mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-19 09:52:49 +00:00
ClusterTrustBundles: make update
This commit is contained in:
parent
6a75e7c40c
commit
2e4b637bf8
983
api/openapi-spec/swagger.json
generated
983
api/openapi-spec/swagger.json
generated
File diff suppressed because it is too large
Load Diff
@ -8343,6 +8343,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -9073,6 +9078,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -774,6 +774,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1499,6 +1504,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -881,6 +881,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1606,6 +1611,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -1107,6 +1107,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1775,6 +1780,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -5336,6 +5336,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -6061,6 +6066,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -473,6 +473,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1141,6 +1146,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -1126,6 +1126,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1851,6 +1856,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -4510,6 +4510,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -5235,6 +5240,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -511,6 +511,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1179,6 +1184,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
2403
api/openapi-spec/v3/apis__certificates.k8s.io__v1alpha1_openapi.json
Normal file
2403
api/openapi-spec/v3/apis__certificates.k8s.io__v1alpha1_openapi.json
Normal file
File diff suppressed because it is too large
Load Diff
@ -400,6 +400,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1073,6 +1078,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -563,6 +563,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1231,6 +1236,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -522,6 +522,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1195,6 +1200,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -983,6 +983,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1651,6 +1656,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -987,6 +987,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1655,6 +1660,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -490,6 +490,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1158,6 +1163,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -1151,6 +1151,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1876,6 +1881,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -602,6 +602,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1270,6 +1275,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -463,6 +463,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1131,6 +1136,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -526,6 +526,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1251,6 +1256,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -783,6 +783,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1508,6 +1513,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -1017,6 +1017,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1685,6 +1690,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -376,6 +376,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1044,6 +1049,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -2215,6 +2215,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -2940,6 +2945,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
@ -402,6 +402,11 @@
|
|||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "DeleteOptions",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "DeleteOptions",
|
"kind": "DeleteOptions",
|
||||||
@ -1127,6 +1132,11 @@
|
|||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
"version": "v1"
|
"version": "v1"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"group": "certificates.k8s.io",
|
||||||
|
"kind": "WatchEvent",
|
||||||
|
"version": "v1alpha1"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"group": "certificates.k8s.io",
|
"group": "certificates.k8s.io",
|
||||||
"kind": "WatchEvent",
|
"kind": "WatchEvent",
|
||||||
|
141
pkg/apis/certificates/v1alpha1/zz_generated.conversion.go
generated
Normal file
141
pkg/apis/certificates/v1alpha1/zz_generated.conversion.go
generated
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
//go:build !ignore_autogenerated
|
||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by conversion-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
unsafe "unsafe"
|
||||||
|
|
||||||
|
v1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
|
conversion "k8s.io/apimachinery/pkg/conversion"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
certificates "k8s.io/kubernetes/pkg/apis/certificates"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
localSchemeBuilder.Register(RegisterConversions)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterConversions adds conversion functions to the given scheme.
|
||||||
|
// Public to allow building arbitrary schemes.
|
||||||
|
func RegisterConversions(s *runtime.Scheme) error {
|
||||||
|
if err := s.AddGeneratedConversionFunc((*v1alpha1.ClusterTrustBundle)(nil), (*certificates.ClusterTrustBundle)(nil), func(a, b interface{}, scope conversion.Scope) error {
|
||||||
|
return Convert_v1alpha1_ClusterTrustBundle_To_certificates_ClusterTrustBundle(a.(*v1alpha1.ClusterTrustBundle), b.(*certificates.ClusterTrustBundle), scope)
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := s.AddGeneratedConversionFunc((*certificates.ClusterTrustBundle)(nil), (*v1alpha1.ClusterTrustBundle)(nil), func(a, b interface{}, scope conversion.Scope) error {
|
||||||
|
return Convert_certificates_ClusterTrustBundle_To_v1alpha1_ClusterTrustBundle(a.(*certificates.ClusterTrustBundle), b.(*v1alpha1.ClusterTrustBundle), scope)
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := s.AddGeneratedConversionFunc((*v1alpha1.ClusterTrustBundleList)(nil), (*certificates.ClusterTrustBundleList)(nil), func(a, b interface{}, scope conversion.Scope) error {
|
||||||
|
return Convert_v1alpha1_ClusterTrustBundleList_To_certificates_ClusterTrustBundleList(a.(*v1alpha1.ClusterTrustBundleList), b.(*certificates.ClusterTrustBundleList), scope)
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := s.AddGeneratedConversionFunc((*certificates.ClusterTrustBundleList)(nil), (*v1alpha1.ClusterTrustBundleList)(nil), func(a, b interface{}, scope conversion.Scope) error {
|
||||||
|
return Convert_certificates_ClusterTrustBundleList_To_v1alpha1_ClusterTrustBundleList(a.(*certificates.ClusterTrustBundleList), b.(*v1alpha1.ClusterTrustBundleList), scope)
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := s.AddGeneratedConversionFunc((*v1alpha1.ClusterTrustBundleSpec)(nil), (*certificates.ClusterTrustBundleSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {
|
||||||
|
return Convert_v1alpha1_ClusterTrustBundleSpec_To_certificates_ClusterTrustBundleSpec(a.(*v1alpha1.ClusterTrustBundleSpec), b.(*certificates.ClusterTrustBundleSpec), scope)
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := s.AddGeneratedConversionFunc((*certificates.ClusterTrustBundleSpec)(nil), (*v1alpha1.ClusterTrustBundleSpec)(nil), func(a, b interface{}, scope conversion.Scope) error {
|
||||||
|
return Convert_certificates_ClusterTrustBundleSpec_To_v1alpha1_ClusterTrustBundleSpec(a.(*certificates.ClusterTrustBundleSpec), b.(*v1alpha1.ClusterTrustBundleSpec), scope)
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1alpha1_ClusterTrustBundle_To_certificates_ClusterTrustBundle(in *v1alpha1.ClusterTrustBundle, out *certificates.ClusterTrustBundle, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
if err := Convert_v1alpha1_ClusterTrustBundleSpec_To_certificates_ClusterTrustBundleSpec(&in.Spec, &out.Spec, s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1alpha1_ClusterTrustBundle_To_certificates_ClusterTrustBundle is an autogenerated conversion function.
|
||||||
|
func Convert_v1alpha1_ClusterTrustBundle_To_certificates_ClusterTrustBundle(in *v1alpha1.ClusterTrustBundle, out *certificates.ClusterTrustBundle, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1alpha1_ClusterTrustBundle_To_certificates_ClusterTrustBundle(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_certificates_ClusterTrustBundle_To_v1alpha1_ClusterTrustBundle(in *certificates.ClusterTrustBundle, out *v1alpha1.ClusterTrustBundle, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
if err := Convert_certificates_ClusterTrustBundleSpec_To_v1alpha1_ClusterTrustBundleSpec(&in.Spec, &out.Spec, s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_certificates_ClusterTrustBundle_To_v1alpha1_ClusterTrustBundle is an autogenerated conversion function.
|
||||||
|
func Convert_certificates_ClusterTrustBundle_To_v1alpha1_ClusterTrustBundle(in *certificates.ClusterTrustBundle, out *v1alpha1.ClusterTrustBundle, s conversion.Scope) error {
|
||||||
|
return autoConvert_certificates_ClusterTrustBundle_To_v1alpha1_ClusterTrustBundle(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1alpha1_ClusterTrustBundleList_To_certificates_ClusterTrustBundleList(in *v1alpha1.ClusterTrustBundleList, out *certificates.ClusterTrustBundleList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
out.Items = *(*[]certificates.ClusterTrustBundle)(unsafe.Pointer(&in.Items))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1alpha1_ClusterTrustBundleList_To_certificates_ClusterTrustBundleList is an autogenerated conversion function.
|
||||||
|
func Convert_v1alpha1_ClusterTrustBundleList_To_certificates_ClusterTrustBundleList(in *v1alpha1.ClusterTrustBundleList, out *certificates.ClusterTrustBundleList, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1alpha1_ClusterTrustBundleList_To_certificates_ClusterTrustBundleList(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_certificates_ClusterTrustBundleList_To_v1alpha1_ClusterTrustBundleList(in *certificates.ClusterTrustBundleList, out *v1alpha1.ClusterTrustBundleList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
out.Items = *(*[]v1alpha1.ClusterTrustBundle)(unsafe.Pointer(&in.Items))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_certificates_ClusterTrustBundleList_To_v1alpha1_ClusterTrustBundleList is an autogenerated conversion function.
|
||||||
|
func Convert_certificates_ClusterTrustBundleList_To_v1alpha1_ClusterTrustBundleList(in *certificates.ClusterTrustBundleList, out *v1alpha1.ClusterTrustBundleList, s conversion.Scope) error {
|
||||||
|
return autoConvert_certificates_ClusterTrustBundleList_To_v1alpha1_ClusterTrustBundleList(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1alpha1_ClusterTrustBundleSpec_To_certificates_ClusterTrustBundleSpec(in *v1alpha1.ClusterTrustBundleSpec, out *certificates.ClusterTrustBundleSpec, s conversion.Scope) error {
|
||||||
|
out.SignerName = in.SignerName
|
||||||
|
out.TrustBundle = in.TrustBundle
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1alpha1_ClusterTrustBundleSpec_To_certificates_ClusterTrustBundleSpec is an autogenerated conversion function.
|
||||||
|
func Convert_v1alpha1_ClusterTrustBundleSpec_To_certificates_ClusterTrustBundleSpec(in *v1alpha1.ClusterTrustBundleSpec, out *certificates.ClusterTrustBundleSpec, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1alpha1_ClusterTrustBundleSpec_To_certificates_ClusterTrustBundleSpec(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_certificates_ClusterTrustBundleSpec_To_v1alpha1_ClusterTrustBundleSpec(in *certificates.ClusterTrustBundleSpec, out *v1alpha1.ClusterTrustBundleSpec, s conversion.Scope) error {
|
||||||
|
out.SignerName = in.SignerName
|
||||||
|
out.TrustBundle = in.TrustBundle
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_certificates_ClusterTrustBundleSpec_To_v1alpha1_ClusterTrustBundleSpec is an autogenerated conversion function.
|
||||||
|
func Convert_certificates_ClusterTrustBundleSpec_To_v1alpha1_ClusterTrustBundleSpec(in *certificates.ClusterTrustBundleSpec, out *v1alpha1.ClusterTrustBundleSpec, s conversion.Scope) error {
|
||||||
|
return autoConvert_certificates_ClusterTrustBundleSpec_To_v1alpha1_ClusterTrustBundleSpec(in, out, s)
|
||||||
|
}
|
33
pkg/apis/certificates/v1alpha1/zz_generated.defaults.go
generated
Normal file
33
pkg/apis/certificates/v1alpha1/zz_generated.defaults.go
generated
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
//go:build !ignore_autogenerated
|
||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by defaulter-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
)
|
||||||
|
|
||||||
|
// RegisterDefaults adds defaulters functions to the given scheme.
|
||||||
|
// Public to allow building arbitrary schemes.
|
||||||
|
// All generated defaulters are covering - they call all nested defaulters.
|
||||||
|
func RegisterDefaults(scheme *runtime.Scheme) error {
|
||||||
|
return nil
|
||||||
|
}
|
76
pkg/apis/certificates/zz_generated.deepcopy.go
generated
76
pkg/apis/certificates/zz_generated.deepcopy.go
generated
@ -183,6 +183,82 @@ func (in *CertificateSigningRequestStatus) DeepCopy() *CertificateSigningRequest
|
|||||||
return out
|
return out
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ClusterTrustBundle) DeepCopyInto(out *ClusterTrustBundle) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
||||||
|
out.Spec = in.Spec
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterTrustBundle.
|
||||||
|
func (in *ClusterTrustBundle) DeepCopy() *ClusterTrustBundle {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ClusterTrustBundle)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ClusterTrustBundle) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ClusterTrustBundleList) DeepCopyInto(out *ClusterTrustBundleList) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]ClusterTrustBundle, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterTrustBundleList.
|
||||||
|
func (in *ClusterTrustBundleList) DeepCopy() *ClusterTrustBundleList {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ClusterTrustBundleList)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ClusterTrustBundleList) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ClusterTrustBundleSpec) DeepCopyInto(out *ClusterTrustBundleSpec) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterTrustBundleSpec.
|
||||||
|
func (in *ClusterTrustBundleSpec) DeepCopy() *ClusterTrustBundleSpec {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ClusterTrustBundleSpec)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
func (in ExtraValue) DeepCopyInto(out *ExtraValue) {
|
func (in ExtraValue) DeepCopyInto(out *ExtraValue) {
|
||||||
{
|
{
|
||||||
|
127
pkg/generated/openapi/zz_generated.openapi.go
generated
127
pkg/generated/openapi/zz_generated.openapi.go
generated
@ -322,6 +322,9 @@ func GetOpenAPIDefinitions(ref common.ReferenceCallback) map[string]common.OpenA
|
|||||||
"k8s.io/api/certificates/v1.CertificateSigningRequestList": schema_k8sio_api_certificates_v1_CertificateSigningRequestList(ref),
|
"k8s.io/api/certificates/v1.CertificateSigningRequestList": schema_k8sio_api_certificates_v1_CertificateSigningRequestList(ref),
|
||||||
"k8s.io/api/certificates/v1.CertificateSigningRequestSpec": schema_k8sio_api_certificates_v1_CertificateSigningRequestSpec(ref),
|
"k8s.io/api/certificates/v1.CertificateSigningRequestSpec": schema_k8sio_api_certificates_v1_CertificateSigningRequestSpec(ref),
|
||||||
"k8s.io/api/certificates/v1.CertificateSigningRequestStatus": schema_k8sio_api_certificates_v1_CertificateSigningRequestStatus(ref),
|
"k8s.io/api/certificates/v1.CertificateSigningRequestStatus": schema_k8sio_api_certificates_v1_CertificateSigningRequestStatus(ref),
|
||||||
|
"k8s.io/api/certificates/v1alpha1.ClusterTrustBundle": schema_k8sio_api_certificates_v1alpha1_ClusterTrustBundle(ref),
|
||||||
|
"k8s.io/api/certificates/v1alpha1.ClusterTrustBundleList": schema_k8sio_api_certificates_v1alpha1_ClusterTrustBundleList(ref),
|
||||||
|
"k8s.io/api/certificates/v1alpha1.ClusterTrustBundleSpec": schema_k8sio_api_certificates_v1alpha1_ClusterTrustBundleSpec(ref),
|
||||||
"k8s.io/api/certificates/v1beta1.CertificateSigningRequest": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequest(ref),
|
"k8s.io/api/certificates/v1beta1.CertificateSigningRequest": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequest(ref),
|
||||||
"k8s.io/api/certificates/v1beta1.CertificateSigningRequestCondition": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestCondition(ref),
|
"k8s.io/api/certificates/v1beta1.CertificateSigningRequestCondition": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestCondition(ref),
|
||||||
"k8s.io/api/certificates/v1beta1.CertificateSigningRequestList": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestList(ref),
|
"k8s.io/api/certificates/v1beta1.CertificateSigningRequestList": schema_k8sio_api_certificates_v1beta1_CertificateSigningRequestList(ref),
|
||||||
@ -15516,6 +15519,130 @@ func schema_k8sio_api_certificates_v1_CertificateSigningRequestStatus(ref common
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func schema_k8sio_api_certificates_v1alpha1_ClusterTrustBundle(ref common.ReferenceCallback) common.OpenAPIDefinition {
|
||||||
|
return common.OpenAPIDefinition{
|
||||||
|
Schema: spec.Schema{
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates).\n\nClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the `clusterTrustBundle` projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to.\n\nIt can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.",
|
||||||
|
Type: []string{"object"},
|
||||||
|
Properties: map[string]spec.Schema{
|
||||||
|
"kind": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds",
|
||||||
|
Type: []string{"string"},
|
||||||
|
Format: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"apiVersion": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources",
|
||||||
|
Type: []string{"string"},
|
||||||
|
Format: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"metadata": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "metadata contains the object metadata.",
|
||||||
|
Default: map[string]interface{}{},
|
||||||
|
Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"spec": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "spec contains the signer (if any) and trust anchors.",
|
||||||
|
Default: map[string]interface{}{},
|
||||||
|
Ref: ref("k8s.io/api/certificates/v1alpha1.ClusterTrustBundleSpec"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Required: []string{"spec"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Dependencies: []string{
|
||||||
|
"k8s.io/api/certificates/v1alpha1.ClusterTrustBundleSpec", "k8s.io/apimachinery/pkg/apis/meta/v1.ObjectMeta"},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func schema_k8sio_api_certificates_v1alpha1_ClusterTrustBundleList(ref common.ReferenceCallback) common.OpenAPIDefinition {
|
||||||
|
return common.OpenAPIDefinition{
|
||||||
|
Schema: spec.Schema{
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "ClusterTrustBundleList is a collection of ClusterTrustBundle objects",
|
||||||
|
Type: []string{"object"},
|
||||||
|
Properties: map[string]spec.Schema{
|
||||||
|
"kind": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds",
|
||||||
|
Type: []string{"string"},
|
||||||
|
Format: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"apiVersion": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources",
|
||||||
|
Type: []string{"string"},
|
||||||
|
Format: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"metadata": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "metadata contains the list metadata.",
|
||||||
|
Default: map[string]interface{}{},
|
||||||
|
Ref: ref("k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"items": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "items is a collection of ClusterTrustBundle objects",
|
||||||
|
Type: []string{"array"},
|
||||||
|
Items: &spec.SchemaOrArray{
|
||||||
|
Schema: &spec.Schema{
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Default: map[string]interface{}{},
|
||||||
|
Ref: ref("k8s.io/api/certificates/v1alpha1.ClusterTrustBundle"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Required: []string{"items"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Dependencies: []string{
|
||||||
|
"k8s.io/api/certificates/v1alpha1.ClusterTrustBundle", "k8s.io/apimachinery/pkg/apis/meta/v1.ListMeta"},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func schema_k8sio_api_certificates_v1alpha1_ClusterTrustBundleSpec(ref common.ReferenceCallback) common.OpenAPIDefinition {
|
||||||
|
return common.OpenAPIDefinition{
|
||||||
|
Schema: spec.Schema{
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "ClusterTrustBundleSpec contains the signer and trust anchors.",
|
||||||
|
Type: []string{"object"},
|
||||||
|
Properties: map[string]spec.Schema{
|
||||||
|
"signerName": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "signerName indicates the associated signer, if any.\n\nIn order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.\n\nIf signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.\n\nIf signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.\n\nList/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.",
|
||||||
|
Type: []string{"string"},
|
||||||
|
Format: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"trustBundle": {
|
||||||
|
SchemaProps: spec.SchemaProps{
|
||||||
|
Description: "trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.\n\nThe data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.\n\nUsers of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.",
|
||||||
|
Default: "",
|
||||||
|
Type: []string{"string"},
|
||||||
|
Format: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Required: []string{"trustBundle"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func schema_k8sio_api_certificates_v1beta1_CertificateSigningRequest(ref common.ReferenceCallback) common.OpenAPIDefinition {
|
func schema_k8sio_api_certificates_v1beta1_CertificateSigningRequest(ref common.ReferenceCallback) common.OpenAPIDefinition {
|
||||||
return common.OpenAPIDefinition{
|
return common.OpenAPIDefinition{
|
||||||
Schema: spec.Schema{
|
Schema: spec.Schema{
|
||||||
|
831
staging/src/k8s.io/api/certificates/v1alpha1/generated.pb.go
generated
Normal file
831
staging/src/k8s.io/api/certificates/v1alpha1/generated.pb.go
generated
Normal file
@ -0,0 +1,831 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by protoc-gen-gogo. DO NOT EDIT.
|
||||||
|
// source: k8s.io/kubernetes/vendor/k8s.io/api/certificates/v1alpha1/generated.proto
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
fmt "fmt"
|
||||||
|
|
||||||
|
io "io"
|
||||||
|
|
||||||
|
proto "github.com/gogo/protobuf/proto"
|
||||||
|
|
||||||
|
math "math"
|
||||||
|
math_bits "math/bits"
|
||||||
|
reflect "reflect"
|
||||||
|
strings "strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Reference imports to suppress errors if they are not otherwise used.
|
||||||
|
var _ = proto.Marshal
|
||||||
|
var _ = fmt.Errorf
|
||||||
|
var _ = math.Inf
|
||||||
|
|
||||||
|
// This is a compile-time assertion to ensure that this generated file
|
||||||
|
// is compatible with the proto package it is being compiled against.
|
||||||
|
// A compilation error at this line likely means your copy of the
|
||||||
|
// proto package needs to be updated.
|
||||||
|
const _ = proto.GoGoProtoPackageIsVersion3 // please upgrade the proto package
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundle) Reset() { *m = ClusterTrustBundle{} }
|
||||||
|
func (*ClusterTrustBundle) ProtoMessage() {}
|
||||||
|
func (*ClusterTrustBundle) Descriptor() ([]byte, []int) {
|
||||||
|
return fileDescriptor_8915b0d419f9eda6, []int{0}
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundle) XXX_Unmarshal(b []byte) error {
|
||||||
|
return m.Unmarshal(b)
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundle) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||||
|
b = b[:cap(b)]
|
||||||
|
n, err := m.MarshalToSizedBuffer(b)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return b[:n], nil
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundle) XXX_Merge(src proto.Message) {
|
||||||
|
xxx_messageInfo_ClusterTrustBundle.Merge(m, src)
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundle) XXX_Size() int {
|
||||||
|
return m.Size()
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundle) XXX_DiscardUnknown() {
|
||||||
|
xxx_messageInfo_ClusterTrustBundle.DiscardUnknown(m)
|
||||||
|
}
|
||||||
|
|
||||||
|
var xxx_messageInfo_ClusterTrustBundle proto.InternalMessageInfo
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleList) Reset() { *m = ClusterTrustBundleList{} }
|
||||||
|
func (*ClusterTrustBundleList) ProtoMessage() {}
|
||||||
|
func (*ClusterTrustBundleList) Descriptor() ([]byte, []int) {
|
||||||
|
return fileDescriptor_8915b0d419f9eda6, []int{1}
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleList) XXX_Unmarshal(b []byte) error {
|
||||||
|
return m.Unmarshal(b)
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleList) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||||
|
b = b[:cap(b)]
|
||||||
|
n, err := m.MarshalToSizedBuffer(b)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return b[:n], nil
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleList) XXX_Merge(src proto.Message) {
|
||||||
|
xxx_messageInfo_ClusterTrustBundleList.Merge(m, src)
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleList) XXX_Size() int {
|
||||||
|
return m.Size()
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleList) XXX_DiscardUnknown() {
|
||||||
|
xxx_messageInfo_ClusterTrustBundleList.DiscardUnknown(m)
|
||||||
|
}
|
||||||
|
|
||||||
|
var xxx_messageInfo_ClusterTrustBundleList proto.InternalMessageInfo
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleSpec) Reset() { *m = ClusterTrustBundleSpec{} }
|
||||||
|
func (*ClusterTrustBundleSpec) ProtoMessage() {}
|
||||||
|
func (*ClusterTrustBundleSpec) Descriptor() ([]byte, []int) {
|
||||||
|
return fileDescriptor_8915b0d419f9eda6, []int{2}
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleSpec) XXX_Unmarshal(b []byte) error {
|
||||||
|
return m.Unmarshal(b)
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleSpec) XXX_Marshal(b []byte, deterministic bool) ([]byte, error) {
|
||||||
|
b = b[:cap(b)]
|
||||||
|
n, err := m.MarshalToSizedBuffer(b)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return b[:n], nil
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleSpec) XXX_Merge(src proto.Message) {
|
||||||
|
xxx_messageInfo_ClusterTrustBundleSpec.Merge(m, src)
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleSpec) XXX_Size() int {
|
||||||
|
return m.Size()
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleSpec) XXX_DiscardUnknown() {
|
||||||
|
xxx_messageInfo_ClusterTrustBundleSpec.DiscardUnknown(m)
|
||||||
|
}
|
||||||
|
|
||||||
|
var xxx_messageInfo_ClusterTrustBundleSpec proto.InternalMessageInfo
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
proto.RegisterType((*ClusterTrustBundle)(nil), "k8s.io.api.certificates.v1alpha1.ClusterTrustBundle")
|
||||||
|
proto.RegisterType((*ClusterTrustBundleList)(nil), "k8s.io.api.certificates.v1alpha1.ClusterTrustBundleList")
|
||||||
|
proto.RegisterType((*ClusterTrustBundleSpec)(nil), "k8s.io.api.certificates.v1alpha1.ClusterTrustBundleSpec")
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
proto.RegisterFile("k8s.io/kubernetes/vendor/k8s.io/api/certificates/v1alpha1/generated.proto", fileDescriptor_8915b0d419f9eda6)
|
||||||
|
}
|
||||||
|
|
||||||
|
var fileDescriptor_8915b0d419f9eda6 = []byte{
|
||||||
|
// 448 bytes of a gzipped FileDescriptorProto
|
||||||
|
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x9c, 0x93, 0xcf, 0x6b, 0x13, 0x41,
|
||||||
|
0x14, 0xc7, 0x77, 0x6a, 0x0b, 0xed, 0x44, 0x41, 0x56, 0x90, 0x90, 0xc3, 0x34, 0xe4, 0xd4, 0x8b,
|
||||||
|
0x33, 0x26, 0x54, 0xe9, 0x79, 0x05, 0xa1, 0xe0, 0x0f, 0xd8, 0x7a, 0xb1, 0x78, 0x70, 0x32, 0x79,
|
||||||
|
0xdd, 0x8c, 0xc9, 0xee, 0x0e, 0x33, 0xb3, 0x01, 0x6f, 0x82, 0xff, 0x80, 0x7f, 0x56, 0x8e, 0xd5,
|
||||||
|
0x53, 0x4f, 0xc5, 0xac, 0xff, 0x88, 0xcc, 0x64, 0x93, 0x5d, 0x5c, 0x25, 0xd2, 0xdb, 0xbe, 0x1f,
|
||||||
|
0x9f, 0xef, 0x7b, 0xdf, 0xb7, 0x0c, 0x3e, 0x9f, 0x9d, 0x19, 0x2a, 0x73, 0x36, 0x2b, 0xc6, 0xa0,
|
||||||
|
0x33, 0xb0, 0x60, 0xd8, 0x02, 0xb2, 0x49, 0xae, 0x59, 0x55, 0xe0, 0x4a, 0x32, 0x01, 0xda, 0xca,
|
||||||
|
0x2b, 0x29, 0xb8, 0x2f, 0x0f, 0xf9, 0x5c, 0x4d, 0xf9, 0x90, 0x25, 0x90, 0x81, 0xe6, 0x16, 0x26,
|
||||||
|
0x54, 0xe9, 0xdc, 0xe6, 0x61, 0x7f, 0x4d, 0x50, 0xae, 0x24, 0x6d, 0x12, 0x74, 0x43, 0xf4, 0x9e,
|
||||||
|
0x24, 0xd2, 0x4e, 0x8b, 0x31, 0x15, 0x79, 0xca, 0x92, 0x3c, 0xc9, 0x99, 0x07, 0xc7, 0xc5, 0x95,
|
||||||
|
0x8f, 0x7c, 0xe0, 0xbf, 0xd6, 0x82, 0xbd, 0xd3, 0x7a, 0x85, 0x94, 0x8b, 0xa9, 0xcc, 0x40, 0x7f,
|
||||||
|
0x66, 0x6a, 0x96, 0xb8, 0x84, 0x61, 0x29, 0x58, 0xce, 0x16, 0xad, 0x35, 0x7a, 0xec, 0x5f, 0x94,
|
||||||
|
0x2e, 0x32, 0x2b, 0x53, 0x68, 0x01, 0xcf, 0x77, 0x01, 0x46, 0x4c, 0x21, 0xe5, 0x7f, 0x72, 0x83,
|
||||||
|
0x1f, 0x08, 0x87, 0x2f, 0xe6, 0x85, 0xb1, 0xa0, 0xdf, 0xe9, 0xc2, 0xd8, 0xa8, 0xc8, 0x26, 0x73,
|
||||||
|
0x08, 0x3f, 0xe2, 0x43, 0xb7, 0xda, 0x84, 0x5b, 0xde, 0x45, 0x7d, 0x74, 0xd2, 0x19, 0x3d, 0xa5,
|
||||||
|
0xf5, 0x65, 0xb6, 0x13, 0xa8, 0x9a, 0x25, 0x2e, 0x61, 0xa8, 0xeb, 0xa6, 0x8b, 0x21, 0x7d, 0x3b,
|
||||||
|
0xfe, 0x04, 0xc2, 0xbe, 0x06, 0xcb, 0xa3, 0x70, 0x79, 0x7b, 0x1c, 0x94, 0xb7, 0xc7, 0xb8, 0xce,
|
||||||
|
0xc5, 0x5b, 0xd5, 0xf0, 0x12, 0xef, 0x1b, 0x05, 0xa2, 0xbb, 0xe7, 0xd5, 0xcf, 0xe8, 0xae, 0xbb,
|
||||||
|
0xd3, 0xf6, 0x96, 0x17, 0x0a, 0x44, 0x74, 0xbf, 0x9a, 0xb2, 0xef, 0xa2, 0xd8, 0x6b, 0x0e, 0xbe,
|
||||||
|
0x23, 0xfc, 0xb8, 0xdd, 0xfe, 0x4a, 0x1a, 0x1b, 0x7e, 0x68, 0x19, 0xa3, 0xff, 0x67, 0xcc, 0xd1,
|
||||||
|
0xde, 0xd6, 0xc3, 0x6a, 0xe0, 0xe1, 0x26, 0xd3, 0x30, 0xf5, 0x1e, 0x1f, 0x48, 0x0b, 0xa9, 0xe9,
|
||||||
|
0xee, 0xf5, 0xef, 0x9d, 0x74, 0x46, 0xa7, 0x77, 0x71, 0x15, 0x3d, 0xa8, 0x06, 0x1c, 0x9c, 0x3b,
|
||||||
|
0xa9, 0x78, 0xad, 0x38, 0xf8, 0xfa, 0x57, 0x4f, 0xce, 0x74, 0x38, 0xc2, 0xd8, 0xc8, 0x24, 0x03,
|
||||||
|
0xfd, 0x86, 0xa7, 0xe0, 0x5d, 0x1d, 0xd5, 0xc7, 0xbf, 0xd8, 0x56, 0xe2, 0x46, 0x57, 0xf8, 0x0c,
|
||||||
|
0x77, 0x6c, 0x2d, 0xe3, 0xff, 0xc2, 0x51, 0xf4, 0xa8, 0x82, 0x3a, 0x8d, 0x09, 0x71, 0xb3, 0x2f,
|
||||||
|
0x7a, 0xb9, 0x5c, 0x91, 0xe0, 0x7a, 0x45, 0x82, 0x9b, 0x15, 0x09, 0xbe, 0x94, 0x04, 0x2d, 0x4b,
|
||||||
|
0x82, 0xae, 0x4b, 0x82, 0x6e, 0x4a, 0x82, 0x7e, 0x96, 0x04, 0x7d, 0xfb, 0x45, 0x82, 0xcb, 0xfe,
|
||||||
|
0xae, 0x67, 0xf7, 0x3b, 0x00, 0x00, 0xff, 0xff, 0x05, 0xe9, 0xaa, 0x07, 0xb2, 0x03, 0x00, 0x00,
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundle) Marshal() (dAtA []byte, err error) {
|
||||||
|
size := m.Size()
|
||||||
|
dAtA = make([]byte, size)
|
||||||
|
n, err := m.MarshalToSizedBuffer(dAtA[:size])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return dAtA[:n], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundle) MarshalTo(dAtA []byte) (int, error) {
|
||||||
|
size := m.Size()
|
||||||
|
return m.MarshalToSizedBuffer(dAtA[:size])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundle) MarshalToSizedBuffer(dAtA []byte) (int, error) {
|
||||||
|
i := len(dAtA)
|
||||||
|
_ = i
|
||||||
|
var l int
|
||||||
|
_ = l
|
||||||
|
{
|
||||||
|
size, err := m.Spec.MarshalToSizedBuffer(dAtA[:i])
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
i -= size
|
||||||
|
i = encodeVarintGenerated(dAtA, i, uint64(size))
|
||||||
|
}
|
||||||
|
i--
|
||||||
|
dAtA[i] = 0x12
|
||||||
|
{
|
||||||
|
size, err := m.ObjectMeta.MarshalToSizedBuffer(dAtA[:i])
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
i -= size
|
||||||
|
i = encodeVarintGenerated(dAtA, i, uint64(size))
|
||||||
|
}
|
||||||
|
i--
|
||||||
|
dAtA[i] = 0xa
|
||||||
|
return len(dAtA) - i, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleList) Marshal() (dAtA []byte, err error) {
|
||||||
|
size := m.Size()
|
||||||
|
dAtA = make([]byte, size)
|
||||||
|
n, err := m.MarshalToSizedBuffer(dAtA[:size])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return dAtA[:n], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleList) MarshalTo(dAtA []byte) (int, error) {
|
||||||
|
size := m.Size()
|
||||||
|
return m.MarshalToSizedBuffer(dAtA[:size])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleList) MarshalToSizedBuffer(dAtA []byte) (int, error) {
|
||||||
|
i := len(dAtA)
|
||||||
|
_ = i
|
||||||
|
var l int
|
||||||
|
_ = l
|
||||||
|
if len(m.Items) > 0 {
|
||||||
|
for iNdEx := len(m.Items) - 1; iNdEx >= 0; iNdEx-- {
|
||||||
|
{
|
||||||
|
size, err := m.Items[iNdEx].MarshalToSizedBuffer(dAtA[:i])
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
i -= size
|
||||||
|
i = encodeVarintGenerated(dAtA, i, uint64(size))
|
||||||
|
}
|
||||||
|
i--
|
||||||
|
dAtA[i] = 0x12
|
||||||
|
}
|
||||||
|
}
|
||||||
|
{
|
||||||
|
size, err := m.ListMeta.MarshalToSizedBuffer(dAtA[:i])
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
i -= size
|
||||||
|
i = encodeVarintGenerated(dAtA, i, uint64(size))
|
||||||
|
}
|
||||||
|
i--
|
||||||
|
dAtA[i] = 0xa
|
||||||
|
return len(dAtA) - i, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleSpec) Marshal() (dAtA []byte, err error) {
|
||||||
|
size := m.Size()
|
||||||
|
dAtA = make([]byte, size)
|
||||||
|
n, err := m.MarshalToSizedBuffer(dAtA[:size])
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return dAtA[:n], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleSpec) MarshalTo(dAtA []byte) (int, error) {
|
||||||
|
size := m.Size()
|
||||||
|
return m.MarshalToSizedBuffer(dAtA[:size])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleSpec) MarshalToSizedBuffer(dAtA []byte) (int, error) {
|
||||||
|
i := len(dAtA)
|
||||||
|
_ = i
|
||||||
|
var l int
|
||||||
|
_ = l
|
||||||
|
i -= len(m.TrustBundle)
|
||||||
|
copy(dAtA[i:], m.TrustBundle)
|
||||||
|
i = encodeVarintGenerated(dAtA, i, uint64(len(m.TrustBundle)))
|
||||||
|
i--
|
||||||
|
dAtA[i] = 0x12
|
||||||
|
i -= len(m.SignerName)
|
||||||
|
copy(dAtA[i:], m.SignerName)
|
||||||
|
i = encodeVarintGenerated(dAtA, i, uint64(len(m.SignerName)))
|
||||||
|
i--
|
||||||
|
dAtA[i] = 0xa
|
||||||
|
return len(dAtA) - i, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func encodeVarintGenerated(dAtA []byte, offset int, v uint64) int {
|
||||||
|
offset -= sovGenerated(v)
|
||||||
|
base := offset
|
||||||
|
for v >= 1<<7 {
|
||||||
|
dAtA[offset] = uint8(v&0x7f | 0x80)
|
||||||
|
v >>= 7
|
||||||
|
offset++
|
||||||
|
}
|
||||||
|
dAtA[offset] = uint8(v)
|
||||||
|
return base
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundle) Size() (n int) {
|
||||||
|
if m == nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
var l int
|
||||||
|
_ = l
|
||||||
|
l = m.ObjectMeta.Size()
|
||||||
|
n += 1 + l + sovGenerated(uint64(l))
|
||||||
|
l = m.Spec.Size()
|
||||||
|
n += 1 + l + sovGenerated(uint64(l))
|
||||||
|
return n
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleList) Size() (n int) {
|
||||||
|
if m == nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
var l int
|
||||||
|
_ = l
|
||||||
|
l = m.ListMeta.Size()
|
||||||
|
n += 1 + l + sovGenerated(uint64(l))
|
||||||
|
if len(m.Items) > 0 {
|
||||||
|
for _, e := range m.Items {
|
||||||
|
l = e.Size()
|
||||||
|
n += 1 + l + sovGenerated(uint64(l))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return n
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *ClusterTrustBundleSpec) Size() (n int) {
|
||||||
|
if m == nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
var l int
|
||||||
|
_ = l
|
||||||
|
l = len(m.SignerName)
|
||||||
|
n += 1 + l + sovGenerated(uint64(l))
|
||||||
|
l = len(m.TrustBundle)
|
||||||
|
n += 1 + l + sovGenerated(uint64(l))
|
||||||
|
return n
|
||||||
|
}
|
||||||
|
|
||||||
|
func sovGenerated(x uint64) (n int) {
|
||||||
|
return (math_bits.Len64(x|1) + 6) / 7
|
||||||
|
}
|
||||||
|
func sozGenerated(x uint64) (n int) {
|
||||||
|
return sovGenerated(uint64((x << 1) ^ uint64((int64(x) >> 63))))
|
||||||
|
}
|
||||||
|
func (this *ClusterTrustBundle) String() string {
|
||||||
|
if this == nil {
|
||||||
|
return "nil"
|
||||||
|
}
|
||||||
|
s := strings.Join([]string{`&ClusterTrustBundle{`,
|
||||||
|
`ObjectMeta:` + strings.Replace(strings.Replace(fmt.Sprintf("%v", this.ObjectMeta), "ObjectMeta", "v1.ObjectMeta", 1), `&`, ``, 1) + `,`,
|
||||||
|
`Spec:` + strings.Replace(strings.Replace(this.Spec.String(), "ClusterTrustBundleSpec", "ClusterTrustBundleSpec", 1), `&`, ``, 1) + `,`,
|
||||||
|
`}`,
|
||||||
|
}, "")
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
func (this *ClusterTrustBundleList) String() string {
|
||||||
|
if this == nil {
|
||||||
|
return "nil"
|
||||||
|
}
|
||||||
|
repeatedStringForItems := "[]ClusterTrustBundle{"
|
||||||
|
for _, f := range this.Items {
|
||||||
|
repeatedStringForItems += strings.Replace(strings.Replace(f.String(), "ClusterTrustBundle", "ClusterTrustBundle", 1), `&`, ``, 1) + ","
|
||||||
|
}
|
||||||
|
repeatedStringForItems += "}"
|
||||||
|
s := strings.Join([]string{`&ClusterTrustBundleList{`,
|
||||||
|
`ListMeta:` + strings.Replace(strings.Replace(fmt.Sprintf("%v", this.ListMeta), "ListMeta", "v1.ListMeta", 1), `&`, ``, 1) + `,`,
|
||||||
|
`Items:` + repeatedStringForItems + `,`,
|
||||||
|
`}`,
|
||||||
|
}, "")
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
func (this *ClusterTrustBundleSpec) String() string {
|
||||||
|
if this == nil {
|
||||||
|
return "nil"
|
||||||
|
}
|
||||||
|
s := strings.Join([]string{`&ClusterTrustBundleSpec{`,
|
||||||
|
`SignerName:` + fmt.Sprintf("%v", this.SignerName) + `,`,
|
||||||
|
`TrustBundle:` + fmt.Sprintf("%v", this.TrustBundle) + `,`,
|
||||||
|
`}`,
|
||||||
|
}, "")
|
||||||
|
return s
|
||||||
|
}
|
||||||
|
func valueToStringGenerated(v interface{}) string {
|
||||||
|
rv := reflect.ValueOf(v)
|
||||||
|
if rv.IsNil() {
|
||||||
|
return "nil"
|
||||||
|
}
|
||||||
|
pv := reflect.Indirect(rv).Interface()
|
||||||
|
return fmt.Sprintf("*%v", pv)
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundle) Unmarshal(dAtA []byte) error {
|
||||||
|
l := len(dAtA)
|
||||||
|
iNdEx := 0
|
||||||
|
for iNdEx < l {
|
||||||
|
preIndex := iNdEx
|
||||||
|
var wire uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
wire |= uint64(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
fieldNum := int32(wire >> 3)
|
||||||
|
wireType := int(wire & 0x7)
|
||||||
|
if wireType == 4 {
|
||||||
|
return fmt.Errorf("proto: ClusterTrustBundle: wiretype end group for non-group")
|
||||||
|
}
|
||||||
|
if fieldNum <= 0 {
|
||||||
|
return fmt.Errorf("proto: ClusterTrustBundle: illegal tag %d (wire type %d)", fieldNum, wire)
|
||||||
|
}
|
||||||
|
switch fieldNum {
|
||||||
|
case 1:
|
||||||
|
if wireType != 2 {
|
||||||
|
return fmt.Errorf("proto: wrong wireType = %d for field ObjectMeta", wireType)
|
||||||
|
}
|
||||||
|
var msglen int
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
msglen |= int(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if msglen < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
postIndex := iNdEx + msglen
|
||||||
|
if postIndex < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if postIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
if err := m.ObjectMeta.Unmarshal(dAtA[iNdEx:postIndex]); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
iNdEx = postIndex
|
||||||
|
case 2:
|
||||||
|
if wireType != 2 {
|
||||||
|
return fmt.Errorf("proto: wrong wireType = %d for field Spec", wireType)
|
||||||
|
}
|
||||||
|
var msglen int
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
msglen |= int(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if msglen < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
postIndex := iNdEx + msglen
|
||||||
|
if postIndex < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if postIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
if err := m.Spec.Unmarshal(dAtA[iNdEx:postIndex]); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
iNdEx = postIndex
|
||||||
|
default:
|
||||||
|
iNdEx = preIndex
|
||||||
|
skippy, err := skipGenerated(dAtA[iNdEx:])
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if (skippy < 0) || (iNdEx+skippy) < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if (iNdEx + skippy) > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
iNdEx += skippy
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if iNdEx > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleList) Unmarshal(dAtA []byte) error {
|
||||||
|
l := len(dAtA)
|
||||||
|
iNdEx := 0
|
||||||
|
for iNdEx < l {
|
||||||
|
preIndex := iNdEx
|
||||||
|
var wire uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
wire |= uint64(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
fieldNum := int32(wire >> 3)
|
||||||
|
wireType := int(wire & 0x7)
|
||||||
|
if wireType == 4 {
|
||||||
|
return fmt.Errorf("proto: ClusterTrustBundleList: wiretype end group for non-group")
|
||||||
|
}
|
||||||
|
if fieldNum <= 0 {
|
||||||
|
return fmt.Errorf("proto: ClusterTrustBundleList: illegal tag %d (wire type %d)", fieldNum, wire)
|
||||||
|
}
|
||||||
|
switch fieldNum {
|
||||||
|
case 1:
|
||||||
|
if wireType != 2 {
|
||||||
|
return fmt.Errorf("proto: wrong wireType = %d for field ListMeta", wireType)
|
||||||
|
}
|
||||||
|
var msglen int
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
msglen |= int(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if msglen < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
postIndex := iNdEx + msglen
|
||||||
|
if postIndex < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if postIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
if err := m.ListMeta.Unmarshal(dAtA[iNdEx:postIndex]); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
iNdEx = postIndex
|
||||||
|
case 2:
|
||||||
|
if wireType != 2 {
|
||||||
|
return fmt.Errorf("proto: wrong wireType = %d for field Items", wireType)
|
||||||
|
}
|
||||||
|
var msglen int
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
msglen |= int(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if msglen < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
postIndex := iNdEx + msglen
|
||||||
|
if postIndex < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if postIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
m.Items = append(m.Items, ClusterTrustBundle{})
|
||||||
|
if err := m.Items[len(m.Items)-1].Unmarshal(dAtA[iNdEx:postIndex]); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
iNdEx = postIndex
|
||||||
|
default:
|
||||||
|
iNdEx = preIndex
|
||||||
|
skippy, err := skipGenerated(dAtA[iNdEx:])
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if (skippy < 0) || (iNdEx+skippy) < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if (iNdEx + skippy) > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
iNdEx += skippy
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if iNdEx > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
func (m *ClusterTrustBundleSpec) Unmarshal(dAtA []byte) error {
|
||||||
|
l := len(dAtA)
|
||||||
|
iNdEx := 0
|
||||||
|
for iNdEx < l {
|
||||||
|
preIndex := iNdEx
|
||||||
|
var wire uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
wire |= uint64(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
fieldNum := int32(wire >> 3)
|
||||||
|
wireType := int(wire & 0x7)
|
||||||
|
if wireType == 4 {
|
||||||
|
return fmt.Errorf("proto: ClusterTrustBundleSpec: wiretype end group for non-group")
|
||||||
|
}
|
||||||
|
if fieldNum <= 0 {
|
||||||
|
return fmt.Errorf("proto: ClusterTrustBundleSpec: illegal tag %d (wire type %d)", fieldNum, wire)
|
||||||
|
}
|
||||||
|
switch fieldNum {
|
||||||
|
case 1:
|
||||||
|
if wireType != 2 {
|
||||||
|
return fmt.Errorf("proto: wrong wireType = %d for field SignerName", wireType)
|
||||||
|
}
|
||||||
|
var stringLen uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
stringLen |= uint64(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
intStringLen := int(stringLen)
|
||||||
|
if intStringLen < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
postIndex := iNdEx + intStringLen
|
||||||
|
if postIndex < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if postIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
m.SignerName = string(dAtA[iNdEx:postIndex])
|
||||||
|
iNdEx = postIndex
|
||||||
|
case 2:
|
||||||
|
if wireType != 2 {
|
||||||
|
return fmt.Errorf("proto: wrong wireType = %d for field TrustBundle", wireType)
|
||||||
|
}
|
||||||
|
var stringLen uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
stringLen |= uint64(b&0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
intStringLen := int(stringLen)
|
||||||
|
if intStringLen < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
postIndex := iNdEx + intStringLen
|
||||||
|
if postIndex < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if postIndex > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
m.TrustBundle = string(dAtA[iNdEx:postIndex])
|
||||||
|
iNdEx = postIndex
|
||||||
|
default:
|
||||||
|
iNdEx = preIndex
|
||||||
|
skippy, err := skipGenerated(dAtA[iNdEx:])
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if (skippy < 0) || (iNdEx+skippy) < 0 {
|
||||||
|
return ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if (iNdEx + skippy) > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
iNdEx += skippy
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if iNdEx > l {
|
||||||
|
return io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
func skipGenerated(dAtA []byte) (n int, err error) {
|
||||||
|
l := len(dAtA)
|
||||||
|
iNdEx := 0
|
||||||
|
depth := 0
|
||||||
|
for iNdEx < l {
|
||||||
|
var wire uint64
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return 0, ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return 0, io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
wire |= (uint64(b) & 0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
wireType := int(wire & 0x7)
|
||||||
|
switch wireType {
|
||||||
|
case 0:
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return 0, ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return 0, io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
iNdEx++
|
||||||
|
if dAtA[iNdEx-1] < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case 1:
|
||||||
|
iNdEx += 8
|
||||||
|
case 2:
|
||||||
|
var length int
|
||||||
|
for shift := uint(0); ; shift += 7 {
|
||||||
|
if shift >= 64 {
|
||||||
|
return 0, ErrIntOverflowGenerated
|
||||||
|
}
|
||||||
|
if iNdEx >= l {
|
||||||
|
return 0, io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
b := dAtA[iNdEx]
|
||||||
|
iNdEx++
|
||||||
|
length |= (int(b) & 0x7F) << shift
|
||||||
|
if b < 0x80 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if length < 0 {
|
||||||
|
return 0, ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
iNdEx += length
|
||||||
|
case 3:
|
||||||
|
depth++
|
||||||
|
case 4:
|
||||||
|
if depth == 0 {
|
||||||
|
return 0, ErrUnexpectedEndOfGroupGenerated
|
||||||
|
}
|
||||||
|
depth--
|
||||||
|
case 5:
|
||||||
|
iNdEx += 4
|
||||||
|
default:
|
||||||
|
return 0, fmt.Errorf("proto: illegal wireType %d", wireType)
|
||||||
|
}
|
||||||
|
if iNdEx < 0 {
|
||||||
|
return 0, ErrInvalidLengthGenerated
|
||||||
|
}
|
||||||
|
if depth == 0 {
|
||||||
|
return iNdEx, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0, io.ErrUnexpectedEOF
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
ErrInvalidLengthGenerated = fmt.Errorf("proto: negative length found during unmarshaling")
|
||||||
|
ErrIntOverflowGenerated = fmt.Errorf("proto: integer overflow")
|
||||||
|
ErrUnexpectedEndOfGroupGenerated = fmt.Errorf("proto: unexpected end of group")
|
||||||
|
)
|
103
staging/src/k8s.io/api/certificates/v1alpha1/generated.proto
Normal file
103
staging/src/k8s.io/api/certificates/v1alpha1/generated.proto
Normal file
@ -0,0 +1,103 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
// This file was autogenerated by go-to-protobuf. Do not edit it manually!
|
||||||
|
|
||||||
|
syntax = "proto2";
|
||||||
|
|
||||||
|
package k8s.io.api.certificates.v1alpha1;
|
||||||
|
|
||||||
|
import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto";
|
||||||
|
import "k8s.io/apimachinery/pkg/runtime/generated.proto";
|
||||||
|
import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto";
|
||||||
|
|
||||||
|
// Package-wide variables from generator "generated".
|
||||||
|
option go_package = "k8s.io/api/certificates/v1alpha1";
|
||||||
|
|
||||||
|
// ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors
|
||||||
|
// (root certificates).
|
||||||
|
//
|
||||||
|
// ClusterTrustBundle objects are considered to be readable by any authenticated
|
||||||
|
// user in the cluster, because they can be mounted by pods using the
|
||||||
|
// `clusterTrustBundle` projection. All service accounts have read access to
|
||||||
|
// ClusterTrustBundles by default. Users who only have namespace-level access
|
||||||
|
// to a cluster can read ClusterTrustBundles by impersonating a serviceaccount
|
||||||
|
// that they have access to.
|
||||||
|
//
|
||||||
|
// It can be optionally associated with a particular assigner, in which case it
|
||||||
|
// contains one valid set of trust anchors for that signer. Signers may have
|
||||||
|
// multiple associated ClusterTrustBundles; each is an independent set of trust
|
||||||
|
// anchors for that signer. Admission control is used to enforce that only users
|
||||||
|
// with permissions on the signer can create or modify the corresponding bundle.
|
||||||
|
message ClusterTrustBundle {
|
||||||
|
// metadata contains the object metadata.
|
||||||
|
// +optional
|
||||||
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||||
|
|
||||||
|
// spec contains the signer (if any) and trust anchors.
|
||||||
|
optional ClusterTrustBundleSpec spec = 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClusterTrustBundleList is a collection of ClusterTrustBundle objects
|
||||||
|
message ClusterTrustBundleList {
|
||||||
|
// metadata contains the list metadata.
|
||||||
|
//
|
||||||
|
// +optional
|
||||||
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||||
|
|
||||||
|
// items is a collection of ClusterTrustBundle objects
|
||||||
|
repeated ClusterTrustBundle items = 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClusterTrustBundleSpec contains the signer and trust anchors.
|
||||||
|
message ClusterTrustBundleSpec {
|
||||||
|
// signerName indicates the associated signer, if any.
|
||||||
|
//
|
||||||
|
// In order to create or update a ClusterTrustBundle that sets signerName,
|
||||||
|
// you must have the following cluster-scoped permission:
|
||||||
|
// group=certificates.k8s.io resource=signers resourceName=<the signer name>
|
||||||
|
// verb=attest.
|
||||||
|
//
|
||||||
|
// If signerName is not empty, then the ClusterTrustBundle object must be
|
||||||
|
// named with the signer name as a prefix (translating slashes to colons).
|
||||||
|
// For example, for the signer name `example.com/foo`, valid
|
||||||
|
// ClusterTrustBundle object names include `example.com:foo:abc` and
|
||||||
|
// `example.com:foo:v1`.
|
||||||
|
//
|
||||||
|
// If signerName is empty, then the ClusterTrustBundle object's name must
|
||||||
|
// not have such a prefix.
|
||||||
|
//
|
||||||
|
// List/watch requests for ClusterTrustBundles can filter on this field
|
||||||
|
// using a `spec.signerName=NAME` field selector.
|
||||||
|
//
|
||||||
|
// +optional
|
||||||
|
optional string signerName = 1;
|
||||||
|
|
||||||
|
// trustBundle contains the individual X.509 trust anchors for this
|
||||||
|
// bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.
|
||||||
|
//
|
||||||
|
// The data must consist only of PEM certificate blocks that parse as valid
|
||||||
|
// X.509 certificates. Each certificate must include a basic constraints
|
||||||
|
// extension with the CA bit set. The API server will reject objects that
|
||||||
|
// contain duplicate certificates, or that use PEM block headers.
|
||||||
|
//
|
||||||
|
// Users of ClusterTrustBundles, including Kubelet, are free to reorder and
|
||||||
|
// deduplicate certificate blocks in this file according to their own logic,
|
||||||
|
// as well as to drop PEM block headers and inter-block data.
|
||||||
|
optional string trustBundle = 2;
|
||||||
|
}
|
||||||
|
|
@ -95,7 +95,7 @@ type ClusterTrustBundleSpec struct {
|
|||||||
// ClusterTrustBundleList is a collection of ClusterTrustBundle objects
|
// ClusterTrustBundleList is a collection of ClusterTrustBundle objects
|
||||||
type ClusterTrustBundleList struct {
|
type ClusterTrustBundleList struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
|
||||||
// metadata contains the list metadata.
|
// metadata contains the list metadata.
|
||||||
//
|
//
|
||||||
// +optional
|
// +optional
|
||||||
|
60
staging/src/k8s.io/api/certificates/v1alpha1/types_swagger_doc_generated.go
generated
Normal file
60
staging/src/k8s.io/api/certificates/v1alpha1/types_swagger_doc_generated.go
generated
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
// This file contains a collection of methods that can be used from go-restful to
|
||||||
|
// generate Swagger API documentation for its models. Please read this PR for more
|
||||||
|
// information on the implementation: https://github.com/emicklei/go-restful/pull/215
|
||||||
|
//
|
||||||
|
// TODOs are ignored from the parser (e.g. TODO(andronat):... || TODO:...) if and only if
|
||||||
|
// they are on one line! For multiple line or blocks that you want to ignore use ---.
|
||||||
|
// Any context after a --- is ignored.
|
||||||
|
//
|
||||||
|
// Those methods can be generated by using hack/update-codegen.sh
|
||||||
|
|
||||||
|
// AUTO-GENERATED FUNCTIONS START HERE. DO NOT EDIT.
|
||||||
|
var map_ClusterTrustBundle = map[string]string{
|
||||||
|
"": "ClusterTrustBundle is a cluster-scoped container for X.509 trust anchors (root certificates).\n\nClusterTrustBundle objects are considered to be readable by any authenticated user in the cluster, because they can be mounted by pods using the `clusterTrustBundle` projection. All service accounts have read access to ClusterTrustBundles by default. Users who only have namespace-level access to a cluster can read ClusterTrustBundles by impersonating a serviceaccount that they have access to.\n\nIt can be optionally associated with a particular assigner, in which case it contains one valid set of trust anchors for that signer. Signers may have multiple associated ClusterTrustBundles; each is an independent set of trust anchors for that signer. Admission control is used to enforce that only users with permissions on the signer can create or modify the corresponding bundle.",
|
||||||
|
"metadata": "metadata contains the object metadata.",
|
||||||
|
"spec": "spec contains the signer (if any) and trust anchors.",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ClusterTrustBundle) SwaggerDoc() map[string]string {
|
||||||
|
return map_ClusterTrustBundle
|
||||||
|
}
|
||||||
|
|
||||||
|
var map_ClusterTrustBundleList = map[string]string{
|
||||||
|
"": "ClusterTrustBundleList is a collection of ClusterTrustBundle objects",
|
||||||
|
"metadata": "metadata contains the list metadata.",
|
||||||
|
"items": "items is a collection of ClusterTrustBundle objects",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ClusterTrustBundleList) SwaggerDoc() map[string]string {
|
||||||
|
return map_ClusterTrustBundleList
|
||||||
|
}
|
||||||
|
|
||||||
|
var map_ClusterTrustBundleSpec = map[string]string{
|
||||||
|
"": "ClusterTrustBundleSpec contains the signer and trust anchors.",
|
||||||
|
"signerName": "signerName indicates the associated signer, if any.\n\nIn order to create or update a ClusterTrustBundle that sets signerName, you must have the following cluster-scoped permission: group=certificates.k8s.io resource=signers resourceName=<the signer name> verb=attest.\n\nIf signerName is not empty, then the ClusterTrustBundle object must be named with the signer name as a prefix (translating slashes to colons). For example, for the signer name `example.com/foo`, valid ClusterTrustBundle object names include `example.com:foo:abc` and `example.com:foo:v1`.\n\nIf signerName is empty, then the ClusterTrustBundle object's name must not have such a prefix.\n\nList/watch requests for ClusterTrustBundles can filter on this field using a `spec.signerName=NAME` field selector.",
|
||||||
|
"trustBundle": "trustBundle contains the individual X.509 trust anchors for this bundle, as PEM bundle of PEM-wrapped, DER-formatted X.509 certificates.\n\nThe data must consist only of PEM certificate blocks that parse as valid X.509 certificates. Each certificate must include a basic constraints extension with the CA bit set. The API server will reject objects that contain duplicate certificates, or that use PEM block headers.\n\nUsers of ClusterTrustBundles, including Kubelet, are free to reorder and deduplicate certificate blocks in this file according to their own logic, as well as to drop PEM block headers and inter-block data.",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ClusterTrustBundleSpec) SwaggerDoc() map[string]string {
|
||||||
|
return map_ClusterTrustBundleSpec
|
||||||
|
}
|
||||||
|
|
||||||
|
// AUTO-GENERATED FUNCTIONS END HERE
|
102
staging/src/k8s.io/api/certificates/v1alpha1/zz_generated.deepcopy.go
generated
Normal file
102
staging/src/k8s.io/api/certificates/v1alpha1/zz_generated.deepcopy.go
generated
Normal file
@ -0,0 +1,102 @@
|
|||||||
|
//go:build !ignore_autogenerated
|
||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by deepcopy-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ClusterTrustBundle) DeepCopyInto(out *ClusterTrustBundle) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ObjectMeta.DeepCopyInto(&out.ObjectMeta)
|
||||||
|
out.Spec = in.Spec
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterTrustBundle.
|
||||||
|
func (in *ClusterTrustBundle) DeepCopy() *ClusterTrustBundle {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ClusterTrustBundle)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ClusterTrustBundle) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ClusterTrustBundleList) DeepCopyInto(out *ClusterTrustBundleList) {
|
||||||
|
*out = *in
|
||||||
|
out.TypeMeta = in.TypeMeta
|
||||||
|
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]ClusterTrustBundle, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
(*in)[i].DeepCopyInto(&(*out)[i])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterTrustBundleList.
|
||||||
|
func (in *ClusterTrustBundleList) DeepCopy() *ClusterTrustBundleList {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ClusterTrustBundleList)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
|
||||||
|
func (in *ClusterTrustBundleList) DeepCopyObject() runtime.Object {
|
||||||
|
if c := in.DeepCopy(); c != nil {
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
|
||||||
|
func (in *ClusterTrustBundleSpec) DeepCopyInto(out *ClusterTrustBundleSpec) {
|
||||||
|
*out = *in
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ClusterTrustBundleSpec.
|
||||||
|
func (in *ClusterTrustBundleSpec) DeepCopy() *ClusterTrustBundleSpec {
|
||||||
|
if in == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := new(ClusterTrustBundleSpec)
|
||||||
|
in.DeepCopyInto(out)
|
||||||
|
return out
|
||||||
|
}
|
58
staging/src/k8s.io/api/certificates/v1alpha1/zz_generated.prerelease-lifecycle.go
generated
Normal file
58
staging/src/k8s.io/api/certificates/v1alpha1/zz_generated.prerelease-lifecycle.go
generated
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
//go:build !ignore_autogenerated
|
||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by prerelease-lifecycle-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
// APILifecycleIntroduced is an autogenerated function, returning the release in which the API struct was introduced as int versions of major and minor for comparison.
|
||||||
|
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go.
|
||||||
|
func (in *ClusterTrustBundle) APILifecycleIntroduced() (major, minor int) {
|
||||||
|
return 1, 26
|
||||||
|
}
|
||||||
|
|
||||||
|
// APILifecycleDeprecated is an autogenerated function, returning the release in which the API struct was or will be deprecated as int versions of major and minor for comparison.
|
||||||
|
// It is controlled by "k8s:prerelease-lifecycle-gen:deprecated" tags in types.go or "k8s:prerelease-lifecycle-gen:introduced" plus three minor.
|
||||||
|
func (in *ClusterTrustBundle) APILifecycleDeprecated() (major, minor int) {
|
||||||
|
return 1, 29
|
||||||
|
}
|
||||||
|
|
||||||
|
// APILifecycleRemoved is an autogenerated function, returning the release in which the API is no longer served as int versions of major and minor for comparison.
|
||||||
|
// It is controlled by "k8s:prerelease-lifecycle-gen:removed" tags in types.go or "k8s:prerelease-lifecycle-gen:deprecated" plus three minor.
|
||||||
|
func (in *ClusterTrustBundle) APILifecycleRemoved() (major, minor int) {
|
||||||
|
return 1, 32
|
||||||
|
}
|
||||||
|
|
||||||
|
// APILifecycleIntroduced is an autogenerated function, returning the release in which the API struct was introduced as int versions of major and minor for comparison.
|
||||||
|
// It is controlled by "k8s:prerelease-lifecycle-gen:introduced" tags in types.go.
|
||||||
|
func (in *ClusterTrustBundleList) APILifecycleIntroduced() (major, minor int) {
|
||||||
|
return 1, 26
|
||||||
|
}
|
||||||
|
|
||||||
|
// APILifecycleDeprecated is an autogenerated function, returning the release in which the API struct was or will be deprecated as int versions of major and minor for comparison.
|
||||||
|
// It is controlled by "k8s:prerelease-lifecycle-gen:deprecated" tags in types.go or "k8s:prerelease-lifecycle-gen:introduced" plus three minor.
|
||||||
|
func (in *ClusterTrustBundleList) APILifecycleDeprecated() (major, minor int) {
|
||||||
|
return 1, 29
|
||||||
|
}
|
||||||
|
|
||||||
|
// APILifecycleRemoved is an autogenerated function, returning the release in which the API is no longer served as int versions of major and minor for comparison.
|
||||||
|
// It is controlled by "k8s:prerelease-lifecycle-gen:removed" tags in types.go or "k8s:prerelease-lifecycle-gen:deprecated" plus three minor.
|
||||||
|
func (in *ClusterTrustBundleList) APILifecycleRemoved() (major, minor int) {
|
||||||
|
return 1, 32
|
||||||
|
}
|
50
staging/src/k8s.io/api/testdata/HEAD/certificates.k8s.io.v1alpha1.ClusterTrustBundle.json
vendored
Normal file
50
staging/src/k8s.io/api/testdata/HEAD/certificates.k8s.io.v1alpha1.ClusterTrustBundle.json
vendored
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
{
|
||||||
|
"kind": "ClusterTrustBundle",
|
||||||
|
"apiVersion": "certificates.k8s.io/v1alpha1",
|
||||||
|
"metadata": {
|
||||||
|
"name": "nameValue",
|
||||||
|
"generateName": "generateNameValue",
|
||||||
|
"namespace": "namespaceValue",
|
||||||
|
"selfLink": "selfLinkValue",
|
||||||
|
"uid": "uidValue",
|
||||||
|
"resourceVersion": "resourceVersionValue",
|
||||||
|
"generation": 7,
|
||||||
|
"creationTimestamp": "2008-01-01T01:01:01Z",
|
||||||
|
"deletionTimestamp": "2009-01-01T01:01:01Z",
|
||||||
|
"deletionGracePeriodSeconds": 10,
|
||||||
|
"labels": {
|
||||||
|
"labelsKey": "labelsValue"
|
||||||
|
},
|
||||||
|
"annotations": {
|
||||||
|
"annotationsKey": "annotationsValue"
|
||||||
|
},
|
||||||
|
"ownerReferences": [
|
||||||
|
{
|
||||||
|
"apiVersion": "apiVersionValue",
|
||||||
|
"kind": "kindValue",
|
||||||
|
"name": "nameValue",
|
||||||
|
"uid": "uidValue",
|
||||||
|
"controller": true,
|
||||||
|
"blockOwnerDeletion": true
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"finalizers": [
|
||||||
|
"finalizersValue"
|
||||||
|
],
|
||||||
|
"managedFields": [
|
||||||
|
{
|
||||||
|
"manager": "managerValue",
|
||||||
|
"operation": "operationValue",
|
||||||
|
"apiVersion": "apiVersionValue",
|
||||||
|
"time": "2004-01-01T01:01:01Z",
|
||||||
|
"fieldsType": "fieldsTypeValue",
|
||||||
|
"fieldsV1": {},
|
||||||
|
"subresource": "subresourceValue"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"spec": {
|
||||||
|
"signerName": "signerNameValue",
|
||||||
|
"trustBundle": "trustBundleValue"
|
||||||
|
}
|
||||||
|
}
|
BIN
staging/src/k8s.io/api/testdata/HEAD/certificates.k8s.io.v1alpha1.ClusterTrustBundle.pb
vendored
Normal file
BIN
staging/src/k8s.io/api/testdata/HEAD/certificates.k8s.io.v1alpha1.ClusterTrustBundle.pb
vendored
Normal file
Binary file not shown.
37
staging/src/k8s.io/api/testdata/HEAD/certificates.k8s.io.v1alpha1.ClusterTrustBundle.yaml
vendored
Normal file
37
staging/src/k8s.io/api/testdata/HEAD/certificates.k8s.io.v1alpha1.ClusterTrustBundle.yaml
vendored
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
apiVersion: certificates.k8s.io/v1alpha1
|
||||||
|
kind: ClusterTrustBundle
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
annotationsKey: annotationsValue
|
||||||
|
creationTimestamp: "2008-01-01T01:01:01Z"
|
||||||
|
deletionGracePeriodSeconds: 10
|
||||||
|
deletionTimestamp: "2009-01-01T01:01:01Z"
|
||||||
|
finalizers:
|
||||||
|
- finalizersValue
|
||||||
|
generateName: generateNameValue
|
||||||
|
generation: 7
|
||||||
|
labels:
|
||||||
|
labelsKey: labelsValue
|
||||||
|
managedFields:
|
||||||
|
- apiVersion: apiVersionValue
|
||||||
|
fieldsType: fieldsTypeValue
|
||||||
|
fieldsV1: {}
|
||||||
|
manager: managerValue
|
||||||
|
operation: operationValue
|
||||||
|
subresource: subresourceValue
|
||||||
|
time: "2004-01-01T01:01:01Z"
|
||||||
|
name: nameValue
|
||||||
|
namespace: namespaceValue
|
||||||
|
ownerReferences:
|
||||||
|
- apiVersion: apiVersionValue
|
||||||
|
blockOwnerDeletion: true
|
||||||
|
controller: true
|
||||||
|
kind: kindValue
|
||||||
|
name: nameValue
|
||||||
|
uid: uidValue
|
||||||
|
resourceVersion: resourceVersionValue
|
||||||
|
selfLink: selfLinkValue
|
||||||
|
uid: uidValue
|
||||||
|
spec:
|
||||||
|
signerName: signerNameValue
|
||||||
|
trustBundle: trustBundleValue
|
@ -0,0 +1,247 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
certificatesv1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
managedfields "k8s.io/apimachinery/pkg/util/managedfields"
|
||||||
|
internal "k8s.io/client-go/applyconfigurations/internal"
|
||||||
|
v1 "k8s.io/client-go/applyconfigurations/meta/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ClusterTrustBundleApplyConfiguration represents an declarative configuration of the ClusterTrustBundle type for use
|
||||||
|
// with apply.
|
||||||
|
type ClusterTrustBundleApplyConfiguration struct {
|
||||||
|
v1.TypeMetaApplyConfiguration `json:",inline"`
|
||||||
|
*v1.ObjectMetaApplyConfiguration `json:"metadata,omitempty"`
|
||||||
|
Spec *ClusterTrustBundleSpecApplyConfiguration `json:"spec,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClusterTrustBundle constructs an declarative configuration of the ClusterTrustBundle type for use with
|
||||||
|
// apply.
|
||||||
|
func ClusterTrustBundle(name string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b := &ClusterTrustBundleApplyConfiguration{}
|
||||||
|
b.WithName(name)
|
||||||
|
b.WithKind("ClusterTrustBundle")
|
||||||
|
b.WithAPIVersion("certificates.k8s.io/v1alpha1")
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// ExtractClusterTrustBundle extracts the applied configuration owned by fieldManager from
|
||||||
|
// clusterTrustBundle. If no managedFields are found in clusterTrustBundle for fieldManager, a
|
||||||
|
// ClusterTrustBundleApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||||
|
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||||
|
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||||
|
// the fieldManager never owned fields any fields.
|
||||||
|
// clusterTrustBundle must be a unmodified ClusterTrustBundle API object that was retrieved from the Kubernetes API.
|
||||||
|
// ExtractClusterTrustBundle provides a way to perform a extract/modify-in-place/apply workflow.
|
||||||
|
// Note that an extracted apply configuration will contain fewer fields than what the fieldManager previously
|
||||||
|
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||||
|
// Experimental!
|
||||||
|
func ExtractClusterTrustBundle(clusterTrustBundle *certificatesv1alpha1.ClusterTrustBundle, fieldManager string) (*ClusterTrustBundleApplyConfiguration, error) {
|
||||||
|
return extractClusterTrustBundle(clusterTrustBundle, fieldManager, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
// ExtractClusterTrustBundleStatus is the same as ExtractClusterTrustBundle except
|
||||||
|
// that it extracts the status subresource applied configuration.
|
||||||
|
// Experimental!
|
||||||
|
func ExtractClusterTrustBundleStatus(clusterTrustBundle *certificatesv1alpha1.ClusterTrustBundle, fieldManager string) (*ClusterTrustBundleApplyConfiguration, error) {
|
||||||
|
return extractClusterTrustBundle(clusterTrustBundle, fieldManager, "status")
|
||||||
|
}
|
||||||
|
|
||||||
|
func extractClusterTrustBundle(clusterTrustBundle *certificatesv1alpha1.ClusterTrustBundle, fieldManager string, subresource string) (*ClusterTrustBundleApplyConfiguration, error) {
|
||||||
|
b := &ClusterTrustBundleApplyConfiguration{}
|
||||||
|
err := managedfields.ExtractInto(clusterTrustBundle, internal.Parser().Type("io.k8s.api.certificates.v1alpha1.ClusterTrustBundle"), fieldManager, b, subresource)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
b.WithName(clusterTrustBundle.Name)
|
||||||
|
|
||||||
|
b.WithKind("ClusterTrustBundle")
|
||||||
|
b.WithAPIVersion("certificates.k8s.io/v1alpha1")
|
||||||
|
return b, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithKind sets the Kind field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the Kind field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithKind(value string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.Kind = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithAPIVersion sets the APIVersion field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the APIVersion field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithAPIVersion(value string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.APIVersion = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithName sets the Name field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the Name field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithName(value string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.Name = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithGenerateName sets the GenerateName field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the GenerateName field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithGenerateName(value string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.GenerateName = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithNamespace sets the Namespace field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the Namespace field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithNamespace(value string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.Namespace = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithUID sets the UID field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the UID field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithUID(value types.UID) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.UID = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithResourceVersion sets the ResourceVersion field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the ResourceVersion field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithResourceVersion(value string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.ResourceVersion = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithGeneration sets the Generation field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the Generation field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithGeneration(value int64) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.Generation = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithCreationTimestamp sets the CreationTimestamp field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the CreationTimestamp field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithCreationTimestamp(value metav1.Time) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.CreationTimestamp = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithDeletionTimestamp sets the DeletionTimestamp field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the DeletionTimestamp field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithDeletionTimestamp(value metav1.Time) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.DeletionTimestamp = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithDeletionGracePeriodSeconds sets the DeletionGracePeriodSeconds field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the DeletionGracePeriodSeconds field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithDeletionGracePeriodSeconds(value int64) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
b.DeletionGracePeriodSeconds = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithLabels puts the entries into the Labels field in the declarative configuration
|
||||||
|
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the entries provided by each call will be put on the Labels field,
|
||||||
|
// overwriting an existing map entries in Labels field with the same key.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithLabels(entries map[string]string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
if b.Labels == nil && len(entries) > 0 {
|
||||||
|
b.Labels = make(map[string]string, len(entries))
|
||||||
|
}
|
||||||
|
for k, v := range entries {
|
||||||
|
b.Labels[k] = v
|
||||||
|
}
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithAnnotations puts the entries into the Annotations field in the declarative configuration
|
||||||
|
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the entries provided by each call will be put on the Annotations field,
|
||||||
|
// overwriting an existing map entries in Annotations field with the same key.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithAnnotations(entries map[string]string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
if b.Annotations == nil && len(entries) > 0 {
|
||||||
|
b.Annotations = make(map[string]string, len(entries))
|
||||||
|
}
|
||||||
|
for k, v := range entries {
|
||||||
|
b.Annotations[k] = v
|
||||||
|
}
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithOwnerReferences adds the given value to the OwnerReferences field in the declarative configuration
|
||||||
|
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
||||||
|
// If called multiple times, values provided by each call will be appended to the OwnerReferences field.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithOwnerReferences(values ...*v1.OwnerReferenceApplyConfiguration) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
for i := range values {
|
||||||
|
if values[i] == nil {
|
||||||
|
panic("nil value passed to WithOwnerReferences")
|
||||||
|
}
|
||||||
|
b.OwnerReferences = append(b.OwnerReferences, *values[i])
|
||||||
|
}
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithFinalizers adds the given value to the Finalizers field in the declarative configuration
|
||||||
|
// and returns the receiver, so that objects can be build by chaining "With" function invocations.
|
||||||
|
// If called multiple times, values provided by each call will be appended to the Finalizers field.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithFinalizers(values ...string) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.ensureObjectMetaApplyConfigurationExists()
|
||||||
|
for i := range values {
|
||||||
|
b.Finalizers = append(b.Finalizers, values[i])
|
||||||
|
}
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) ensureObjectMetaApplyConfigurationExists() {
|
||||||
|
if b.ObjectMetaApplyConfiguration == nil {
|
||||||
|
b.ObjectMetaApplyConfiguration = &v1.ObjectMetaApplyConfiguration{}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithSpec sets the Spec field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the Spec field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleApplyConfiguration) WithSpec(value *ClusterTrustBundleSpecApplyConfiguration) *ClusterTrustBundleApplyConfiguration {
|
||||||
|
b.Spec = value
|
||||||
|
return b
|
||||||
|
}
|
@ -0,0 +1,48 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by applyconfiguration-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
// ClusterTrustBundleSpecApplyConfiguration represents an declarative configuration of the ClusterTrustBundleSpec type for use
|
||||||
|
// with apply.
|
||||||
|
type ClusterTrustBundleSpecApplyConfiguration struct {
|
||||||
|
SignerName *string `json:"signerName,omitempty"`
|
||||||
|
TrustBundle *string `json:"trustBundle,omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClusterTrustBundleSpecApplyConfiguration constructs an declarative configuration of the ClusterTrustBundleSpec type for use with
|
||||||
|
// apply.
|
||||||
|
func ClusterTrustBundleSpec() *ClusterTrustBundleSpecApplyConfiguration {
|
||||||
|
return &ClusterTrustBundleSpecApplyConfiguration{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithSignerName sets the SignerName field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the SignerName field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleSpecApplyConfiguration) WithSignerName(value string) *ClusterTrustBundleSpecApplyConfiguration {
|
||||||
|
b.SignerName = &value
|
||||||
|
return b
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithTrustBundle sets the TrustBundle field in the declarative configuration to the given value
|
||||||
|
// and returns the receiver, so that objects can be built by chaining "With" function invocations.
|
||||||
|
// If called multiple times, the TrustBundle field is set to the value of the last call.
|
||||||
|
func (b *ClusterTrustBundleSpecApplyConfiguration) WithTrustBundle(value string) *ClusterTrustBundleSpecApplyConfiguration {
|
||||||
|
b.TrustBundle = &value
|
||||||
|
return b
|
||||||
|
}
|
@ -3642,6 +3642,33 @@ var schemaYAML = typed.YAMLObject(`types:
|
|||||||
elementRelationship: associative
|
elementRelationship: associative
|
||||||
keys:
|
keys:
|
||||||
- type
|
- type
|
||||||
|
- name: io.k8s.api.certificates.v1alpha1.ClusterTrustBundle
|
||||||
|
map:
|
||||||
|
fields:
|
||||||
|
- name: apiVersion
|
||||||
|
type:
|
||||||
|
scalar: string
|
||||||
|
- name: kind
|
||||||
|
type:
|
||||||
|
scalar: string
|
||||||
|
- name: metadata
|
||||||
|
type:
|
||||||
|
namedType: io.k8s.apimachinery.pkg.apis.meta.v1.ObjectMeta
|
||||||
|
default: {}
|
||||||
|
- name: spec
|
||||||
|
type:
|
||||||
|
namedType: io.k8s.api.certificates.v1alpha1.ClusterTrustBundleSpec
|
||||||
|
default: {}
|
||||||
|
- name: io.k8s.api.certificates.v1alpha1.ClusterTrustBundleSpec
|
||||||
|
map:
|
||||||
|
fields:
|
||||||
|
- name: signerName
|
||||||
|
type:
|
||||||
|
scalar: string
|
||||||
|
- name: trustBundle
|
||||||
|
type:
|
||||||
|
scalar: string
|
||||||
|
default: ""
|
||||||
- name: io.k8s.api.certificates.v1beta1.CertificateSigningRequest
|
- name: io.k8s.api.certificates.v1beta1.CertificateSigningRequest
|
||||||
map:
|
map:
|
||||||
fields:
|
fields:
|
||||||
|
@ -33,6 +33,7 @@ import (
|
|||||||
batchv1 "k8s.io/api/batch/v1"
|
batchv1 "k8s.io/api/batch/v1"
|
||||||
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
||||||
certificatesv1 "k8s.io/api/certificates/v1"
|
certificatesv1 "k8s.io/api/certificates/v1"
|
||||||
|
certificatesv1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
||||||
coordinationv1 "k8s.io/api/coordination/v1"
|
coordinationv1 "k8s.io/api/coordination/v1"
|
||||||
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
||||||
@ -81,6 +82,7 @@ import (
|
|||||||
applyconfigurationsbatchv1 "k8s.io/client-go/applyconfigurations/batch/v1"
|
applyconfigurationsbatchv1 "k8s.io/client-go/applyconfigurations/batch/v1"
|
||||||
applyconfigurationsbatchv1beta1 "k8s.io/client-go/applyconfigurations/batch/v1beta1"
|
applyconfigurationsbatchv1beta1 "k8s.io/client-go/applyconfigurations/batch/v1beta1"
|
||||||
applyconfigurationscertificatesv1 "k8s.io/client-go/applyconfigurations/certificates/v1"
|
applyconfigurationscertificatesv1 "k8s.io/client-go/applyconfigurations/certificates/v1"
|
||||||
|
applyconfigurationscertificatesv1alpha1 "k8s.io/client-go/applyconfigurations/certificates/v1alpha1"
|
||||||
applyconfigurationscertificatesv1beta1 "k8s.io/client-go/applyconfigurations/certificates/v1beta1"
|
applyconfigurationscertificatesv1beta1 "k8s.io/client-go/applyconfigurations/certificates/v1beta1"
|
||||||
applyconfigurationscoordinationv1 "k8s.io/client-go/applyconfigurations/coordination/v1"
|
applyconfigurationscoordinationv1 "k8s.io/client-go/applyconfigurations/coordination/v1"
|
||||||
applyconfigurationscoordinationv1beta1 "k8s.io/client-go/applyconfigurations/coordination/v1beta1"
|
applyconfigurationscoordinationv1beta1 "k8s.io/client-go/applyconfigurations/coordination/v1beta1"
|
||||||
@ -522,6 +524,12 @@ func ForKind(kind schema.GroupVersionKind) interface{} {
|
|||||||
case certificatesv1.SchemeGroupVersion.WithKind("CertificateSigningRequestStatus"):
|
case certificatesv1.SchemeGroupVersion.WithKind("CertificateSigningRequestStatus"):
|
||||||
return &applyconfigurationscertificatesv1.CertificateSigningRequestStatusApplyConfiguration{}
|
return &applyconfigurationscertificatesv1.CertificateSigningRequestStatusApplyConfiguration{}
|
||||||
|
|
||||||
|
// Group=certificates.k8s.io, Version=v1alpha1
|
||||||
|
case certificatesv1alpha1.SchemeGroupVersion.WithKind("ClusterTrustBundle"):
|
||||||
|
return &applyconfigurationscertificatesv1alpha1.ClusterTrustBundleApplyConfiguration{}
|
||||||
|
case certificatesv1alpha1.SchemeGroupVersion.WithKind("ClusterTrustBundleSpec"):
|
||||||
|
return &applyconfigurationscertificatesv1alpha1.ClusterTrustBundleSpecApplyConfiguration{}
|
||||||
|
|
||||||
// Group=certificates.k8s.io, Version=v1beta1
|
// Group=certificates.k8s.io, Version=v1beta1
|
||||||
case certificatesv1beta1.SchemeGroupVersion.WithKind("CertificateSigningRequest"):
|
case certificatesv1beta1.SchemeGroupVersion.WithKind("CertificateSigningRequest"):
|
||||||
return &applyconfigurationscertificatesv1beta1.CertificateSigningRequestApplyConfiguration{}
|
return &applyconfigurationscertificatesv1beta1.CertificateSigningRequestApplyConfiguration{}
|
||||||
|
@ -20,6 +20,7 @@ package certificates
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
v1 "k8s.io/client-go/informers/certificates/v1"
|
v1 "k8s.io/client-go/informers/certificates/v1"
|
||||||
|
v1alpha1 "k8s.io/client-go/informers/certificates/v1alpha1"
|
||||||
v1beta1 "k8s.io/client-go/informers/certificates/v1beta1"
|
v1beta1 "k8s.io/client-go/informers/certificates/v1beta1"
|
||||||
internalinterfaces "k8s.io/client-go/informers/internalinterfaces"
|
internalinterfaces "k8s.io/client-go/informers/internalinterfaces"
|
||||||
)
|
)
|
||||||
@ -28,6 +29,8 @@ import (
|
|||||||
type Interface interface {
|
type Interface interface {
|
||||||
// V1 provides access to shared informers for resources in V1.
|
// V1 provides access to shared informers for resources in V1.
|
||||||
V1() v1.Interface
|
V1() v1.Interface
|
||||||
|
// V1alpha1 provides access to shared informers for resources in V1alpha1.
|
||||||
|
V1alpha1() v1alpha1.Interface
|
||||||
// V1beta1 provides access to shared informers for resources in V1beta1.
|
// V1beta1 provides access to shared informers for resources in V1beta1.
|
||||||
V1beta1() v1beta1.Interface
|
V1beta1() v1beta1.Interface
|
||||||
}
|
}
|
||||||
@ -48,6 +51,11 @@ func (g *group) V1() v1.Interface {
|
|||||||
return v1.New(g.factory, g.namespace, g.tweakListOptions)
|
return v1.New(g.factory, g.namespace, g.tweakListOptions)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// V1alpha1 returns a new v1alpha1.Interface.
|
||||||
|
func (g *group) V1alpha1() v1alpha1.Interface {
|
||||||
|
return v1alpha1.New(g.factory, g.namespace, g.tweakListOptions)
|
||||||
|
}
|
||||||
|
|
||||||
// V1beta1 returns a new v1beta1.Interface.
|
// V1beta1 returns a new v1beta1.Interface.
|
||||||
func (g *group) V1beta1() v1beta1.Interface {
|
func (g *group) V1beta1() v1beta1.Interface {
|
||||||
return v1beta1.New(g.factory, g.namespace, g.tweakListOptions)
|
return v1beta1.New(g.factory, g.namespace, g.tweakListOptions)
|
||||||
|
@ -0,0 +1,89 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by informer-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
time "time"
|
||||||
|
|
||||||
|
certificatesv1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
internalinterfaces "k8s.io/client-go/informers/internalinterfaces"
|
||||||
|
kubernetes "k8s.io/client-go/kubernetes"
|
||||||
|
v1alpha1 "k8s.io/client-go/listers/certificates/v1alpha1"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ClusterTrustBundleInformer provides access to a shared informer and lister for
|
||||||
|
// ClusterTrustBundles.
|
||||||
|
type ClusterTrustBundleInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() v1alpha1.ClusterTrustBundleLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type clusterTrustBundleInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewClusterTrustBundleInformer constructs a new informer for ClusterTrustBundle type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewClusterTrustBundleInformer(client kubernetes.Interface, resyncPeriod time.Duration, indexers cache.Indexers) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredClusterTrustBundleInformer(client, resyncPeriod, indexers, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewFilteredClusterTrustBundleInformer constructs a new informer for ClusterTrustBundle type.
|
||||||
|
// Always prefer using an informer factory to get a shared informer instead of getting an independent
|
||||||
|
// one. This reduces memory footprint and number of connections to the server.
|
||||||
|
func NewFilteredClusterTrustBundleInformer(client kubernetes.Interface, resyncPeriod time.Duration, indexers cache.Indexers, tweakListOptions internalinterfaces.TweakListOptionsFunc) cache.SharedIndexInformer {
|
||||||
|
return cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.CertificatesV1alpha1().ClusterTrustBundles().List(context.TODO(), options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
||||||
|
if tweakListOptions != nil {
|
||||||
|
tweakListOptions(&options)
|
||||||
|
}
|
||||||
|
return client.CertificatesV1alpha1().ClusterTrustBundles().Watch(context.TODO(), options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&certificatesv1alpha1.ClusterTrustBundle{},
|
||||||
|
resyncPeriod,
|
||||||
|
indexers,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *clusterTrustBundleInformer) defaultInformer(client kubernetes.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
return NewFilteredClusterTrustBundleInformer(client, resyncPeriod, cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc}, f.tweakListOptions)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *clusterTrustBundleInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&certificatesv1alpha1.ClusterTrustBundle{}, f.defaultInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *clusterTrustBundleInformer) Lister() v1alpha1.ClusterTrustBundleLister {
|
||||||
|
return v1alpha1.NewClusterTrustBundleLister(f.Informer().GetIndexer())
|
||||||
|
}
|
@ -0,0 +1,45 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by informer-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
internalinterfaces "k8s.io/client-go/informers/internalinterfaces"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Interface provides access to all the informers in this group version.
|
||||||
|
type Interface interface {
|
||||||
|
// ClusterTrustBundles returns a ClusterTrustBundleInformer.
|
||||||
|
ClusterTrustBundles() ClusterTrustBundleInformer
|
||||||
|
}
|
||||||
|
|
||||||
|
type version struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
namespace string
|
||||||
|
tweakListOptions internalinterfaces.TweakListOptionsFunc
|
||||||
|
}
|
||||||
|
|
||||||
|
// New returns a new Interface.
|
||||||
|
func New(f internalinterfaces.SharedInformerFactory, namespace string, tweakListOptions internalinterfaces.TweakListOptionsFunc) Interface {
|
||||||
|
return &version{factory: f, namespace: namespace, tweakListOptions: tweakListOptions}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClusterTrustBundles returns a ClusterTrustBundleInformer.
|
||||||
|
func (v *version) ClusterTrustBundles() ClusterTrustBundleInformer {
|
||||||
|
return &clusterTrustBundleInformer{factory: v.factory, tweakListOptions: v.tweakListOptions}
|
||||||
|
}
|
@ -35,6 +35,7 @@ import (
|
|||||||
batchv1 "k8s.io/api/batch/v1"
|
batchv1 "k8s.io/api/batch/v1"
|
||||||
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
||||||
certificatesv1 "k8s.io/api/certificates/v1"
|
certificatesv1 "k8s.io/api/certificates/v1"
|
||||||
|
certificatesv1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
||||||
coordinationv1 "k8s.io/api/coordination/v1"
|
coordinationv1 "k8s.io/api/coordination/v1"
|
||||||
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
||||||
@ -176,6 +177,10 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
case certificatesv1.SchemeGroupVersion.WithResource("certificatesigningrequests"):
|
case certificatesv1.SchemeGroupVersion.WithResource("certificatesigningrequests"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Certificates().V1().CertificateSigningRequests().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Certificates().V1().CertificateSigningRequests().Informer()}, nil
|
||||||
|
|
||||||
|
// Group=certificates.k8s.io, Version=v1alpha1
|
||||||
|
case certificatesv1alpha1.SchemeGroupVersion.WithResource("clustertrustbundles"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Certificates().V1alpha1().ClusterTrustBundles().Informer()}, nil
|
||||||
|
|
||||||
// Group=certificates.k8s.io, Version=v1beta1
|
// Group=certificates.k8s.io, Version=v1beta1
|
||||||
case certificatesv1beta1.SchemeGroupVersion.WithResource("certificatesigningrequests"):
|
case certificatesv1beta1.SchemeGroupVersion.WithResource("certificatesigningrequests"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Certificates().V1beta1().CertificateSigningRequests().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Certificates().V1beta1().CertificateSigningRequests().Informer()}, nil
|
||||||
|
@ -42,6 +42,7 @@ import (
|
|||||||
batchv1 "k8s.io/client-go/kubernetes/typed/batch/v1"
|
batchv1 "k8s.io/client-go/kubernetes/typed/batch/v1"
|
||||||
batchv1beta1 "k8s.io/client-go/kubernetes/typed/batch/v1beta1"
|
batchv1beta1 "k8s.io/client-go/kubernetes/typed/batch/v1beta1"
|
||||||
certificatesv1 "k8s.io/client-go/kubernetes/typed/certificates/v1"
|
certificatesv1 "k8s.io/client-go/kubernetes/typed/certificates/v1"
|
||||||
|
certificatesv1alpha1 "k8s.io/client-go/kubernetes/typed/certificates/v1alpha1"
|
||||||
certificatesv1beta1 "k8s.io/client-go/kubernetes/typed/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/client-go/kubernetes/typed/certificates/v1beta1"
|
||||||
coordinationv1 "k8s.io/client-go/kubernetes/typed/coordination/v1"
|
coordinationv1 "k8s.io/client-go/kubernetes/typed/coordination/v1"
|
||||||
coordinationv1beta1 "k8s.io/client-go/kubernetes/typed/coordination/v1beta1"
|
coordinationv1beta1 "k8s.io/client-go/kubernetes/typed/coordination/v1beta1"
|
||||||
@ -99,6 +100,7 @@ type Interface interface {
|
|||||||
BatchV1beta1() batchv1beta1.BatchV1beta1Interface
|
BatchV1beta1() batchv1beta1.BatchV1beta1Interface
|
||||||
CertificatesV1() certificatesv1.CertificatesV1Interface
|
CertificatesV1() certificatesv1.CertificatesV1Interface
|
||||||
CertificatesV1beta1() certificatesv1beta1.CertificatesV1beta1Interface
|
CertificatesV1beta1() certificatesv1beta1.CertificatesV1beta1Interface
|
||||||
|
CertificatesV1alpha1() certificatesv1alpha1.CertificatesV1alpha1Interface
|
||||||
CoordinationV1beta1() coordinationv1beta1.CoordinationV1beta1Interface
|
CoordinationV1beta1() coordinationv1beta1.CoordinationV1beta1Interface
|
||||||
CoordinationV1() coordinationv1.CoordinationV1Interface
|
CoordinationV1() coordinationv1.CoordinationV1Interface
|
||||||
CoreV1() corev1.CoreV1Interface
|
CoreV1() corev1.CoreV1Interface
|
||||||
@ -154,6 +156,7 @@ type Clientset struct {
|
|||||||
batchV1beta1 *batchv1beta1.BatchV1beta1Client
|
batchV1beta1 *batchv1beta1.BatchV1beta1Client
|
||||||
certificatesV1 *certificatesv1.CertificatesV1Client
|
certificatesV1 *certificatesv1.CertificatesV1Client
|
||||||
certificatesV1beta1 *certificatesv1beta1.CertificatesV1beta1Client
|
certificatesV1beta1 *certificatesv1beta1.CertificatesV1beta1Client
|
||||||
|
certificatesV1alpha1 *certificatesv1alpha1.CertificatesV1alpha1Client
|
||||||
coordinationV1beta1 *coordinationv1beta1.CoordinationV1beta1Client
|
coordinationV1beta1 *coordinationv1beta1.CoordinationV1beta1Client
|
||||||
coordinationV1 *coordinationv1.CoordinationV1Client
|
coordinationV1 *coordinationv1.CoordinationV1Client
|
||||||
coreV1 *corev1.CoreV1Client
|
coreV1 *corev1.CoreV1Client
|
||||||
@ -286,6 +289,11 @@ func (c *Clientset) CertificatesV1beta1() certificatesv1beta1.CertificatesV1beta
|
|||||||
return c.certificatesV1beta1
|
return c.certificatesV1beta1
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CertificatesV1alpha1 retrieves the CertificatesV1alpha1Client
|
||||||
|
func (c *Clientset) CertificatesV1alpha1() certificatesv1alpha1.CertificatesV1alpha1Interface {
|
||||||
|
return c.certificatesV1alpha1
|
||||||
|
}
|
||||||
|
|
||||||
// CoordinationV1beta1 retrieves the CoordinationV1beta1Client
|
// CoordinationV1beta1 retrieves the CoordinationV1beta1Client
|
||||||
func (c *Clientset) CoordinationV1beta1() coordinationv1beta1.CoordinationV1beta1Interface {
|
func (c *Clientset) CoordinationV1beta1() coordinationv1beta1.CoordinationV1beta1Interface {
|
||||||
return c.coordinationV1beta1
|
return c.coordinationV1beta1
|
||||||
@ -560,6 +568,10 @@ func NewForConfigAndClient(c *rest.Config, httpClient *http.Client) (*Clientset,
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
cs.certificatesV1alpha1, err = certificatesv1alpha1.NewForConfigAndClient(&configShallowCopy, httpClient)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
cs.coordinationV1beta1, err = coordinationv1beta1.NewForConfigAndClient(&configShallowCopy, httpClient)
|
cs.coordinationV1beta1, err = coordinationv1beta1.NewForConfigAndClient(&configShallowCopy, httpClient)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -721,6 +733,7 @@ func New(c rest.Interface) *Clientset {
|
|||||||
cs.batchV1beta1 = batchv1beta1.New(c)
|
cs.batchV1beta1 = batchv1beta1.New(c)
|
||||||
cs.certificatesV1 = certificatesv1.New(c)
|
cs.certificatesV1 = certificatesv1.New(c)
|
||||||
cs.certificatesV1beta1 = certificatesv1beta1.New(c)
|
cs.certificatesV1beta1 = certificatesv1beta1.New(c)
|
||||||
|
cs.certificatesV1alpha1 = certificatesv1alpha1.New(c)
|
||||||
cs.coordinationV1beta1 = coordinationv1beta1.New(c)
|
cs.coordinationV1beta1 = coordinationv1beta1.New(c)
|
||||||
cs.coordinationV1 = coordinationv1.New(c)
|
cs.coordinationV1 = coordinationv1.New(c)
|
||||||
cs.coreV1 = corev1.New(c)
|
cs.coreV1 = corev1.New(c)
|
||||||
|
@ -62,6 +62,8 @@ import (
|
|||||||
fakebatchv1beta1 "k8s.io/client-go/kubernetes/typed/batch/v1beta1/fake"
|
fakebatchv1beta1 "k8s.io/client-go/kubernetes/typed/batch/v1beta1/fake"
|
||||||
certificatesv1 "k8s.io/client-go/kubernetes/typed/certificates/v1"
|
certificatesv1 "k8s.io/client-go/kubernetes/typed/certificates/v1"
|
||||||
fakecertificatesv1 "k8s.io/client-go/kubernetes/typed/certificates/v1/fake"
|
fakecertificatesv1 "k8s.io/client-go/kubernetes/typed/certificates/v1/fake"
|
||||||
|
certificatesv1alpha1 "k8s.io/client-go/kubernetes/typed/certificates/v1alpha1"
|
||||||
|
fakecertificatesv1alpha1 "k8s.io/client-go/kubernetes/typed/certificates/v1alpha1/fake"
|
||||||
certificatesv1beta1 "k8s.io/client-go/kubernetes/typed/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/client-go/kubernetes/typed/certificates/v1beta1"
|
||||||
fakecertificatesv1beta1 "k8s.io/client-go/kubernetes/typed/certificates/v1beta1/fake"
|
fakecertificatesv1beta1 "k8s.io/client-go/kubernetes/typed/certificates/v1beta1/fake"
|
||||||
coordinationv1 "k8s.io/client-go/kubernetes/typed/coordination/v1"
|
coordinationv1 "k8s.io/client-go/kubernetes/typed/coordination/v1"
|
||||||
@ -277,6 +279,11 @@ func (c *Clientset) CertificatesV1beta1() certificatesv1beta1.CertificatesV1beta
|
|||||||
return &fakecertificatesv1beta1.FakeCertificatesV1beta1{Fake: &c.Fake}
|
return &fakecertificatesv1beta1.FakeCertificatesV1beta1{Fake: &c.Fake}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// CertificatesV1alpha1 retrieves the CertificatesV1alpha1Client
|
||||||
|
func (c *Clientset) CertificatesV1alpha1() certificatesv1alpha1.CertificatesV1alpha1Interface {
|
||||||
|
return &fakecertificatesv1alpha1.FakeCertificatesV1alpha1{Fake: &c.Fake}
|
||||||
|
}
|
||||||
|
|
||||||
// CoordinationV1beta1 retrieves the CoordinationV1beta1Client
|
// CoordinationV1beta1 retrieves the CoordinationV1beta1Client
|
||||||
func (c *Clientset) CoordinationV1beta1() coordinationv1beta1.CoordinationV1beta1Interface {
|
func (c *Clientset) CoordinationV1beta1() coordinationv1beta1.CoordinationV1beta1Interface {
|
||||||
return &fakecoordinationv1beta1.FakeCoordinationV1beta1{Fake: &c.Fake}
|
return &fakecoordinationv1beta1.FakeCoordinationV1beta1{Fake: &c.Fake}
|
||||||
|
@ -38,6 +38,7 @@ import (
|
|||||||
batchv1 "k8s.io/api/batch/v1"
|
batchv1 "k8s.io/api/batch/v1"
|
||||||
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
||||||
certificatesv1 "k8s.io/api/certificates/v1"
|
certificatesv1 "k8s.io/api/certificates/v1"
|
||||||
|
certificatesv1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
||||||
coordinationv1 "k8s.io/api/coordination/v1"
|
coordinationv1 "k8s.io/api/coordination/v1"
|
||||||
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
||||||
@ -100,6 +101,7 @@ var localSchemeBuilder = runtime.SchemeBuilder{
|
|||||||
batchv1beta1.AddToScheme,
|
batchv1beta1.AddToScheme,
|
||||||
certificatesv1.AddToScheme,
|
certificatesv1.AddToScheme,
|
||||||
certificatesv1beta1.AddToScheme,
|
certificatesv1beta1.AddToScheme,
|
||||||
|
certificatesv1alpha1.AddToScheme,
|
||||||
coordinationv1beta1.AddToScheme,
|
coordinationv1beta1.AddToScheme,
|
||||||
coordinationv1.AddToScheme,
|
coordinationv1.AddToScheme,
|
||||||
corev1.AddToScheme,
|
corev1.AddToScheme,
|
||||||
|
@ -38,6 +38,7 @@ import (
|
|||||||
batchv1 "k8s.io/api/batch/v1"
|
batchv1 "k8s.io/api/batch/v1"
|
||||||
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
batchv1beta1 "k8s.io/api/batch/v1beta1"
|
||||||
certificatesv1 "k8s.io/api/certificates/v1"
|
certificatesv1 "k8s.io/api/certificates/v1"
|
||||||
|
certificatesv1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/api/certificates/v1beta1"
|
||||||
coordinationv1 "k8s.io/api/coordination/v1"
|
coordinationv1 "k8s.io/api/coordination/v1"
|
||||||
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
coordinationv1beta1 "k8s.io/api/coordination/v1beta1"
|
||||||
@ -100,6 +101,7 @@ var localSchemeBuilder = runtime.SchemeBuilder{
|
|||||||
batchv1beta1.AddToScheme,
|
batchv1beta1.AddToScheme,
|
||||||
certificatesv1.AddToScheme,
|
certificatesv1.AddToScheme,
|
||||||
certificatesv1beta1.AddToScheme,
|
certificatesv1beta1.AddToScheme,
|
||||||
|
certificatesv1alpha1.AddToScheme,
|
||||||
coordinationv1beta1.AddToScheme,
|
coordinationv1beta1.AddToScheme,
|
||||||
coordinationv1.AddToScheme,
|
coordinationv1.AddToScheme,
|
||||||
corev1.AddToScheme,
|
corev1.AddToScheme,
|
||||||
|
@ -0,0 +1,107 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
|
||||||
|
v1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
|
"k8s.io/client-go/kubernetes/scheme"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
type CertificatesV1alpha1Interface interface {
|
||||||
|
RESTClient() rest.Interface
|
||||||
|
ClusterTrustBundlesGetter
|
||||||
|
}
|
||||||
|
|
||||||
|
// CertificatesV1alpha1Client is used to interact with features provided by the certificates.k8s.io group.
|
||||||
|
type CertificatesV1alpha1Client struct {
|
||||||
|
restClient rest.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CertificatesV1alpha1Client) ClusterTrustBundles() ClusterTrustBundleInterface {
|
||||||
|
return newClusterTrustBundles(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewForConfig creates a new CertificatesV1alpha1Client for the given config.
|
||||||
|
// NewForConfig is equivalent to NewForConfigAndClient(c, httpClient),
|
||||||
|
// where httpClient was generated with rest.HTTPClientFor(c).
|
||||||
|
func NewForConfig(c *rest.Config) (*CertificatesV1alpha1Client, error) {
|
||||||
|
config := *c
|
||||||
|
if err := setConfigDefaults(&config); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
httpClient, err := rest.HTTPClientFor(&config)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return NewForConfigAndClient(&config, httpClient)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewForConfigAndClient creates a new CertificatesV1alpha1Client for the given config and http client.
|
||||||
|
// Note the http client provided takes precedence over the configured transport values.
|
||||||
|
func NewForConfigAndClient(c *rest.Config, h *http.Client) (*CertificatesV1alpha1Client, error) {
|
||||||
|
config := *c
|
||||||
|
if err := setConfigDefaults(&config); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
client, err := rest.RESTClientForConfigAndClient(&config, h)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &CertificatesV1alpha1Client{client}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewForConfigOrDie creates a new CertificatesV1alpha1Client for the given config and
|
||||||
|
// panics if there is an error in the config.
|
||||||
|
func NewForConfigOrDie(c *rest.Config) *CertificatesV1alpha1Client {
|
||||||
|
client, err := NewForConfig(c)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
|
||||||
|
// New creates a new CertificatesV1alpha1Client for the given RESTClient.
|
||||||
|
func New(c rest.Interface) *CertificatesV1alpha1Client {
|
||||||
|
return &CertificatesV1alpha1Client{c}
|
||||||
|
}
|
||||||
|
|
||||||
|
func setConfigDefaults(config *rest.Config) error {
|
||||||
|
gv := v1alpha1.SchemeGroupVersion
|
||||||
|
config.GroupVersion = &gv
|
||||||
|
config.APIPath = "/apis"
|
||||||
|
config.NegotiatedSerializer = scheme.Codecs.WithoutConversion()
|
||||||
|
|
||||||
|
if config.UserAgent == "" {
|
||||||
|
config.UserAgent = rest.DefaultKubernetesUserAgent()
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RESTClient returns a RESTClient that is used to communicate
|
||||||
|
// with API server by this client implementation.
|
||||||
|
func (c *CertificatesV1alpha1Client) RESTClient() rest.Interface {
|
||||||
|
if c == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return c.restClient
|
||||||
|
}
|
@ -0,0 +1,197 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
json "encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
v1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
certificatesv1alpha1 "k8s.io/client-go/applyconfigurations/certificates/v1alpha1"
|
||||||
|
scheme "k8s.io/client-go/kubernetes/scheme"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ClusterTrustBundlesGetter has a method to return a ClusterTrustBundleInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type ClusterTrustBundlesGetter interface {
|
||||||
|
ClusterTrustBundles() ClusterTrustBundleInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// ClusterTrustBundleInterface has methods to work with ClusterTrustBundle resources.
|
||||||
|
type ClusterTrustBundleInterface interface {
|
||||||
|
Create(ctx context.Context, clusterTrustBundle *v1alpha1.ClusterTrustBundle, opts v1.CreateOptions) (*v1alpha1.ClusterTrustBundle, error)
|
||||||
|
Update(ctx context.Context, clusterTrustBundle *v1alpha1.ClusterTrustBundle, opts v1.UpdateOptions) (*v1alpha1.ClusterTrustBundle, error)
|
||||||
|
Delete(ctx context.Context, name string, opts v1.DeleteOptions) error
|
||||||
|
DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error
|
||||||
|
Get(ctx context.Context, name string, opts v1.GetOptions) (*v1alpha1.ClusterTrustBundle, error)
|
||||||
|
List(ctx context.Context, opts v1.ListOptions) (*v1alpha1.ClusterTrustBundleList, error)
|
||||||
|
Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ClusterTrustBundle, err error)
|
||||||
|
Apply(ctx context.Context, clusterTrustBundle *certificatesv1alpha1.ClusterTrustBundleApplyConfiguration, opts v1.ApplyOptions) (result *v1alpha1.ClusterTrustBundle, err error)
|
||||||
|
ClusterTrustBundleExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// clusterTrustBundles implements ClusterTrustBundleInterface
|
||||||
|
type clusterTrustBundles struct {
|
||||||
|
client rest.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// newClusterTrustBundles returns a ClusterTrustBundles
|
||||||
|
func newClusterTrustBundles(c *CertificatesV1alpha1Client) *clusterTrustBundles {
|
||||||
|
return &clusterTrustBundles{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the clusterTrustBundle, and returns the corresponding clusterTrustBundle object, and an error if there is any.
|
||||||
|
func (c *clusterTrustBundles) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
result = &v1alpha1.ClusterTrustBundle{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ClusterTrustBundles that match those selectors.
|
||||||
|
func (c *clusterTrustBundles) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ClusterTrustBundleList, err error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
result = &v1alpha1.ClusterTrustBundleList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested clusterTrustBundles.
|
||||||
|
func (c *clusterTrustBundles) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
var timeout time.Duration
|
||||||
|
if opts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*opts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Watch(ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a clusterTrustBundle and creates it. Returns the server's representation of the clusterTrustBundle, and an error, if there is any.
|
||||||
|
func (c *clusterTrustBundles) Create(ctx context.Context, clusterTrustBundle *v1alpha1.ClusterTrustBundle, opts v1.CreateOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
result = &v1alpha1.ClusterTrustBundle{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(clusterTrustBundle).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a clusterTrustBundle and updates it. Returns the server's representation of the clusterTrustBundle, and an error, if there is any.
|
||||||
|
func (c *clusterTrustBundles) Update(ctx context.Context, clusterTrustBundle *v1alpha1.ClusterTrustBundle, opts v1.UpdateOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
result = &v1alpha1.ClusterTrustBundle{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
Name(clusterTrustBundle.Name).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(clusterTrustBundle).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the clusterTrustBundle and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *clusterTrustBundles) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
Name(name).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *clusterTrustBundles) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
var timeout time.Duration
|
||||||
|
if listOpts.TimeoutSeconds != nil {
|
||||||
|
timeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second
|
||||||
|
}
|
||||||
|
return c.client.Delete().
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
VersionedParams(&listOpts, scheme.ParameterCodec).
|
||||||
|
Timeout(timeout).
|
||||||
|
Body(&opts).
|
||||||
|
Do(ctx).
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched clusterTrustBundle.
|
||||||
|
func (c *clusterTrustBundles) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
result = &v1alpha1.ClusterTrustBundle{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
Name(name).
|
||||||
|
SubResource(subresources...).
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Body(data).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Apply takes the given apply declarative configuration, applies it and returns the applied clusterTrustBundle.
|
||||||
|
func (c *clusterTrustBundles) Apply(ctx context.Context, clusterTrustBundle *certificatesv1alpha1.ClusterTrustBundleApplyConfiguration, opts v1.ApplyOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
if clusterTrustBundle == nil {
|
||||||
|
return nil, fmt.Errorf("clusterTrustBundle provided to Apply must not be nil")
|
||||||
|
}
|
||||||
|
patchOpts := opts.ToPatchOptions()
|
||||||
|
data, err := json.Marshal(clusterTrustBundle)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
name := clusterTrustBundle.Name
|
||||||
|
if name == nil {
|
||||||
|
return nil, fmt.Errorf("clusterTrustBundle.Name must be provided to Apply")
|
||||||
|
}
|
||||||
|
result = &v1alpha1.ClusterTrustBundle{}
|
||||||
|
err = c.client.Patch(types.ApplyPatchType).
|
||||||
|
Resource("clustertrustbundles").
|
||||||
|
Name(*name).
|
||||||
|
VersionedParams(&patchOpts, scheme.ParameterCodec).
|
||||||
|
Body(data).
|
||||||
|
Do(ctx).
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
// This package has the automatically generated typed clients.
|
||||||
|
package v1alpha1
|
@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
// Package fake has the automatically generated clients.
|
||||||
|
package fake
|
@ -0,0 +1,40 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "k8s.io/client-go/kubernetes/typed/certificates/v1alpha1"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
type FakeCertificatesV1alpha1 struct {
|
||||||
|
*testing.Fake
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeCertificatesV1alpha1) ClusterTrustBundles() v1alpha1.ClusterTrustBundleInterface {
|
||||||
|
return &FakeClusterTrustBundles{c}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RESTClient returns a RESTClient that is used to communicate
|
||||||
|
// with API server by this client implementation.
|
||||||
|
func (c *FakeCertificatesV1alpha1) RESTClient() rest.Interface {
|
||||||
|
var ret *rest.RESTClient
|
||||||
|
return ret
|
||||||
|
}
|
@ -0,0 +1,145 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
json "encoding/json"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
v1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
certificatesv1alpha1 "k8s.io/client-go/applyconfigurations/certificates/v1alpha1"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeClusterTrustBundles implements ClusterTrustBundleInterface
|
||||||
|
type FakeClusterTrustBundles struct {
|
||||||
|
Fake *FakeCertificatesV1alpha1
|
||||||
|
}
|
||||||
|
|
||||||
|
var clustertrustbundlesResource = v1alpha1.SchemeGroupVersion.WithResource("clustertrustbundles")
|
||||||
|
|
||||||
|
var clustertrustbundlesKind = v1alpha1.SchemeGroupVersion.WithKind("ClusterTrustBundle")
|
||||||
|
|
||||||
|
// Get takes name of the clusterTrustBundle, and returns the corresponding clusterTrustBundle object, and an error if there is any.
|
||||||
|
func (c *FakeClusterTrustBundles) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewRootGetAction(clustertrustbundlesResource, name), &v1alpha1.ClusterTrustBundle{})
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ClusterTrustBundle), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of ClusterTrustBundles that match those selectors.
|
||||||
|
func (c *FakeClusterTrustBundles) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.ClusterTrustBundleList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewRootListAction(clustertrustbundlesResource, clustertrustbundlesKind, opts), &v1alpha1.ClusterTrustBundleList{})
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &v1alpha1.ClusterTrustBundleList{ListMeta: obj.(*v1alpha1.ClusterTrustBundleList).ListMeta}
|
||||||
|
for _, item := range obj.(*v1alpha1.ClusterTrustBundleList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested clusterTrustBundles.
|
||||||
|
func (c *FakeClusterTrustBundles) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewRootWatchAction(clustertrustbundlesResource, opts))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a clusterTrustBundle and creates it. Returns the server's representation of the clusterTrustBundle, and an error, if there is any.
|
||||||
|
func (c *FakeClusterTrustBundles) Create(ctx context.Context, clusterTrustBundle *v1alpha1.ClusterTrustBundle, opts v1.CreateOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewRootCreateAction(clustertrustbundlesResource, clusterTrustBundle), &v1alpha1.ClusterTrustBundle{})
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ClusterTrustBundle), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a clusterTrustBundle and updates it. Returns the server's representation of the clusterTrustBundle, and an error, if there is any.
|
||||||
|
func (c *FakeClusterTrustBundles) Update(ctx context.Context, clusterTrustBundle *v1alpha1.ClusterTrustBundle, opts v1.UpdateOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewRootUpdateAction(clustertrustbundlesResource, clusterTrustBundle), &v1alpha1.ClusterTrustBundle{})
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ClusterTrustBundle), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the clusterTrustBundle and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *FakeClusterTrustBundles) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewRootDeleteActionWithOptions(clustertrustbundlesResource, name, opts), &v1alpha1.ClusterTrustBundle{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *FakeClusterTrustBundles) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
|
||||||
|
action := testing.NewRootDeleteCollectionAction(clustertrustbundlesResource, listOpts)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &v1alpha1.ClusterTrustBundleList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched clusterTrustBundle.
|
||||||
|
func (c *FakeClusterTrustBundles) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewRootPatchSubresourceAction(clustertrustbundlesResource, name, pt, data, subresources...), &v1alpha1.ClusterTrustBundle{})
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ClusterTrustBundle), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Apply takes the given apply declarative configuration, applies it and returns the applied clusterTrustBundle.
|
||||||
|
func (c *FakeClusterTrustBundles) Apply(ctx context.Context, clusterTrustBundle *certificatesv1alpha1.ClusterTrustBundleApplyConfiguration, opts v1.ApplyOptions) (result *v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
if clusterTrustBundle == nil {
|
||||||
|
return nil, fmt.Errorf("clusterTrustBundle provided to Apply must not be nil")
|
||||||
|
}
|
||||||
|
data, err := json.Marshal(clusterTrustBundle)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
name := clusterTrustBundle.Name
|
||||||
|
if name == nil {
|
||||||
|
return nil, fmt.Errorf("clusterTrustBundle.Name must be provided to Apply")
|
||||||
|
}
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewRootPatchSubresourceAction(clustertrustbundlesResource, *name, types.ApplyPatchType, data), &v1alpha1.ClusterTrustBundle{})
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ClusterTrustBundle), err
|
||||||
|
}
|
@ -0,0 +1,21 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by client-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
type ClusterTrustBundleExpansion interface{}
|
@ -0,0 +1,68 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by lister-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1alpha1 "k8s.io/api/certificates/v1alpha1"
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
"k8s.io/client-go/tools/cache"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ClusterTrustBundleLister helps list ClusterTrustBundles.
|
||||||
|
// All objects returned here must be treated as read-only.
|
||||||
|
type ClusterTrustBundleLister interface {
|
||||||
|
// List lists all ClusterTrustBundles in the indexer.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
List(selector labels.Selector) (ret []*v1alpha1.ClusterTrustBundle, err error)
|
||||||
|
// Get retrieves the ClusterTrustBundle from the index for a given name.
|
||||||
|
// Objects returned here must be treated as read-only.
|
||||||
|
Get(name string) (*v1alpha1.ClusterTrustBundle, error)
|
||||||
|
ClusterTrustBundleListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// clusterTrustBundleLister implements the ClusterTrustBundleLister interface.
|
||||||
|
type clusterTrustBundleLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewClusterTrustBundleLister returns a new ClusterTrustBundleLister.
|
||||||
|
func NewClusterTrustBundleLister(indexer cache.Indexer) ClusterTrustBundleLister {
|
||||||
|
return &clusterTrustBundleLister{indexer: indexer}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all ClusterTrustBundles in the indexer.
|
||||||
|
func (s *clusterTrustBundleLister) List(selector labels.Selector) (ret []*v1alpha1.ClusterTrustBundle, err error) {
|
||||||
|
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*v1alpha1.ClusterTrustBundle))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get retrieves the ClusterTrustBundle from the index for a given name.
|
||||||
|
func (s *clusterTrustBundleLister) Get(name string) (*v1alpha1.ClusterTrustBundle, error) {
|
||||||
|
obj, exists, err := s.indexer.GetByKey(name)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, errors.NewNotFound(v1alpha1.Resource("clustertrustbundle"), name)
|
||||||
|
}
|
||||||
|
return obj.(*v1alpha1.ClusterTrustBundle), nil
|
||||||
|
}
|
@ -0,0 +1,23 @@
|
|||||||
|
/*
|
||||||
|
Copyright The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Code generated by lister-gen. DO NOT EDIT.
|
||||||
|
|
||||||
|
package v1alpha1
|
||||||
|
|
||||||
|
// ClusterTrustBundleListerExpansion allows custom methods to be added to
|
||||||
|
// ClusterTrustBundleLister.
|
||||||
|
type ClusterTrustBundleListerExpansion interface{}
|
Loading…
Reference in New Issue
Block a user