Skip to content

Commit

Permalink
Merge pull request #109031 from Jefftree/openapiv3beta
Browse files Browse the repository at this point in the history
OpenAPI V3 Enable Beta
  • Loading branch information
k8s-ci-robot committed Mar 30, 2022
2 parents 0c5574c + 8e88d46 commit 904c305
Show file tree
Hide file tree
Showing 115 changed files with 24,892 additions and 7,569 deletions.
@@ -1,5 +1,14 @@
{
"components": {},
"components": {
"securitySchemes": {
"BearerToken": {
"description": "Bearer Token authentication",
"in": "header",
"name": "authorization",
"type": "apiKey"
}
}
},
"info": {
"title": "Kubernetes",
"version": "unversioned"
Expand All @@ -20,6 +29,9 @@
}
},
"description": "OK"
},
"401": {
"description": "Unauthorized"
}
},
"tags": [
Expand Down
7,486 changes: 5,742 additions & 1,744 deletions api/openapi-spec/v3/api__v1_openapi.json

Large diffs are not rendered by default.

17 changes: 16 additions & 1 deletion api/openapi-spec/v3/api_openapi.json
Expand Up @@ -15,7 +15,11 @@
"serverAddressByClientCIDRs": {
"description": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.",
"items": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR"
}
],
"default": {}
},
"type": "array"
Expand Down Expand Up @@ -62,6 +66,14 @@
],
"type": "object"
}
},
"securitySchemes": {
"BearerToken": {
"description": "Bearer Token authentication",
"in": "header",
"name": "authorization",
"type": "apiKey"
}
}
},
"info": {
Expand Down Expand Up @@ -94,6 +106,9 @@
}
},
"description": "OK"
},
"401": {
"description": "Unauthorized"
}
},
"tags": [
Expand Down
699 changes: 511 additions & 188 deletions api/openapi-spec/v3/apis__admissionregistration.k8s.io__v1_openapi.json

Large diffs are not rendered by default.

Expand Up @@ -18,22 +18,34 @@
"type": "string"
},
"preferredVersion": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery"
}
],
"default": {},
"description": "preferredVersion is the version preferred by the API server, which probably is the storage version."
},
"serverAddressByClientCIDRs": {
"description": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP.",
"items": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.ServerAddressByClientCIDR"
}
],
"default": {}
},
"type": "array"
},
"versions": {
"description": "versions are the versions supported in this group.",
"items": {
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery",
"allOf": [
{
"$ref": "#/components/schemas/io.k8s.apimachinery.pkg.apis.meta.v1.GroupVersionForDiscovery"
}
],
"default": {}
},
"type": "array"
Expand Down Expand Up @@ -92,6 +104,14 @@
],
"type": "object"
}
},
"securitySchemes": {
"BearerToken": {
"description": "Bearer Token authentication",
"in": "header",
"name": "authorization",
"type": "apiKey"
}
}
},
"info": {
Expand Down Expand Up @@ -124,6 +144,9 @@
}
},
"description": "OK"
},
"401": {
"description": "Unauthorized"
}
},
"tags": [
Expand Down

0 comments on commit 904c305

Please sign in to comment.