k8s_openapi/v1_32/api/rbac/v1/
cluster_role_binding.rs1#[derive(Clone, Debug, Default, PartialEq)]
5pub struct ClusterRoleBinding {
6 pub metadata: crate::apimachinery::pkg::apis::meta::v1::ObjectMeta,
8
9 pub role_ref: crate::api::rbac::v1::RoleRef,
11
12 pub subjects: Option<Vec<crate::api::rbac::v1::Subject>>,
14}
15
16impl crate::Resource for ClusterRoleBinding {
17 const API_VERSION: &'static str = "rbac.authorization.k8s.io/v1";
18 const GROUP: &'static str = "rbac.authorization.k8s.io";
19 const KIND: &'static str = "ClusterRoleBinding";
20 const VERSION: &'static str = "v1";
21 const URL_PATH_SEGMENT: &'static str = "clusterrolebindings";
22 type Scope = crate::ClusterResourceScope;
23}
24
25impl crate::ListableResource for ClusterRoleBinding {
26 const LIST_KIND: &'static str = "ClusterRoleBindingList";
27}
28
29impl crate::Metadata for ClusterRoleBinding {
30 type Ty = crate::apimachinery::pkg::apis::meta::v1::ObjectMeta;
31
32 fn metadata(&self) -> &<Self as crate::Metadata>::Ty {
33 &self.metadata
34 }
35
36 fn metadata_mut(&mut self) -> &mut<Self as crate::Metadata>::Ty {
37 &mut self.metadata
38 }
39}
40
41impl crate::DeepMerge for ClusterRoleBinding {
42 fn merge_from(&mut self, other: Self) {
43 crate::DeepMerge::merge_from(&mut self.metadata, other.metadata);
44 crate::DeepMerge::merge_from(&mut self.role_ref, other.role_ref);
45 crate::merge_strategies::list::atomic(&mut self.subjects, other.subjects);
46 }
47}
48
49impl<'de> crate::serde::Deserialize<'de> for ClusterRoleBinding {
50 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
51 #[allow(non_camel_case_types)]
52 enum Field {
53 Key_api_version,
54 Key_kind,
55 Key_metadata,
56 Key_role_ref,
57 Key_subjects,
58 Other,
59 }
60
61 impl<'de> crate::serde::Deserialize<'de> for Field {
62 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
63 struct Visitor;
64
65 impl crate::serde::de::Visitor<'_> for Visitor {
66 type Value = Field;
67
68 fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
69 f.write_str("field identifier")
70 }
71
72 fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
73 Ok(match v {
74 "apiVersion" => Field::Key_api_version,
75 "kind" => Field::Key_kind,
76 "metadata" => Field::Key_metadata,
77 "roleRef" => Field::Key_role_ref,
78 "subjects" => Field::Key_subjects,
79 _ => Field::Other,
80 })
81 }
82 }
83
84 deserializer.deserialize_identifier(Visitor)
85 }
86 }
87
88 struct Visitor;
89
90 impl<'de> crate::serde::de::Visitor<'de> for Visitor {
91 type Value = ClusterRoleBinding;
92
93 fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
94 f.write_str(<Self::Value as crate::Resource>::KIND)
95 }
96
97 fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
98 let mut value_metadata: Option<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta> = None;
99 let mut value_role_ref: Option<crate::api::rbac::v1::RoleRef> = None;
100 let mut value_subjects: Option<Vec<crate::api::rbac::v1::Subject>> = None;
101
102 while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
103 match key {
104 Field::Key_api_version => {
105 let value_api_version: String = crate::serde::de::MapAccess::next_value(&mut map)?;
106 if value_api_version != <Self::Value as crate::Resource>::API_VERSION {
107 return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_api_version), &<Self::Value as crate::Resource>::API_VERSION));
108 }
109 },
110 Field::Key_kind => {
111 let value_kind: String = crate::serde::de::MapAccess::next_value(&mut map)?;
112 if value_kind != <Self::Value as crate::Resource>::KIND {
113 return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_kind), &<Self::Value as crate::Resource>::KIND));
114 }
115 },
116 Field::Key_metadata => value_metadata = crate::serde::de::MapAccess::next_value(&mut map)?,
117 Field::Key_role_ref => value_role_ref = crate::serde::de::MapAccess::next_value(&mut map)?,
118 Field::Key_subjects => value_subjects = crate::serde::de::MapAccess::next_value(&mut map)?,
119 Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
120 }
121 }
122
123 Ok(ClusterRoleBinding {
124 metadata: value_metadata.unwrap_or_default(),
125 role_ref: value_role_ref.unwrap_or_default(),
126 subjects: value_subjects,
127 })
128 }
129 }
130
131 deserializer.deserialize_struct(
132 <Self as crate::Resource>::KIND,
133 &[
134 "apiVersion",
135 "kind",
136 "metadata",
137 "roleRef",
138 "subjects",
139 ],
140 Visitor,
141 )
142 }
143}
144
145impl crate::serde::Serialize for ClusterRoleBinding {
146 fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
147 let mut state = serializer.serialize_struct(
148 <Self as crate::Resource>::KIND,
149 4 +
150 self.subjects.as_ref().map_or(0, |_| 1),
151 )?;
152 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "apiVersion", <Self as crate::Resource>::API_VERSION)?;
153 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "kind", <Self as crate::Resource>::KIND)?;
154 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "metadata", &self.metadata)?;
155 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "roleRef", &self.role_ref)?;
156 if let Some(value) = &self.subjects {
157 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "subjects", value)?;
158 }
159 crate::serde::ser::SerializeStruct::end(state)
160 }
161}
162
163#[cfg(feature = "schemars")]
164impl crate::schemars::JsonSchema for ClusterRoleBinding {
165 fn schema_name() -> String {
166 "io.k8s.api.rbac.v1.ClusterRoleBinding".to_owned()
167 }
168
169 fn json_schema(__gen: &mut crate::schemars::gen::SchemaGenerator) -> crate::schemars::schema::Schema {
170 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
171 metadata: Some(Box::new(crate::schemars::schema::Metadata {
172 description: Some("ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.".to_owned()),
173 ..Default::default()
174 })),
175 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Object))),
176 object: Some(Box::new(crate::schemars::schema::ObjectValidation {
177 properties: [
178 (
179 "apiVersion".to_owned(),
180 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
181 metadata: Some(Box::new(crate::schemars::schema::Metadata {
182 description: Some("APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources".to_owned()),
183 ..Default::default()
184 })),
185 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
186 ..Default::default()
187 }),
188 ),
189 (
190 "kind".to_owned(),
191 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
192 metadata: Some(Box::new(crate::schemars::schema::Metadata {
193 description: Some("Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds".to_owned()),
194 ..Default::default()
195 })),
196 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::String))),
197 ..Default::default()
198 }),
199 ),
200 (
201 "metadata".to_owned(),
202 {
203 let mut schema_obj = __gen.subschema_for::<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta>().into_object();
204 schema_obj.metadata = Some(Box::new(crate::schemars::schema::Metadata {
205 description: Some("Standard object's metadata.".to_owned()),
206 ..Default::default()
207 }));
208 crate::schemars::schema::Schema::Object(schema_obj)
209 },
210 ),
211 (
212 "roleRef".to_owned(),
213 {
214 let mut schema_obj = __gen.subschema_for::<crate::api::rbac::v1::RoleRef>().into_object();
215 schema_obj.metadata = Some(Box::new(crate::schemars::schema::Metadata {
216 description: Some("RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.".to_owned()),
217 ..Default::default()
218 }));
219 crate::schemars::schema::Schema::Object(schema_obj)
220 },
221 ),
222 (
223 "subjects".to_owned(),
224 crate::schemars::schema::Schema::Object(crate::schemars::schema::SchemaObject {
225 metadata: Some(Box::new(crate::schemars::schema::Metadata {
226 description: Some("Subjects holds references to the objects the role applies to.".to_owned()),
227 ..Default::default()
228 })),
229 instance_type: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(crate::schemars::schema::InstanceType::Array))),
230 array: Some(Box::new(crate::schemars::schema::ArrayValidation {
231 items: Some(crate::schemars::schema::SingleOrVec::Single(Box::new(__gen.subschema_for::<crate::api::rbac::v1::Subject>()))),
232 ..Default::default()
233 })),
234 ..Default::default()
235 }),
236 ),
237 ].into(),
238 required: [
239 "metadata".to_owned(),
240 "roleRef".to_owned(),
241 ].into(),
242 ..Default::default()
243 })),
244 ..Default::default()
245 })
246 }
247}