이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Chapter 1. Authorization APIs
1.1. LocalResourceAccessReview [authorization.openshift.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
LocalResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec in a particular namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
- Type
-
object
1.2. LocalSubjectAccessReview [authorization.openshift.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
LocalSubjectAccessReview is an object for requesting information about whether a user or group can perform an action in a particular namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
- Type
-
object
1.3. ResourceAccessReview [authorization.openshift.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
ResourceAccessReview is a means to request a list of which users and groups are authorized to perform the action specified by spec
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
- Type
-
object
1.4. SelfSubjectRulesReview [authorization.openshift.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
SelfSubjectRulesReview is a resource you can create to determine which actions you can perform in a namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
- Type
-
object
1.5. SubjectAccessReview [authorization.openshift.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
SubjectAccessReview is an object for requesting information about whether a user or group can perform an action
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
- Type
-
object
1.6. SubjectRulesReview [authorization.openshift.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
SubjectRulesReview is a resource you can create to determine which actions another user can perform in a namespace
Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
- Type
-
object
1.7. SelfSubjectReview [authentication.k8s.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
- SelfSubjectReview contains the user information that the kube-apiserver has about the user making this request. When using impersonation, users will receive the user info of the user being impersonated. If impersonation or request header authentication is used, any extra keys will have their case ignored and returned as lowercase.
- Type
-
object
1.8. TokenRequest [authentication.k8s.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
- TokenRequest requests a token for a given service account.
- Type
-
object
1.9. TokenReview [authentication.k8s.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
- TokenReview attempts to authenticate a token to a known user. Note: TokenReview requests may be cached by the webhook token authenticator plugin in the kube-apiserver.
- Type
-
object
1.10. LocalSubjectAccessReview [authorization.k8s.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
- LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. Having a namespace scoped resource makes it much easier to grant namespace scoped policy that includes permissions checking.
- Type
-
object
1.11. SelfSubjectAccessReview [authorization.k8s.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
- SelfSubjectAccessReview checks whether or the current user can perform an action. Not filling in a spec.namespace means "in all namespaces". Self is a special case, because users should always be able to check whether they can perform an action
- Type
-
object
1.12. SelfSubjectRulesReview [authorization.k8s.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
- SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. The returned list of actions may be incomplete depending on the server’s authorization mode, and any errors experienced during the evaluation. SelfSubjectRulesReview should be used by UIs to show/hide actions, or to quickly let an end user reason about their permissions. It should NOT Be used by external systems to drive authorization decisions as this raises confused deputy, cache lifetime/revocation, and correctness concerns. SubjectAccessReview, and LocalAccessReview are the correct way to defer authorization decisions to the API server.
- Type
-
object
1.13. SubjectAccessReview [authorization.k8s.io/v1] 링크 복사링크가 클립보드에 복사되었습니다!
- Description
- SubjectAccessReview checks whether or not a user or group can perform an action.
- Type
-
object