-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improvement: Corrected the link for Authorization. #30430
Improvement: Corrected the link for Authorization. #30430
Conversation
Hi @cheftako @lavalamp @bradtopol |
✔️ Deploy Preview for kubernetes-io-main-staging ready! 🔨 Explore the source changes: 349be77 🔍 Inspect the deploy log: https://app.netlify.com/sites/kubernetes-io-main-staging/deploys/619cd222442a7900088bd203 😎 Browse the preview: https://deploy-preview-30430--kubernetes-io-main-staging.netlify.app |
@Shubham82 Thanks ! /lgtm |
LGTM label has been added. Git tree hash: afdb041194424bafab14699505672b74daabd799
|
Thanks, @seokho-son for taking look at this. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Thanks, @Shubham82 for improvement :)
You're welcome! @mehabhalodiya |
@@ -145,7 +145,7 @@ Kubernetes provides several built-in authentication methods, and an [Authenticat | |||
|
|||
### Authorization | |||
|
|||
[Authorization](/docs/reference/access-authn-authz/webhook/) determines whether specific users can read, write, and do other operations on API resources. It works at the level of whole resources -- it doesn't discriminate based on arbitrary object fields. If the built-in authorization options don't meet your needs, and [Authorization webhook](/docs/reference/access-authn-authz/webhook/) allows calling out to user-provided code to make an authorization decision. | |||
[Authorization](/docs/reference/access-authn-authz/authorization/) determines whether specific users can read, write, and do other operations on API resources. It works at the level of whole resources -- it doesn't discriminate based on arbitrary object fields. If the built-in authorization options don't meet your needs, and [Authorization webhook](/docs/reference/access-authn-authz/webhook/) allows calling out to user-provided code to make an authorization decision. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
HI @Shubham82 . The link update looks great.
What do you think about removing the word, "and" before the second link text (Authorization webhook)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @kbhawkey, Thanks for your suggestion
It seems good to me, I will update it soon.
Have you any suggestions other than that?
|
Hi @kbhawkey
Addressed the comments, PTAL! |
/lgtm |
LGTM label has been added. Git tree hash: 74a2edb70350d3d9536a2243bdf61ab7c046e0dd
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM too!
@Shubham82 you'll have to sign the CLA before we can merge this 🙂 |
Hi, @RinkiyaKeDad I have already signed the CLA. This EasyCLA is optional. |
HI @seokho-son @jihoon-seo |
/label tide/merge-method-squash |
Hi, @Shubham82 . |
Hi @kbhawkey
I don't think I need to authorize EasyCLA to merge this PR. It is an optional thing.
yes, I will squash it to a single commit. |
Improvement: Corrected the link for Authorization. Fix Typo
52ded0e
to
349be77
Compare
Hi @kbhawkey PTAL! |
@Shubham82 CLA signing is mandatory, not optional. |
Hi @tengqm |
/easycla |
kubernetes/org#3068 |
EasyCLA is in non-blocking mode to surface various issues between the old system and the new one, it's okay that it's reporting an error as long as its reported in the tracking thread (it is). |
/remove-label tide/merge-method-squash |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: RinkiyaKeDad, sftim The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This PR fixes the link of
Authorization
under the API Access Extensions in the Extending Kubernetes docs.Fixes: #30429