mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-09-11 22:20:18 +00:00
Fix v1beta1 CSR API listType warnings
Change-Id: I2fb4a96b618d70405472e32dbac92045fd5055fc
This commit is contained in:
@@ -68,11 +68,6 @@ API rule violation: list_type_missing,k8s.io/api/autoscaling/v2beta2,HorizontalP
|
||||
API rule violation: list_type_missing,k8s.io/api/batch/v1,JobStatus,Conditions
|
||||
API rule violation: list_type_missing,k8s.io/api/batch/v1beta1,CronJobStatus,Active
|
||||
API rule violation: list_type_missing,k8s.io/api/batch/v2alpha1,CronJobStatus,Active
|
||||
API rule violation: list_type_missing,k8s.io/api/certificates/v1beta1,CertificateSigningRequestSpec,Groups
|
||||
API rule violation: list_type_missing,k8s.io/api/certificates/v1beta1,CertificateSigningRequestSpec,Request
|
||||
API rule violation: list_type_missing,k8s.io/api/certificates/v1beta1,CertificateSigningRequestSpec,Usages
|
||||
API rule violation: list_type_missing,k8s.io/api/certificates/v1beta1,CertificateSigningRequestStatus,Certificate
|
||||
API rule violation: list_type_missing,k8s.io/api/certificates/v1beta1,CertificateSigningRequestStatus,Conditions
|
||||
API rule violation: list_type_missing,k8s.io/api/core/v1,AvoidPods,PreferAvoidPods
|
||||
API rule violation: list_type_missing,k8s.io/api/core/v1,Capabilities,Add
|
||||
API rule violation: list_type_missing,k8s.io/api/core/v1,Capabilities,Drop
|
||||
|
18
api/openapi-spec/swagger.json
generated
18
api/openapi-spec/swagger.json
generated
@@ -4427,12 +4427,14 @@
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
"type": "array",
|
||||
"x-kubernetes-list-type": "atomic"
|
||||
},
|
||||
"request": {
|
||||
"description": "Base64-encoded PKCS#10 CSR data",
|
||||
"format": "byte",
|
||||
"type": "string"
|
||||
"type": "string",
|
||||
"x-kubernetes-list-type": "atomic"
|
||||
},
|
||||
"signerName": {
|
||||
"description": "Requested signer for the request. It is a qualified name in the form: `scope-hostname.io/name`. If empty, it will be defaulted:\n 1. If it's a kubelet client certificate, it is assigned\n \"kubernetes.io/kube-apiserver-client-kubelet\".\n 2. If it's a kubelet serving certificate, it is assigned\n \"kubernetes.io/kubelet-serving\".\n 3. Otherwise, it is assigned \"kubernetes.io/legacy-unknown\".\nDistribution of trust for signers happens out of band. You can select on this field using `spec.signerName`.",
|
||||
@@ -4447,7 +4449,8 @@
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
"type": "array",
|
||||
"x-kubernetes-list-type": "atomic"
|
||||
},
|
||||
"username": {
|
||||
"description": "Information about the requesting user. See user.Info interface for details.",
|
||||
@@ -4464,14 +4467,19 @@
|
||||
"certificate": {
|
||||
"description": "If request was approved, the controller will place the issued certificate here.",
|
||||
"format": "byte",
|
||||
"type": "string"
|
||||
"type": "string",
|
||||
"x-kubernetes-list-type": "atomic"
|
||||
},
|
||||
"conditions": {
|
||||
"description": "Conditions applied to the request, such as approval or denial.",
|
||||
"items": {
|
||||
"$ref": "#/definitions/io.k8s.api.certificates.v1beta1.CertificateSigningRequestCondition"
|
||||
},
|
||||
"type": "array"
|
||||
"type": "array",
|
||||
"x-kubernetes-list-map-keys": [
|
||||
"type"
|
||||
],
|
||||
"x-kubernetes-list-type": "map"
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
|
Reference in New Issue
Block a user