mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 10:18:13 +00:00 
			
		
		
		
	Merge pull request #87791 from mikedanese/authexp
remove authn/z expansions
This commit is contained in:
		| @@ -40,7 +40,7 @@ const ( | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // TokenReview attempts to authenticate a token to a known user. | ||||
|   | ||||
| @@ -24,7 +24,7 @@ import ( | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // TokenReview attempts to authenticate a token to a known user. | ||||
|   | ||||
| @@ -24,7 +24,7 @@ import ( | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // SubjectAccessReview checks whether or not a user or group can perform an action. | ||||
| @@ -43,7 +43,7 @@ type SubjectAccessReview struct { | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // SelfSubjectAccessReview checks whether or the current user can perform an action.  Not filling in a | ||||
| @@ -63,7 +63,7 @@ type SelfSubjectAccessReview struct { | ||||
| } | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. | ||||
| @@ -189,7 +189,7 @@ type SubjectAccessReviewStatus struct { | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. | ||||
|   | ||||
| @@ -24,7 +24,7 @@ import ( | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // SubjectAccessReview checks whether or not a user or group can perform an action. | ||||
| @@ -43,7 +43,7 @@ type SubjectAccessReview struct { | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // SelfSubjectAccessReview checks whether or the current user can perform an action.  Not filling in a | ||||
| @@ -63,7 +63,7 @@ type SelfSubjectAccessReview struct { | ||||
| } | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // LocalSubjectAccessReview checks whether or not a user or group can perform an action in a given namespace. | ||||
| @@ -189,7 +189,7 @@ type SubjectAccessReviewStatus struct { | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:nonNamespaced | ||||
| // +genclient:noVerbs | ||||
| // +genclient:onlyVerbs=create | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // SelfSubjectRulesReview enumerates the set of actions the current user can perform within a namespace. | ||||
|   | ||||
| @@ -4061,6 +4061,7 @@ type ServiceList struct { | ||||
| } | ||||
|  | ||||
| // +genclient | ||||
| // +genclient:method=CreateToken,verb=create,subresource=token,input=k8s.io/api/authentication/v1.TokenRequest,result=k8s.io/api/authentication/v1.TokenRequest | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // ServiceAccount binds together: | ||||
|   | ||||
| @@ -17,6 +17,7 @@ go_library( | ||||
|     importpath = "k8s.io/client-go/kubernetes/typed/authentication/v1/fake", | ||||
|     deps = [ | ||||
|         "//staging/src/k8s.io/api/authentication/v1:go_default_library", | ||||
|         "//staging/src/k8s.io/apimachinery/pkg/runtime/schema:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/kubernetes/typed/authentication/v1:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/rest:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/testing:go_default_library", | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1 "k8s.io/api/authentication/v1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeTokenReviews implements TokenReviewInterface | ||||
| type FakeTokenReviews struct { | ||||
| 	Fake *FakeAuthenticationV1 | ||||
| } | ||||
|  | ||||
| var tokenreviewsResource = schema.GroupVersionResource{Group: "authentication.k8s.io", Version: "v1", Resource: "tokenreviews"} | ||||
|  | ||||
| var tokenreviewsKind = schema.GroupVersionKind{Group: "authentication.k8s.io", Version: "v1", Kind: "TokenReview"} | ||||
|  | ||||
| // Create takes the representation of a tokenReview and creates it.  Returns the server's representation of the tokenReview, and an error, if there is any. | ||||
| func (c *FakeTokenReviews) Create(tokenReview *v1.TokenReview) (result *v1.TokenReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(tokenreviewsResource, tokenReview), &v1.TokenReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1.TokenReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeTokenReviews) Create(tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), tokenReview) | ||||
| } | ||||
|  | ||||
| func (c *FakeTokenReviews) CreateContext(ctx context.Context, tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authenticationapi.SchemeGroupVersion.WithResource("tokenreviews"), tokenReview), &authenticationapi.TokenReview{}) | ||||
| 	return obj.(*authenticationapi.TokenReview), err | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1 "k8s.io/api/authentication/v1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type TokenReviewsGetter interface { | ||||
|  | ||||
| // TokenReviewInterface has methods to work with TokenReview resources. | ||||
| type TokenReviewInterface interface { | ||||
| 	Create(*v1.TokenReview) (*v1.TokenReview, error) | ||||
| 	TokenReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newTokenReviews(c *AuthenticationV1Client) *tokenReviews { | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a tokenReview and creates it.  Returns the server's representation of the tokenReview, and an error, if there is any. | ||||
| func (c *tokenReviews) Create(tokenReview *v1.TokenReview) (result *v1.TokenReview, err error) { | ||||
| 	result = &v1.TokenReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("tokenreviews"). | ||||
| 		Body(tokenReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type TokenReviewExpansion interface { | ||||
| 	Create(tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) | ||||
| 	CreateContext(ctx context.Context, tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *tokenReviews) Create(tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), tokenReview) | ||||
| } | ||||
|  | ||||
| func (c *tokenReviews) CreateContext(ctx context.Context, tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	result = &authenticationapi.TokenReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -17,6 +17,7 @@ go_library( | ||||
|     importpath = "k8s.io/client-go/kubernetes/typed/authentication/v1beta1/fake", | ||||
|     deps = [ | ||||
|         "//staging/src/k8s.io/api/authentication/v1beta1:go_default_library", | ||||
|         "//staging/src/k8s.io/apimachinery/pkg/runtime/schema:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/kubernetes/typed/authentication/v1beta1:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/rest:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/testing:go_default_library", | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1beta1 "k8s.io/api/authentication/v1beta1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeTokenReviews implements TokenReviewInterface | ||||
| type FakeTokenReviews struct { | ||||
| 	Fake *FakeAuthenticationV1beta1 | ||||
| } | ||||
|  | ||||
| var tokenreviewsResource = schema.GroupVersionResource{Group: "authentication.k8s.io", Version: "v1beta1", Resource: "tokenreviews"} | ||||
|  | ||||
| var tokenreviewsKind = schema.GroupVersionKind{Group: "authentication.k8s.io", Version: "v1beta1", Kind: "TokenReview"} | ||||
|  | ||||
| // Create takes the representation of a tokenReview and creates it.  Returns the server's representation of the tokenReview, and an error, if there is any. | ||||
| func (c *FakeTokenReviews) Create(tokenReview *v1beta1.TokenReview) (result *v1beta1.TokenReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(tokenreviewsResource, tokenReview), &v1beta1.TokenReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1beta1.TokenReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeTokenReviews) Create(tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), tokenReview) | ||||
| } | ||||
|  | ||||
| func (c *FakeTokenReviews) CreateContext(ctx context.Context, tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authenticationapi.SchemeGroupVersion.WithResource("tokenreviews"), tokenReview), &authenticationapi.TokenReview{}) | ||||
| 	return obj.(*authenticationapi.TokenReview), err | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1beta1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1beta1 "k8s.io/api/authentication/v1beta1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type TokenReviewsGetter interface { | ||||
|  | ||||
| // TokenReviewInterface has methods to work with TokenReview resources. | ||||
| type TokenReviewInterface interface { | ||||
| 	Create(*v1beta1.TokenReview) (*v1beta1.TokenReview, error) | ||||
| 	TokenReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newTokenReviews(c *AuthenticationV1beta1Client) *tokenReviews { | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a tokenReview and creates it.  Returns the server's representation of the tokenReview, and an error, if there is any. | ||||
| func (c *tokenReviews) Create(tokenReview *v1beta1.TokenReview) (result *v1beta1.TokenReview, err error) { | ||||
| 	result = &v1beta1.TokenReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("tokenreviews"). | ||||
| 		Body(tokenReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type TokenReviewExpansion interface { | ||||
| 	Create(tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) | ||||
| 	CreateContext(ctx context.Context, tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *tokenReviews) Create(tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), tokenReview) | ||||
| } | ||||
|  | ||||
| func (c *tokenReviews) CreateContext(ctx context.Context, tokenReview *authenticationapi.TokenReview) (result *authenticationapi.TokenReview, err error) { | ||||
| 	result = &authenticationapi.TokenReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -23,6 +23,7 @@ go_library( | ||||
|     importpath = "k8s.io/client-go/kubernetes/typed/authorization/v1/fake", | ||||
|     deps = [ | ||||
|         "//staging/src/k8s.io/api/authorization/v1:go_default_library", | ||||
|         "//staging/src/k8s.io/apimachinery/pkg/runtime/schema:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/kubernetes/typed/authorization/v1:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/rest:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/testing:go_default_library", | ||||
|   | ||||
| @@ -18,8 +18,29 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeLocalSubjectAccessReviews implements LocalSubjectAccessReviewInterface | ||||
| type FakeLocalSubjectAccessReviews struct { | ||||
| 	Fake *FakeAuthorizationV1 | ||||
| 	ns   string | ||||
| } | ||||
|  | ||||
| var localsubjectaccessreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1", Resource: "localsubjectaccessreviews"} | ||||
|  | ||||
| var localsubjectaccessreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1", Kind: "LocalSubjectAccessReview"} | ||||
|  | ||||
| // Create takes the representation of a localSubjectAccessReview and creates it.  Returns the server's representation of the localSubjectAccessReview, and an error, if there is any. | ||||
| func (c *FakeLocalSubjectAccessReviews) Create(localSubjectAccessReview *v1.LocalSubjectAccessReview) (result *v1.LocalSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewCreateAction(localsubjectaccessreviewsResource, c.ns, localSubjectAccessReview), &v1.LocalSubjectAccessReview{}) | ||||
|  | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1.LocalSubjectAccessReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeLocalSubjectAccessReviews) Create(sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *FakeLocalSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewCreateAction(authorizationapi.SchemeGroupVersion.WithResource("localsubjectaccessreviews"), c.ns, sar), &authorizationapi.SubjectAccessReview{}) | ||||
| 	return obj.(*authorizationapi.LocalSubjectAccessReview), err | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeSelfSubjectAccessReviews implements SelfSubjectAccessReviewInterface | ||||
| type FakeSelfSubjectAccessReviews struct { | ||||
| 	Fake *FakeAuthorizationV1 | ||||
| } | ||||
|  | ||||
| var selfsubjectaccessreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1", Resource: "selfsubjectaccessreviews"} | ||||
|  | ||||
| var selfsubjectaccessreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1", Kind: "SelfSubjectAccessReview"} | ||||
|  | ||||
| // Create takes the representation of a selfSubjectAccessReview and creates it.  Returns the server's representation of the selfSubjectAccessReview, and an error, if there is any. | ||||
| func (c *FakeSelfSubjectAccessReviews) Create(selfSubjectAccessReview *v1.SelfSubjectAccessReview) (result *v1.SelfSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(selfsubjectaccessreviewsResource, selfSubjectAccessReview), &v1.SelfSubjectAccessReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1.SelfSubjectAccessReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeSelfSubjectAccessReviews) Create(sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *FakeSelfSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authorizationapi.SchemeGroupVersion.WithResource("selfsubjectaccessreviews"), sar), &authorizationapi.SelfSubjectAccessReview{}) | ||||
| 	return obj.(*authorizationapi.SelfSubjectAccessReview), err | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeSelfSubjectRulesReviews implements SelfSubjectRulesReviewInterface | ||||
| type FakeSelfSubjectRulesReviews struct { | ||||
| 	Fake *FakeAuthorizationV1 | ||||
| } | ||||
|  | ||||
| var selfsubjectrulesreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1", Resource: "selfsubjectrulesreviews"} | ||||
|  | ||||
| var selfsubjectrulesreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1", Kind: "SelfSubjectRulesReview"} | ||||
|  | ||||
| // Create takes the representation of a selfSubjectRulesReview and creates it.  Returns the server's representation of the selfSubjectRulesReview, and an error, if there is any. | ||||
| func (c *FakeSelfSubjectRulesReviews) Create(selfSubjectRulesReview *v1.SelfSubjectRulesReview) (result *v1.SelfSubjectRulesReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(selfsubjectrulesreviewsResource, selfSubjectRulesReview), &v1.SelfSubjectRulesReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1.SelfSubjectRulesReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeSelfSubjectRulesReviews) Create(srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), srr) | ||||
| } | ||||
|  | ||||
| func (c *FakeSelfSubjectRulesReviews) CreateContext(ctx context.Context, srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authorizationapi.SchemeGroupVersion.WithResource("selfsubjectrulesreviews"), srr), &authorizationapi.SelfSubjectRulesReview{}) | ||||
| 	return obj.(*authorizationapi.SelfSubjectRulesReview), err | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeSubjectAccessReviews implements SubjectAccessReviewInterface | ||||
| type FakeSubjectAccessReviews struct { | ||||
| 	Fake *FakeAuthorizationV1 | ||||
| } | ||||
|  | ||||
| var subjectaccessreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1", Resource: "subjectaccessreviews"} | ||||
|  | ||||
| var subjectaccessreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1", Kind: "SubjectAccessReview"} | ||||
|  | ||||
| // Create takes the representation of a subjectAccessReview and creates it.  Returns the server's representation of the subjectAccessReview, and an error, if there is any. | ||||
| func (c *FakeSubjectAccessReviews) Create(subjectAccessReview *v1.SubjectAccessReview) (result *v1.SubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(subjectaccessreviewsResource, subjectAccessReview), &v1.SubjectAccessReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1.SubjectAccessReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeSubjectAccessReviews) Create(sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *FakeSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authorizationapi.SchemeGroupVersion.WithResource("subjectaccessreviews"), sar), &authorizationapi.SubjectAccessReview{}) | ||||
| 	if obj == nil { | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type LocalSubjectAccessReviewsGetter interface { | ||||
|  | ||||
| // LocalSubjectAccessReviewInterface has methods to work with LocalSubjectAccessReview resources. | ||||
| type LocalSubjectAccessReviewInterface interface { | ||||
| 	Create(*v1.LocalSubjectAccessReview) (*v1.LocalSubjectAccessReview, error) | ||||
| 	LocalSubjectAccessReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -46,3 +50,15 @@ func newLocalSubjectAccessReviews(c *AuthorizationV1Client, namespace string) *l | ||||
| 		ns:     namespace, | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a localSubjectAccessReview and creates it.  Returns the server's representation of the localSubjectAccessReview, and an error, if there is any. | ||||
| func (c *localSubjectAccessReviews) Create(localSubjectAccessReview *v1.LocalSubjectAccessReview) (result *v1.LocalSubjectAccessReview, err error) { | ||||
| 	result = &v1.LocalSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Namespace(c.ns). | ||||
| 		Resource("localsubjectaccessreviews"). | ||||
| 		Body(localSubjectAccessReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type LocalSubjectAccessReviewExpansion interface { | ||||
| 	Create(sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) | ||||
| 	CreateContext(ctx context.Context, sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *localSubjectAccessReviews) Create(sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *localSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	result = &authorizationapi.LocalSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type SelfSubjectAccessReviewsGetter interface { | ||||
|  | ||||
| // SelfSubjectAccessReviewInterface has methods to work with SelfSubjectAccessReview resources. | ||||
| type SelfSubjectAccessReviewInterface interface { | ||||
| 	Create(*v1.SelfSubjectAccessReview) (*v1.SelfSubjectAccessReview, error) | ||||
| 	SelfSubjectAccessReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newSelfSubjectAccessReviews(c *AuthorizationV1Client) *selfSubjectAccessRev | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a selfSubjectAccessReview and creates it.  Returns the server's representation of the selfSubjectAccessReview, and an error, if there is any. | ||||
| func (c *selfSubjectAccessReviews) Create(selfSubjectAccessReview *v1.SelfSubjectAccessReview) (result *v1.SelfSubjectAccessReview, err error) { | ||||
| 	result = &v1.SelfSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("selfsubjectaccessreviews"). | ||||
| 		Body(selfSubjectAccessReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type SelfSubjectAccessReviewExpansion interface { | ||||
| 	Create(sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) | ||||
| 	CreateContext(ctx context.Context, sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectAccessReviews) Create(sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	result = &authorizationapi.SelfSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type SelfSubjectRulesReviewsGetter interface { | ||||
|  | ||||
| // SelfSubjectRulesReviewInterface has methods to work with SelfSubjectRulesReview resources. | ||||
| type SelfSubjectRulesReviewInterface interface { | ||||
| 	Create(*v1.SelfSubjectRulesReview) (*v1.SelfSubjectRulesReview, error) | ||||
| 	SelfSubjectRulesReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newSelfSubjectRulesReviews(c *AuthorizationV1Client) *selfSubjectRulesRevie | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a selfSubjectRulesReview and creates it.  Returns the server's representation of the selfSubjectRulesReview, and an error, if there is any. | ||||
| func (c *selfSubjectRulesReviews) Create(selfSubjectRulesReview *v1.SelfSubjectRulesReview) (result *v1.SelfSubjectRulesReview, err error) { | ||||
| 	result = &v1.SelfSubjectRulesReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("selfsubjectrulesreviews"). | ||||
| 		Body(selfSubjectRulesReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type SelfSubjectRulesReviewExpansion interface { | ||||
| 	Create(srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) | ||||
| 	CreateContext(ctx context.Context, srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectRulesReviews) Create(srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), srr) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectRulesReviews) CreateContext(ctx context.Context, srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	result = &authorizationapi.SelfSubjectRulesReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1 "k8s.io/api/authorization/v1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type SubjectAccessReviewsGetter interface { | ||||
|  | ||||
| // SubjectAccessReviewInterface has methods to work with SubjectAccessReview resources. | ||||
| type SubjectAccessReviewInterface interface { | ||||
| 	Create(*v1.SubjectAccessReview) (*v1.SubjectAccessReview, error) | ||||
| 	SubjectAccessReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newSubjectAccessReviews(c *AuthorizationV1Client) *subjectAccessReviews { | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a subjectAccessReview and creates it.  Returns the server's representation of the subjectAccessReview, and an error, if there is any. | ||||
| func (c *subjectAccessReviews) Create(subjectAccessReview *v1.SubjectAccessReview) (result *v1.SubjectAccessReview, err error) { | ||||
| 	result = &v1.SubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("subjectaccessreviews"). | ||||
| 		Body(subjectAccessReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -24,14 +24,9 @@ import ( | ||||
|  | ||||
| // The SubjectAccessReviewExpansion interface allows manually adding extra methods to the AuthorizationInterface. | ||||
| type SubjectAccessReviewExpansion interface { | ||||
| 	Create(sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) | ||||
| 	CreateContext(ctx context.Context, sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *subjectAccessReviews) Create(sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *subjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	result = &authorizationapi.SubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -24,6 +24,7 @@ go_library( | ||||
|     importpath = "k8s.io/client-go/kubernetes/typed/authorization/v1beta1/fake", | ||||
|     deps = [ | ||||
|         "//staging/src/k8s.io/api/authorization/v1beta1:go_default_library", | ||||
|         "//staging/src/k8s.io/apimachinery/pkg/runtime/schema:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/kubernetes/typed/authorization/v1beta1:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/rest:go_default_library", | ||||
|         "//staging/src/k8s.io/client-go/testing:go_default_library", | ||||
|   | ||||
| @@ -18,8 +18,29 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeLocalSubjectAccessReviews implements LocalSubjectAccessReviewInterface | ||||
| type FakeLocalSubjectAccessReviews struct { | ||||
| 	Fake *FakeAuthorizationV1beta1 | ||||
| 	ns   string | ||||
| } | ||||
|  | ||||
| var localsubjectaccessreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1beta1", Resource: "localsubjectaccessreviews"} | ||||
|  | ||||
| var localsubjectaccessreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1beta1", Kind: "LocalSubjectAccessReview"} | ||||
|  | ||||
| // Create takes the representation of a localSubjectAccessReview and creates it.  Returns the server's representation of the localSubjectAccessReview, and an error, if there is any. | ||||
| func (c *FakeLocalSubjectAccessReviews) Create(localSubjectAccessReview *v1beta1.LocalSubjectAccessReview) (result *v1beta1.LocalSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewCreateAction(localsubjectaccessreviewsResource, c.ns, localSubjectAccessReview), &v1beta1.LocalSubjectAccessReview{}) | ||||
|  | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1beta1.LocalSubjectAccessReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeLocalSubjectAccessReviews) Create(sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *FakeLocalSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewCreateAction(authorizationapi.SchemeGroupVersion.WithResource("localsubjectaccessreviews"), c.ns, sar), &authorizationapi.SubjectAccessReview{}) | ||||
| 	return obj.(*authorizationapi.LocalSubjectAccessReview), err | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeSelfSubjectAccessReviews implements SelfSubjectAccessReviewInterface | ||||
| type FakeSelfSubjectAccessReviews struct { | ||||
| 	Fake *FakeAuthorizationV1beta1 | ||||
| } | ||||
|  | ||||
| var selfsubjectaccessreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1beta1", Resource: "selfsubjectaccessreviews"} | ||||
|  | ||||
| var selfsubjectaccessreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1beta1", Kind: "SelfSubjectAccessReview"} | ||||
|  | ||||
| // Create takes the representation of a selfSubjectAccessReview and creates it.  Returns the server's representation of the selfSubjectAccessReview, and an error, if there is any. | ||||
| func (c *FakeSelfSubjectAccessReviews) Create(selfSubjectAccessReview *v1beta1.SelfSubjectAccessReview) (result *v1beta1.SelfSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(selfsubjectaccessreviewsResource, selfSubjectAccessReview), &v1beta1.SelfSubjectAccessReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1beta1.SelfSubjectAccessReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeSelfSubjectAccessReviews) Create(sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *FakeSelfSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authorizationapi.SchemeGroupVersion.WithResource("selfsubjectaccessreviews"), sar), &authorizationapi.SelfSubjectAccessReview{}) | ||||
| 	return obj.(*authorizationapi.SelfSubjectAccessReview), err | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeSelfSubjectRulesReviews implements SelfSubjectRulesReviewInterface | ||||
| type FakeSelfSubjectRulesReviews struct { | ||||
| 	Fake *FakeAuthorizationV1beta1 | ||||
| } | ||||
|  | ||||
| var selfsubjectrulesreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1beta1", Resource: "selfsubjectrulesreviews"} | ||||
|  | ||||
| var selfsubjectrulesreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1beta1", Kind: "SelfSubjectRulesReview"} | ||||
|  | ||||
| // Create takes the representation of a selfSubjectRulesReview and creates it.  Returns the server's representation of the selfSubjectRulesReview, and an error, if there is any. | ||||
| func (c *FakeSelfSubjectRulesReviews) Create(selfSubjectRulesReview *v1beta1.SelfSubjectRulesReview) (result *v1beta1.SelfSubjectRulesReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(selfsubjectrulesreviewsResource, selfSubjectRulesReview), &v1beta1.SelfSubjectRulesReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1beta1.SelfSubjectRulesReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeSelfSubjectRulesReviews) Create(srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), srr) | ||||
| } | ||||
|  | ||||
| func (c *FakeSelfSubjectRulesReviews) CreateContext(ctx context.Context, srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authorizationapi.SchemeGroupVersion.WithResource("selfsubjectrulesreviews"), srr), &authorizationapi.SelfSubjectRulesReview{}) | ||||
| 	return obj.(*authorizationapi.SelfSubjectRulesReview), err | ||||
|   | ||||
| @@ -18,7 +18,27 @@ limitations under the License. | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	schema "k8s.io/apimachinery/pkg/runtime/schema" | ||||
| 	testing "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| // FakeSubjectAccessReviews implements SubjectAccessReviewInterface | ||||
| type FakeSubjectAccessReviews struct { | ||||
| 	Fake *FakeAuthorizationV1beta1 | ||||
| } | ||||
|  | ||||
| var subjectaccessreviewsResource = schema.GroupVersionResource{Group: "authorization.k8s.io", Version: "v1beta1", Resource: "subjectaccessreviews"} | ||||
|  | ||||
| var subjectaccessreviewsKind = schema.GroupVersionKind{Group: "authorization.k8s.io", Version: "v1beta1", Kind: "SubjectAccessReview"} | ||||
|  | ||||
| // Create takes the representation of a subjectAccessReview and creates it.  Returns the server's representation of the subjectAccessReview, and an error, if there is any. | ||||
| func (c *FakeSubjectAccessReviews) Create(subjectAccessReview *v1beta1.SubjectAccessReview) (result *v1beta1.SubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewRootCreateAction(subjectaccessreviewsResource, subjectAccessReview), &v1beta1.SubjectAccessReview{}) | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*v1beta1.SubjectAccessReview), err | ||||
| } | ||||
|   | ||||
| @@ -23,10 +23,6 @@ import ( | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeSubjectAccessReviews) Create(sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *FakeSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewRootCreateAction(authorizationapi.SchemeGroupVersion.WithResource("subjectaccessreviews"), sar), &authorizationapi.SubjectAccessReview{}) | ||||
| 	return obj.(*authorizationapi.SubjectAccessReview), err | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1beta1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type LocalSubjectAccessReviewsGetter interface { | ||||
|  | ||||
| // LocalSubjectAccessReviewInterface has methods to work with LocalSubjectAccessReview resources. | ||||
| type LocalSubjectAccessReviewInterface interface { | ||||
| 	Create(*v1beta1.LocalSubjectAccessReview) (*v1beta1.LocalSubjectAccessReview, error) | ||||
| 	LocalSubjectAccessReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -46,3 +50,15 @@ func newLocalSubjectAccessReviews(c *AuthorizationV1beta1Client, namespace strin | ||||
| 		ns:     namespace, | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a localSubjectAccessReview and creates it.  Returns the server's representation of the localSubjectAccessReview, and an error, if there is any. | ||||
| func (c *localSubjectAccessReviews) Create(localSubjectAccessReview *v1beta1.LocalSubjectAccessReview) (result *v1beta1.LocalSubjectAccessReview, err error) { | ||||
| 	result = &v1beta1.LocalSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Namespace(c.ns). | ||||
| 		Resource("localsubjectaccessreviews"). | ||||
| 		Body(localSubjectAccessReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type LocalSubjectAccessReviewExpansion interface { | ||||
| 	Create(sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) | ||||
| 	CreateContext(ctx context.Context, sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *localSubjectAccessReviews) Create(sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *localSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.LocalSubjectAccessReview) (result *authorizationapi.LocalSubjectAccessReview, err error) { | ||||
| 	result = &authorizationapi.LocalSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1beta1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type SelfSubjectAccessReviewsGetter interface { | ||||
|  | ||||
| // SelfSubjectAccessReviewInterface has methods to work with SelfSubjectAccessReview resources. | ||||
| type SelfSubjectAccessReviewInterface interface { | ||||
| 	Create(*v1beta1.SelfSubjectAccessReview) (*v1beta1.SelfSubjectAccessReview, error) | ||||
| 	SelfSubjectAccessReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newSelfSubjectAccessReviews(c *AuthorizationV1beta1Client) *selfSubjectAcce | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a selfSubjectAccessReview and creates it.  Returns the server's representation of the selfSubjectAccessReview, and an error, if there is any. | ||||
| func (c *selfSubjectAccessReviews) Create(selfSubjectAccessReview *v1beta1.SelfSubjectAccessReview) (result *v1beta1.SelfSubjectAccessReview, err error) { | ||||
| 	result = &v1beta1.SelfSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("selfsubjectaccessreviews"). | ||||
| 		Body(selfSubjectAccessReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type SelfSubjectAccessReviewExpansion interface { | ||||
| 	Create(sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) | ||||
| 	CreateContext(ctx context.Context, sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectAccessReviews) Create(sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SelfSubjectAccessReview) (result *authorizationapi.SelfSubjectAccessReview, err error) { | ||||
| 	result = &authorizationapi.SelfSubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1beta1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type SelfSubjectRulesReviewsGetter interface { | ||||
|  | ||||
| // SelfSubjectRulesReviewInterface has methods to work with SelfSubjectRulesReview resources. | ||||
| type SelfSubjectRulesReviewInterface interface { | ||||
| 	Create(*v1beta1.SelfSubjectRulesReview) (*v1beta1.SelfSubjectRulesReview, error) | ||||
| 	SelfSubjectRulesReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newSelfSubjectRulesReviews(c *AuthorizationV1beta1Client) *selfSubjectRules | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a selfSubjectRulesReview and creates it.  Returns the server's representation of the selfSubjectRulesReview, and an error, if there is any. | ||||
| func (c *selfSubjectRulesReviews) Create(selfSubjectRulesReview *v1beta1.SelfSubjectRulesReview) (result *v1beta1.SelfSubjectRulesReview, err error) { | ||||
| 	result = &v1beta1.SelfSubjectRulesReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("selfsubjectrulesreviews"). | ||||
| 		Body(selfSubjectRulesReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -23,14 +23,9 @@ import ( | ||||
| ) | ||||
|  | ||||
| type SelfSubjectRulesReviewExpansion interface { | ||||
| 	Create(srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) | ||||
| 	CreateContext(ctx context.Context, srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectRulesReviews) Create(srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), srr) | ||||
| } | ||||
|  | ||||
| func (c *selfSubjectRulesReviews) CreateContext(ctx context.Context, srr *authorizationapi.SelfSubjectRulesReview) (result *authorizationapi.SelfSubjectRulesReview, err error) { | ||||
| 	result = &authorizationapi.SelfSubjectRulesReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -19,6 +19,9 @@ limitations under the License. | ||||
| package v1beta1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	v1beta1 "k8s.io/api/authorization/v1beta1" | ||||
| 	rest "k8s.io/client-go/rest" | ||||
| ) | ||||
|  | ||||
| @@ -30,6 +33,7 @@ type SubjectAccessReviewsGetter interface { | ||||
|  | ||||
| // SubjectAccessReviewInterface has methods to work with SubjectAccessReview resources. | ||||
| type SubjectAccessReviewInterface interface { | ||||
| 	Create(*v1beta1.SubjectAccessReview) (*v1beta1.SubjectAccessReview, error) | ||||
| 	SubjectAccessReviewExpansion | ||||
| } | ||||
|  | ||||
| @@ -44,3 +48,14 @@ func newSubjectAccessReviews(c *AuthorizationV1beta1Client) *subjectAccessReview | ||||
| 		client: c.RESTClient(), | ||||
| 	} | ||||
| } | ||||
|  | ||||
| // Create takes the representation of a subjectAccessReview and creates it.  Returns the server's representation of the subjectAccessReview, and an error, if there is any. | ||||
| func (c *subjectAccessReviews) Create(subjectAccessReview *v1beta1.SubjectAccessReview) (result *v1beta1.SubjectAccessReview, err error) { | ||||
| 	result = &v1beta1.SubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
| 		Resource("subjectaccessreviews"). | ||||
| 		Body(subjectAccessReview). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -24,14 +24,9 @@ import ( | ||||
|  | ||||
| // The SubjectAccessReviewExpansion interface allows manually adding extra methods to the AuthorizationInterface. | ||||
| type SubjectAccessReviewExpansion interface { | ||||
| 	Create(sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) | ||||
| 	CreateContext(ctx context.Context, sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) | ||||
| } | ||||
|  | ||||
| func (c *subjectAccessReviews) Create(sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	return c.CreateContext(context.Background(), sar) | ||||
| } | ||||
|  | ||||
| func (c *subjectAccessReviews) CreateContext(ctx context.Context, sar *authorizationapi.SubjectAccessReview) (result *authorizationapi.SubjectAccessReview, err error) { | ||||
| 	result = &authorizationapi.SubjectAccessReview{} | ||||
| 	err = c.client.Post(). | ||||
|   | ||||
| @@ -32,7 +32,6 @@ go_library( | ||||
|         "service.go", | ||||
|         "service_expansion.go", | ||||
|         "serviceaccount.go", | ||||
|         "serviceaccount_expansion.go", | ||||
|     ], | ||||
|     importmap = "k8s.io/kubernetes/vendor/k8s.io/client-go/kubernetes/typed/core/v1", | ||||
|     importpath = "k8s.io/client-go/kubernetes/typed/core/v1", | ||||
|   | ||||
| @@ -31,7 +31,6 @@ go_library( | ||||
|         "fake_service.go", | ||||
|         "fake_service_expansion.go", | ||||
|         "fake_serviceaccount.go", | ||||
|         "fake_serviceaccount_expansion.go", | ||||
|     ], | ||||
|     importmap = "k8s.io/kubernetes/vendor/k8s.io/client-go/kubernetes/typed/core/v1/fake", | ||||
|     importpath = "k8s.io/client-go/kubernetes/typed/core/v1/fake", | ||||
|   | ||||
| @@ -19,6 +19,7 @@ limitations under the License. | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	authenticationv1 "k8s.io/api/authentication/v1" | ||||
| 	corev1 "k8s.io/api/core/v1" | ||||
| 	v1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||||
| 	labels "k8s.io/apimachinery/pkg/labels" | ||||
| @@ -126,3 +127,14 @@ func (c *FakeServiceAccounts) Patch(name string, pt types.PatchType, data []byte | ||||
| 	} | ||||
| 	return obj.(*corev1.ServiceAccount), err | ||||
| } | ||||
|  | ||||
| // CreateToken takes the representation of a tokenRequest and creates it.  Returns the server's representation of the tokenRequest, and an error, if there is any. | ||||
| func (c *FakeServiceAccounts) CreateToken(serviceAccountName string, tokenRequest *authenticationv1.TokenRequest) (result *authenticationv1.TokenRequest, err error) { | ||||
| 	obj, err := c.Fake. | ||||
| 		Invokes(testing.NewCreateSubresourceAction(serviceaccountsResource, serviceAccountName, "token", c.ns, tokenRequest), &authenticationv1.TokenRequest{}) | ||||
|  | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*authenticationv1.TokenRequest), err | ||||
| } | ||||
|   | ||||
| @@ -1,31 +0,0 @@ | ||||
| /* | ||||
| Copyright 2018 The Kubernetes Authors. | ||||
|  | ||||
| Licensed under the Apache License, Version 2.0 (the "License"); | ||||
| you may not use this file except in compliance with the License. | ||||
| You may obtain a copy of the License at | ||||
|  | ||||
|     http://www.apache.org/licenses/LICENSE-2.0 | ||||
|  | ||||
| Unless required by applicable law or agreed to in writing, software | ||||
| distributed under the License is distributed on an "AS IS" BASIS, | ||||
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||
| See the License for the specific language governing permissions and | ||||
| limitations under the License. | ||||
| */ | ||||
|  | ||||
| package fake | ||||
|  | ||||
| import ( | ||||
| 	authenticationv1 "k8s.io/api/authentication/v1" | ||||
| 	core "k8s.io/client-go/testing" | ||||
| ) | ||||
|  | ||||
| func (c *FakeServiceAccounts) CreateToken(name string, tr *authenticationv1.TokenRequest) (*authenticationv1.TokenRequest, error) { | ||||
| 	obj, err := c.Fake.Invokes(core.NewCreateSubresourceAction(serviceaccountsResource, name, "token", c.ns, tr), &authenticationv1.TokenRequest{}) | ||||
|  | ||||
| 	if obj == nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
| 	return obj.(*authenticationv1.TokenRequest), err | ||||
| } | ||||
| @@ -37,3 +37,5 @@ type ReplicationControllerExpansion interface{} | ||||
| type ResourceQuotaExpansion interface{} | ||||
|  | ||||
| type SecretExpansion interface{} | ||||
|  | ||||
| type ServiceAccountExpansion interface{} | ||||
|   | ||||
| @@ -22,6 +22,7 @@ import ( | ||||
| 	"context" | ||||
| 	"time" | ||||
|  | ||||
| 	authenticationv1 "k8s.io/api/authentication/v1" | ||||
| 	v1 "k8s.io/api/core/v1" | ||||
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||||
| 	types "k8s.io/apimachinery/pkg/types" | ||||
| @@ -46,6 +47,8 @@ type ServiceAccountInterface interface { | ||||
| 	List(opts metav1.ListOptions) (*v1.ServiceAccountList, error) | ||||
| 	Watch(opts metav1.ListOptions) (watch.Interface, error) | ||||
| 	Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1.ServiceAccount, err error) | ||||
| 	CreateToken(serviceAccountName string, tokenRequest *authenticationv1.TokenRequest) (*authenticationv1.TokenRequest, error) | ||||
|  | ||||
| 	ServiceAccountExpansion | ||||
| } | ||||
|  | ||||
| @@ -173,3 +176,17 @@ func (c *serviceAccounts) Patch(name string, pt types.PatchType, data []byte, su | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|  | ||||
| // CreateToken takes the representation of a tokenRequest and creates it.  Returns the server's representation of the tokenRequest, and an error, if there is any. | ||||
| func (c *serviceAccounts) CreateToken(serviceAccountName string, tokenRequest *authenticationv1.TokenRequest) (result *authenticationv1.TokenRequest, err error) { | ||||
| 	result = &authenticationv1.TokenRequest{} | ||||
| 	err = c.client.Post(). | ||||
| 		Namespace(c.ns). | ||||
| 		Resource("serviceaccounts"). | ||||
| 		Name(serviceAccountName). | ||||
| 		SubResource("token"). | ||||
| 		Body(tokenRequest). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return | ||||
| } | ||||
|   | ||||
| @@ -1,43 +0,0 @@ | ||||
| /* | ||||
| Copyright 2018 The Kubernetes Authors. | ||||
|  | ||||
| Licensed under the Apache License, Version 2.0 (the "License"); | ||||
| you may not use this file except in compliance with the License. | ||||
| You may obtain a copy of the License at | ||||
|  | ||||
|     http://www.apache.org/licenses/LICENSE-2.0 | ||||
|  | ||||
| Unless required by applicable law or agreed to in writing, software | ||||
| distributed under the License is distributed on an "AS IS" BASIS, | ||||
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||
| See the License for the specific language governing permissions and | ||||
| limitations under the License. | ||||
| */ | ||||
|  | ||||
| package v1 | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
|  | ||||
| 	authenticationv1 "k8s.io/api/authentication/v1" | ||||
| ) | ||||
|  | ||||
| // The ServiceAccountExpansion interface allows manually adding extra methods | ||||
| // to the ServiceAccountInterface. | ||||
| type ServiceAccountExpansion interface { | ||||
| 	CreateToken(name string, tr *authenticationv1.TokenRequest) (*authenticationv1.TokenRequest, error) | ||||
| } | ||||
|  | ||||
| // CreateToken creates a new token for a serviceaccount. | ||||
| func (c *serviceAccounts) CreateToken(name string, tr *authenticationv1.TokenRequest) (*authenticationv1.TokenRequest, error) { | ||||
| 	result := &authenticationv1.TokenRequest{} | ||||
| 	err := c.client.Post(). | ||||
| 		Namespace(c.ns). | ||||
| 		Resource("serviceaccounts"). | ||||
| 		SubResource("token"). | ||||
| 		Name(name). | ||||
| 		Body(tr). | ||||
| 		Do(context.TODO()). | ||||
| 		Into(result) | ||||
| 	return result, err | ||||
| } | ||||
		Reference in New Issue
	
	Block a user
	 Kubernetes Prow Robot
					Kubernetes Prow Robot