Role
apiVersion: rbac.authorization.k8s.io/v1
import "k8s.io/api/rbac/v1"
Role
Role is a namespaced, logical grouping of PolicyRules that can be referenced as a unit by a RoleBinding.
-
apiVersion: rbac.authorization.k8s.io/v1
-
kind: Role
-
metadata (
Standard object's metadata.
-
rules ([]PolicyRule)
Rules holds all the PolicyRules for this Role
PolicyRule holds information that describes a policy rule, but does not contain information about who the rule applies to or which namespace the rule applies to.
-
rules.apiGroups ([]string)
APIGroups is the name of the APIGroup that contains the resources. If multiple API groups are specified, any action requested against one of the enumerated resources in any API group will be allowed.
-
rules.resources ([]string)
Resources is a list of resources this rule applies to. '*' represents all resources.
-
rules.verbs ([]string), required
Verbs is a list of Verbs that apply to ALL the ResourceKinds contained in this rule. '*' represents all verbs.
-
rules.resourceNames ([]string)
ResourceNames is an optional white list of names that the rule applies to. An empty set means that everything is allowed.
-
rules.nonResourceURLs ([]string)
NonResourceURLs is a set of partial urls that a user should have access to. *s are allowed, but only as the full, final step in the path Since non-resource URLs are not namespaced, this field is only applicable for ClusterRoles referenced from a ClusterRoleBinding. Rules can either apply to API resources (such as "pods" or "secrets") or non-resource URL paths (such as "/api"), but not both.
-
RoleList
RoleList is a collection of Roles
-
apiVersion: rbac.authorization.k8s.io/v1
-
kind: RoleList
-
metadata (
Standard object's metadata.
-
items ([]
Items is a list of Roles
Operations
get
read the specified Role
HTTP Request
GET /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name}
Parameters
-
name (in path): string, required
name of the Role
-
namespace (in path): string, required
-
pretty (in query): string
Response
200 (
401: Unauthorized GET /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles namespace (in path): string, required allowWatchBookmarks (in query): boolean continue (in query): string fieldSelector (in query): string labelSelector (in query): string limit (in query): integer pretty (in query): string resourceVersion (in query): string resourceVersionMatch (in query): string timeoutSeconds (in query): integer watch (in query): boolean 200 (
401: Unauthorized GET /apis/rbac.authorization.k8s.io/v1/roles allowWatchBookmarks (in query): boolean continue (in query): string fieldSelector (in query): string labelSelector (in query): string limit (in query): integer pretty (in query): string resourceVersion (in query): string resourceVersionMatch (in query): string timeoutSeconds (in query): integer watch (in query): boolean 200 (
401: Unauthorized POST /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles namespace (in path): string, required dryRun (in query): string fieldManager (in query): string fieldValidation (in query): string pretty (in query): string 200 (
201 (
202 (
401: Unauthorized PUT /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name} name (in path): string, required name of the Role namespace (in path): string, required dryRun (in query): string fieldManager (in query): string fieldValidation (in query): string pretty (in query): string 200 (
201 (
401: Unauthorized PATCH /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name} name (in path): string, required name of the Role namespace (in path): string, required dryRun (in query): string fieldManager (in query): string fieldValidation (in query): string force (in query): boolean pretty (in query): string 200 (
201 (
401: Unauthorized DELETE /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name} name (in path): string, required name of the Role namespace (in path): string, required dryRun (in query): string gracePeriodSeconds (in query): integer pretty (in query): string propagationPolicy (in query): string 200 (
202 (
401: Unauthorized DELETE /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles namespace (in path): string, required continue (in query): string dryRun (in query): string fieldSelector (in query): string gracePeriodSeconds (in query): integer labelSelector (in query): string limit (in query): integer pretty (in query): string propagationPolicy (in query): string resourceVersion (in query): string resourceVersionMatch (in query): string timeoutSeconds (in query): integer 200 (
401: Unauthorizedlist
list or watch objects of kind RoleHTTP Request
Parameters
Response
list
list or watch objects of kind RoleHTTP Request
Parameters
Response
create
create a RoleHTTP Request
Parameters
Response
update
replace the specified RoleHTTP Request
Parameters
Response
patch
partially update the specified RoleHTTP Request
Parameters
Response
delete
delete a RoleHTTP Request
Parameters
Response
deletecollection
delete collection of RoleHTTP Request
Parameters
Response