k8s_openapi/v1_32/api/rbac/v1/
cluster_role_binding.rs

1// Generated from definition io.k8s.api.rbac.v1.ClusterRoleBinding
2
3/// ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.
4#[derive(Clone, Debug, Default, PartialEq)]
5pub struct ClusterRoleBinding {
6    /// Standard object's metadata.
7    pub metadata: crate::apimachinery::pkg::apis::meta::v1::ObjectMeta,
8
9    /// RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.
10    pub role_ref: crate::api::rbac::v1::RoleRef,
11
12    /// Subjects holds references to the objects the role applies to.
13    pub subjects: Option<Vec<crate::api::rbac::v1::Subject>>,
14}
15
16impl crate::Resource for ClusterRoleBinding {
17    const API_VERSION: &'static str = "rbac.authorization.k8s.io/v1";
18    const GROUP: &'static str = "rbac.authorization.k8s.io";
19    const KIND: &'static str = "ClusterRoleBinding";
20    const VERSION: &'static str = "v1";
21    const URL_PATH_SEGMENT: &'static str = "clusterrolebindings";
22    type Scope = crate::ClusterResourceScope;
23}
24
25impl crate::ListableResource for ClusterRoleBinding {
26    const LIST_KIND: &'static str = "ClusterRoleBindingList";
27}
28
29impl crate::Metadata for ClusterRoleBinding {
30    type Ty = crate::apimachinery::pkg::apis::meta::v1::ObjectMeta;
31
32    fn metadata(&self) -> &<Self as crate::Metadata>::Ty {
33        &self.metadata
34    }
35
36    fn metadata_mut(&mut self) -> &mut<Self as crate::Metadata>::Ty {
37        &mut self.metadata
38    }
39}
40
41impl crate::DeepMerge for ClusterRoleBinding {
42    fn merge_from(&mut self, other: Self) {
43        crate::DeepMerge::merge_from(&mut self.metadata, other.metadata);
44        crate::DeepMerge::merge_from(&mut self.role_ref, other.role_ref);
45        crate::merge_strategies::list::atomic(&mut self.subjects, other.subjects);
46    }
47}
48
49impl<'de> crate::serde::Deserialize<'de> for ClusterRoleBinding {
50    fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
51        #[allow(non_camel_case_types)]
52        enum Field {
53            Key_api_version,
54            Key_kind,
55            Key_metadata,
56            Key_role_ref,
57            Key_subjects,
58            Other,
59        }
60
61        impl<'de> crate::serde::Deserialize<'de> for Field {
62            fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
63                struct Visitor;
64
65                impl crate::serde::de::Visitor<'_> for Visitor {
66                    type Value = Field;
67
68                    fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
69                        f.write_str("field identifier")
70                    }
71
72                    fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
73                        Ok(match v {
74                            "apiVersion" => Field::Key_api_version,
75                            "kind" => Field::Key_kind,
76                            "metadata" => Field::Key_metadata,
77                            "roleRef" => Field::Key_role_ref,
78                            "subjects" => Field::Key_subjects,
79                            _ => Field::Other,
80                        })
81                    }
82                }
83
84                deserializer.deserialize_identifier(Visitor)
85            }
86        }
87
88        struct Visitor;
89
90        impl<'de> crate::serde::de::Visitor<'de> for Visitor {
91            type Value = ClusterRoleBinding;
92
93            fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
94                f.write_str(<Self::Value as crate::Resource>::KIND)
95            }
96
97            fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
98                let mut value_metadata: Option<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta> = None;
99                let mut value_role_ref: Option<crate::api::rbac::v1::RoleRef> = None;
100                let mut value_subjects: Option<Vec<crate::api::rbac::v1::Subject>> = None;
101
102                while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
103                    match key {
104                        Field::Key_api_version => {
105                            let value_api_version: String = crate::serde::de::MapAccess::next_value(&mut map)?;
106                            if value_api_version != <Self::Value as crate::Resource>::API_VERSION {
107                                return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_api_version), &<Self::Value as crate::Resource>::API_VERSION));
108                            }
109                        },
110                        Field::Key_kind => {
111                            let value_kind: String = crate::serde::de::MapAccess::next_value(&mut map)?;
112                            if value_kind != <Self::Value as crate::Resource>::KIND {
113                                return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_kind), &<Self::Value as crate::Resource>::KIND));
114                            }
115                        },
116                        Field::Key_metadata => value_metadata = crate::serde::de::MapAccess::next_value(&mut map)?,
117                        Field::Key_role_ref => value_role_ref = crate::serde::de::MapAccess::next_value(&mut map)?,
118                        Field::Key_subjects => value_subjects = crate::serde::de::MapAccess::next_value(&mut map)?,
119                        Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
120                    }
121                }
122
123                Ok(ClusterRoleBinding {
124                    metadata: value_metadata.unwrap_or_default(),
125                    role_ref: value_role_ref.unwrap_or_default(),
126                    subjects: value_subjects,
127                })
128            }
129        }
130
131        deserializer.deserialize_struct(
132            <Self as crate::Resource>::KIND,
133            &[
134                "apiVersion",
135                "kind",
136                "metadata",
137                "roleRef",
138                "subjects",
139            ],
140            Visitor,
141        )
142    }
143}
144
145impl crate::serde::Serialize for ClusterRoleBinding {
146    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
147        let mut state = serializer.serialize_struct(
148            <Self as crate::Resource>::KIND,
149            4 +
150            self.subjects.as_ref().map_or(0, |_| 1),
151        )?;
152        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "apiVersion", <Self as crate::Resource>::API_VERSION)?;
153        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "kind", <Self as crate::Resource>::KIND)?;
154        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "metadata", &self.metadata)?;
155        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "roleRef", &self.role_ref)?;
156        if let Some(value) = &self.subjects {
157            crate::serde::ser::SerializeStruct::serialize_field(&mut state, "subjects", value)?;
158        }
159        crate::serde::ser::SerializeStruct::end(state)
160    }
161}
162
163#[cfg(feature = "schemars")]
164impl crate::schemars::JsonSchema for ClusterRoleBinding {
165    fn schema_name() -> String {
166        "io.k8s.api.rbac.v1.ClusterRoleBinding".to_owned()
167    }
168
169    fn json_schema(__gen: &mut crate::schemars::gen::SchemaGenerator) -> crate::schemars::schema::Schema {
170        crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
171            metadata: Some(Box::new(crate::schemars::schema::Metadata {
172                description: Some("ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.".to_owned()),
173                ..Default::default()
174            })),
175            instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Object))),
176            object: Some(Box::new(crate::schemars::schema::ObjectValidation {
177                properties: [
178                    (
179                        "apiVersion".to_owned(),
180                        crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
181                            metadata: Some(Box::new(crate::schemars::schema::Metadata {
182                                description: Some("APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources".to_owned()),
183                                ..Default::default()
184                            })),
185                            instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
186                            ..Default::default()
187                        }),
188                    ),
189                    (
190                        "kind".to_owned(),
191                        crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
192                            metadata: Some(Box::new(crate::schemars::schema::Metadata {
193                                description: Some("Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds".to_owned()),
194                                ..Default::default()
195                            })),
196                            instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
197                            ..Default::default()
198                        }),
199                    ),
200                    (
201                        "metadata".to_owned(),
202                        {
203                            let mut schema_obj = __gen.subschema_for::<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta>().into_object();
204                            schema_obj.metadata = Some(Box::new(crate::schemars::schema::Metadata {
205                                description: Some("Standard object's metadata.".to_owned()),
206                                ..Default::default()
207                            }));
208                            crate::schemars::schema::Schema::Object(schema_obj)
209                        },
210                    ),
211                    (
212                        "roleRef".to_owned(),
213                        {
214                            let mut schema_obj = __gen.subschema_for::<crate::api::rbac::v1::RoleRef>().into_object();
215                            schema_obj.metadata = Some(Box::new(crate::schemars::schema::Metadata {
216                                description: Some("RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.".to_owned()),
217                                ..Default::default()
218                            }));
219                            crate::schemars::schema::Schema::Object(schema_obj)
220                        },
221                    ),
222                    (
223                        "subjects".to_owned(),
224                        crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
225                            metadata: Some(Box::new(crate::schemars::schema::Metadata {
226                                description: Some("Subjects holds references to the objects the role applies to.".to_owned()),
227                                ..Default::default()
228                            })),
229                            instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Array))),
230                            array: Some(Box::new(crate::schemars::schema::ArrayValidation {
231                                items: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(__gen.subschema_for::<crate::api::rbac::v1::Subject>()))),
232                                ..Default::default()
233                            })),
234                            ..Default::default()
235                        }),
236                    ),
237                ].into(),
238                required: [
239                    "metadata".to_owned(),
240                    "roleRef".to_owned(),
241                ].into(),
242                ..Default::default()
243            })),
244            ..Default::default()
245        })
246    }
247}