Skip to content

Commit

Permalink
update generated docs for trust-manager + approver-policy
Browse files Browse the repository at this point in the history
Signed-off-by: Ashley Davis <[email protected]>
  • Loading branch information
SgtCoDFish committed Jan 31, 2025
1 parent 3f65b7e commit 749e065
Show file tree
Hide file tree
Showing 4 changed files with 90 additions and 57 deletions.
41 changes: 0 additions & 41 deletions content/docs/policy/approval/approver-policy/api-reference.md
Original file line number Diff line number Diff line change
Expand Up @@ -167,7 +167,6 @@ referring to matching issuers.
CertificateRequests will not be processed if the issuer does not match,
regardless of whether the requestor is bound by RBAC.


The following value will match _all_ issuers:
```
issuerRef: {}
Expand Down Expand Up @@ -199,7 +198,6 @@ referring to matching issuers.
CertificateRequests will not be processed if the issuer does not match,
regardless of whether the requestor is bound by RBAC.


The following value will match _all_ issuers:
```
issuerRef: {}
Expand Down Expand Up @@ -285,7 +283,6 @@ selector.
MatchNames is the set of namespace names that select on
CertificateRequests that have been created in a matching namespace.
Accepts wildcards "*".
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -385,7 +382,6 @@ CertificateRequest `spec.keyUsages` field.
If set, `spec.keyUsages` in a CertificateRequest must be a subset of the
specified values.
If `[]` or unset, no `spec.keyUsages` are allowed.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -437,7 +433,6 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field must match the specified pattern.


NOTE:`value: ""` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
<br/>
Expand Down Expand Up @@ -473,7 +468,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -540,10 +534,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -577,7 +569,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -644,10 +635,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -681,7 +670,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -748,10 +736,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -785,7 +771,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -942,10 +927,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -979,7 +962,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1046,10 +1028,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -1083,7 +1063,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1151,10 +1130,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -1188,7 +1165,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1256,10 +1232,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -1293,7 +1267,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1360,10 +1333,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -1397,7 +1368,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1464,10 +1434,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -1501,7 +1469,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1570,7 +1537,6 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field must match the specified pattern.


NOTE:`value: ""` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
<br/>
Expand Down Expand Up @@ -1606,7 +1572,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1674,10 +1639,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -1711,7 +1674,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down Expand Up @@ -1778,10 +1740,8 @@ ALL validations for the request to be granted by this policy.
Accepts wildcards "*".
If set, the related field can only include items contained in the allowed values.


NOTE:`values: []` paired with `required: true` establishes a policy that
will never grant a `CertificateRequest`, but other policies may.
TODO: add x-kubernetes-list-type: set in v1alpha2
<br/>
</td>
<td>false</td>
Expand Down Expand Up @@ -1815,7 +1775,6 @@ To enable more advanced validation rules, approver-policy provides the
`cr` (map) variable to the CEL expression containing `namespace` and
`name` of the `CertificateRequest` resource.


Example (rule for namespaced DNSNames):
```
rule: self.endsWith(cr.namespace + '.svc.cluster.local')
Expand Down
Loading

0 comments on commit 749e065

Please sign in to comment.