Skip to content

Commit 1124b9e

Browse files
authored
Merge pull request #34100 from jboxman/apis-48
Add APIs for 4.8
2 parents 20e2cdb + 3edffb5 commit 1124b9e

File tree

227 files changed

+24061
-12852
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

227 files changed

+24061
-12852
lines changed

_topic_map.yml

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2173,6 +2173,8 @@ Topics:
21732173
File: consolelink-console-openshift-io-v1
21742174
- Name: 'ConsoleNotification [console.openshift.io/v1]'
21752175
File: consolenotification-console-openshift-io-v1
2176+
- Name: 'ConsolePlugin [console.openshift.io/v1alpha1]'
2177+
File: consoleplugin-console-openshift-io-v1alpha1
21762178
- Name: 'ConsoleQuickStart [console.openshift.io/v1]'
21772179
File: consolequickstart-console-openshift-io-v1
21782180
- Name: 'ConsoleYAMLSample [console.openshift.io/v1]'
@@ -2237,6 +2239,8 @@ Topics:
22372239
Topics:
22382240
- Name: About Metadata APIs
22392241
File: metadata-apis-index
2242+
- Name: 'APIRequestCount [apiserver.openshift.io/v1]'
2243+
File: apirequestcount-apiserver-openshift-io-v1
22402244
- Name: 'Binding [core/v1]'
22412245
File: binding-core-v1
22422246
- Name: 'ComponentStatus [core/v1]'
@@ -2283,10 +2287,12 @@ Topics:
22832287
File: clusternetwork-network-openshift-io-v1
22842288
- Name: 'Endpoints [core/v1]'
22852289
File: endpoints-core-v1
2286-
- Name: 'EndpointSlice [discovery.k8s.io/v1beta1]'
2287-
File: endpointslice-discovery-k8s-io-v1beta1
2290+
- Name: 'EndpointSlice [discovery.k8s.io/v1]'
2291+
File: endpointslice-discovery-k8s-io-v1
22882292
- Name: 'EgressNetworkPolicy [network.openshift.io/v1]'
22892293
File: egressnetworkpolicy-network-openshift-io-v1
2294+
- Name: 'EgressRouter [network.operator.openshift.io/v1]'
2295+
File: egressrouter-network-operator-openshift-io-v1
22902296
- Name: 'HostSubnet [network.openshift.io/v1]'
22912297
File: hostsubnet-network-openshift-io-v1
22922298
- Name: 'Ingress [networking.k8s.io/v1]'
@@ -2414,8 +2420,8 @@ Topics:
24142420
Topics:
24152421
- Name: About Policy APIs
24162422
File: policy-apis-index
2417-
- Name: 'PodDisruptionBudget [policy/v1beta1]'
2418-
File: poddisruptionbudget-policy-v1beta1
2423+
- Name: 'PodDisruptionBudget [policy/v1]'
2424+
File: poddisruptionbudget-policy-v1
24192425
- Name: Project APIs
24202426
Dir: project_apis
24212427
Topics:
@@ -2471,14 +2477,14 @@ Topics:
24712477
File: appliedclusterresourcequota-quota-openshift-io-v1
24722478
- Name: 'ClusterResourceQuota [quota.openshift.io/v1]'
24732479
File: clusterresourcequota-quota-openshift-io-v1
2474-
- Name: 'FlowSchema [flowcontrol.apiserver.k8s.io/v1alpha1]'
2475-
File: flowschema-flowcontrol-apiserver-k8s-io-v1alpha1
2480+
- Name: 'FlowSchema [flowcontrol.apiserver.k8s.io/v1beta1]'
2481+
File: flowschema-flowcontrol-apiserver-k8s-io-v1beta1
24762482
- Name: 'LimitRange [core/v1]'
24772483
File: limitrange-core-v1
24782484
- Name: 'PriorityClass [scheduling.k8s.io/v1]'
24792485
File: priorityclass-scheduling-k8s-io-v1
2480-
- Name: 'PriorityLevelConfiguration [flowcontrol.apiserver.k8s.io/v1alpha1]'
2481-
File: prioritylevelconfiguration-flowcontrol-apiserver-k8s-io-v1alpha1
2486+
- Name: 'PriorityLevelConfiguration [flowcontrol.apiserver.k8s.io/v1beta1]'
2487+
File: prioritylevelconfiguration-flowcontrol-apiserver-k8s-io-v1beta1
24822488
- Name: 'ResourceQuota [core/v1]'
24832489
File: resourcequota-core-v1
24842490
- Name: Security APIs
@@ -2513,6 +2519,8 @@ Topics:
25132519
File: csidriver-storage-k8s-io-v1
25142520
- Name: 'CSINode [storage.k8s.io/v1]'
25152521
File: csinode-storage-k8s-io-v1
2522+
- Name: 'CSIStorageCapacity [storage.k8s.io/v1beta1]'
2523+
File: csistoragecapacity-storage-k8s-io-v1beta1
25162524
- Name: 'PersistentVolumeClaim [core/v1]'
25172525
File: persistentvolumeclaim-core-v1
25182526
- Name: 'StorageClass [storage.k8s.io/v1]'
@@ -2564,8 +2572,8 @@ Topics:
25642572
File: buildconfig-build-openshift-io-v1
25652573
- Name: 'Build [build.openshift.io/v1]'
25662574
File: build-build-openshift-io-v1
2567-
- Name: 'CronJob [batch/v1beta1]'
2568-
File: cronjob-batch-v1beta1
2575+
- Name: 'CronJob [batch/v1]'
2576+
File: cronjob-batch-v1
25692577
- Name: 'DaemonSet [apps/v1]'
25702578
File: daemonset-apps-v1
25712579
- Name: 'Deployment [apps/v1]'

api-config.yaml

Lines changed: 98 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,74 @@ apiSupportLevels:
3636
supportLevels:
3737
- apiVersion: v\d+alpha\d+
3838
level: 4
39-
packageMap: {} # replace regex
39+
packageMap:
40+
com.coreos.monitoring: monitoring.coreos.com
41+
com.coreos.operators: operators.coreos.com
42+
com.github.openshift.api.apps: apps.openshift.io
43+
com.github.openshift.api.authorization: authorization.openshift.io
44+
com.github.openshift.api.build: build.openshift.io
45+
com.github.openshift.api.image: image.openshift.io
46+
com.github.openshift.api.oauth: oauth.openshift.io
47+
com.github.openshift.api.project: project.openshift.io
48+
com.github.openshift.api.quota: quota.openshift.io
49+
com.github.openshift.api.route: route.openshift.io
50+
com.github.openshift.api.security: security.openshift.io
51+
com.github.openshift.api.template: template.openshift.io
52+
com.github.openshift.api.user: user.openshift.io
53+
com.github.operator-framework.api.pkg.lib: packages.operators.coreos.com
54+
com.github.operator-framework.api.pkg.operators: packages.operators.coreos.com
55+
com.github.operator-framework.operator-lifecycle-manager.pkg.package-server.apis.operators: packages.operators.coreos.com
56+
io.cncf.cni.k8s: k8s.cni.cncf.io
57+
io.cncf.cni.whereabouts: whereabouts.cni.cncf.io
58+
io.k8s.metrics.pkg.apis.metrics: metrics.k8s.io
59+
io.k8s.api.admissionregistration: admissionregistration.k8s.io
60+
io.k8s.api.apps: apps
61+
io.k8s.api.authentication: authentication.k8s.io
62+
io.k8s.api.authorization: authorization.k8s.io
63+
io.k8s.api.autoscaling: autoscaling
64+
io.k8s.api.batch: batch
65+
io.k8s.api.certificates: certificates.k8s.io
66+
io.k8s.api.coordination: coordination.k8s.io
67+
io.k8s.api.core: core
68+
io.k8s.api.discovery: discovery.k8s.io
69+
io.k8s.api.events: events.k8s.io
70+
io.k8s.api.extensions: extensions
71+
io.k8s.api.flowcontrol: flowcontrol.apiserver.k8s.io
72+
io.k8s.api.networking: networking.k8s.io
73+
io.k8s.api.node: node.k8s.io
74+
io.k8s.api.policy: policy
75+
io.k8s.api.rbac: rbac.authorization.k8s.io
76+
io.k8s.api.scheduling: scheduling.k8s.io
77+
io.k8s.api.storage: storage.k8s.io
78+
io.k8s.apiextensions-apiserver.pkg.apis.apiextensions: apiextensions.k8s.io
79+
io.k8s.apimachinery.pkg.api: api
80+
io.k8s.apimachinery.pkg.apis.meta: meta
81+
io.k8s.apimachinery.pkg.util: util
82+
io.k8s.apimachinery.pkg: pkg
83+
io.k8s.kube-aggregator.pkg.apis.apiregistration: apiregistration.k8s.io
84+
io.k8s.migration: migration.k8s.io
85+
io.k8s.storage.snapshot: snapshot.storage.k8s.io
86+
io.metal3: metal3.io
87+
io.openshift.apiserver: apiserver.openshift.io
88+
io.openshift.authorization: authorization.openshift.io
89+
io.openshift.autoscaling: autoscaling.openshift.io
90+
io.openshift.cloudcredential: cloudcredential.openshift.io
91+
io.openshift.config: config.openshift.io
92+
io.openshift.console: console.openshift.io
93+
io.openshift.helm: helm.openshift.io
94+
io.openshift.internal.security: security.internal.openshift.io
95+
io.openshift.machine: machine.openshift.io
96+
io.openshift.machineconfiguration: machineconfiguration.openshift.io
97+
io.openshift.network: network.openshift.io
98+
io.openshift.operator.controlplane: controlplane.operator.openshift.io
99+
io.openshift.operator.imageregistry: imageregistry.operator.openshift.io
100+
io.openshift.operator.ingress: ingress.operator.openshift.io
101+
io.openshift.operator.network: network.operator.openshift.io
102+
io.openshift.operator.samples: samples.operator.openshift.io
103+
io.openshift.operator: operator.openshift.io
104+
io.openshift.quota: quota.openshift.io
105+
io.openshift.security: security.openshift.io
106+
io.openshift.tuned: tuned.openshift.io
40107
apiMap:
41108
- name: Authorization APIs
42109
resources:
@@ -226,6 +293,11 @@ apiMap:
226293
version: v1
227294
plural: consolenotifications
228295
namespaced: false
296+
- kind: ConsolePlugin
297+
group: console.openshift.io
298+
version: v1alpha1
299+
plural: consoleplugins
300+
namespaced: false
229301
- kind: ConsoleQuickStart
230302
group: console.openshift.io
231303
version: v1
@@ -344,6 +416,11 @@ apiMap:
344416
namespaced: true
345417
- name: Metadata APIs
346418
resources:
419+
- kind: APIRequestCount
420+
group: apiserver.openshift.io
421+
version: v1
422+
plural: apirequestcounts
423+
namespaced: false
347424
- kind: Binding
348425
group: core
349426
version: v1
@@ -440,14 +517,19 @@ apiMap:
440517
namespaced: true
441518
- kind: EndpointSlice
442519
group: discovery.k8s.io
443-
version: v1beta1
520+
version: v1
444521
plural: endpointslices
445522
namespaced: true
446523
- kind: EgressNetworkPolicy
447524
group: network.openshift.io
448525
version: v1
449526
plural: egressnetworkpolicies
450527
namespaced: true
528+
- kind: EgressRouter
529+
group: network.operator.openshift.io
530+
version: v1
531+
plural: egressrouters
532+
namespaced: true
451533
- kind: HostSubnet
452534
group: network.openshift.io
453535
version: v1
@@ -542,6 +624,12 @@ apiMap:
542624
version: v1
543625
plural: oauthclients
544626
namespaced: false
627+
# Not in OpenAPI spec JSON
628+
# - kind: TokenReview
629+
# group: oauth.openshift.io
630+
# version: v1
631+
# plural: tokenreviews
632+
# namespaced: false
545633
- kind: UserOAuthAccessToken
546634
group: oauth.openshift.io
547635
version: v1
@@ -715,7 +803,7 @@ apiMap:
715803
resources:
716804
- kind: PodDisruptionBudget
717805
group: policy
718-
version: v1beta1
806+
version: v1
719807
plural: poddisruptionbudgets
720808
namespaced: true
721809
# https://bugzilla.redhat.com/show_bug.cgi?id=1875493
@@ -811,7 +899,7 @@ apiMap:
811899
namespaced: false
812900
- kind: FlowSchema
813901
group: flowcontrol.apiserver.k8s.io
814-
version: v1alpha1
902+
version: v1beta1
815903
plural: flowschemas
816904
namespaced: false
817905
- kind: LimitRange
@@ -826,7 +914,7 @@ apiMap:
826914
namespaced: false
827915
- kind: PriorityLevelConfiguration
828916
group: flowcontrol.apiserver.k8s.io
829-
version: v1alpha1
917+
version: v1beta1
830918
plural: prioritylevelconfigurations
831919
namespaced: false
832920
- kind: ResourceQuota
@@ -899,6 +987,11 @@ apiMap:
899987
version: v1
900988
plural: csinodes
901989
namespaced: false
990+
- kind: CSIStorageCapacity
991+
group: storage.k8s.io
992+
version: v1beta1
993+
plural: csistoragecapacities
994+
namespaced: true
902995
- kind: PersistentVolumeClaim
903996
group: core
904997
version: v1

rest_api/authorization_apis/authorization-apis-index.adoc

Lines changed: 44 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,87 +9,120 @@ toc::[]
99
== LocalResourceAccessReview [authorization.openshift.io/v1]
1010

1111
Description::
12-
LocalResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec in a particular namespace
12+
+
13+
--
14+
LocalResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec in a particular namespace
15+
--
1316

1417
Type::
1518
`object`
1619

1720
== LocalSubjectAccessReview [authorization.openshift.io/v1]
1821

1922
Description::
20-
LocalSubjectAccessReview is an object for requesting information about whether a user or group can perform an action in a particular namespace
23+
+
24+
--
25+
LocalSubjectAccessReview is an object for requesting information about whether a user or group can perform an action in a particular namespace
26+
--
2127

2228
Type::
2329
`object`
2430

2531
== ResourceAccessReview [authorization.openshift.io/v1]
2632

2733
Description::
28-
ResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec
34+
+
35+
--
36+
ResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec
37+
--
2938

3039
Type::
3140
`object`
3241

3342
== SelfSubjectRulesReview [authorization.openshift.io/v1]
3443

3544
Description::
36-
SelfSubjectRulesReview is a resource you can create to determine which actions you can perform in a namespace
45+
+
46+
--
47+
SelfSubjectRulesReview is a resource you can create to determine which actions you can perform in a namespace
48+
--
3749

3850
Type::
3951
`object`
4052

4153
== SubjectAccessReview [authorization.openshift.io/v1]
4254

4355
Description::
44-
SubjectAccessReview is an object for requesting information about whether a user or group can perform an action
56+
+
57+
--
58+
SubjectAccessReview is an object for requesting information about whether a user or group can perform an action
59+
--
4560

4661
Type::
4762
`object`
4863

4964
== SubjectRulesReview [authorization.openshift.io/v1]
5065

5166
Description::
52-
SubjectRulesReview is a resource you can create to determine which actions another user can perform in a namespace
67+
+
68+
--
69+
SubjectRulesReview is a resource you can create to determine which actions another user can perform in a namespace
70+
--
5371

5472
Type::
5573
`object`
5674

5775
== TokenReview [authentication.k8s.io/v1]
5876

5977
Description::
60-
TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.
78+
+
79+
--
80+
TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.
81+
--
6182

6283
Type::
6384
`object`
6485

6586
== LocalSubjectAccessReview [authorization.k8s.io/v1]
6687

6788
Description::
68-
LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.
89+
+
90+
--
91+
LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.
92+
--
6993

7094
Type::
7195
`object`
7296

7397
== SelfSubjectAccessReview [authorization.k8s.io/v1]
7498

7599
Description::
76-
SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action
100+
+
101+
--
102+
SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action
103+
--
77104

78105
Type::
79106
`object`
80107

81108
== SelfSubjectRulesReview [authorization.k8s.io/v1]
82109

83110
Description::
84-
SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.
111+
+
112+
--
113+
SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.
114+
--
85115

86116
Type::
87117
`object`
88118

89119
== SubjectAccessReview [authorization.k8s.io/v1]
90120

91121
Description::
92-
SubjectAccessReview checks whether or not a user or group can perform an action.
122+
+
123+
--
124+
SubjectAccessReview checks whether or not a user or group can perform an action.
125+
--
93126

94127
Type::
95128
`object`

0 commit comments

Comments
 (0)