Safe Haskell | Safe-Inferred |
---|---|
Language | Haskell2010 |
Kubernetes.OpenAPI.API.RbacAuthorizationV1
Contents
- Operations
- RbacAuthorizationV1
- createClusterRole
- createClusterRoleBinding
- createNamespacedRole
- createNamespacedRoleBinding
- deleteClusterRole
- deleteClusterRoleBinding
- deleteCollectionClusterRole
- deleteCollectionClusterRoleBinding
- deleteCollectionNamespacedRole
- deleteCollectionNamespacedRoleBinding
- deleteNamespacedRole
- deleteNamespacedRoleBinding
- getAPIResources
- listClusterRole
- listClusterRoleBinding
- listNamespacedRole
- listNamespacedRoleBinding
- listRoleBindingForAllNamespaces
- listRoleForAllNamespaces
- patchClusterRole
- patchClusterRoleBinding
- patchNamespacedRole
- patchNamespacedRoleBinding
- readClusterRole
- readClusterRoleBinding
- readNamespacedRole
- readNamespacedRoleBinding
- replaceClusterRole
- replaceClusterRoleBinding
- replaceNamespacedRole
- replaceNamespacedRoleBinding
- RbacAuthorizationV1
Description
Synopsis
- createClusterRole :: (Consumes CreateClusterRole contentType, MimeRender contentType V1ClusterRole) => ContentType contentType -> Accept accept -> V1ClusterRole -> KubernetesRequest CreateClusterRole contentType V1ClusterRole accept
- data CreateClusterRole
- createClusterRoleBinding :: (Consumes CreateClusterRoleBinding contentType, MimeRender contentType V1ClusterRoleBinding) => ContentType contentType -> Accept accept -> V1ClusterRoleBinding -> KubernetesRequest CreateClusterRoleBinding contentType V1ClusterRoleBinding accept
- data CreateClusterRoleBinding
- createNamespacedRole :: (Consumes CreateNamespacedRole contentType, MimeRender contentType V1Role) => ContentType contentType -> Accept accept -> V1Role -> Namespace -> KubernetesRequest CreateNamespacedRole contentType V1Role accept
- data CreateNamespacedRole
- createNamespacedRoleBinding :: (Consumes CreateNamespacedRoleBinding contentType, MimeRender contentType V1RoleBinding) => ContentType contentType -> Accept accept -> V1RoleBinding -> Namespace -> KubernetesRequest CreateNamespacedRoleBinding contentType V1RoleBinding accept
- data CreateNamespacedRoleBinding
- deleteClusterRole :: Consumes DeleteClusterRole contentType => ContentType contentType -> Accept accept -> Name -> KubernetesRequest DeleteClusterRole contentType V1Status accept
- data DeleteClusterRole
- deleteClusterRoleBinding :: Consumes DeleteClusterRoleBinding contentType => ContentType contentType -> Accept accept -> Name -> KubernetesRequest DeleteClusterRoleBinding contentType V1Status accept
- data DeleteClusterRoleBinding
- deleteCollectionClusterRole :: Consumes DeleteCollectionClusterRole contentType => ContentType contentType -> Accept accept -> KubernetesRequest DeleteCollectionClusterRole contentType V1Status accept
- data DeleteCollectionClusterRole
- deleteCollectionClusterRoleBinding :: Consumes DeleteCollectionClusterRoleBinding contentType => ContentType contentType -> Accept accept -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType V1Status accept
- data DeleteCollectionClusterRoleBinding
- deleteCollectionNamespacedRole :: Consumes DeleteCollectionNamespacedRole contentType => ContentType contentType -> Accept accept -> Namespace -> KubernetesRequest DeleteCollectionNamespacedRole contentType V1Status accept
- data DeleteCollectionNamespacedRole
- deleteCollectionNamespacedRoleBinding :: Consumes DeleteCollectionNamespacedRoleBinding contentType => ContentType contentType -> Accept accept -> Namespace -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType V1Status accept
- data DeleteCollectionNamespacedRoleBinding
- deleteNamespacedRole :: Consumes DeleteNamespacedRole contentType => ContentType contentType -> Accept accept -> Name -> Namespace -> KubernetesRequest DeleteNamespacedRole contentType V1Status accept
- data DeleteNamespacedRole
- deleteNamespacedRoleBinding :: Consumes DeleteNamespacedRoleBinding contentType => ContentType contentType -> Accept accept -> Name -> Namespace -> KubernetesRequest DeleteNamespacedRoleBinding contentType V1Status accept
- data DeleteNamespacedRoleBinding
- getAPIResources :: Accept accept -> KubernetesRequest GetAPIResources MimeNoContent V1APIResourceList accept
- data GetAPIResources
- listClusterRole :: Accept accept -> KubernetesRequest ListClusterRole MimeNoContent V1ClusterRoleList accept
- data ListClusterRole
- listClusterRoleBinding :: Accept accept -> KubernetesRequest ListClusterRoleBinding MimeNoContent V1ClusterRoleBindingList accept
- data ListClusterRoleBinding
- listNamespacedRole :: Accept accept -> Namespace -> KubernetesRequest ListNamespacedRole MimeNoContent V1RoleList accept
- data ListNamespacedRole
- listNamespacedRoleBinding :: Accept accept -> Namespace -> KubernetesRequest ListNamespacedRoleBinding MimeNoContent V1RoleBindingList accept
- data ListNamespacedRoleBinding
- listRoleBindingForAllNamespaces :: Accept accept -> KubernetesRequest ListRoleBindingForAllNamespaces MimeNoContent V1RoleBindingList accept
- data ListRoleBindingForAllNamespaces
- listRoleForAllNamespaces :: Accept accept -> KubernetesRequest ListRoleForAllNamespaces MimeNoContent V1RoleList accept
- data ListRoleForAllNamespaces
- patchClusterRole :: (Consumes PatchClusterRole contentType, MimeRender contentType Body) => ContentType contentType -> Accept accept -> Body -> Name -> KubernetesRequest PatchClusterRole contentType V1ClusterRole accept
- data PatchClusterRole
- patchClusterRoleBinding :: (Consumes PatchClusterRoleBinding contentType, MimeRender contentType Body) => ContentType contentType -> Accept accept -> Body -> Name -> KubernetesRequest PatchClusterRoleBinding contentType V1ClusterRoleBinding accept
- data PatchClusterRoleBinding
- patchNamespacedRole :: (Consumes PatchNamespacedRole contentType, MimeRender contentType Body) => ContentType contentType -> Accept accept -> Body -> Name -> Namespace -> KubernetesRequest PatchNamespacedRole contentType V1Role accept
- data PatchNamespacedRole
- patchNamespacedRoleBinding :: (Consumes PatchNamespacedRoleBinding contentType, MimeRender contentType Body) => ContentType contentType -> Accept accept -> Body -> Name -> Namespace -> KubernetesRequest PatchNamespacedRoleBinding contentType V1RoleBinding accept
- data PatchNamespacedRoleBinding
- readClusterRole :: Accept accept -> Name -> KubernetesRequest ReadClusterRole MimeNoContent V1ClusterRole accept
- data ReadClusterRole
- readClusterRoleBinding :: Accept accept -> Name -> KubernetesRequest ReadClusterRoleBinding MimeNoContent V1ClusterRoleBinding accept
- data ReadClusterRoleBinding
- readNamespacedRole :: Accept accept -> Name -> Namespace -> KubernetesRequest ReadNamespacedRole MimeNoContent V1Role accept
- data ReadNamespacedRole
- readNamespacedRoleBinding :: Accept accept -> Name -> Namespace -> KubernetesRequest ReadNamespacedRoleBinding MimeNoContent V1RoleBinding accept
- data ReadNamespacedRoleBinding
- replaceClusterRole :: (Consumes ReplaceClusterRole contentType, MimeRender contentType V1ClusterRole) => ContentType contentType -> Accept accept -> V1ClusterRole -> Name -> KubernetesRequest ReplaceClusterRole contentType V1ClusterRole accept
- data ReplaceClusterRole
- replaceClusterRoleBinding :: (Consumes ReplaceClusterRoleBinding contentType, MimeRender contentType V1ClusterRoleBinding) => ContentType contentType -> Accept accept -> V1ClusterRoleBinding -> Name -> KubernetesRequest ReplaceClusterRoleBinding contentType V1ClusterRoleBinding accept
- data ReplaceClusterRoleBinding
- replaceNamespacedRole :: (Consumes ReplaceNamespacedRole contentType, MimeRender contentType V1Role) => ContentType contentType -> Accept accept -> V1Role -> Name -> Namespace -> KubernetesRequest ReplaceNamespacedRole contentType V1Role accept
- data ReplaceNamespacedRole
- replaceNamespacedRoleBinding :: (Consumes ReplaceNamespacedRoleBinding contentType, MimeRender contentType V1RoleBinding) => ContentType contentType -> Accept accept -> V1RoleBinding -> Name -> Namespace -> KubernetesRequest ReplaceNamespacedRoleBinding contentType V1RoleBinding accept
- data ReplaceNamespacedRoleBinding
Operations
RbacAuthorizationV1
createClusterRole
Arguments
:: (Consumes CreateClusterRole contentType, MimeRender contentType V1ClusterRole) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1ClusterRole | "body" |
-> KubernetesRequest CreateClusterRole contentType V1ClusterRole accept |
POST /apis/rbac.authorization.k8s.io/v1/clusterroles
create a ClusterRole
AuthMethod: AuthApiKeyBearerToken
data CreateClusterRole Source #
Instances
HasBodyParam CreateClusterRole V1ClusterRole Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes CreateClusterRole contentType, MimeRender contentType V1ClusterRole) => KubernetesRequest CreateClusterRole contentType res accept -> V1ClusterRole -> KubernetesRequest CreateClusterRole contentType res accept Source # | |
HasOptionalParam CreateClusterRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRole contentType res accept -> DryRun -> KubernetesRequest CreateClusterRole contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRole contentType res accept -> DryRun -> KubernetesRequest CreateClusterRole contentType res accept Source # | |
HasOptionalParam CreateClusterRole FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRole contentType res accept -> FieldManager -> KubernetesRequest CreateClusterRole contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRole contentType res accept -> FieldManager -> KubernetesRequest CreateClusterRole contentType res accept Source # | |
HasOptionalParam CreateClusterRole FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRole contentType res accept -> FieldValidation -> KubernetesRequest CreateClusterRole contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRole contentType res accept -> FieldValidation -> KubernetesRequest CreateClusterRole contentType res accept Source # | |
HasOptionalParam CreateClusterRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRole contentType res accept -> Pretty -> KubernetesRequest CreateClusterRole contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRole contentType res accept -> Pretty -> KubernetesRequest CreateClusterRole contentType res accept Source # | |
MimeType mtype => Consumes CreateClusterRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
createClusterRoleBinding
createClusterRoleBinding Source #
Arguments
:: (Consumes CreateClusterRoleBinding contentType, MimeRender contentType V1ClusterRoleBinding) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1ClusterRoleBinding | "body" |
-> KubernetesRequest CreateClusterRoleBinding contentType V1ClusterRoleBinding accept |
POST /apis/rbac.authorization.k8s.io/v1/clusterrolebindings
create a ClusterRoleBinding
AuthMethod: AuthApiKeyBearerToken
data CreateClusterRoleBinding Source #
Instances
HasBodyParam CreateClusterRoleBinding V1ClusterRoleBinding Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes CreateClusterRoleBinding contentType, MimeRender contentType V1ClusterRoleBinding) => KubernetesRequest CreateClusterRoleBinding contentType res accept -> V1ClusterRoleBinding -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # | |
HasOptionalParam CreateClusterRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # | |
HasOptionalParam CreateClusterRoleBinding FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> FieldManager -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> FieldManager -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # | |
HasOptionalParam CreateClusterRoleBinding FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # | |
HasOptionalParam CreateClusterRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest CreateClusterRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes CreateClusterRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateClusterRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
createNamespacedRole
Arguments
:: (Consumes CreateNamespacedRole contentType, MimeRender contentType V1Role) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1Role | "body" |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest CreateNamespacedRole contentType V1Role accept |
POST /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles
create a Role
AuthMethod: AuthApiKeyBearerToken
data CreateNamespacedRole Source #
Instances
HasBodyParam CreateNamespacedRole V1Role Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes CreateNamespacedRole contentType, MimeRender contentType V1Role) => KubernetesRequest CreateNamespacedRole contentType res accept -> V1Role -> KubernetesRequest CreateNamespacedRole contentType res accept Source # | |
HasOptionalParam CreateNamespacedRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRole contentType res accept -> DryRun -> KubernetesRequest CreateNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRole contentType res accept -> DryRun -> KubernetesRequest CreateNamespacedRole contentType res accept Source # | |
HasOptionalParam CreateNamespacedRole FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRole contentType res accept -> FieldManager -> KubernetesRequest CreateNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRole contentType res accept -> FieldManager -> KubernetesRequest CreateNamespacedRole contentType res accept Source # | |
HasOptionalParam CreateNamespacedRole FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRole contentType res accept -> FieldValidation -> KubernetesRequest CreateNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRole contentType res accept -> FieldValidation -> KubernetesRequest CreateNamespacedRole contentType res accept Source # | |
HasOptionalParam CreateNamespacedRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRole contentType res accept -> Pretty -> KubernetesRequest CreateNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRole contentType res accept -> Pretty -> KubernetesRequest CreateNamespacedRole contentType res accept Source # | |
MimeType mtype => Consumes CreateNamespacedRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
createNamespacedRoleBinding
createNamespacedRoleBinding Source #
Arguments
:: (Consumes CreateNamespacedRoleBinding contentType, MimeRender contentType V1RoleBinding) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1RoleBinding | "body" |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest CreateNamespacedRoleBinding contentType V1RoleBinding accept |
POST /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/rolebindings
create a RoleBinding
AuthMethod: AuthApiKeyBearerToken
data CreateNamespacedRoleBinding Source #
Instances
HasBodyParam CreateNamespacedRoleBinding V1RoleBinding Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes CreateNamespacedRoleBinding contentType, MimeRender contentType V1RoleBinding) => KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> V1RoleBinding -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam CreateNamespacedRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam CreateNamespacedRoleBinding FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> FieldManager -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> FieldManager -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam CreateNamespacedRoleBinding FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam CreateNamespacedRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest CreateNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest CreateNamespacedRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes CreateNamespacedRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces CreateNamespacedRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteClusterRole
Arguments
:: Consumes DeleteClusterRole contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Name | "name" - name of the ClusterRole |
-> KubernetesRequest DeleteClusterRole contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/clusterroles/{name}
delete a ClusterRole
AuthMethod: AuthApiKeyBearerToken
data DeleteClusterRole Source #
Instances
HasBodyParam DeleteClusterRole V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteClusterRole contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteClusterRole contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteClusterRole contentType res accept Source # | |
HasOptionalParam DeleteClusterRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRole contentType res accept -> DryRun -> KubernetesRequest DeleteClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRole contentType res accept -> DryRun -> KubernetesRequest DeleteClusterRole contentType res accept Source # | |
HasOptionalParam DeleteClusterRole GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteClusterRole contentType res accept Source # | |
HasOptionalParam DeleteClusterRole IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteClusterRole contentType res accept Source # | |
HasOptionalParam DeleteClusterRole OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteClusterRole contentType res accept Source # | |
HasOptionalParam DeleteClusterRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRole contentType res accept -> Pretty -> KubernetesRequest DeleteClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRole contentType res accept -> Pretty -> KubernetesRequest DeleteClusterRole contentType res accept Source # | |
HasOptionalParam DeleteClusterRole PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteClusterRole contentType res accept Source # | |
MimeType mtype => Consumes DeleteClusterRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteClusterRoleBinding
deleteClusterRoleBinding Source #
Arguments
:: Consumes DeleteClusterRoleBinding contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Name | "name" - name of the ClusterRoleBinding |
-> KubernetesRequest DeleteClusterRoleBinding contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}
delete a ClusterRoleBinding
AuthMethod: AuthApiKeyBearerToken
data DeleteClusterRoleBinding Source #
Instances
HasBodyParam DeleteClusterRoleBinding V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteClusterRoleBinding contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteClusterRoleBinding contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteClusterRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteClusterRoleBinding GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteClusterRoleBinding IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteClusterRoleBinding OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteClusterRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteClusterRoleBinding PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteClusterRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteClusterRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes DeleteClusterRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteClusterRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteCollectionClusterRole
deleteCollectionClusterRole Source #
Arguments
:: Consumes DeleteCollectionClusterRole contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> KubernetesRequest DeleteCollectionClusterRole contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/clusterroles
delete collection of ClusterRole
AuthMethod: AuthApiKeyBearerToken
data DeleteCollectionClusterRole Source #
Instances
HasBodyParam DeleteCollectionClusterRole V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteCollectionClusterRole contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteCollectionClusterRole contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> Continue -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> Continue -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> Limit -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> Limit -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRole TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRole contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionClusterRole contentType res accept Source # | |
MimeType mtype => Consumes DeleteCollectionClusterRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteCollectionClusterRoleBinding
deleteCollectionClusterRoleBinding Source #
Arguments
:: Consumes DeleteCollectionClusterRoleBinding contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> KubernetesRequest DeleteCollectionClusterRoleBinding contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/clusterrolebindings
delete collection of ClusterRoleBinding
AuthMethod: AuthApiKeyBearerToken
data DeleteCollectionClusterRoleBinding Source #
Instances
HasBodyParam DeleteCollectionClusterRoleBinding V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteCollectionClusterRoleBinding contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> Continue -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> Continue -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> Limit -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> Limit -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionClusterRoleBinding TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionClusterRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes DeleteCollectionClusterRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionClusterRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteCollectionNamespacedRole
deleteCollectionNamespacedRole Source #
Arguments
:: Consumes DeleteCollectionNamespacedRole contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest DeleteCollectionNamespacedRole contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles
delete collection of Role
AuthMethod: AuthApiKeyBearerToken
data DeleteCollectionNamespacedRole Source #
Instances
HasBodyParam DeleteCollectionNamespacedRole V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteCollectionNamespacedRole contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> Continue -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> Continue -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> Limit -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> Limit -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRole TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRole contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionNamespacedRole contentType res accept Source # | |
MimeType mtype => Consumes DeleteCollectionNamespacedRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteCollectionNamespacedRoleBinding
deleteCollectionNamespacedRoleBinding Source #
Arguments
:: Consumes DeleteCollectionNamespacedRoleBinding contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/rolebindings
delete collection of RoleBinding
AuthMethod: AuthApiKeyBearerToken
data DeleteCollectionNamespacedRoleBinding Source #
Instances
HasBodyParam DeleteCollectionNamespacedRoleBinding V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteCollectionNamespacedRoleBinding contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> Continue -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> Continue -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> Limit -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> Limit -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteCollectionNamespacedRoleBinding TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest DeleteCollectionNamespacedRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes DeleteCollectionNamespacedRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteCollectionNamespacedRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteNamespacedRole
Arguments
:: Consumes DeleteNamespacedRole contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Name | "name" - name of the Role |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest DeleteNamespacedRole contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name}
delete a Role
AuthMethod: AuthApiKeyBearerToken
data DeleteNamespacedRole Source #
Instances
HasBodyParam DeleteNamespacedRole V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteNamespacedRole contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteNamespacedRole contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRole contentType res accept -> DryRun -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRole contentType res accept -> DryRun -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRole GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRole contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRole IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRole contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRole OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRole contentType res accept -> OrphanDependents -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRole contentType res accept -> Pretty -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRole contentType res accept -> Pretty -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRole PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRole contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteNamespacedRole contentType res accept Source # | |
MimeType mtype => Consumes DeleteNamespacedRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
deleteNamespacedRoleBinding
deleteNamespacedRoleBinding Source #
Arguments
:: Consumes DeleteNamespacedRoleBinding contentType | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Name | "name" - name of the RoleBinding |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest DeleteNamespacedRoleBinding contentType V1Status accept |
DELETE /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/rolebindings/{name}
delete a RoleBinding
AuthMethod: AuthApiKeyBearerToken
data DeleteNamespacedRoleBinding Source #
Instances
HasBodyParam DeleteNamespacedRoleBinding V1DeleteOptions Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes DeleteNamespacedRoleBinding contentType, MimeRender contentType V1DeleteOptions) => KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> V1DeleteOptions -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRoleBinding GracePeriodSeconds Source # | Optional Param "gracePeriodSeconds" - The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> GracePeriodSeconds -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRoleBinding IgnoreStoreReadErrorWithClusterBreakingPotential Source # | Optional Param "ignoreStoreReadErrorWithClusterBreakingPotential" - if set to true, it will trigger an unsafe deletion of the resource in case the normal deletion flow fails with a corrupt object error. A resource is considered corrupt if it can not be retrieved from the underlying storage successfully because of a) its data can not be transformed e.g. decryption failure, or b) it fails to decode into an object. NOTE: unsafe deletion ignores finalizer constraints, skips precondition checks, and removes the object from the storage. WARNING: This may potentially break the cluster if the workload associated with the resource being unsafe-deleted relies on normal deletion flow. Use only if you REALLY know what you are doing. The default value is false, and the user must opt in to enable it |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> IgnoreStoreReadErrorWithClusterBreakingPotential -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRoleBinding OrphanDependents Source # | Optional Param "orphanDependents" - Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If truefalse, the "orphan" finalizer will be added toremoved from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> OrphanDependents -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam DeleteNamespacedRoleBinding PropagationPolicy Source # | Optional Param "propagationPolicy" - Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest DeleteNamespacedRoleBinding contentType res accept -> PropagationPolicy -> KubernetesRequest DeleteNamespacedRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes DeleteNamespacedRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces DeleteNamespacedRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
getAPIResources
Arguments
:: Accept accept | request accept ( |
-> KubernetesRequest GetAPIResources MimeNoContent V1APIResourceList accept |
data GetAPIResources Source #
Instances
Produces GetAPIResources MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces GetAPIResources MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces GetAPIResources MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces GetAPIResources MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
listClusterRole
Arguments
:: Accept accept | request accept ( |
-> KubernetesRequest ListClusterRole MimeNoContent V1ClusterRoleList accept |
GET /apis/rbac.authorization.k8s.io/v1/clusterroles
list or watch objects of kind ClusterRole
AuthMethod: AuthApiKeyBearerToken
data ListClusterRole Source #
Instances
HasOptionalParam ListClusterRole AllowWatchBookmarks Source # | Optional Param "allowWatchBookmarks" - allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> Continue -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> Continue -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> FieldSelector -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> FieldSelector -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> LabelSelector -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> LabelSelector -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> Limit -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> Limit -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> Pretty -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> Pretty -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> ResourceVersion -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> ResourceVersion -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> SendInitialEvents -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> SendInitialEvents -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> TimeoutSeconds -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> TimeoutSeconds -> KubernetesRequest ListClusterRole contentType res accept Source # | |
HasOptionalParam ListClusterRole Watch Source # | Optional Param "watch" - Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRole contentType res accept -> Watch -> KubernetesRequest ListClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRole contentType res accept -> Watch -> KubernetesRequest ListClusterRole contentType res accept Source # | |
Produces ListClusterRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRole MimeCborSeq Source # | application/cbor-seq |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRole MimeJsonstreamwatch Source # | application/json;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRole MimeVndKubernetesProtobufstreamwatch Source # | application/vnd.kubernetes.protobuf;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
listClusterRoleBinding
listClusterRoleBinding Source #
Arguments
:: Accept accept | request accept ( |
-> KubernetesRequest ListClusterRoleBinding MimeNoContent V1ClusterRoleBindingList accept |
GET /apis/rbac.authorization.k8s.io/v1/clusterrolebindings
list or watch objects of kind ClusterRoleBinding
AuthMethod: AuthApiKeyBearerToken
data ListClusterRoleBinding Source #
Instances
HasOptionalParam ListClusterRoleBinding AllowWatchBookmarks Source # | Optional Param "allowWatchBookmarks" - allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Continue -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Continue -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Limit -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Limit -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ListClusterRoleBinding Watch Source # | Optional Param "watch" - Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Watch -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListClusterRoleBinding contentType res accept -> Watch -> KubernetesRequest ListClusterRoleBinding contentType res accept Source # | |
Produces ListClusterRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRoleBinding MimeCborSeq Source # | application/cbor-seq |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRoleBinding MimeJsonstreamwatch Source # | application/json;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRoleBinding MimeVndKubernetesProtobufstreamwatch Source # | application/vnd.kubernetes.protobuf;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListClusterRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
listNamespacedRole
Arguments
:: Accept accept | request accept ( |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest ListNamespacedRole MimeNoContent V1RoleList accept |
GET /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles
list or watch objects of kind Role
AuthMethod: AuthApiKeyBearerToken
data ListNamespacedRole Source #
Instances
HasOptionalParam ListNamespacedRole AllowWatchBookmarks Source # | Optional Param "allowWatchBookmarks" - allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> Continue -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> Continue -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> FieldSelector -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> FieldSelector -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> LabelSelector -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> LabelSelector -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> Limit -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> Limit -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> Pretty -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> Pretty -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> ResourceVersion -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> ResourceVersion -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> SendInitialEvents -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> SendInitialEvents -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> TimeoutSeconds -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> TimeoutSeconds -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
HasOptionalParam ListNamespacedRole Watch Source # | Optional Param "watch" - Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRole contentType res accept -> Watch -> KubernetesRequest ListNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRole contentType res accept -> Watch -> KubernetesRequest ListNamespacedRole contentType res accept Source # | |
Produces ListNamespacedRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRole MimeCborSeq Source # | application/cbor-seq |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRole MimeJsonstreamwatch Source # | application/json;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRole MimeVndKubernetesProtobufstreamwatch Source # | application/vnd.kubernetes.protobuf;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
listNamespacedRoleBinding
listNamespacedRoleBinding Source #
Arguments
:: Accept accept | request accept ( |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest ListNamespacedRoleBinding MimeNoContent V1RoleBindingList accept |
GET /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/rolebindings
list or watch objects of kind RoleBinding
AuthMethod: AuthApiKeyBearerToken
data ListNamespacedRoleBinding Source #
Instances
HasOptionalParam ListNamespacedRoleBinding AllowWatchBookmarks Source # | Optional Param "allowWatchBookmarks" - allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Continue -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Continue -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> FieldSelector -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> LabelSelector -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Limit -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Limit -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> ResourceVersion -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> SendInitialEvents -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> TimeoutSeconds -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ListNamespacedRoleBinding Watch Source # | Optional Param "watch" - Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Watch -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ListNamespacedRoleBinding contentType res accept -> Watch -> KubernetesRequest ListNamespacedRoleBinding contentType res accept Source # | |
Produces ListNamespacedRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRoleBinding MimeCborSeq Source # | application/cbor-seq |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRoleBinding MimeJsonstreamwatch Source # | application/json;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRoleBinding MimeVndKubernetesProtobufstreamwatch Source # | application/vnd.kubernetes.protobuf;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListNamespacedRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
listRoleBindingForAllNamespaces
listRoleBindingForAllNamespaces Source #
Arguments
:: Accept accept | request accept ( |
-> KubernetesRequest ListRoleBindingForAllNamespaces MimeNoContent V1RoleBindingList accept |
GET /apis/rbac.authorization.k8s.io/v1/rolebindings
list or watch objects of kind RoleBinding
AuthMethod: AuthApiKeyBearerToken
data ListRoleBindingForAllNamespaces Source #
Instances
HasOptionalParam ListRoleBindingForAllNamespaces AllowWatchBookmarks Source # | Optional Param "allowWatchBookmarks" - allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Continue -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Continue -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> FieldSelector -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> FieldSelector -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> LabelSelector -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> LabelSelector -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Limit -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Limit -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Pretty -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Pretty -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> ResourceVersion -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> ResourceVersion -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> SendInitialEvents -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> SendInitialEvents -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> TimeoutSeconds -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> TimeoutSeconds -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleBindingForAllNamespaces Watch Source # | Optional Param "watch" - Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Watch -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept -> Watch -> KubernetesRequest ListRoleBindingForAllNamespaces contentType res accept Source # | |
Produces ListRoleBindingForAllNamespaces MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleBindingForAllNamespaces MimeCborSeq Source # | application/cbor-seq |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleBindingForAllNamespaces MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleBindingForAllNamespaces MimeJsonstreamwatch Source # | application/json;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleBindingForAllNamespaces MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleBindingForAllNamespaces MimeVndKubernetesProtobufstreamwatch Source # | application/vnd.kubernetes.protobuf;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleBindingForAllNamespaces MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
listRoleForAllNamespaces
listRoleForAllNamespaces Source #
Arguments
:: Accept accept | request accept ( |
-> KubernetesRequest ListRoleForAllNamespaces MimeNoContent V1RoleList accept |
GET /apis/rbac.authorization.k8s.io/v1/roles
list or watch objects of kind Role
AuthMethod: AuthApiKeyBearerToken
data ListRoleForAllNamespaces Source #
Instances
HasOptionalParam ListRoleForAllNamespaces AllowWatchBookmarks Source # | Optional Param "allowWatchBookmarks" - allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> AllowWatchBookmarks -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces Continue Source # | Optional Param "continue" - The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Continue -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Continue -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces FieldSelector Source # | Optional Param "fieldSelector" - A selector to restrict the list of returned objects by their fields. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> FieldSelector -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> FieldSelector -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces LabelSelector Source # | Optional Param "labelSelector" - A selector to restrict the list of returned objects by their labels. Defaults to everything. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> LabelSelector -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> LabelSelector -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces Limit Source # | Optional Param "limit" - limit is a maximum number of responses to return for a list call. If more items exist, the server will set the |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Limit -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Limit -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Pretty -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Pretty -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces ResourceVersion Source # | Optional Param "resourceVersion" - resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> ResourceVersion -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> ResourceVersion -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces ResourceVersionMatch Source # | Optional Param "resourceVersionMatch" - resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> ResourceVersionMatch -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces SendInitialEvents Source # | Optional Param "sendInitialEvents" - `sendInitialEvents=true` may be set together with `watch=true`. In that case, the watch stream will begin with synthetic events to produce the current state of objects in the collection. Once all such events have been sent, a synthetic "Bookmark" event will be sent. The bookmark will report the ResourceVersion (RV) corresponding to the set of objects, and be marked with `"k8s.io/initial-events-end": "true"` annotation. Afterwards, the watch stream will proceed as usual, sending watch events corresponding to changes (subsequent to the RV) to objects watched. When |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> SendInitialEvents -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> SendInitialEvents -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces TimeoutSeconds Source # | Optional Param "timeoutSeconds" - Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> TimeoutSeconds -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> TimeoutSeconds -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
HasOptionalParam ListRoleForAllNamespaces Watch Source # | Optional Param "watch" - Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Watch -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # (-&-) :: KubernetesRequest ListRoleForAllNamespaces contentType res accept -> Watch -> KubernetesRequest ListRoleForAllNamespaces contentType res accept Source # | |
Produces ListRoleForAllNamespaces MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleForAllNamespaces MimeCborSeq Source # | application/cbor-seq |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleForAllNamespaces MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleForAllNamespaces MimeJsonstreamwatch Source # | application/json;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleForAllNamespaces MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleForAllNamespaces MimeVndKubernetesProtobufstreamwatch Source # | application/vnd.kubernetes.protobuf;stream=watch |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ListRoleForAllNamespaces MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
patchClusterRole
Arguments
:: (Consumes PatchClusterRole contentType, MimeRender contentType Body) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Body | "body" |
-> Name | "name" - name of the ClusterRole |
-> KubernetesRequest PatchClusterRole contentType V1ClusterRole accept |
PATCH /apis/rbac.authorization.k8s.io/v1/clusterroles/{name}
partially update the specified ClusterRole
AuthMethod: AuthApiKeyBearerToken
data PatchClusterRole Source #
Instances
HasBodyParam PatchClusterRole Body Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes PatchClusterRole contentType, MimeRender contentType Body) => KubernetesRequest PatchClusterRole contentType res accept -> Body -> KubernetesRequest PatchClusterRole contentType res accept Source # | |
HasOptionalParam PatchClusterRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRole contentType res accept -> DryRun -> KubernetesRequest PatchClusterRole contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRole contentType res accept -> DryRun -> KubernetesRequest PatchClusterRole contentType res accept Source # | |
HasOptionalParam PatchClusterRole FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRole contentType res accept -> FieldManager -> KubernetesRequest PatchClusterRole contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRole contentType res accept -> FieldManager -> KubernetesRequest PatchClusterRole contentType res accept Source # | |
HasOptionalParam PatchClusterRole FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRole contentType res accept -> FieldValidation -> KubernetesRequest PatchClusterRole contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRole contentType res accept -> FieldValidation -> KubernetesRequest PatchClusterRole contentType res accept Source # | |
HasOptionalParam PatchClusterRole Force Source # | Optional Param "force" - Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRole contentType res accept -> Force -> KubernetesRequest PatchClusterRole contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRole contentType res accept -> Force -> KubernetesRequest PatchClusterRole contentType res accept Source # | |
HasOptionalParam PatchClusterRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRole contentType res accept -> Pretty -> KubernetesRequest PatchClusterRole contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRole contentType res accept -> Pretty -> KubernetesRequest PatchClusterRole contentType res accept Source # | |
Consumes PatchClusterRole MimeApplyPatchcbor Source # | application/apply-patch+cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRole MimeApplyPatchyaml Source # | application/apply-patch+yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRole MimeJsonPatchjson Source # | application/json-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRole MimeMergePatchjson Source # | application/merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRole MimeStrategicMergePatchjson Source # | application/strategic-merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
patchClusterRoleBinding
patchClusterRoleBinding Source #
Arguments
:: (Consumes PatchClusterRoleBinding contentType, MimeRender contentType Body) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Body | "body" |
-> Name | "name" - name of the ClusterRoleBinding |
-> KubernetesRequest PatchClusterRoleBinding contentType V1ClusterRoleBinding accept |
PATCH /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}
partially update the specified ClusterRoleBinding
AuthMethod: AuthApiKeyBearerToken
data PatchClusterRoleBinding Source #
Instances
HasBodyParam PatchClusterRoleBinding Body Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes PatchClusterRoleBinding contentType, MimeRender contentType Body) => KubernetesRequest PatchClusterRoleBinding contentType res accept -> Body -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # | |
HasOptionalParam PatchClusterRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # | |
HasOptionalParam PatchClusterRoleBinding FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> FieldManager -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> FieldManager -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # | |
HasOptionalParam PatchClusterRoleBinding FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # | |
HasOptionalParam PatchClusterRoleBinding Force Source # | Optional Param "force" - Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> Force -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> Force -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # | |
HasOptionalParam PatchClusterRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest PatchClusterRoleBinding contentType res accept Source # | |
Consumes PatchClusterRoleBinding MimeApplyPatchcbor Source # | application/apply-patch+cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRoleBinding MimeApplyPatchyaml Source # | application/apply-patch+yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRoleBinding MimeJsonPatchjson Source # | application/json-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRoleBinding MimeMergePatchjson Source # | application/merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchClusterRoleBinding MimeStrategicMergePatchjson Source # | application/strategic-merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchClusterRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
patchNamespacedRole
Arguments
:: (Consumes PatchNamespacedRole contentType, MimeRender contentType Body) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Body | "body" |
-> Name | "name" - name of the Role |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest PatchNamespacedRole contentType V1Role accept |
PATCH /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name}
partially update the specified Role
AuthMethod: AuthApiKeyBearerToken
data PatchNamespacedRole Source #
Instances
HasBodyParam PatchNamespacedRole Body Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes PatchNamespacedRole contentType, MimeRender contentType Body) => KubernetesRequest PatchNamespacedRole contentType res accept -> Body -> KubernetesRequest PatchNamespacedRole contentType res accept Source # | |
HasOptionalParam PatchNamespacedRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRole contentType res accept -> DryRun -> KubernetesRequest PatchNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRole contentType res accept -> DryRun -> KubernetesRequest PatchNamespacedRole contentType res accept Source # | |
HasOptionalParam PatchNamespacedRole FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRole contentType res accept -> FieldManager -> KubernetesRequest PatchNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRole contentType res accept -> FieldManager -> KubernetesRequest PatchNamespacedRole contentType res accept Source # | |
HasOptionalParam PatchNamespacedRole FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRole contentType res accept -> FieldValidation -> KubernetesRequest PatchNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRole contentType res accept -> FieldValidation -> KubernetesRequest PatchNamespacedRole contentType res accept Source # | |
HasOptionalParam PatchNamespacedRole Force Source # | Optional Param "force" - Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRole contentType res accept -> Force -> KubernetesRequest PatchNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRole contentType res accept -> Force -> KubernetesRequest PatchNamespacedRole contentType res accept Source # | |
HasOptionalParam PatchNamespacedRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRole contentType res accept -> Pretty -> KubernetesRequest PatchNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRole contentType res accept -> Pretty -> KubernetesRequest PatchNamespacedRole contentType res accept Source # | |
Consumes PatchNamespacedRole MimeApplyPatchcbor Source # | application/apply-patch+cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRole MimeApplyPatchyaml Source # | application/apply-patch+yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRole MimeJsonPatchjson Source # | application/json-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRole MimeMergePatchjson Source # | application/merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRole MimeStrategicMergePatchjson Source # | application/strategic-merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
patchNamespacedRoleBinding
patchNamespacedRoleBinding Source #
Arguments
:: (Consumes PatchNamespacedRoleBinding contentType, MimeRender contentType Body) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> Body | "body" |
-> Name | "name" - name of the RoleBinding |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest PatchNamespacedRoleBinding contentType V1RoleBinding accept |
PATCH /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/rolebindings/{name}
partially update the specified RoleBinding
AuthMethod: AuthApiKeyBearerToken
data PatchNamespacedRoleBinding Source #
Instances
HasBodyParam PatchNamespacedRoleBinding Body Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes PatchNamespacedRoleBinding contentType, MimeRender contentType Body) => KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> Body -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam PatchNamespacedRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam PatchNamespacedRoleBinding FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> FieldManager -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> FieldManager -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam PatchNamespacedRoleBinding FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam PatchNamespacedRoleBinding Force Source # | Optional Param "force" - Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> Force -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> Force -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam PatchNamespacedRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest PatchNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest PatchNamespacedRoleBinding contentType res accept Source # | |
Consumes PatchNamespacedRoleBinding MimeApplyPatchcbor Source # | application/apply-patch+cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRoleBinding MimeApplyPatchyaml Source # | application/apply-patch+yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRoleBinding MimeJsonPatchjson Source # | application/json-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRoleBinding MimeMergePatchjson Source # | application/merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Consumes PatchNamespacedRoleBinding MimeStrategicMergePatchjson Source # | application/strategic-merge-patch+json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces PatchNamespacedRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
readClusterRole
Arguments
:: Accept accept | request accept ( |
-> Name | "name" - name of the ClusterRole |
-> KubernetesRequest ReadClusterRole MimeNoContent V1ClusterRole accept |
GET /apis/rbac.authorization.k8s.io/v1/clusterroles/{name}
read the specified ClusterRole
AuthMethod: AuthApiKeyBearerToken
data ReadClusterRole Source #
Instances
readClusterRoleBinding
readClusterRoleBinding Source #
Arguments
:: Accept accept | request accept ( |
-> Name | "name" - name of the ClusterRoleBinding |
-> KubernetesRequest ReadClusterRoleBinding MimeNoContent V1ClusterRoleBinding accept |
GET /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}
read the specified ClusterRoleBinding
AuthMethod: AuthApiKeyBearerToken
data ReadClusterRoleBinding Source #
Instances
readNamespacedRole
Arguments
:: Accept accept | request accept ( |
-> Name | "name" - name of the Role |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest ReadNamespacedRole MimeNoContent V1Role accept |
GET /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name}
read the specified Role
AuthMethod: AuthApiKeyBearerToken
data ReadNamespacedRole Source #
Instances
readNamespacedRoleBinding
readNamespacedRoleBinding Source #
Arguments
:: Accept accept | request accept ( |
-> Name | "name" - name of the RoleBinding |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest ReadNamespacedRoleBinding MimeNoContent V1RoleBinding accept |
GET /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/rolebindings/{name}
read the specified RoleBinding
AuthMethod: AuthApiKeyBearerToken
data ReadNamespacedRoleBinding Source #
Instances
replaceClusterRole
Arguments
:: (Consumes ReplaceClusterRole contentType, MimeRender contentType V1ClusterRole) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1ClusterRole | "body" |
-> Name | "name" - name of the ClusterRole |
-> KubernetesRequest ReplaceClusterRole contentType V1ClusterRole accept |
PUT /apis/rbac.authorization.k8s.io/v1/clusterroles/{name}
replace the specified ClusterRole
AuthMethod: AuthApiKeyBearerToken
data ReplaceClusterRole Source #
Instances
HasBodyParam ReplaceClusterRole V1ClusterRole Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes ReplaceClusterRole contentType, MimeRender contentType V1ClusterRole) => KubernetesRequest ReplaceClusterRole contentType res accept -> V1ClusterRole -> KubernetesRequest ReplaceClusterRole contentType res accept Source # | |
HasOptionalParam ReplaceClusterRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRole contentType res accept -> DryRun -> KubernetesRequest ReplaceClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRole contentType res accept -> DryRun -> KubernetesRequest ReplaceClusterRole contentType res accept Source # | |
HasOptionalParam ReplaceClusterRole FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRole contentType res accept -> FieldManager -> KubernetesRequest ReplaceClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRole contentType res accept -> FieldManager -> KubernetesRequest ReplaceClusterRole contentType res accept Source # | |
HasOptionalParam ReplaceClusterRole FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRole contentType res accept -> FieldValidation -> KubernetesRequest ReplaceClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRole contentType res accept -> FieldValidation -> KubernetesRequest ReplaceClusterRole contentType res accept Source # | |
HasOptionalParam ReplaceClusterRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRole contentType res accept -> Pretty -> KubernetesRequest ReplaceClusterRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRole contentType res accept -> Pretty -> KubernetesRequest ReplaceClusterRole contentType res accept Source # | |
MimeType mtype => Consumes ReplaceClusterRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
replaceClusterRoleBinding
replaceClusterRoleBinding Source #
Arguments
:: (Consumes ReplaceClusterRoleBinding contentType, MimeRender contentType V1ClusterRoleBinding) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1ClusterRoleBinding | "body" |
-> Name | "name" - name of the ClusterRoleBinding |
-> KubernetesRequest ReplaceClusterRoleBinding contentType V1ClusterRoleBinding accept |
PUT /apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}
replace the specified ClusterRoleBinding
AuthMethod: AuthApiKeyBearerToken
data ReplaceClusterRoleBinding Source #
Instances
HasBodyParam ReplaceClusterRoleBinding V1ClusterRoleBinding Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes ReplaceClusterRoleBinding contentType, MimeRender contentType V1ClusterRoleBinding) => KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> V1ClusterRoleBinding -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceClusterRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> DryRun -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceClusterRoleBinding FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> FieldManager -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> FieldManager -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceClusterRoleBinding FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceClusterRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceClusterRoleBinding contentType res accept -> Pretty -> KubernetesRequest ReplaceClusterRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes ReplaceClusterRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceClusterRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
replaceNamespacedRole
replaceNamespacedRole Source #
Arguments
:: (Consumes ReplaceNamespacedRole contentType, MimeRender contentType V1Role) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1Role | "body" |
-> Name | "name" - name of the Role |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest ReplaceNamespacedRole contentType V1Role accept |
PUT /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/roles/{name}
replace the specified Role
AuthMethod: AuthApiKeyBearerToken
data ReplaceNamespacedRole Source #
Instances
HasBodyParam ReplaceNamespacedRole V1Role Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes ReplaceNamespacedRole contentType, MimeRender contentType V1Role) => KubernetesRequest ReplaceNamespacedRole contentType res accept -> V1Role -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRole DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> DryRun -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> DryRun -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRole FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> FieldManager -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> FieldManager -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRole FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> FieldValidation -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> FieldValidation -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRole Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> Pretty -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRole contentType res accept -> Pretty -> KubernetesRequest ReplaceNamespacedRole contentType res accept Source # | |
MimeType mtype => Consumes ReplaceNamespacedRole mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRole MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRole MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRole MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRole MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |
replaceNamespacedRoleBinding
replaceNamespacedRoleBinding Source #
Arguments
:: (Consumes ReplaceNamespacedRoleBinding contentType, MimeRender contentType V1RoleBinding) | |
=> ContentType contentType | request content-type ( |
-> Accept accept | request accept ( |
-> V1RoleBinding | "body" |
-> Name | "name" - name of the RoleBinding |
-> Namespace | "namespace" - object name and auth scope, such as for teams and projects |
-> KubernetesRequest ReplaceNamespacedRoleBinding contentType V1RoleBinding accept |
PUT /apis/rbac.authorization.k8s.io/v1/namespaces/{namespace}/rolebindings/{name}
replace the specified RoleBinding
AuthMethod: AuthApiKeyBearerToken
data ReplaceNamespacedRoleBinding Source #
Instances
HasBodyParam ReplaceNamespacedRoleBinding V1RoleBinding Source # | |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods setBodyParam :: (Consumes ReplaceNamespacedRoleBinding contentType, MimeRender contentType V1RoleBinding) => KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> V1RoleBinding -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRoleBinding DryRun Source # | Optional Param "dryRun" - When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> DryRun -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRoleBinding FieldManager Source # | Optional Param "fieldManager" - fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> FieldManager -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> FieldManager -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRoleBinding FieldValidation Source # | Optional Param "fieldValidation" - fieldValidation instructs the server on how to handle objects in the request (POSTPUTPATCH) containing unknown or duplicate fields. Valid values are: - Ignore: This will ignore any unknown fields that are silently dropped from the object, and will ignore all but the last duplicate field that the decoder encounters. This is the default behavior prior to v1.23. - Warn: This will send a warning via the standard warning response header for each unknown field that is dropped from the object, and for each duplicate field that is encountered. The request will still succeed if there are no other errors, and will only persist the last of any duplicate fields. This is the default in v1.23+ - Strict: This will fail the request with a BadRequest error if any unknown fields would be dropped from the object, or if any duplicate fields are present. The error returned from the server will contain all unknown and duplicate fields encountered. |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> FieldValidation -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # | |
HasOptionalParam ReplaceNamespacedRoleBinding Pretty Source # | Optional Param "pretty" - If |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 Methods applyOptionalParam :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # (-&-) :: KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept -> Pretty -> KubernetesRequest ReplaceNamespacedRoleBinding contentType res accept Source # | |
MimeType mtype => Consumes ReplaceNamespacedRoleBinding mtype Source # | */* |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRoleBinding MimeCbor Source # | application/cbor |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRoleBinding MimeJSON Source # | application/json |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRoleBinding MimeVndKubernetesProtobuf Source # | application/vnd.kubernetes.protobuf |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 | |
Produces ReplaceNamespacedRoleBinding MimeYaml Source # | application/yaml |
Defined in Kubernetes.OpenAPI.API.RbacAuthorizationV1 |