authorization.v1.resourceAttributes
"ResourceAttributes includes the authorization attributes available for resource requests to the Authorizer interface"
Index
fn withGroup(group)
fn withName(name)
fn withNamespace(namespace)
fn withResource(resource)
fn withSubresource(subresource)
fn withVerb(verb)
fn withVersion(version)
obj fieldSelector
obj labelSelector
Fields
fn withGroup
withGroup(group)
"Group is the API Group of the Resource. \"*\" means all."
fn withName
withName(name)
"Name is the name of the resource being requested for a \"get\" or deleted for a \"delete\". \"\" (empty) means all."
fn withNamespace
withNamespace(namespace)
"Namespace is the namespace of the action being requested. Currently, there is no distinction between no namespace and all namespaces \"\" (empty) is defaulted for LocalSubjectAccessReviews \"\" (empty) is empty for cluster-scoped resources \"\" (empty) means \"all\" for namespace scoped resources from a SubjectAccessReview or SelfSubjectAccessReview"
fn withResource
withResource(resource)
"Resource is one of the existing resource types. \"*\" means all."
fn withSubresource
withSubresource(subresource)
"Subresource is one of the existing resource types. \"\" means none."
fn withVerb
withVerb(verb)
"Verb is a kubernetes resource API verb, like: get, list, watch, create, update, delete, proxy. \"*\" means all."
fn withVersion
withVersion(version)
"Version is the API Version of the Resource. \"*\" means all."
obj fieldSelector
"FieldSelectorAttributes indicates a field limited access. Webhook authors are encouraged to * ensure rawSelector and requirements are not both set * consider the requirements field if set * not try to parse or consider the rawSelector field if set. This is to avoid another CVE-2022-2880 (i.e. getting different systems to agree on how exactly to parse a query is not something we want), see https://www.oxeye.io/resources/golang-parameter-smuggling-attack for more details. For the *SubjectAccessReview endpoints of the kube-apiserver: * If rawSelector is empty and requirements are empty, the request is not limited. * If rawSelector is present and requirements are empty, the rawSelector will be parsed and limited if the parsing succeeds. * If rawSelector is empty and requirements are present, the requirements should be honored * If rawSelector is present and requirements are present, the request is invalid."
fn fieldSelector.withRawSelector
withRawSelector(rawSelector)
"rawSelector is the serialization of a field selector that would be included in a query parameter. Webhook implementations are encouraged to ignore rawSelector. The kube-apiserver's *SubjectAccessReview will parse the rawSelector as long as the requirements are not present."
fn fieldSelector.withRequirements
withRequirements(requirements)
"requirements is the parsed interpretation of a field selector. All requirements must be met for a resource instance to match the selector. Webhook implementations should handle requirements, but how to handle them is up to the webhook. Since requirements can only limit the request, it is safe to authorize as unlimited request if the requirements are not understood."
fn fieldSelector.withRequirementsMixin
withRequirementsMixin(requirements)
"requirements is the parsed interpretation of a field selector. All requirements must be met for a resource instance to match the selector. Webhook implementations should handle requirements, but how to handle them is up to the webhook. Since requirements can only limit the request, it is safe to authorize as unlimited request if the requirements are not understood."
Note: This function appends passed data to existing values
obj labelSelector
"LabelSelectorAttributes indicates a label limited access. Webhook authors are encouraged to * ensure rawSelector and requirements are not both set * consider the requirements field if set * not try to parse or consider the rawSelector field if set. This is to avoid another CVE-2022-2880 (i.e. getting different systems to agree on how exactly to parse a query is not something we want), see https://www.oxeye.io/resources/golang-parameter-smuggling-attack for more details. For the *SubjectAccessReview endpoints of the kube-apiserver: * If rawSelector is empty and requirements are empty, the request is not limited. * If rawSelector is present and requirements are empty, the rawSelector will be parsed and limited if the parsing succeeds. * If rawSelector is empty and requirements are present, the requirements should be honored * If rawSelector is present and requirements are present, the request is invalid."
fn labelSelector.withRawSelector
withRawSelector(rawSelector)
"rawSelector is the serialization of a field selector that would be included in a query parameter. Webhook implementations are encouraged to ignore rawSelector. The kube-apiserver's *SubjectAccessReview will parse the rawSelector as long as the requirements are not present."
fn labelSelector.withRequirements
withRequirements(requirements)
"requirements is the parsed interpretation of a label selector. All requirements must be met for a resource instance to match the selector. Webhook implementations should handle requirements, but how to handle them is up to the webhook. Since requirements can only limit the request, it is safe to authorize as unlimited request if the requirements are not understood."
fn labelSelector.withRequirementsMixin
withRequirementsMixin(requirements)
"requirements is the parsed interpretation of a label selector. All requirements must be met for a resource instance to match the selector. Webhook implementations should handle requirements, but how to handle them is up to the webhook. Since requirements can only limit the request, it is safe to authorize as unlimited request if the requirements are not understood."
Note: This function appends passed data to existing values