Skip to content

Commit

Permalink
generated: Update OpenAPI
Browse files Browse the repository at this point in the history
  • Loading branch information
Jefftree committed Mar 30, 2022
1 parent 550d638 commit 52af96c
Show file tree
Hide file tree
Showing 56 changed files with 23,925 additions and 7,291 deletions.
@@ -1,5 +1,14 @@
{
"components": {},
"components": {
"securitySchemes": {
"BearerToken": {
"description": "Bearer Token authentication",
"in": "header",
"name": "authorization",
"type": "apiKey"
}
}
},

This comment has been minimized.

Copy link
@allensaner

allensaner Jul 12, 2023

hi @Jefftree, may I ask if the yaml file for this openAPI is manually maintained or automatically generated,thanks very.

This comment has been minimized.

Copy link
@Jefftree

Jefftree Jul 12, 2023

Author Member

@allensaner Automatically generated via ./hack/update-openapi-spec.sh

"info": {
"title": "Kubernetes",
"version": "unversioned"
Expand All @@ -20,6 +29,9 @@
}
},
"description": "OK"
},
"401": {
"description": "Unauthorized"
}
},
"tags": [
Expand Down
7,486 changes: 5,742 additions & 1,744 deletions api/openapi-spec/v3/api__v1_openapi.json

Large diffs are not rendered by default.

17 changes: 16 additions & 1 deletion api/openapi-spec/v3/api_openapi.json
Expand Up @@ -15,7 +15,11 @@
"serverAddressByClientCIDRs": {
"description": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.",
"items": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR"
}
],
"default": {}
},
"type": "array"
Expand Down Expand Up @@ -62,6 +66,14 @@
],
"type": "object"
}
},
"securitySchemes": {
"BearerToken": {
"description": "Bearer Token authentication",
"in": "header",
"name": "authorization",
"type": "apiKey"
}
}
},
"info": {
Expand Down Expand Up @@ -94,6 +106,9 @@
}
},
"description": "OK"
},
"401": {
"description": "Unauthorized"
}
},
"tags": [
Expand Down
699 changes: 511 additions & 188 deletions api/openapi-spec/v3/apis__admissionregistration.k8s.io__v1_openapi.json

Large diffs are not rendered by default.

Expand Up @@ -18,22 +18,34 @@
"type": "string"
},
"preferredVersion": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery"
}
],
"default": {},
"description": "preferredVersion is the version preferred by the API server, which probably is the storage version."
},
"serverAddressByClientCIDRs": {
"description": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.",
"items": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR"
}
],
"default": {}
},
"type": "array"
},
"versions": {
"description": "versions are the versions supported in this group.",
"items": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery"
}
],
"default": {}
},
"type": "array"
Expand Down Expand Up @@ -92,6 +104,14 @@
],
"type": "object"
}
},
"securitySchemes": {
"BearerToken": {
"description": "Bearer Token authentication",
"in": "header",
"name": "authorization",
"type": "apiKey"
}
}
},
"info": {
Expand Down Expand Up @@ -124,6 +144,9 @@
}
},
"description": "OK"
},
"401": {
"description": "Unauthorized"
}
},
"tags": [
Expand Down

0 comments on commit 52af96c

Please sign in to comment.