#[derive(Clone, Debug, Default, PartialEq)]
pub struct ClusterRoleBinding {
pub metadata: Option<crate::v1_13::apimachinery::pkg::apis::meta::v1::ObjectMeta>,
pub role_ref: crate::v1_13::api::rbac::v1::RoleRef,
pub subjects: Option<Vec<crate::v1_13::api::rbac::v1::Subject>>,
}
impl ClusterRoleBinding {
pub fn create_cluster_role_binding(
body: &crate::v1_13::api::rbac::v1::ClusterRoleBinding,
optional: CreateClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<CreateClusterRoleBindingResponse>), crate::RequestError> {
let CreateClusterRoleBindingOptional {
dry_run,
include_uninitialized,
pretty,
} = optional;
let __url = "/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?".to_string();
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(dry_run) = dry_run {
__query_pairs.append_pair("dryRun", dry_run);
}
if let Some(include_uninitialized) = include_uninitialized {
__query_pairs.append_pair("includeUninitialized", &include_uninitialized.to_string());
}
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
let __url = __query_pairs.finish();
let mut __request = http::Request::post(__url);
let __body = serde_json::to_vec(&body).map_err(crate::RequestError::Json)?;
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct CreateClusterRoleBindingOptional<'a> {
pub dry_run: Option<&'a str>,
pub include_uninitialized: Option<bool>,
pub pretty: Option<&'a str>,
}
#[derive(Debug)]
pub enum CreateClusterRoleBindingResponse {
Ok(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Created(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Accepted(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Unauthorized,
Other,
}
impl crate::Response for CreateClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((CreateClusterRoleBindingResponse::Ok(result), buf.len()))
},
http::StatusCode::CREATED => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((CreateClusterRoleBindingResponse::Created(result), buf.len()))
},
http::StatusCode::ACCEPTED => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((CreateClusterRoleBindingResponse::Accepted(result), buf.len()))
},
http::StatusCode::UNAUTHORIZED => Ok((CreateClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((CreateClusterRoleBindingResponse::Other, 0)),
}
}
}
impl ClusterRoleBinding {
pub fn delete_cluster_role_binding(
name: &str,
optional: DeleteClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<DeleteClusterRoleBindingResponse>), crate::RequestError> {
let DeleteClusterRoleBindingOptional {
dry_run,
grace_period_seconds,
orphan_dependents,
pretty,
propagation_policy,
} = optional;
let __url = format!("/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}?", name = name);
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(dry_run) = dry_run {
__query_pairs.append_pair("dryRun", dry_run);
}
if let Some(grace_period_seconds) = grace_period_seconds {
__query_pairs.append_pair("gracePeriodSeconds", &grace_period_seconds.to_string());
}
if let Some(orphan_dependents) = orphan_dependents {
__query_pairs.append_pair("orphanDependents", &orphan_dependents.to_string());
}
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
if let Some(propagation_policy) = propagation_policy {
__query_pairs.append_pair("propagationPolicy", propagation_policy);
}
let __url = __query_pairs.finish();
let mut __request = http::Request::delete(__url);
let __body = vec![];
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct DeleteClusterRoleBindingOptional<'a> {
pub dry_run: Option<&'a str>,
pub grace_period_seconds: Option<i64>,
pub orphan_dependents: Option<bool>,
pub pretty: Option<&'a str>,
pub propagation_policy: Option<&'a str>,
}
#[derive(Debug)]
pub enum DeleteClusterRoleBindingResponse {
OkStatus(crate::v1_13::apimachinery::pkg::apis::meta::v1::Status),
OkValue(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Accepted(crate::v1_13::apimachinery::pkg::apis::meta::v1::Status),
Unauthorized,
Other,
}
impl crate::Response for DeleteClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let result: serde_json::Map<String, serde_json::Value> = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
let is_status = match result.get("kind") {
Some(serde_json::Value::String(s)) if s == "Status" => true,
_ => false,
};
if is_status {
let result = serde::Deserialize::deserialize(serde_json::Value::Object(result));
let result = result.map_err(crate::ResponseError::Json)?;
Ok((DeleteClusterRoleBindingResponse::OkStatus(result), buf.len()))
}
else {
let result = serde::Deserialize::deserialize(serde_json::Value::Object(result));
let result = result.map_err(crate::ResponseError::Json)?;
Ok((DeleteClusterRoleBindingResponse::OkValue(result), buf.len()))
}
},
http::StatusCode::ACCEPTED => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((DeleteClusterRoleBindingResponse::Accepted(result), buf.len()))
},
http::StatusCode::UNAUTHORIZED => Ok((DeleteClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((DeleteClusterRoleBindingResponse::Other, 0)),
}
}
}
impl ClusterRoleBinding {
pub fn delete_collection_cluster_role_binding(
optional: DeleteCollectionClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<DeleteCollectionClusterRoleBindingResponse>), crate::RequestError> {
let DeleteCollectionClusterRoleBindingOptional {
continue_,
field_selector,
include_uninitialized,
label_selector,
limit,
pretty,
resource_version,
timeout_seconds,
watch,
} = optional;
let __url = "/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?".to_string();
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(continue_) = continue_ {
__query_pairs.append_pair("continue", continue_);
}
if let Some(field_selector) = field_selector {
__query_pairs.append_pair("fieldSelector", field_selector);
}
if let Some(include_uninitialized) = include_uninitialized {
__query_pairs.append_pair("includeUninitialized", &include_uninitialized.to_string());
}
if let Some(label_selector) = label_selector {
__query_pairs.append_pair("labelSelector", label_selector);
}
if let Some(limit) = limit {
__query_pairs.append_pair("limit", &limit.to_string());
}
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
if let Some(resource_version) = resource_version {
__query_pairs.append_pair("resourceVersion", resource_version);
}
if let Some(timeout_seconds) = timeout_seconds {
__query_pairs.append_pair("timeoutSeconds", &timeout_seconds.to_string());
}
if let Some(watch) = watch {
__query_pairs.append_pair("watch", &watch.to_string());
}
let __url = __query_pairs.finish();
let mut __request = http::Request::delete(__url);
let __body = vec![];
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct DeleteCollectionClusterRoleBindingOptional<'a> {
pub continue_: Option<&'a str>,
pub field_selector: Option<&'a str>,
pub include_uninitialized: Option<bool>,
pub label_selector: Option<&'a str>,
pub limit: Option<i64>,
pub pretty: Option<&'a str>,
pub resource_version: Option<&'a str>,
pub timeout_seconds: Option<i64>,
pub watch: Option<bool>,
}
#[derive(Debug)]
pub enum DeleteCollectionClusterRoleBindingResponse {
OkStatus(crate::v1_13::apimachinery::pkg::apis::meta::v1::Status),
OkValue(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Unauthorized,
Other,
}
impl crate::Response for DeleteCollectionClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let result: serde_json::Map<String, serde_json::Value> = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
let is_status = match result.get("kind") {
Some(serde_json::Value::String(s)) if s == "Status" => true,
_ => false,
};
if is_status {
let result = serde::Deserialize::deserialize(serde_json::Value::Object(result));
let result = result.map_err(crate::ResponseError::Json)?;
Ok((DeleteCollectionClusterRoleBindingResponse::OkStatus(result), buf.len()))
}
else {
let result = serde::Deserialize::deserialize(serde_json::Value::Object(result));
let result = result.map_err(crate::ResponseError::Json)?;
Ok((DeleteCollectionClusterRoleBindingResponse::OkValue(result), buf.len()))
}
},
http::StatusCode::UNAUTHORIZED => Ok((DeleteCollectionClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((DeleteCollectionClusterRoleBindingResponse::Other, 0)),
}
}
}
impl ClusterRoleBinding {
pub fn list_cluster_role_binding(
optional: ListClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<ListClusterRoleBindingResponse>), crate::RequestError> {
let ListClusterRoleBindingOptional {
continue_,
field_selector,
include_uninitialized,
label_selector,
limit,
pretty,
resource_version,
timeout_seconds,
} = optional;
let __url = "/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?".to_string();
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(continue_) = continue_ {
__query_pairs.append_pair("continue", continue_);
}
if let Some(field_selector) = field_selector {
__query_pairs.append_pair("fieldSelector", field_selector);
}
if let Some(include_uninitialized) = include_uninitialized {
__query_pairs.append_pair("includeUninitialized", &include_uninitialized.to_string());
}
if let Some(label_selector) = label_selector {
__query_pairs.append_pair("labelSelector", label_selector);
}
if let Some(limit) = limit {
__query_pairs.append_pair("limit", &limit.to_string());
}
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
if let Some(resource_version) = resource_version {
__query_pairs.append_pair("resourceVersion", resource_version);
}
if let Some(timeout_seconds) = timeout_seconds {
__query_pairs.append_pair("timeoutSeconds", &timeout_seconds.to_string());
}
let __url = __query_pairs.finish();
let mut __request = http::Request::get(__url);
let __body = vec![];
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct ListClusterRoleBindingOptional<'a> {
pub continue_: Option<&'a str>,
pub field_selector: Option<&'a str>,
pub include_uninitialized: Option<bool>,
pub label_selector: Option<&'a str>,
pub limit: Option<i64>,
pub pretty: Option<&'a str>,
pub resource_version: Option<&'a str>,
pub timeout_seconds: Option<i64>,
}
#[derive(Debug)]
pub enum ListClusterRoleBindingResponse {
Ok(crate::v1_13::api::rbac::v1::ClusterRoleBindingList),
Unauthorized,
Other,
}
impl crate::Response for ListClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((ListClusterRoleBindingResponse::Ok(result), buf.len()))
},
http::StatusCode::UNAUTHORIZED => Ok((ListClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((ListClusterRoleBindingResponse::Other, 0)),
}
}
}
impl ClusterRoleBinding {
pub fn patch_cluster_role_binding(
name: &str,
body: &crate::v1_13::apimachinery::pkg::apis::meta::v1::Patch,
optional: PatchClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<PatchClusterRoleBindingResponse>), crate::RequestError> {
let PatchClusterRoleBindingOptional {
dry_run,
pretty,
} = optional;
let __url = format!("/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}?", name = name);
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(dry_run) = dry_run {
__query_pairs.append_pair("dryRun", dry_run);
}
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
let __url = __query_pairs.finish();
let mut __request = http::Request::patch(__url);
let __body = serde_json::to_vec(&body).map_err(crate::RequestError::Json)?;
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct PatchClusterRoleBindingOptional<'a> {
pub dry_run: Option<&'a str>,
pub pretty: Option<&'a str>,
}
#[derive(Debug)]
pub enum PatchClusterRoleBindingResponse {
Ok(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Unauthorized,
Other,
}
impl crate::Response for PatchClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((PatchClusterRoleBindingResponse::Ok(result), buf.len()))
},
http::StatusCode::UNAUTHORIZED => Ok((PatchClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((PatchClusterRoleBindingResponse::Other, 0)),
}
}
}
impl ClusterRoleBinding {
pub fn read_cluster_role_binding(
name: &str,
optional: ReadClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<ReadClusterRoleBindingResponse>), crate::RequestError> {
let ReadClusterRoleBindingOptional {
pretty,
} = optional;
let __url = format!("/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}?", name = name);
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
let __url = __query_pairs.finish();
let mut __request = http::Request::get(__url);
let __body = vec![];
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct ReadClusterRoleBindingOptional<'a> {
pub pretty: Option<&'a str>,
}
#[derive(Debug)]
pub enum ReadClusterRoleBindingResponse {
Ok(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Unauthorized,
Other,
}
impl crate::Response for ReadClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((ReadClusterRoleBindingResponse::Ok(result), buf.len()))
},
http::StatusCode::UNAUTHORIZED => Ok((ReadClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((ReadClusterRoleBindingResponse::Other, 0)),
}
}
}
impl ClusterRoleBinding {
pub fn replace_cluster_role_binding(
name: &str,
body: &crate::v1_13::api::rbac::v1::ClusterRoleBinding,
optional: ReplaceClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<ReplaceClusterRoleBindingResponse>), crate::RequestError> {
let ReplaceClusterRoleBindingOptional {
dry_run,
pretty,
} = optional;
let __url = format!("/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/{name}?", name = name);
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(dry_run) = dry_run {
__query_pairs.append_pair("dryRun", dry_run);
}
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
let __url = __query_pairs.finish();
let mut __request = http::Request::put(__url);
let __body = serde_json::to_vec(&body).map_err(crate::RequestError::Json)?;
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct ReplaceClusterRoleBindingOptional<'a> {
pub dry_run: Option<&'a str>,
pub pretty: Option<&'a str>,
}
#[derive(Debug)]
pub enum ReplaceClusterRoleBindingResponse {
Ok(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Created(crate::v1_13::api::rbac::v1::ClusterRoleBinding),
Unauthorized,
Other,
}
impl crate::Response for ReplaceClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((ReplaceClusterRoleBindingResponse::Ok(result), buf.len()))
},
http::StatusCode::CREATED => {
let result = match serde_json::from_slice(buf) {
Ok(value) => value,
Err(ref err) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Err(err) => return Err(crate::ResponseError::Json(err)),
};
Ok((ReplaceClusterRoleBindingResponse::Created(result), buf.len()))
},
http::StatusCode::UNAUTHORIZED => Ok((ReplaceClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((ReplaceClusterRoleBindingResponse::Other, 0)),
}
}
}
impl ClusterRoleBinding {
pub fn watch_cluster_role_binding(
optional: WatchClusterRoleBindingOptional<'_>,
) -> Result<(http::Request<Vec<u8>>, fn(http::StatusCode) -> crate::ResponseBody<WatchClusterRoleBindingResponse>), crate::RequestError> {
let WatchClusterRoleBindingOptional {
field_selector,
include_uninitialized,
label_selector,
limit,
pretty,
resource_version,
timeout_seconds,
} = optional;
let __url = "/apis/rbac.authorization.k8s.io/v1/clusterrolebindings?".to_string();
let mut __query_pairs = url::form_urlencoded::Serializer::new(__url);
if let Some(field_selector) = field_selector {
__query_pairs.append_pair("fieldSelector", field_selector);
}
if let Some(include_uninitialized) = include_uninitialized {
__query_pairs.append_pair("includeUninitialized", &include_uninitialized.to_string());
}
if let Some(label_selector) = label_selector {
__query_pairs.append_pair("labelSelector", label_selector);
}
if let Some(limit) = limit {
__query_pairs.append_pair("limit", &limit.to_string());
}
if let Some(pretty) = pretty {
__query_pairs.append_pair("pretty", pretty);
}
if let Some(resource_version) = resource_version {
__query_pairs.append_pair("resourceVersion", resource_version);
}
if let Some(timeout_seconds) = timeout_seconds {
__query_pairs.append_pair("timeoutSeconds", &timeout_seconds.to_string());
}
__query_pairs.append_pair("watch", "true");
let __url = __query_pairs.finish();
let mut __request = http::Request::get(__url);
let __body = vec![];
match __request.body(__body) {
Ok(body) => Ok((body, crate::ResponseBody::new)),
Err(err) => Err(crate::RequestError::Http(err)),
}
}
}
#[derive(Clone, Copy, Debug, Default)]
pub struct WatchClusterRoleBindingOptional<'a> {
pub field_selector: Option<&'a str>,
pub include_uninitialized: Option<bool>,
pub label_selector: Option<&'a str>,
pub limit: Option<i64>,
pub pretty: Option<&'a str>,
pub resource_version: Option<&'a str>,
pub timeout_seconds: Option<i64>,
}
#[derive(Debug)]
pub enum WatchClusterRoleBindingResponse {
Ok(crate::v1_13::apimachinery::pkg::apis::meta::v1::WatchEvent),
Unauthorized,
Other,
}
impl crate::Response for WatchClusterRoleBindingResponse {
fn try_from_parts(status_code: http::StatusCode, buf: &[u8]) -> Result<(Self, usize), crate::ResponseError> {
match status_code {
http::StatusCode::OK => {
let mut deserializer = serde_json::Deserializer::from_slice(buf).into_iter();
let (result, byte_offset) = match deserializer.next() {
Some(Ok(value)) => (value, deserializer.byte_offset()),
Some(Err(ref err)) if err.is_eof() => return Err(crate::ResponseError::NeedMoreData),
Some(Err(err)) => return Err(crate::ResponseError::Json(err)),
None => return Err(crate::ResponseError::NeedMoreData),
};
Ok((WatchClusterRoleBindingResponse::Ok(result), byte_offset))
},
http::StatusCode::UNAUTHORIZED => Ok((WatchClusterRoleBindingResponse::Unauthorized, 0)),
_ => Ok((WatchClusterRoleBindingResponse::Other, 0)),
}
}
}
impl crate::Resource for ClusterRoleBinding {
fn api_version() -> &'static str {
"rbac.authorization.k8s.io/v1"
}
fn group() -> &'static str {
"rbac.authorization.k8s.io"
}
fn kind() -> &'static str {
"ClusterRoleBinding"
}
fn version() -> &'static str {
"v1"
}
}
impl crate::Metadata for ClusterRoleBinding {
type Ty = crate::v1_13::apimachinery::pkg::apis::meta::v1::ObjectMeta;
fn metadata(&self) -> Option<&<Self as crate::Metadata>::Ty> {
self.metadata.as_ref()
}
}
impl<'de> serde::Deserialize<'de> for ClusterRoleBinding {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: serde::Deserializer<'de> {
#[allow(non_camel_case_types)]
enum Field {
Key_api_version,
Key_kind,
Key_metadata,
Key_role_ref,
Key_subjects,
Other,
}
impl<'de> serde::Deserialize<'de> for Field {
fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: serde::Deserializer<'de> {
struct Visitor;
impl<'de> serde::de::Visitor<'de> for Visitor {
type Value = Field;
fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "field identifier")
}
fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: serde::de::Error {
Ok(match v {
"apiVersion" => Field::Key_api_version,
"kind" => Field::Key_kind,
"metadata" => Field::Key_metadata,
"roleRef" => Field::Key_role_ref,
"subjects" => Field::Key_subjects,
_ => Field::Other,
})
}
}
deserializer.deserialize_identifier(Visitor)
}
}
struct Visitor;
impl<'de> serde::de::Visitor<'de> for Visitor {
type Value = ClusterRoleBinding;
fn expecting(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
write!(f, "struct ClusterRoleBinding")
}
fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: serde::de::MapAccess<'de> {
let mut value_metadata: Option<crate::v1_13::apimachinery::pkg::apis::meta::v1::ObjectMeta> = None;
let mut value_role_ref: Option<crate::v1_13::api::rbac::v1::RoleRef> = None;
let mut value_subjects: Option<Vec<crate::v1_13::api::rbac::v1::Subject>> = None;
while let Some(key) = serde::de::MapAccess::next_key::<Field>(&mut map)? {
match key {
Field::Key_api_version => {
let value_api_version: String = serde::de::MapAccess::next_value(&mut map)?;
if value_api_version != <Self::Value as crate::Resource>::api_version() {
return Err(serde::de::Error::invalid_value(serde::de::Unexpected::Str(&value_api_version), &<Self::Value as crate::Resource>::api_version()));
}
},
Field::Key_kind => {
let value_kind: String = serde::de::MapAccess::next_value(&mut map)?;
if value_kind != <Self::Value as crate::Resource>::kind() {
return Err(serde::de::Error::invalid_value(serde::de::Unexpected::Str(&value_kind), &<Self::Value as crate::Resource>::kind()));
}
},
Field::Key_metadata => value_metadata = serde::de::MapAccess::next_value(&mut map)?,
Field::Key_role_ref => value_role_ref = Some(serde::de::MapAccess::next_value(&mut map)?),
Field::Key_subjects => value_subjects = serde::de::MapAccess::next_value(&mut map)?,
Field::Other => { let _: serde::de::IgnoredAny = serde::de::MapAccess::next_value(&mut map)?; },
}
}
Ok(ClusterRoleBinding {
metadata: value_metadata,
role_ref: value_role_ref.ok_or_else(|| serde::de::Error::missing_field("roleRef"))?,
subjects: value_subjects,
})
}
}
deserializer.deserialize_struct(
"ClusterRoleBinding",
&[
"apiVersion",
"kind",
"metadata",
"roleRef",
"subjects",
],
Visitor,
)
}
}
impl serde::Serialize for ClusterRoleBinding {
fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: serde::Serializer {
let mut state = serializer.serialize_struct(
"ClusterRoleBinding",
3 +
self.metadata.as_ref().map_or(0, |_| 1) +
self.subjects.as_ref().map_or(0, |_| 1),
)?;
serde::ser::SerializeStruct::serialize_field(&mut state, "apiVersion", <Self as crate::Resource>::api_version())?;
serde::ser::SerializeStruct::serialize_field(&mut state, "kind", <Self as crate::Resource>::kind())?;
if let Some(value) = &self.metadata {
serde::ser::SerializeStruct::serialize_field(&mut state, "metadata", value)?;
}
serde::ser::SerializeStruct::serialize_field(&mut state, "roleRef", &self.role_ref)?;
if let Some(value) = &self.subjects {
serde::ser::SerializeStruct::serialize_field(&mut state, "subjects", value)?;
}
serde::ser::SerializeStruct::end(state)
}
}