Skip to content

Commit 3edffb5

Browse files
committed
Add APIs for 4.8
1 parent 8af0a48 commit 3edffb5

File tree

227 files changed

+24061
-12852
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

227 files changed

+24061
-12852
lines changed

_topic_map.yml

Lines changed: 18 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2151,6 +2151,8 @@ Topics:
21512151
File: consolelink-console-openshift-io-v1
21522152
- Name: 'ConsoleNotification [console.openshift.io/v1]'
21532153
File: consolenotification-console-openshift-io-v1
2154+
- Name: 'ConsolePlugin [console.openshift.io/v1alpha1]'
2155+
File: consoleplugin-console-openshift-io-v1alpha1
21542156
- Name: 'ConsoleQuickStart [console.openshift.io/v1]'
21552157
File: consolequickstart-console-openshift-io-v1
21562158
- Name: 'ConsoleYAMLSample [console.openshift.io/v1]'
@@ -2215,6 +2217,8 @@ Topics:
22152217
Topics:
22162218
- Name: About Metadata APIs
22172219
File: metadata-apis-index
2220+
- Name: 'APIRequestCount [apiserver.openshift.io/v1]'
2221+
File: apirequestcount-apiserver-openshift-io-v1
22182222
- Name: 'Binding [core/v1]'
22192223
File: binding-core-v1
22202224
- Name: 'ComponentStatus [core/v1]'
@@ -2261,10 +2265,12 @@ Topics:
22612265
File: clusternetwork-network-openshift-io-v1
22622266
- Name: 'Endpoints [core/v1]'
22632267
File: endpoints-core-v1
2264-
- Name: 'EndpointSlice [discovery.k8s.io/v1beta1]'
2265-
File: endpointslice-discovery-k8s-io-v1beta1
2268+
- Name: 'EndpointSlice [discovery.k8s.io/v1]'
2269+
File: endpointslice-discovery-k8s-io-v1
22662270
- Name: 'EgressNetworkPolicy [network.openshift.io/v1]'
22672271
File: egressnetworkpolicy-network-openshift-io-v1
2272+
- Name: 'EgressRouter [network.operator.openshift.io/v1]'
2273+
File: egressrouter-network-operator-openshift-io-v1
22682274
- Name: 'HostSubnet [network.openshift.io/v1]'
22692275
File: hostsubnet-network-openshift-io-v1
22702276
- Name: 'Ingress [networking.k8s.io/v1]'
@@ -2392,8 +2398,8 @@ Topics:
23922398
Topics:
23932399
- Name: About Policy APIs
23942400
File: policy-apis-index
2395-
- Name: 'PodDisruptionBudget [policy/v1beta1]'
2396-
File: poddisruptionbudget-policy-v1beta1
2401+
- Name: 'PodDisruptionBudget [policy/v1]'
2402+
File: poddisruptionbudget-policy-v1
23972403
- Name: Project APIs
23982404
Dir: project_apis
23992405
Topics:
@@ -2449,14 +2455,14 @@ Topics:
24492455
File: appliedclusterresourcequota-quota-openshift-io-v1
24502456
- Name: 'ClusterResourceQuota [quota.openshift.io/v1]'
24512457
File: clusterresourcequota-quota-openshift-io-v1
2452-
- Name: 'FlowSchema [flowcontrol.apiserver.k8s.io/v1alpha1]'
2453-
File: flowschema-flowcontrol-apiserver-k8s-io-v1alpha1
2458+
- Name: 'FlowSchema [flowcontrol.apiserver.k8s.io/v1beta1]'
2459+
File: flowschema-flowcontrol-apiserver-k8s-io-v1beta1
24542460
- Name: 'LimitRange [core/v1]'
24552461
File: limitrange-core-v1
24562462
- Name: 'PriorityClass [scheduling.k8s.io/v1]'
24572463
File: priorityclass-scheduling-k8s-io-v1
2458-
- Name: 'PriorityLevelConfiguration [flowcontrol.apiserver.k8s.io/v1alpha1]'
2459-
File: prioritylevelconfiguration-flowcontrol-apiserver-k8s-io-v1alpha1
2464+
- Name: 'PriorityLevelConfiguration [flowcontrol.apiserver.k8s.io/v1beta1]'
2465+
File: prioritylevelconfiguration-flowcontrol-apiserver-k8s-io-v1beta1
24602466
- Name: 'ResourceQuota [core/v1]'
24612467
File: resourcequota-core-v1
24622468
- Name: Security APIs
@@ -2491,6 +2497,8 @@ Topics:
24912497
File: csidriver-storage-k8s-io-v1
24922498
- Name: 'CSINode [storage.k8s.io/v1]'
24932499
File: csinode-storage-k8s-io-v1
2500+
- Name: 'CSIStorageCapacity [storage.k8s.io/v1beta1]'
2501+
File: csistoragecapacity-storage-k8s-io-v1beta1
24942502
- Name: 'PersistentVolumeClaim [core/v1]'
24952503
File: persistentvolumeclaim-core-v1
24962504
- Name: 'StorageClass [storage.k8s.io/v1]'
@@ -2542,8 +2550,8 @@ Topics:
25422550
File: buildconfig-build-openshift-io-v1
25432551
- Name: 'Build [build.openshift.io/v1]'
25442552
File: build-build-openshift-io-v1
2545-
- Name: 'CronJob [batch/v1beta1]'
2546-
File: cronjob-batch-v1beta1
2553+
- Name: 'CronJob [batch/v1]'
2554+
File: cronjob-batch-v1
25472555
- Name: 'DaemonSet [apps/v1]'
25482556
File: daemonset-apps-v1
25492557
- Name: 'Deployment [apps/v1]'

api-config.yaml

Lines changed: 98 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,74 @@ apiSupportLevels:
3636
supportLevels:
3737
- apiVersion: v\d+alpha\d+
3838
level: 4
39-
packageMap: {} # replace regex
39+
packageMap:
40+
com.coreos.monitoring: monitoring.coreos.com
41+
com.coreos.operators: operators.coreos.com
42+
com.github.openshift.api.apps: apps.openshift.io
43+
com.github.openshift.api.authorization: authorization.openshift.io
44+
com.github.openshift.api.build: build.openshift.io
45+
com.github.openshift.api.image: image.openshift.io
46+
com.github.openshift.api.oauth: oauth.openshift.io
47+
com.github.openshift.api.project: project.openshift.io
48+
com.github.openshift.api.quota: quota.openshift.io
49+
com.github.openshift.api.route: route.openshift.io
50+
com.github.openshift.api.security: security.openshift.io
51+
com.github.openshift.api.template: template.openshift.io
52+
com.github.openshift.api.user: user.openshift.io
53+
com.github.operator-framework.api.pkg.lib: packages.operators.coreos.com
54+
com.github.operator-framework.api.pkg.operators: packages.operators.coreos.com
55+
com.github.operator-framework.operator-lifecycle-manager.pkg.package-server.apis.operators: packages.operators.coreos.com
56+
io.cncf.cni.k8s: k8s.cni.cncf.io
57+
io.cncf.cni.whereabouts: whereabouts.cni.cncf.io
58+
io.k8s.metrics.pkg.apis.metrics: metrics.k8s.io
59+
io.k8s.api.admissionregistration: admissionregistration.k8s.io
60+
io.k8s.api.apps: apps
61+
io.k8s.api.authentication: authentication.k8s.io
62+
io.k8s.api.authorization: authorization.k8s.io
63+
io.k8s.api.autoscaling: autoscaling
64+
io.k8s.api.batch: batch
65+
io.k8s.api.certificates: certificates.k8s.io
66+
io.k8s.api.coordination: coordination.k8s.io
67+
io.k8s.api.core: core
68+
io.k8s.api.discovery: discovery.k8s.io
69+
io.k8s.api.events: events.k8s.io
70+
io.k8s.api.extensions: extensions
71+
io.k8s.api.flowcontrol: flowcontrol.apiserver.k8s.io
72+
io.k8s.api.networking: networking.k8s.io
73+
io.k8s.api.node: node.k8s.io
74+
io.k8s.api.policy: policy
75+
io.k8s.api.rbac: rbac.authorization.k8s.io
76+
io.k8s.api.scheduling: scheduling.k8s.io
77+
io.k8s.api.storage: storage.k8s.io
78+
io.k8s.apiextensions-apiserver.pkg.apis.apiextensions: apiextensions.k8s.io
79+
io.k8s.apimachinery.pkg.api: api
80+
io.k8s.apimachinery.pkg.apis.meta: meta
81+
io.k8s.apimachinery.pkg.util: util
82+
io.k8s.apimachinery.pkg: pkg
83+
io.k8s.kube-aggregator.pkg.apis.apiregistration: apiregistration.k8s.io
84+
io.k8s.migration: migration.k8s.io
85+
io.k8s.storage.snapshot: snapshot.storage.k8s.io
86+
io.metal3: metal3.io
87+
io.openshift.apiserver: apiserver.openshift.io
88+
io.openshift.authorization: authorization.openshift.io
89+
io.openshift.autoscaling: autoscaling.openshift.io
90+
io.openshift.cloudcredential: cloudcredential.openshift.io
91+
io.openshift.config: config.openshift.io
92+
io.openshift.console: console.openshift.io
93+
io.openshift.helm: helm.openshift.io
94+
io.openshift.internal.security: security.internal.openshift.io
95+
io.openshift.machine: machine.openshift.io
96+
io.openshift.machineconfiguration: machineconfiguration.openshift.io
97+
io.openshift.network: network.openshift.io
98+
io.openshift.operator.controlplane: controlplane.operator.openshift.io
99+
io.openshift.operator.imageregistry: imageregistry.operator.openshift.io
100+
io.openshift.operator.ingress: ingress.operator.openshift.io
101+
io.openshift.operator.network: network.operator.openshift.io
102+
io.openshift.operator.samples: samples.operator.openshift.io
103+
io.openshift.operator: operator.openshift.io
104+
io.openshift.quota: quota.openshift.io
105+
io.openshift.security: security.openshift.io
106+
io.openshift.tuned: tuned.openshift.io
40107
apiMap:
41108
- name: Authorization APIs
42109
resources:
@@ -226,6 +293,11 @@ apiMap:
226293
version: v1
227294
plural: consolenotifications
228295
namespaced: false
296+
- kind: ConsolePlugin
297+
group: console.openshift.io
298+
version: v1alpha1
299+
plural: consoleplugins
300+
namespaced: false
229301
- kind: ConsoleQuickStart
230302
group: console.openshift.io
231303
version: v1
@@ -344,6 +416,11 @@ apiMap:
344416
namespaced: true
345417
- name: Metadata APIs
346418
resources:
419+
- kind: APIRequestCount
420+
group: apiserver.openshift.io
421+
version: v1
422+
plural: apirequestcounts
423+
namespaced: false
347424
- kind: Binding
348425
group: core
349426
version: v1
@@ -440,14 +517,19 @@ apiMap:
440517
namespaced: true
441518
- kind: EndpointSlice
442519
group: discovery.k8s.io
443-
version: v1beta1
520+
version: v1
444521
plural: endpointslices
445522
namespaced: true
446523
- kind: EgressNetworkPolicy
447524
group: network.openshift.io
448525
version: v1
449526
plural: egressnetworkpolicies
450527
namespaced: true
528+
- kind: EgressRouter
529+
group: network.operator.openshift.io
530+
version: v1
531+
plural: egressrouters
532+
namespaced: true
451533
- kind: HostSubnet
452534
group: network.openshift.io
453535
version: v1
@@ -542,6 +624,12 @@ apiMap:
542624
version: v1
543625
plural: oauthclients
544626
namespaced: false
627+
# Not in OpenAPI spec JSON
628+
# - kind: TokenReview
629+
# group: oauth.openshift.io
630+
# version: v1
631+
# plural: tokenreviews
632+
# namespaced: false
545633
- kind: UserOAuthAccessToken
546634
group: oauth.openshift.io
547635
version: v1
@@ -715,7 +803,7 @@ apiMap:
715803
resources:
716804
- kind: PodDisruptionBudget
717805
group: policy
718-
version: v1beta1
806+
version: v1
719807
plural: poddisruptionbudgets
720808
namespaced: true
721809
# https://bugzilla.redhat.com/show_bug.cgi?id=1875493
@@ -811,7 +899,7 @@ apiMap:
811899
namespaced: false
812900
- kind: FlowSchema
813901
group: flowcontrol.apiserver.k8s.io
814-
version: v1alpha1
902+
version: v1beta1
815903
plural: flowschemas
816904
namespaced: false
817905
- kind: LimitRange
@@ -826,7 +914,7 @@ apiMap:
826914
namespaced: false
827915
- kind: PriorityLevelConfiguration
828916
group: flowcontrol.apiserver.k8s.io
829-
version: v1alpha1
917+
version: v1beta1
830918
plural: prioritylevelconfigurations
831919
namespaced: false
832920
- kind: ResourceQuota
@@ -899,6 +987,11 @@ apiMap:
899987
version: v1
900988
plural: csinodes
901989
namespaced: false
990+
- kind: CSIStorageCapacity
991+
group: storage.k8s.io
992+
version: v1beta1
993+
plural: csistoragecapacities
994+
namespaced: true
902995
- kind: PersistentVolumeClaim
903996
group: core
904997
version: v1

rest_api/authorization_apis/authorization-apis-index.adoc

Lines changed: 44 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,87 +9,120 @@ toc::[]
99
== LocalResourceAccessReview [authorization.openshift.io/v1]
1010

1111
Description::
12-
LocalResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec in a particular namespace
12+
+
13+
--
14+
LocalResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec in a particular namespace
15+
--
1316

1417
Type::
1518
`object`
1619

1720
== LocalSubjectAccessReview [authorization.openshift.io/v1]
1821

1922
Description::
20-
LocalSubjectAccessReview is an object for requesting information about whether a user or group can perform an action in a particular namespace
23+
+
24+
--
25+
LocalSubjectAccessReview is an object for requesting information about whether a user or group can perform an action in a particular namespace
26+
--
2127

2228
Type::
2329
`object`
2430

2531
== ResourceAccessReview [authorization.openshift.io/v1]
2632

2733
Description::
28-
ResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec
34+
+
35+
--
36+
ResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec
37+
--
2938

3039
Type::
3140
`object`
3241

3342
== SelfSubjectRulesReview [authorization.openshift.io/v1]
3443

3544
Description::
36-
SelfSubjectRulesReview is a resource you can create to determine which actions you can perform in a namespace
45+
+
46+
--
47+
SelfSubjectRulesReview is a resource you can create to determine which actions you can perform in a namespace
48+
--
3749

3850
Type::
3951
`object`
4052

4153
== SubjectAccessReview [authorization.openshift.io/v1]
4254

4355
Description::
44-
SubjectAccessReview is an object for requesting information about whether a user or group can perform an action
56+
+
57+
--
58+
SubjectAccessReview is an object for requesting information about whether a user or group can perform an action
59+
--
4560

4661
Type::
4762
`object`
4863

4964
== SubjectRulesReview [authorization.openshift.io/v1]
5065

5166
Description::
52-
SubjectRulesReview is a resource you can create to determine which actions another user can perform in a namespace
67+
+
68+
--
69+
SubjectRulesReview is a resource you can create to determine which actions another user can perform in a namespace
70+
--
5371

5472
Type::
5573
`object`
5674

5775
== TokenReview [authentication.k8s.io/v1]
5876

5977
Description::
60-
TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.
78+
+
79+
--
80+
TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.
81+
--
6182

6283
Type::
6384
`object`
6485

6586
== LocalSubjectAccessReview [authorization.k8s.io/v1]
6687

6788
Description::
68-
LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.
89+
+
90+
--
91+
LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.
92+
--
6993

7094
Type::
7195
`object`
7296

7397
== SelfSubjectAccessReview [authorization.k8s.io/v1]
7498

7599
Description::
76-
SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action
100+
+
101+
--
102+
SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action
103+
--
77104

78105
Type::
79106
`object`
80107

81108
== SelfSubjectRulesReview [authorization.k8s.io/v1]
82109

83110
Description::
84-
SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.
111+
+
112+
--
113+
SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server's authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.
114+
--
85115

86116
Type::
87117
`object`
88118

89119
== SubjectAccessReview [authorization.k8s.io/v1]
90120

91121
Description::
92-
SubjectAccessReview checks whether or not a user or group can perform an action.
122+
+
123+
--
124+
SubjectAccessReview checks whether or not a user or group can perform an action.
125+
--
93126

94127
Type::
95128
`object`

0 commit comments

Comments
 (0)