Skip to content

Commit d9f463a

Browse files
committed
OSDOCS-4755: mark out confusing paragraphs
1 parent e41762d commit d9f463a

File tree

2 files changed

+10
-8
lines changed

2 files changed

+10
-8
lines changed

microshift_rest_api/security_apis/securitycontextconstraints-security-openshift-io-v1.adoc

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,7 @@ toc::[]
1111
Description::
1212
+
1313
--
14-
SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container. For historical reasons SCC was exposed under the core Kubernetes API group. That exposure is deprecated and will be removed in a future release - users should instead use the security.openshift.io group to manage SecurityContextConstraints.
15-
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
14+
SecurityContextConstraints (SCC) governs the ability to make requests that affect the SecurityContext that applies to a container. Use the security.openshift.io group to manage SecurityContextConstraints. Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
1615
--
1716

1817
Type::
@@ -72,7 +71,7 @@ Required::
7271

7372
| `allowedUnsafeSysctls`
7473
| ``
75-
| AllowedUnsafeSysctls is a list of explicitly allowed unsafe sysctls, defaults to none. Each entry is either a plain sysctl name or ends in "*" in which case it is considered as a prefix of allowed sysctls. Single * means all unsafe sysctls are allowed. Kubelet has to whitelist all allowed unsafe sysctls explicitly to avoid rejection.
74+
| AllowedUnsafeSysctls is a list of explicitly allowed unsafe sysctls, defaults to none. Each entry is either a plain sysctl name or ends in "*" in which case it is considered as a prefix of allowed sysctls. Single * means all unsafe sysctls are allowed. Kubelet has to whitelist all allowed unsafe sysctls explicitly to avoid rejection.
7675
Examples: e.g. "foo/*" allows "foo/bar", "foo/baz", etc. e.g. "foo.*" allows "foo.bar", "foo.baz", etc.
7776

7877
| `apiVersion`
@@ -89,7 +88,7 @@ Required::
8988

9089
| `forbiddenSysctls`
9190
| ``
92-
| ForbiddenSysctls is a list of explicitly forbidden sysctls, defaults to none. Each entry is either a plain sysctl name or ends in "*" in which case it is considered as a prefix of forbidden sysctls. Single * means all sysctls are forbidden.
91+
| ForbiddenSysctls is a list of explicitly forbidden sysctls, defaults to none. Each entry is either a plain sysctl name or ends in "*" in which case it is considered as a prefix of forbidden sysctls. Single * means all sysctls are forbidden.
9392
Examples: e.g. "foo/*" forbids "foo/bar", "foo/baz", etc. e.g. "foo.*" forbids "foo.bar", "foo.baz", etc.
9493

9594
| `fsGroup`
@@ -323,7 +322,7 @@ Description::
323322
| Parameter | Type | Description
324323
| `body`
325324
| xref:../security_apis/securitycontextconstraints-security-openshift-io-v1.adoc#securitycontextconstraints-security-openshift-io-v1[`SecurityContextConstraints`] schema
326-
|
325+
|
327326
|===
328327

329328
.HTTP responses
@@ -457,7 +456,7 @@ Description::
457456
| Parameter | Type | Description
458457
| `body`
459458
| `DeleteOptions` schema
460-
|
459+
|
461460
|===
462461

463462
.HTTP responses
@@ -529,7 +528,7 @@ Description::
529528
| Parameter | Type | Description
530529
| `body`
531530
| `Patch` schema
532-
|
531+
|
533532
|===
534533

535534
.HTTP responses
@@ -570,7 +569,7 @@ Description::
570569
| Parameter | Type | Description
571570
| `body`
572571
| xref:../security_apis/securitycontextconstraints-security-openshift-io-v1.adoc#securitycontextconstraints-security-openshift-io-v1[`SecurityContextConstraints`] schema
573-
|
572+
|
574573
|===
575574

576575
.HTTP responses

modules/api-compatibility-exceptions.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,14 @@
11
// Module included in the following assemblies:
22
//
33
// * rest_api/understanding-compatibility-guidelines.adoc
4+
// * microshift_rest_api/understanding-compatibility-guidelines.adoc
45

56
[id="api-compatibility-exceptions_{context}"]
67
= API compatibility exceptions
78

89
The following are exceptions to compatibility in {product-title}:
910

11+
ifndef::microshift[]
1012
[discrete]
1113
[id="OS-file-system-modifications-not-made_{context}"]
1214
== RHEL CoreOS file system modifications not made with a supported Operator
@@ -18,6 +20,7 @@ No assurances are made at this time that a modification made to the host operati
1820
== Modifications to cluster infrastructure in cloud or virtualized environments
1921

2022
No assurances are made at this time that a modification to the cloud hosting environment that supports the cluster is preserved except for where that modification is made through a public interface exposed in the product or is documented as a supported configuration. Cluster infrastructure providers are responsible for preserving their cloud or virtualized infrastructure except for where they delegate that authority to the product through an API.
23+
endif::microshift[]
2124

2225
[discrete]
2326
[id="Functional-defaults-between-upgraded-cluster-new-installation_{context}"]

0 commit comments

Comments
 (0)