -385,7 +382,6 @@ CertificateRequest `spec.keyUsages` field.
385382
If set, `spec.keyUsages` in a CertificateRequest must be a subset of the
386383
specified values.
387384
If `[]` or unset, no `spec.keyUsages` are allowed.
388-
TODO: add x-kubernetes-list-type: set in v1alpha2
389385
<br/>
390386
</td>
391387
<td>false</td>
@@ -437,7 +433,6 @@ ALL validations for the request to be granted by this policy.
437433
Accepts wildcards "*".
438434
If set, the related field must match the specified pattern.
439435

440-
441436
NOTE:`value: ""` paired with `required: true` establishes a policy that
442437
will never grant a `CertificateRequest`, but other policies may.
443438
<br/>
@@ -473,7 +468,6 @@ To enable more advanced validation rules, approver-policy provides the
473468
`cr` (map) variable to the CEL expression containing `namespace` and
474469
`name` of the `CertificateRequest` resource.
475470

476-
477471
Example (rule for namespaced DNSNames):
478472
```
479473
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -540,10 +534,8 @@ ALL validations for the request to be granted by this policy.
540534
Accepts wildcards "*".
541535
If set, the related field can only include items contained in the allowed values.
542536

543-
544537
NOTE:`values: []` paired with `required: true` establishes a policy that
545538
will never grant a `CertificateRequest`, but other policies may.
546-
TODO: add x-kubernetes-list-type: set in v1alpha2
547539
<br/>
548540
</td>
549541
<td>false</td>
@@ -577,7 +569,6 @@ To enable more advanced validation rules, approver-policy provides the
577569
`cr` (map) variable to the CEL expression containing `namespace` and
578570
`name` of the `CertificateRequest` resource.
579571

580-
581572
Example (rule for namespaced DNSNames):
582573
```
583574
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -644,10 +635,8 @@ ALL validations for the request to be granted by this policy.
644635
Accepts wildcards "*".
645636
If set, the related field can only include items contained in the allowed values.
646637

647-
648638
NOTE:`values: []` paired with `required: true` establishes a policy that
649639
will never grant a `CertificateRequest`, but other policies may.
650-
TODO: add x-kubernetes-list-type: set in v1alpha2
651640
<br/>
652641
</td>
653642
<td>false</td>
@@ -681,7 +670,6 @@ To enable more advanced validation rules, approver-policy provides the
681670
`cr` (map) variable to the CEL expression containing `namespace` and
682671
`name` of the `CertificateRequest` resource.
683672

684-
685673
Example (rule for namespaced DNSNames):
686674
```
687675
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -748,10 +736,8 @@ ALL validations for the request to be granted by this policy.
748736
Accepts wildcards "*".
749737
If set, the related field can only include items contained in the allowed values.
750738

751-
752739
NOTE:`values: []` paired with `required: true` establishes a policy that
753740
will never grant a `CertificateRequest`, but other policies may.
754-
TODO: add x-kubernetes-list-type: set in v1alpha2
755741
<br/>
756742
</td>
757743
<td>false</td>
@@ -785,7 +771,6 @@ To enable more advanced validation rules, approver-policy provides the
785771
`cr` (map) variable to the CEL expression containing `namespace` and
786772
`name` of the `CertificateRequest` resource.
787773

788-
789774
Example (rule for namespaced DNSNames):
790775
```
791776
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -942,10 +927,8 @@ ALL validations for the request to be granted by this policy.
942927
Accepts wildcards "*".
943928
If set, the related field can only include items contained in the allowed values.
944929

945-
946930
NOTE:`values: []` paired with `required: true` establishes a policy that
947931
will never grant a `CertificateRequest`, but other policies may.
948-
TODO: add x-kubernetes-list-type: set in v1alpha2
949932
<br/>
950933
</td>
951934
<td>false</td>
@@ -979,7 +962,6 @@ To enable more advanced validation rules, approver-policy provides the
979962
`cr` (map) variable to the CEL expression containing `namespace` and
980963
`name` of the `CertificateRequest` resource.
981964

982-
983965
Example (rule for namespaced DNSNames):
984966
```
985967
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1046,10 +1028,8 @@ ALL validations for the request to be granted by this policy.
10461028
Accepts wildcards "*".
10471029
If set, the related field can only include items contained in the allowed values.
10481030

1049-
10501031
NOTE:`values: []` paired with `required: true` establishes a policy that
10511032
will never grant a `CertificateRequest`, but other policies may.
1052-
TODO: add x-kubernetes-list-type: set in v1alpha2
10531033
<br/>
10541034
</td>
10551035
<td>false</td>
@@ -1083,7 +1063,6 @@ To enable more advanced validation rules, approver-policy provides the
10831063
`cr` (map) variable to the CEL expression containing `namespace` and
10841064
`name` of the `CertificateRequest` resource.
10851065

1086-
10871066
Example (rule for namespaced DNSNames):
10881067
```
10891068
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1151,10 +1130,8 @@ ALL validations for the request to be granted by this policy.
11511130
Accepts wildcards "*".
11521131
If set, the related field can only include items contained in the allowed values.
11531132

1154-
11551133
NOTE:`values: []` paired with `required: true` establishes a policy that
11561134
will never grant a `CertificateRequest`, but other policies may.
1157-
TODO: add x-kubernetes-list-type: set in v1alpha2
11581135
<br/>
11591136
</td>
11601137
<td>false</td>
@@ -1188,7 +1165,6 @@ To enable more advanced validation rules, approver-policy provides the
11881165
`cr` (map) variable to the CEL expression containing `namespace` and
11891166
`name` of the `CertificateRequest` resource.
11901167

1191-
11921168
Example (rule for namespaced DNSNames):
11931169
```
11941170
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1256,10 +1232,8 @@ ALL validations for the request to be granted by this policy.
12561232
Accepts wildcards "*".
12571233
If set, the related field can only include items contained in the allowed values.
12581234

1259-
12601235
NOTE:`values: []` paired with `required: true` establishes a policy that
12611236
will never grant a `CertificateRequest`, but other policies may.
1262-
TODO: add x-kubernetes-list-type: set in v1alpha2
12631237
<br/>
12641238
</td>
12651239
<td>false</td>
@@ -1293,7 +1267,6 @@ To enable more advanced validation rules, approver-policy provides the
12931267
`cr` (map) variable to the CEL expression containing `namespace` and
12941268
`name` of the `CertificateRequest` resource.
12951269

1296-
12971270
Example (rule for namespaced DNSNames):
12981271
```
12991272
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1360,10 +1333,8 @@ ALL validations for the request to be granted by this policy.
13601333
Accepts wildcards "*".
13611334
If set, the related field can only include items contained in the allowed values.
13621335

1363-
13641336
NOTE:`values: []` paired with `required: true` establishes a policy that
13651337
will never grant a `CertificateRequest`, but other policies may.
1366-
TODO: add x-kubernetes-list-type: set in v1alpha2
13671338
<br/>
13681339
</td>
13691340
<td>false</td>
@@ -1397,7 +1368,6 @@ To enable more advanced validation rules, approver-policy provides the
13971368
`cr` (map) variable to the CEL expression containing `namespace` and
13981369
`name` of the `CertificateRequest` resource.
13991370

1400-
14011371
Example (rule for namespaced DNSNames):
14021372
```
14031373
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1464,10 +1434,8 @@ ALL validations for the request to be granted by this policy.
14641434
Accepts wildcards "*".
14651435
If set, the related field can only include items contained in the allowed values.
14661436

1467-
14681437
NOTE:`values: []` paired with `required: true` establishes a policy that
14691438
will never grant a `CertificateRequest`, but other policies may.
1470-
TODO: add x-kubernetes-list-type: set in v1alpha2
14711439
<br/>
14721440
</td>
14731441
<td>false</td>
@@ -1501,7 +1469,6 @@ To enable more advanced validation rules, approver-policy provides the
15011469
`cr` (map) variable to the CEL expression containing `namespace` and
15021470
`name` of the `CertificateRequest` resource.
15031471

1504-
15051472
Example (rule for namespaced DNSNames):
15061473
```
15071474
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1570,7 +1537,6 @@ ALL validations for the request to be granted by this policy.
15701537
Accepts wildcards "*".
15711538
If set, the related field must match the specified pattern.
15721539

1573-
15741540
NOTE:`value: ""` paired with `required: true` establishes a policy that
15751541
will never grant a `CertificateRequest`, but other policies may.
15761542
<br/>
@@ -1606,7 +1572,6 @@ To enable more advanced validation rules, approver-policy provides the
16061572
`cr` (map) variable to the CEL expression containing `namespace` and
16071573
`name` of the `CertificateRequest` resource.
16081574

1609-
16101575
Example (rule for namespaced DNSNames):
16111576
```
16121577
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1674,10 +1639,8 @@ ALL validations for the request to be granted by this policy.
16741639
Accepts wildcards "*".
16751640
If set, the related field can only include items contained in the allowed values.
16761641

1677-
16781642
NOTE:`values: []` paired with `required: true` establishes a policy that
16791643
will never grant a `CertificateRequest`, but other policies may.
1680-
TODO: add x-kubernetes-list-type: set in v1alpha2
16811644
<br/>
16821645
</td>
16831646
<td>false</td>
@@ -1711,7 +1674,6 @@ To enable more advanced validation rules, approver-policy provides the
17111674
`cr` (map) variable to the CEL expression containing `namespace` and
17121675
`name` of the `CertificateRequest` resource.
17131676

1714-
17151677
Example (rule for namespaced DNSNames):
17161678
```
17171679
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
@@ -1778,10 +1740,8 @@ ALL validations for the request to be granted by this policy.
17781740
Accepts wildcards "*".
17791741
If set, the related field can only include items contained in the allowed values.
17801742

1781-
17821743
NOTE:`values: []` paired with `required: true` establishes a policy that
17831744
will never grant a `CertificateRequest`, but other policies may.
1784-
TODO: add x-kubernetes-list-type: set in v1alpha2
17851745
<br/>
17861746
</td>
17871747
<td>false</td>
@@ -1815,7 +1775,6 @@ To enable more advanced validation rules, approver-policy provides the
18151775
`cr` (map) variable to the CEL expression containing `namespace` and
18161776
`name` of the `CertificateRequest` resource.
18171777

1818-
18191778
Example (rule for namespaced DNSNames):
18201779
```
18211780
rule: self.endsWith(cr.namespace + '.svc.cluster.local')

0 commit comments

Comments
 (0)