...

Text file src/github.com/openshift/api/config/v1/0000_10_config-operator_01_authentication.crd.yaml

Documentation: github.com/openshift/api/config/v1

     1apiVersion: apiextensions.k8s.io/v1
     2kind: CustomResourceDefinition
     3metadata:
     4  annotations:
     5    api-approved.openshift.io: https://github.com/openshift/api/pull/470
     6    include.release.openshift.io/ibm-cloud-managed: "true"
     7    include.release.openshift.io/self-managed-high-availability: "true"
     8    include.release.openshift.io/single-node-developer: "true"
     9  name: authentications.config.openshift.io
    10spec:
    11  group: config.openshift.io
    12  names:
    13    kind: Authentication
    14    listKind: AuthenticationList
    15    plural: authentications
    16    singular: authentication
    17  scope: Cluster
    18  versions:
    19    - name: v1
    20      schema:
    21        openAPIV3Schema:
    22          description: "Authentication specifies cluster-wide settings for authentication (like OAuth and webhook token authenticators). The canonical name of an instance is `cluster`. \n Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer)."
    23          type: object
    24          required:
    25            - spec
    26          properties:
    27            apiVersion:
    28              description: 'APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
    29              type: string
    30            kind:
    31              description: 'Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
    32              type: string
    33            metadata:
    34              type: object
    35            spec:
    36              description: spec holds user settable values for configuration
    37              type: object
    38              properties:
    39                oauthMetadata:
    40                  description: 'oauthMetadata contains the discovery endpoint data for OAuth 2.0 Authorization Server Metadata for an external OAuth server. This discovery document can be viewed from its served location: oc get --raw ''/.well-known/oauth-authorization-server'' For further details, see the IETF Draft: https://tools.ietf.org/html/draft-ietf-oauth-discovery-04#section-2 If oauthMetadata.name is non-empty, this value has precedence over any metadata reference stored in status. The key "oauthMetadata" is used to locate the data. If specified and the config map or expected key is not found, no metadata is served. If the specified metadata is not valid, no metadata is served. The namespace for this config map is openshift-config.'
    41                  type: object
    42                  required:
    43                    - name
    44                  properties:
    45                    name:
    46                      description: name is the metadata.name of the referenced config map
    47                      type: string
    48                serviceAccountIssuer:
    49                  description: 'serviceAccountIssuer is the identifier of the bound service account token issuer. The default is https://kubernetes.default.svc WARNING: Updating this field will not result in immediate invalidation of all bound tokens with the previous issuer value. Instead, the tokens issued by previous service account issuer will continue to be trusted for a time period chosen by the platform (currently set to 24h). This time period is subject to change over time. This allows internal components to transition to use new service account issuer without service distruption.'
    50                  type: string
    51                type:
    52                  description: type identifies the cluster managed, user facing authentication mode in use. Specifically, it manages the component that responds to login attempts. The default is IntegratedOAuth.
    53                  type: string
    54                webhookTokenAuthenticator:
    55                  description: webhookTokenAuthenticator configures a remote token reviewer. These remote authentication webhooks can be used to verify bearer tokens via the tokenreviews.authentication.k8s.io REST API. This is required to honor bearer tokens that are provisioned by an external authentication service.
    56                  type: object
    57                  required:
    58                    - kubeConfig
    59                  properties:
    60                    kubeConfig:
    61                      description: "kubeConfig references a secret that contains kube config file data which describes how to access the remote webhook service. The namespace for the referenced secret is openshift-config. \n For further details, see: \n https://kubernetes.io/docs/reference/access-authn-authz/authentication/#webhook-token-authentication \n The key \"kubeConfig\" is used to locate the data. If the secret or expected key is not found, the webhook is not honored. If the specified kube config data is not valid, the webhook is not honored."
    62                      type: object
    63                      required:
    64                        - name
    65                      properties:
    66                        name:
    67                          description: name is the metadata.name of the referenced secret
    68                          type: string
    69                webhookTokenAuthenticators:
    70                  description: webhookTokenAuthenticators is DEPRECATED, setting it has no effect.
    71                  type: array
    72                  items:
    73                    description: deprecatedWebhookTokenAuthenticator holds the necessary configuration options for a remote token authenticator. It's the same as WebhookTokenAuthenticator but it's missing the 'required' validation on KubeConfig field.
    74                    type: object
    75                    properties:
    76                      kubeConfig:
    77                        description: 'kubeConfig contains kube config file data which describes how to access the remote webhook service. For further details, see: https://kubernetes.io/docs/reference/access-authn-authz/authentication/#webhook-token-authentication The key "kubeConfig" is used to locate the data. If the secret or expected key is not found, the webhook is not honored. If the specified kube config data is not valid, the webhook is not honored. The namespace for this secret is determined by the point of use.'
    78                        type: object
    79                        required:
    80                          - name
    81                        properties:
    82                          name:
    83                            description: name is the metadata.name of the referenced secret
    84                            type: string
    85            status:
    86              description: status holds observed values from the cluster. They may not be overridden.
    87              type: object
    88              properties:
    89                integratedOAuthMetadata:
    90                  description: 'integratedOAuthMetadata contains the discovery endpoint data for OAuth 2.0 Authorization Server Metadata for the in-cluster integrated OAuth server. This discovery document can be viewed from its served location: oc get --raw ''/.well-known/oauth-authorization-server'' For further details, see the IETF Draft: https://tools.ietf.org/html/draft-ietf-oauth-discovery-04#section-2 This contains the observed value based on cluster state. An explicitly set value in spec.oauthMetadata has precedence over this field. This field has no meaning if authentication spec.type is not set to IntegratedOAuth. The key "oauthMetadata" is used to locate the data. If the config map or expected key is not found, no metadata is served. If the specified metadata is not valid, no metadata is served. The namespace for this config map is openshift-config-managed.'
    91                  type: object
    92                  required:
    93                    - name
    94                  properties:
    95                    name:
    96                      description: name is the metadata.name of the referenced config map
    97                      type: string
    98      served: true
    99      storage: true
   100      subresources:
   101        status: {}

View as plain text