mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-13 02:33:34 +00:00
rebase: update kubernetes and libraries to v1.22.0 version
Kubernetes v1.22 version has been released and this update ceph csi dependencies to use the same version. Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
This commit is contained in:
committed by
mergify[bot]
parent
e077c1fdf5
commit
aa698bc3e1
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/clusterrole.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/clusterrole.go
generated
vendored
@ -49,7 +49,7 @@ func ClusterRole(name string) *ClusterRoleApplyConfiguration {
|
||||
// ExtractClusterRole extracts the applied configuration owned by fieldManager from
|
||||
// clusterRole. If no managedFields are found in clusterRole for fieldManager, a
|
||||
// ClusterRoleApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// clusterRole must be a unmodified ClusterRole API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func ClusterRole(name string) *ClusterRoleApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractClusterRole(clusterRole *apirbacv1.ClusterRole, fieldManager string) (*ClusterRoleApplyConfiguration, error) {
|
||||
return extractClusterRole(clusterRole, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractClusterRoleStatus is the same as ExtractClusterRole except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleStatus(clusterRole *apirbacv1.ClusterRole, fieldManager string) (*ClusterRoleApplyConfiguration, error) {
|
||||
return extractClusterRole(clusterRole, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractClusterRole(clusterRole *apirbacv1.ClusterRole, fieldManager string, subresource string) (*ClusterRoleApplyConfiguration, error) {
|
||||
b := &ClusterRoleApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(clusterRole, internal.Parser().Type("io.k8s.api.rbac.v1.ClusterRole"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(clusterRole, internal.Parser().Type("io.k8s.api.rbac.v1.ClusterRole"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/clusterrolebinding.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/clusterrolebinding.go
generated
vendored
@ -49,7 +49,7 @@ func ClusterRoleBinding(name string) *ClusterRoleBindingApplyConfiguration {
|
||||
// ExtractClusterRoleBinding extracts the applied configuration owned by fieldManager from
|
||||
// clusterRoleBinding. If no managedFields are found in clusterRoleBinding for fieldManager, a
|
||||
// ClusterRoleBindingApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// clusterRoleBinding must be a unmodified ClusterRoleBinding API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func ClusterRoleBinding(name string) *ClusterRoleBindingApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleBinding(clusterRoleBinding *apirbacv1.ClusterRoleBinding, fieldManager string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
return extractClusterRoleBinding(clusterRoleBinding, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractClusterRoleBindingStatus is the same as ExtractClusterRoleBinding except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleBindingStatus(clusterRoleBinding *apirbacv1.ClusterRoleBinding, fieldManager string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
return extractClusterRoleBinding(clusterRoleBinding, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractClusterRoleBinding(clusterRoleBinding *apirbacv1.ClusterRoleBinding, fieldManager string, subresource string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
b := &ClusterRoleBindingApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(clusterRoleBinding, internal.Parser().Type("io.k8s.api.rbac.v1.ClusterRoleBinding"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(clusterRoleBinding, internal.Parser().Type("io.k8s.api.rbac.v1.ClusterRoleBinding"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/role.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/role.go
generated
vendored
@ -49,7 +49,7 @@ func Role(name, namespace string) *RoleApplyConfiguration {
|
||||
// ExtractRole extracts the applied configuration owned by fieldManager from
|
||||
// role. If no managedFields are found in role for fieldManager, a
|
||||
// RoleApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// role must be a unmodified Role API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func Role(name, namespace string) *RoleApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractRole(role *apirbacv1.Role, fieldManager string) (*RoleApplyConfiguration, error) {
|
||||
return extractRole(role, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractRoleStatus is the same as ExtractRole except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractRoleStatus(role *apirbacv1.Role, fieldManager string) (*RoleApplyConfiguration, error) {
|
||||
return extractRole(role, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractRole(role *apirbacv1.Role, fieldManager string, subresource string) (*RoleApplyConfiguration, error) {
|
||||
b := &RoleApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(role, internal.Parser().Type("io.k8s.api.rbac.v1.Role"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(role, internal.Parser().Type("io.k8s.api.rbac.v1.Role"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/rolebinding.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1/rolebinding.go
generated
vendored
@ -50,7 +50,7 @@ func RoleBinding(name, namespace string) *RoleBindingApplyConfiguration {
|
||||
// ExtractRoleBinding extracts the applied configuration owned by fieldManager from
|
||||
// roleBinding. If no managedFields are found in roleBinding for fieldManager, a
|
||||
// RoleBindingApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// roleBinding must be a unmodified RoleBinding API object that was retrieved from the Kubernetes API.
|
||||
@ -59,8 +59,19 @@ func RoleBinding(name, namespace string) *RoleBindingApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractRoleBinding(roleBinding *apirbacv1.RoleBinding, fieldManager string) (*RoleBindingApplyConfiguration, error) {
|
||||
return extractRoleBinding(roleBinding, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractRoleBindingStatus is the same as ExtractRoleBinding except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractRoleBindingStatus(roleBinding *apirbacv1.RoleBinding, fieldManager string) (*RoleBindingApplyConfiguration, error) {
|
||||
return extractRoleBinding(roleBinding, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractRoleBinding(roleBinding *apirbacv1.RoleBinding, fieldManager string, subresource string) (*RoleBindingApplyConfiguration, error) {
|
||||
b := &RoleBindingApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(roleBinding, internal.Parser().Type("io.k8s.api.rbac.v1.RoleBinding"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(roleBinding, internal.Parser().Type("io.k8s.api.rbac.v1.RoleBinding"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/clusterrole.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/clusterrole.go
generated
vendored
@ -49,7 +49,7 @@ func ClusterRole(name string) *ClusterRoleApplyConfiguration {
|
||||
// ExtractClusterRole extracts the applied configuration owned by fieldManager from
|
||||
// clusterRole. If no managedFields are found in clusterRole for fieldManager, a
|
||||
// ClusterRoleApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// clusterRole must be a unmodified ClusterRole API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func ClusterRole(name string) *ClusterRoleApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractClusterRole(clusterRole *rbacv1alpha1.ClusterRole, fieldManager string) (*ClusterRoleApplyConfiguration, error) {
|
||||
return extractClusterRole(clusterRole, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractClusterRoleStatus is the same as ExtractClusterRole except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleStatus(clusterRole *rbacv1alpha1.ClusterRole, fieldManager string) (*ClusterRoleApplyConfiguration, error) {
|
||||
return extractClusterRole(clusterRole, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractClusterRole(clusterRole *rbacv1alpha1.ClusterRole, fieldManager string, subresource string) (*ClusterRoleApplyConfiguration, error) {
|
||||
b := &ClusterRoleApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(clusterRole, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.ClusterRole"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(clusterRole, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.ClusterRole"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/clusterrolebinding.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/clusterrolebinding.go
generated
vendored
@ -49,7 +49,7 @@ func ClusterRoleBinding(name string) *ClusterRoleBindingApplyConfiguration {
|
||||
// ExtractClusterRoleBinding extracts the applied configuration owned by fieldManager from
|
||||
// clusterRoleBinding. If no managedFields are found in clusterRoleBinding for fieldManager, a
|
||||
// ClusterRoleBindingApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// clusterRoleBinding must be a unmodified ClusterRoleBinding API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func ClusterRoleBinding(name string) *ClusterRoleBindingApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleBinding(clusterRoleBinding *rbacv1alpha1.ClusterRoleBinding, fieldManager string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
return extractClusterRoleBinding(clusterRoleBinding, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractClusterRoleBindingStatus is the same as ExtractClusterRoleBinding except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleBindingStatus(clusterRoleBinding *rbacv1alpha1.ClusterRoleBinding, fieldManager string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
return extractClusterRoleBinding(clusterRoleBinding, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractClusterRoleBinding(clusterRoleBinding *rbacv1alpha1.ClusterRoleBinding, fieldManager string, subresource string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
b := &ClusterRoleBindingApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(clusterRoleBinding, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.ClusterRoleBinding"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(clusterRoleBinding, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.ClusterRoleBinding"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/role.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/role.go
generated
vendored
@ -49,7 +49,7 @@ func Role(name, namespace string) *RoleApplyConfiguration {
|
||||
// ExtractRole extracts the applied configuration owned by fieldManager from
|
||||
// role. If no managedFields are found in role for fieldManager, a
|
||||
// RoleApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// role must be a unmodified Role API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func Role(name, namespace string) *RoleApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractRole(role *rbacv1alpha1.Role, fieldManager string) (*RoleApplyConfiguration, error) {
|
||||
return extractRole(role, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractRoleStatus is the same as ExtractRole except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractRoleStatus(role *rbacv1alpha1.Role, fieldManager string) (*RoleApplyConfiguration, error) {
|
||||
return extractRole(role, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractRole(role *rbacv1alpha1.Role, fieldManager string, subresource string) (*RoleApplyConfiguration, error) {
|
||||
b := &RoleApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(role, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.Role"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(role, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.Role"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/rolebinding.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1alpha1/rolebinding.go
generated
vendored
@ -50,7 +50,7 @@ func RoleBinding(name, namespace string) *RoleBindingApplyConfiguration {
|
||||
// ExtractRoleBinding extracts the applied configuration owned by fieldManager from
|
||||
// roleBinding. If no managedFields are found in roleBinding for fieldManager, a
|
||||
// RoleBindingApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// roleBinding must be a unmodified RoleBinding API object that was retrieved from the Kubernetes API.
|
||||
@ -59,8 +59,19 @@ func RoleBinding(name, namespace string) *RoleBindingApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractRoleBinding(roleBinding *rbacv1alpha1.RoleBinding, fieldManager string) (*RoleBindingApplyConfiguration, error) {
|
||||
return extractRoleBinding(roleBinding, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractRoleBindingStatus is the same as ExtractRoleBinding except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractRoleBindingStatus(roleBinding *rbacv1alpha1.RoleBinding, fieldManager string) (*RoleBindingApplyConfiguration, error) {
|
||||
return extractRoleBinding(roleBinding, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractRoleBinding(roleBinding *rbacv1alpha1.RoleBinding, fieldManager string, subresource string) (*RoleBindingApplyConfiguration, error) {
|
||||
b := &RoleBindingApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(roleBinding, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.RoleBinding"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(roleBinding, internal.Parser().Type("io.k8s.api.rbac.v1alpha1.RoleBinding"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/clusterrole.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/clusterrole.go
generated
vendored
@ -49,7 +49,7 @@ func ClusterRole(name string) *ClusterRoleApplyConfiguration {
|
||||
// ExtractClusterRole extracts the applied configuration owned by fieldManager from
|
||||
// clusterRole. If no managedFields are found in clusterRole for fieldManager, a
|
||||
// ClusterRoleApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// clusterRole must be a unmodified ClusterRole API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func ClusterRole(name string) *ClusterRoleApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractClusterRole(clusterRole *rbacv1beta1.ClusterRole, fieldManager string) (*ClusterRoleApplyConfiguration, error) {
|
||||
return extractClusterRole(clusterRole, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractClusterRoleStatus is the same as ExtractClusterRole except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleStatus(clusterRole *rbacv1beta1.ClusterRole, fieldManager string) (*ClusterRoleApplyConfiguration, error) {
|
||||
return extractClusterRole(clusterRole, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractClusterRole(clusterRole *rbacv1beta1.ClusterRole, fieldManager string, subresource string) (*ClusterRoleApplyConfiguration, error) {
|
||||
b := &ClusterRoleApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(clusterRole, internal.Parser().Type("io.k8s.api.rbac.v1beta1.ClusterRole"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(clusterRole, internal.Parser().Type("io.k8s.api.rbac.v1beta1.ClusterRole"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/clusterrolebinding.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/clusterrolebinding.go
generated
vendored
@ -49,7 +49,7 @@ func ClusterRoleBinding(name string) *ClusterRoleBindingApplyConfiguration {
|
||||
// ExtractClusterRoleBinding extracts the applied configuration owned by fieldManager from
|
||||
// clusterRoleBinding. If no managedFields are found in clusterRoleBinding for fieldManager, a
|
||||
// ClusterRoleBindingApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// clusterRoleBinding must be a unmodified ClusterRoleBinding API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func ClusterRoleBinding(name string) *ClusterRoleBindingApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleBinding(clusterRoleBinding *rbacv1beta1.ClusterRoleBinding, fieldManager string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
return extractClusterRoleBinding(clusterRoleBinding, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractClusterRoleBindingStatus is the same as ExtractClusterRoleBinding except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractClusterRoleBindingStatus(clusterRoleBinding *rbacv1beta1.ClusterRoleBinding, fieldManager string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
return extractClusterRoleBinding(clusterRoleBinding, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractClusterRoleBinding(clusterRoleBinding *rbacv1beta1.ClusterRoleBinding, fieldManager string, subresource string) (*ClusterRoleBindingApplyConfiguration, error) {
|
||||
b := &ClusterRoleBindingApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(clusterRoleBinding, internal.Parser().Type("io.k8s.api.rbac.v1beta1.ClusterRoleBinding"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(clusterRoleBinding, internal.Parser().Type("io.k8s.api.rbac.v1beta1.ClusterRoleBinding"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/role.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/role.go
generated
vendored
@ -49,7 +49,7 @@ func Role(name, namespace string) *RoleApplyConfiguration {
|
||||
// ExtractRole extracts the applied configuration owned by fieldManager from
|
||||
// role. If no managedFields are found in role for fieldManager, a
|
||||
// RoleApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// role must be a unmodified Role API object that was retrieved from the Kubernetes API.
|
||||
@ -58,8 +58,19 @@ func Role(name, namespace string) *RoleApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractRole(role *rbacv1beta1.Role, fieldManager string) (*RoleApplyConfiguration, error) {
|
||||
return extractRole(role, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractRoleStatus is the same as ExtractRole except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractRoleStatus(role *rbacv1beta1.Role, fieldManager string) (*RoleApplyConfiguration, error) {
|
||||
return extractRole(role, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractRole(role *rbacv1beta1.Role, fieldManager string, subresource string) (*RoleApplyConfiguration, error) {
|
||||
b := &RoleApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(role, internal.Parser().Type("io.k8s.api.rbac.v1beta1.Role"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(role, internal.Parser().Type("io.k8s.api.rbac.v1beta1.Role"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/rolebinding.go
generated
vendored
15
vendor/k8s.io/client-go/applyconfigurations/rbac/v1beta1/rolebinding.go
generated
vendored
@ -50,7 +50,7 @@ func RoleBinding(name, namespace string) *RoleBindingApplyConfiguration {
|
||||
// ExtractRoleBinding extracts the applied configuration owned by fieldManager from
|
||||
// roleBinding. If no managedFields are found in roleBinding for fieldManager, a
|
||||
// RoleBindingApplyConfiguration is returned with only the Name, Namespace (if applicable),
|
||||
// APIVersion and Kind populated. Is is possible that no managed fields were found for because other
|
||||
// APIVersion and Kind populated. It is possible that no managed fields were found for because other
|
||||
// field managers have taken ownership of all the fields previously owned by fieldManager, or because
|
||||
// the fieldManager never owned fields any fields.
|
||||
// roleBinding must be a unmodified RoleBinding API object that was retrieved from the Kubernetes API.
|
||||
@ -59,8 +59,19 @@ func RoleBinding(name, namespace string) *RoleBindingApplyConfiguration {
|
||||
// applied if another fieldManager has updated or force applied any of the previously applied fields.
|
||||
// Experimental!
|
||||
func ExtractRoleBinding(roleBinding *rbacv1beta1.RoleBinding, fieldManager string) (*RoleBindingApplyConfiguration, error) {
|
||||
return extractRoleBinding(roleBinding, fieldManager, "")
|
||||
}
|
||||
|
||||
// ExtractRoleBindingStatus is the same as ExtractRoleBinding except
|
||||
// that it extracts the status subresource applied configuration.
|
||||
// Experimental!
|
||||
func ExtractRoleBindingStatus(roleBinding *rbacv1beta1.RoleBinding, fieldManager string) (*RoleBindingApplyConfiguration, error) {
|
||||
return extractRoleBinding(roleBinding, fieldManager, "status")
|
||||
}
|
||||
|
||||
func extractRoleBinding(roleBinding *rbacv1beta1.RoleBinding, fieldManager string, subresource string) (*RoleBindingApplyConfiguration, error) {
|
||||
b := &RoleBindingApplyConfiguration{}
|
||||
err := managedfields.ExtractInto(roleBinding, internal.Parser().Type("io.k8s.api.rbac.v1beta1.RoleBinding"), fieldManager, b)
|
||||
err := managedfields.ExtractInto(roleBinding, internal.Parser().Type("io.k8s.api.rbac.v1beta1.RoleBinding"), fieldManager, b, subresource)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
Reference in New Issue
Block a user