go.mod: bump client-go and api machinerie
I had to run `make generate`. Some API functions got additional parameters `Options` and `Context`. I used empty options and `context.TODO()` for now. Signed-off-by: leonnicolas <leonloechner@gmx.de>
This commit is contained in:
		
							
								
								
									
										69
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/types.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										69
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/types.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -18,11 +18,12 @@ package clientauthentication | ||||
|  | ||||
| import ( | ||||
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||||
| 	"k8s.io/apimachinery/pkg/runtime" | ||||
| ) | ||||
|  | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // ExecCredentials is used by exec-based plugins to communicate credentials to | ||||
| // ExecCredential is used by exec-based plugins to communicate credentials to | ||||
| // HTTP transports. | ||||
| type ExecCredential struct { | ||||
| 	metav1.TypeMeta | ||||
| @@ -37,7 +38,7 @@ type ExecCredential struct { | ||||
| 	Status *ExecCredentialStatus | ||||
| } | ||||
|  | ||||
| // ExecCredenitalSpec holds request and runtime specific information provided by | ||||
| // ExecCredentialSpec holds request and runtime specific information provided by | ||||
| // the transport. | ||||
| type ExecCredentialSpec struct { | ||||
| 	// Response is populated when the transport encounters HTTP status codes, such as 401, | ||||
| @@ -49,6 +50,13 @@ type ExecCredentialSpec struct { | ||||
| 	// interactive prompt. | ||||
| 	// +optional | ||||
| 	Interactive bool | ||||
|  | ||||
| 	// Cluster contains information to allow an exec plugin to communicate with the | ||||
| 	// kubernetes cluster being authenticated to. Note that Cluster is non-nil only | ||||
| 	// when provideClusterInfo is set to true in the exec provider config (i.e., | ||||
| 	// ExecConfig.ProvideClusterInfo). | ||||
| 	// +optional | ||||
| 	Cluster *Cluster | ||||
| } | ||||
|  | ||||
| // ExecCredentialStatus holds credentials for the transport to use. | ||||
| @@ -58,13 +66,13 @@ type ExecCredentialStatus struct { | ||||
| 	ExpirationTimestamp *metav1.Time | ||||
| 	// Token is a bearer token used by the client for request authentication. | ||||
| 	// +optional | ||||
| 	Token string | ||||
| 	Token string `datapolicy:"token"` | ||||
| 	// PEM-encoded client TLS certificate. | ||||
| 	// +optional | ||||
| 	ClientCertificateData string | ||||
| 	// PEM-encoded client TLS private key. | ||||
| 	// +optional | ||||
| 	ClientKeyData string | ||||
| 	ClientKeyData string `datapolicy:"secret-key"` | ||||
| } | ||||
|  | ||||
| // Response defines metadata about a failed request, including HTTP status code and | ||||
| @@ -75,3 +83,56 @@ type Response struct { | ||||
| 	// Code is the HTTP status code returned by the server. | ||||
| 	Code int32 | ||||
| } | ||||
|  | ||||
| // Cluster contains information to allow an exec plugin to communicate | ||||
| // with the kubernetes cluster being authenticated to. | ||||
| // | ||||
| // To ensure that this struct contains everything someone would need to communicate | ||||
| // with a kubernetes cluster (just like they would via a kubeconfig), the fields | ||||
| // should shadow "k8s.io/client-go/tools/clientcmd/api/v1".Cluster, with the exception | ||||
| // of CertificateAuthority, since CA data will always be passed to the plugin as bytes. | ||||
| type Cluster struct { | ||||
| 	// Server is the address of the kubernetes cluster (https://hostname:port). | ||||
| 	Server string | ||||
| 	// TLSServerName is passed to the server for SNI and is used in the client to | ||||
| 	// check server certificates against. If ServerName is empty, the hostname | ||||
| 	// used to contact the server is used. | ||||
| 	// +optional | ||||
| 	TLSServerName string | ||||
| 	// InsecureSkipTLSVerify skips the validity check for the server's certificate. | ||||
| 	// This will make your HTTPS connections insecure. | ||||
| 	// +optional | ||||
| 	InsecureSkipTLSVerify bool | ||||
| 	// CAData contains PEM-encoded certificate authority certificates. | ||||
| 	// If empty, system roots should be used. | ||||
| 	// +listType=atomic | ||||
| 	// +optional | ||||
| 	CertificateAuthorityData []byte | ||||
| 	// ProxyURL is the URL to the proxy to be used for all requests to this | ||||
| 	// cluster. | ||||
| 	// +optional | ||||
| 	ProxyURL string | ||||
| 	// Config holds additional config data that is specific to the exec | ||||
| 	// plugin with regards to the cluster being authenticated to. | ||||
| 	// | ||||
| 	// This data is sourced from the clientcmd Cluster object's | ||||
| 	// extensions[client.authentication.k8s.io/exec] field: | ||||
| 	// | ||||
| 	// clusters: | ||||
| 	// - name: my-cluster | ||||
| 	//   cluster: | ||||
| 	//     ... | ||||
| 	//     extensions: | ||||
| 	//     - name: client.authentication.k8s.io/exec  # reserved extension name for per cluster exec config | ||||
| 	//       extension: | ||||
| 	//         audience: 06e3fbd18de8  # arbitrary config | ||||
| 	// | ||||
| 	// In some environments, the user config may be exactly the same across many clusters | ||||
| 	// (i.e. call this exec plugin) minus some details that are specific to each cluster | ||||
| 	// such as the audience.  This field allows the per cluster config to be directly | ||||
| 	// specified with the cluster info.  Using this field to store secret data is not | ||||
| 	// recommended as one of the prime benefits of exec plugins is that no secrets need | ||||
| 	// to be stored directly in the kubeconfig. | ||||
| 	// +optional | ||||
| 	Config runtime.Object | ||||
| } | ||||
|   | ||||
							
								
								
									
										27
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1/conversion.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										27
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1/conversion.go
									
									
									
										generated
									
									
										vendored
									
									
										Normal file
									
								
							| @@ -0,0 +1,27 @@ | ||||
| /* | ||||
| Copyright 2020 The Kubernetes Authors. | ||||
|  | ||||
| Licensed under the Apache License, Version 2.0 (the "License"); | ||||
| you may not use this file except in compliance with the License. | ||||
| You may obtain a copy of the License at | ||||
|  | ||||
|     http://www.apache.org/licenses/LICENSE-2.0 | ||||
|  | ||||
| Unless required by applicable law or agreed to in writing, software | ||||
| distributed under the License is distributed on an "AS IS" BASIS, | ||||
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||
| See the License for the specific language governing permissions and | ||||
| limitations under the License. | ||||
| */ | ||||
|  | ||||
| package v1alpha1 | ||||
|  | ||||
| import ( | ||||
| 	"k8s.io/apimachinery/pkg/conversion" | ||||
| 	"k8s.io/client-go/pkg/apis/clientauthentication" | ||||
| ) | ||||
|  | ||||
| func Convert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec(in *clientauthentication.ExecCredentialSpec, out *ExecCredentialSpec, s conversion.Scope) error { | ||||
| 	// This conversion intentionally omits the Cluster field which is only supported in newer versions. | ||||
| 	return autoConvert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec(in, out, s) | ||||
| } | ||||
							
								
								
									
										6
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1/types.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										6
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1alpha1/types.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -37,7 +37,7 @@ type ExecCredential struct { | ||||
| 	Status *ExecCredentialStatus `json:"status,omitempty"` | ||||
| } | ||||
|  | ||||
| // ExecCredenitalSpec holds request and runtime specific information provided by | ||||
| // ExecCredentialSpec holds request and runtime specific information provided by | ||||
| // the transport. | ||||
| type ExecCredentialSpec struct { | ||||
| 	// Response is populated when the transport encounters HTTP status codes, such as 401, | ||||
| @@ -61,11 +61,11 @@ type ExecCredentialStatus struct { | ||||
| 	// +optional | ||||
| 	ExpirationTimestamp *metav1.Time `json:"expirationTimestamp,omitempty"` | ||||
| 	// Token is a bearer token used by the client for request authentication. | ||||
| 	Token string `json:"token,omitempty"` | ||||
| 	Token string `json:"token,omitempty" datapolicy:"token"` | ||||
| 	// PEM-encoded client TLS certificates (including intermediates, if any). | ||||
| 	ClientCertificateData string `json:"clientCertificateData,omitempty"` | ||||
| 	// PEM-encoded private key for the above certificate. | ||||
| 	ClientKeyData string `json:"clientKeyData,omitempty"` | ||||
| 	ClientKeyData string `json:"clientKeyData,omitempty" datapolicy:"security-key"` | ||||
| } | ||||
|  | ||||
| // Response defines metadata about a failed request, including HTTP status code and | ||||
|   | ||||
| @@ -51,11 +51,6 @@ func RegisterConversions(s *runtime.Scheme) error { | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := s.AddGeneratedConversionFunc((*clientauthentication.ExecCredentialSpec)(nil), (*ExecCredentialSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec(a.(*clientauthentication.ExecCredentialSpec), b.(*ExecCredentialSpec), scope) | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := s.AddGeneratedConversionFunc((*ExecCredentialStatus)(nil), (*clientauthentication.ExecCredentialStatus)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_v1alpha1_ExecCredentialStatus_To_clientauthentication_ExecCredentialStatus(a.(*ExecCredentialStatus), b.(*clientauthentication.ExecCredentialStatus), scope) | ||||
| 	}); err != nil { | ||||
| @@ -76,6 +71,11 @@ func RegisterConversions(s *runtime.Scheme) error { | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := s.AddConversionFunc((*clientauthentication.ExecCredentialSpec)(nil), (*ExecCredentialSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec(a.(*clientauthentication.ExecCredentialSpec), b.(*ExecCredentialSpec), scope) | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @@ -119,14 +119,10 @@ func Convert_v1alpha1_ExecCredentialSpec_To_clientauthentication_ExecCredentialS | ||||
| func autoConvert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec(in *clientauthentication.ExecCredentialSpec, out *ExecCredentialSpec, s conversion.Scope) error { | ||||
| 	out.Response = (*Response)(unsafe.Pointer(in.Response)) | ||||
| 	out.Interactive = in.Interactive | ||||
| 	// WARNING: in.Cluster requires manual conversion: does not exist in peer-type | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // Convert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec is an autogenerated conversion function. | ||||
| func Convert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec(in *clientauthentication.ExecCredentialSpec, out *ExecCredentialSpec, s conversion.Scope) error { | ||||
| 	return autoConvert_clientauthentication_ExecCredentialSpec_To_v1alpha1_ExecCredentialSpec(in, out, s) | ||||
| } | ||||
|  | ||||
| func autoConvert_v1alpha1_ExecCredentialStatus_To_clientauthentication_ExecCredentialStatus(in *ExecCredentialStatus, out *clientauthentication.ExecCredentialStatus, s conversion.Scope) error { | ||||
| 	out.ExpirationTimestamp = (*v1.Time)(unsafe.Pointer(in.ExpirationTimestamp)) | ||||
| 	out.Token = in.Token | ||||
|   | ||||
							
								
								
									
										8
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/conversion.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										8
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/conversion.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -17,10 +17,12 @@ limitations under the License. | ||||
| package v1beta1 | ||||
|  | ||||
| import ( | ||||
| 	conversion "k8s.io/apimachinery/pkg/conversion" | ||||
| 	clientauthentication "k8s.io/client-go/pkg/apis/clientauthentication" | ||||
| 	"k8s.io/apimachinery/pkg/conversion" | ||||
| 	"k8s.io/client-go/pkg/apis/clientauthentication" | ||||
| ) | ||||
|  | ||||
| func Convert_clientauthentication_ExecCredentialSpec_To_v1beta1_ExecCredentialSpec(in *clientauthentication.ExecCredentialSpec, out *ExecCredentialSpec, s conversion.Scope) error { | ||||
| 	return nil | ||||
| 	// This conversion intentionally omits the Response and Interactive fields, which were only | ||||
| 	// supported in v1alpha1. | ||||
| 	return autoConvert_clientauthentication_ExecCredentialSpec_To_v1beta1_ExecCredentialSpec(in, out, s) | ||||
| } | ||||
|   | ||||
							
								
								
									
										74
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/types.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										74
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/types.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -18,17 +18,17 @@ package v1beta1 | ||||
|  | ||||
| import ( | ||||
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||||
| 	"k8s.io/apimachinery/pkg/runtime" | ||||
| ) | ||||
|  | ||||
| // +k8s:deepcopy-gen:interfaces=k8s.io/apimachinery/pkg/runtime.Object | ||||
|  | ||||
| // ExecCredentials is used by exec-based plugins to communicate credentials to | ||||
| // ExecCredential is used by exec-based plugins to communicate credentials to | ||||
| // HTTP transports. | ||||
| type ExecCredential struct { | ||||
| 	metav1.TypeMeta `json:",inline"` | ||||
|  | ||||
| 	// Spec holds information passed to the plugin by the transport. This contains | ||||
| 	// request and runtime specific information, such as if the session is interactive. | ||||
| 	// Spec holds information passed to the plugin by the transport. | ||||
| 	Spec ExecCredentialSpec `json:"spec,omitempty"` | ||||
|  | ||||
| 	// Status is filled in by the plugin and holds the credentials that the transport | ||||
| @@ -37,9 +37,16 @@ type ExecCredential struct { | ||||
| 	Status *ExecCredentialStatus `json:"status,omitempty"` | ||||
| } | ||||
|  | ||||
| // ExecCredenitalSpec holds request and runtime specific information provided by | ||||
| // ExecCredentialSpec holds request and runtime specific information provided by | ||||
| // the transport. | ||||
| type ExecCredentialSpec struct{} | ||||
| type ExecCredentialSpec struct { | ||||
| 	// Cluster contains information to allow an exec plugin to communicate with the | ||||
| 	// kubernetes cluster being authenticated to. Note that Cluster is non-nil only | ||||
| 	// when provideClusterInfo is set to true in the exec provider config (i.e., | ||||
| 	// ExecConfig.ProvideClusterInfo). | ||||
| 	// +optional | ||||
| 	Cluster *Cluster `json:"cluster,omitempty"` | ||||
| } | ||||
|  | ||||
| // ExecCredentialStatus holds credentials for the transport to use. | ||||
| // | ||||
| @@ -51,9 +58,62 @@ type ExecCredentialStatus struct { | ||||
| 	// +optional | ||||
| 	ExpirationTimestamp *metav1.Time `json:"expirationTimestamp,omitempty"` | ||||
| 	// Token is a bearer token used by the client for request authentication. | ||||
| 	Token string `json:"token,omitempty"` | ||||
| 	Token string `json:"token,omitempty" datapolicy:"token"` | ||||
| 	// PEM-encoded client TLS certificates (including intermediates, if any). | ||||
| 	ClientCertificateData string `json:"clientCertificateData,omitempty"` | ||||
| 	// PEM-encoded private key for the above certificate. | ||||
| 	ClientKeyData string `json:"clientKeyData,omitempty"` | ||||
| 	ClientKeyData string `json:"clientKeyData,omitempty" datapolicy:"security-key"` | ||||
| } | ||||
|  | ||||
| // Cluster contains information to allow an exec plugin to communicate | ||||
| // with the kubernetes cluster being authenticated to. | ||||
| // | ||||
| // To ensure that this struct contains everything someone would need to communicate | ||||
| // with a kubernetes cluster (just like they would via a kubeconfig), the fields | ||||
| // should shadow "k8s.io/client-go/tools/clientcmd/api/v1".Cluster, with the exception | ||||
| // of CertificateAuthority, since CA data will always be passed to the plugin as bytes. | ||||
| type Cluster struct { | ||||
| 	// Server is the address of the kubernetes cluster (https://hostname:port). | ||||
| 	Server string `json:"server"` | ||||
| 	// TLSServerName is passed to the server for SNI and is used in the client to | ||||
| 	// check server certificates against. If ServerName is empty, the hostname | ||||
| 	// used to contact the server is used. | ||||
| 	// +optional | ||||
| 	TLSServerName string `json:"tls-server-name,omitempty"` | ||||
| 	// InsecureSkipTLSVerify skips the validity check for the server's certificate. | ||||
| 	// This will make your HTTPS connections insecure. | ||||
| 	// +optional | ||||
| 	InsecureSkipTLSVerify bool `json:"insecure-skip-tls-verify,omitempty"` | ||||
| 	// CAData contains PEM-encoded certificate authority certificates. | ||||
| 	// If empty, system roots should be used. | ||||
| 	// +listType=atomic | ||||
| 	// +optional | ||||
| 	CertificateAuthorityData []byte `json:"certificate-authority-data,omitempty"` | ||||
| 	// ProxyURL is the URL to the proxy to be used for all requests to this | ||||
| 	// cluster. | ||||
| 	// +optional | ||||
| 	ProxyURL string `json:"proxy-url,omitempty"` | ||||
| 	// Config holds additional config data that is specific to the exec | ||||
| 	// plugin with regards to the cluster being authenticated to. | ||||
| 	// | ||||
| 	// This data is sourced from the clientcmd Cluster object's | ||||
| 	// extensions[client.authentication.k8s.io/exec] field: | ||||
| 	// | ||||
| 	// clusters: | ||||
| 	// - name: my-cluster | ||||
| 	//   cluster: | ||||
| 	//     ... | ||||
| 	//     extensions: | ||||
| 	//     - name: client.authentication.k8s.io/exec  # reserved extension name for per cluster exec config | ||||
| 	//       extension: | ||||
| 	//         audience: 06e3fbd18de8  # arbitrary config | ||||
| 	// | ||||
| 	// In some environments, the user config may be exactly the same across many clusters | ||||
| 	// (i.e. call this exec plugin) minus some details that are specific to each cluster | ||||
| 	// such as the audience.  This field allows the per cluster config to be directly | ||||
| 	// specified with the cluster info.  Using this field to store secret data is not | ||||
| 	// recommended as one of the prime benefits of exec plugins is that no secrets need | ||||
| 	// to be stored directly in the kubeconfig. | ||||
| 	// +optional | ||||
| 	Config runtime.RawExtension `json:"config,omitempty"` | ||||
| } | ||||
|   | ||||
							
								
								
									
										67
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/zz_generated.conversion.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										67
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/zz_generated.conversion.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -36,6 +36,16 @@ func init() { | ||||
| // RegisterConversions adds conversion functions to the given scheme. | ||||
| // Public to allow building arbitrary schemes. | ||||
| func RegisterConversions(s *runtime.Scheme) error { | ||||
| 	if err := s.AddGeneratedConversionFunc((*Cluster)(nil), (*clientauthentication.Cluster)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_v1beta1_Cluster_To_clientauthentication_Cluster(a.(*Cluster), b.(*clientauthentication.Cluster), scope) | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := s.AddGeneratedConversionFunc((*clientauthentication.Cluster)(nil), (*Cluster)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_clientauthentication_Cluster_To_v1beta1_Cluster(a.(*clientauthentication.Cluster), b.(*Cluster), scope) | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := s.AddGeneratedConversionFunc((*ExecCredential)(nil), (*clientauthentication.ExecCredential)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_v1beta1_ExecCredential_To_clientauthentication_ExecCredential(a.(*ExecCredential), b.(*clientauthentication.ExecCredential), scope) | ||||
| 	}); err != nil { | ||||
| @@ -51,11 +61,6 @@ func RegisterConversions(s *runtime.Scheme) error { | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := s.AddGeneratedConversionFunc((*clientauthentication.ExecCredentialSpec)(nil), (*ExecCredentialSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_clientauthentication_ExecCredentialSpec_To_v1beta1_ExecCredentialSpec(a.(*clientauthentication.ExecCredentialSpec), b.(*ExecCredentialSpec), scope) | ||||
| 	}); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	if err := s.AddGeneratedConversionFunc((*ExecCredentialStatus)(nil), (*clientauthentication.ExecCredentialStatus)(nil), func(a, b interface{}, scope conversion.Scope) error { | ||||
| 		return Convert_v1beta1_ExecCredentialStatus_To_clientauthentication_ExecCredentialStatus(a.(*ExecCredentialStatus), b.(*clientauthentication.ExecCredentialStatus), scope) | ||||
| 	}); err != nil { | ||||
| @@ -74,6 +79,40 @@ func RegisterConversions(s *runtime.Scheme) error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func autoConvert_v1beta1_Cluster_To_clientauthentication_Cluster(in *Cluster, out *clientauthentication.Cluster, s conversion.Scope) error { | ||||
| 	out.Server = in.Server | ||||
| 	out.TLSServerName = in.TLSServerName | ||||
| 	out.InsecureSkipTLSVerify = in.InsecureSkipTLSVerify | ||||
| 	out.CertificateAuthorityData = *(*[]byte)(unsafe.Pointer(&in.CertificateAuthorityData)) | ||||
| 	out.ProxyURL = in.ProxyURL | ||||
| 	if err := runtime.Convert_runtime_RawExtension_To_runtime_Object(&in.Config, &out.Config, s); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // Convert_v1beta1_Cluster_To_clientauthentication_Cluster is an autogenerated conversion function. | ||||
| func Convert_v1beta1_Cluster_To_clientauthentication_Cluster(in *Cluster, out *clientauthentication.Cluster, s conversion.Scope) error { | ||||
| 	return autoConvert_v1beta1_Cluster_To_clientauthentication_Cluster(in, out, s) | ||||
| } | ||||
|  | ||||
| func autoConvert_clientauthentication_Cluster_To_v1beta1_Cluster(in *clientauthentication.Cluster, out *Cluster, s conversion.Scope) error { | ||||
| 	out.Server = in.Server | ||||
| 	out.TLSServerName = in.TLSServerName | ||||
| 	out.InsecureSkipTLSVerify = in.InsecureSkipTLSVerify | ||||
| 	out.CertificateAuthorityData = *(*[]byte)(unsafe.Pointer(&in.CertificateAuthorityData)) | ||||
| 	out.ProxyURL = in.ProxyURL | ||||
| 	if err := runtime.Convert_runtime_Object_To_runtime_RawExtension(&in.Config, &out.Config, s); err != nil { | ||||
| 		return err | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| // Convert_clientauthentication_Cluster_To_v1beta1_Cluster is an autogenerated conversion function. | ||||
| func Convert_clientauthentication_Cluster_To_v1beta1_Cluster(in *clientauthentication.Cluster, out *Cluster, s conversion.Scope) error { | ||||
| 	return autoConvert_clientauthentication_Cluster_To_v1beta1_Cluster(in, out, s) | ||||
| } | ||||
|  | ||||
| func autoConvert_v1beta1_ExecCredential_To_clientauthentication_ExecCredential(in *ExecCredential, out *clientauthentication.ExecCredential, s conversion.Scope) error { | ||||
| 	if err := Convert_v1beta1_ExecCredentialSpec_To_clientauthentication_ExecCredentialSpec(&in.Spec, &out.Spec, s); err != nil { | ||||
| 		return err | ||||
| @@ -101,6 +140,15 @@ func Convert_clientauthentication_ExecCredential_To_v1beta1_ExecCredential(in *c | ||||
| } | ||||
|  | ||||
| func autoConvert_v1beta1_ExecCredentialSpec_To_clientauthentication_ExecCredentialSpec(in *ExecCredentialSpec, out *clientauthentication.ExecCredentialSpec, s conversion.Scope) error { | ||||
| 	if in.Cluster != nil { | ||||
| 		in, out := &in.Cluster, &out.Cluster | ||||
| 		*out = new(clientauthentication.Cluster) | ||||
| 		if err := Convert_v1beta1_Cluster_To_clientauthentication_Cluster(*in, *out, s); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} else { | ||||
| 		out.Cluster = nil | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| @@ -112,6 +160,15 @@ func Convert_v1beta1_ExecCredentialSpec_To_clientauthentication_ExecCredentialSp | ||||
| func autoConvert_clientauthentication_ExecCredentialSpec_To_v1beta1_ExecCredentialSpec(in *clientauthentication.ExecCredentialSpec, out *ExecCredentialSpec, s conversion.Scope) error { | ||||
| 	// WARNING: in.Response requires manual conversion: does not exist in peer-type | ||||
| 	// WARNING: in.Interactive requires manual conversion: does not exist in peer-type | ||||
| 	if in.Cluster != nil { | ||||
| 		in, out := &in.Cluster, &out.Cluster | ||||
| 		*out = new(Cluster) | ||||
| 		if err := Convert_clientauthentication_Cluster_To_v1beta1_Cluster(*in, *out, s); err != nil { | ||||
| 			return err | ||||
| 		} | ||||
| 	} else { | ||||
| 		out.Cluster = nil | ||||
| 	} | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
|   | ||||
							
								
								
									
										29
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/zz_generated.deepcopy.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										29
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/v1beta1/zz_generated.deepcopy.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -24,11 +24,33 @@ import ( | ||||
| 	runtime "k8s.io/apimachinery/pkg/runtime" | ||||
| ) | ||||
|  | ||||
| // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. | ||||
| func (in *Cluster) DeepCopyInto(out *Cluster) { | ||||
| 	*out = *in | ||||
| 	if in.CertificateAuthorityData != nil { | ||||
| 		in, out := &in.CertificateAuthorityData, &out.CertificateAuthorityData | ||||
| 		*out = make([]byte, len(*in)) | ||||
| 		copy(*out, *in) | ||||
| 	} | ||||
| 	in.Config.DeepCopyInto(&out.Config) | ||||
| 	return | ||||
| } | ||||
|  | ||||
| // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Cluster. | ||||
| func (in *Cluster) DeepCopy() *Cluster { | ||||
| 	if in == nil { | ||||
| 		return nil | ||||
| 	} | ||||
| 	out := new(Cluster) | ||||
| 	in.DeepCopyInto(out) | ||||
| 	return out | ||||
| } | ||||
|  | ||||
| // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. | ||||
| func (in *ExecCredential) DeepCopyInto(out *ExecCredential) { | ||||
| 	*out = *in | ||||
| 	out.TypeMeta = in.TypeMeta | ||||
| 	out.Spec = in.Spec | ||||
| 	in.Spec.DeepCopyInto(&out.Spec) | ||||
| 	if in.Status != nil { | ||||
| 		in, out := &in.Status, &out.Status | ||||
| 		*out = new(ExecCredentialStatus) | ||||
| @@ -58,6 +80,11 @@ func (in *ExecCredential) DeepCopyObject() runtime.Object { | ||||
| // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. | ||||
| func (in *ExecCredentialSpec) DeepCopyInto(out *ExecCredentialSpec) { | ||||
| 	*out = *in | ||||
| 	if in.Cluster != nil { | ||||
| 		in, out := &in.Cluster, &out.Cluster | ||||
| 		*out = new(Cluster) | ||||
| 		(*in).DeepCopyInto(*out) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
|   | ||||
							
								
								
									
										29
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/zz_generated.deepcopy.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										29
									
								
								vendor/k8s.io/client-go/pkg/apis/clientauthentication/zz_generated.deepcopy.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -24,6 +24,30 @@ import ( | ||||
| 	runtime "k8s.io/apimachinery/pkg/runtime" | ||||
| ) | ||||
|  | ||||
| // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. | ||||
| func (in *Cluster) DeepCopyInto(out *Cluster) { | ||||
| 	*out = *in | ||||
| 	if in.CertificateAuthorityData != nil { | ||||
| 		in, out := &in.CertificateAuthorityData, &out.CertificateAuthorityData | ||||
| 		*out = make([]byte, len(*in)) | ||||
| 		copy(*out, *in) | ||||
| 	} | ||||
| 	if in.Config != nil { | ||||
| 		out.Config = in.Config.DeepCopyObject() | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
| // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Cluster. | ||||
| func (in *Cluster) DeepCopy() *Cluster { | ||||
| 	if in == nil { | ||||
| 		return nil | ||||
| 	} | ||||
| 	out := new(Cluster) | ||||
| 	in.DeepCopyInto(out) | ||||
| 	return out | ||||
| } | ||||
|  | ||||
| // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. | ||||
| func (in *ExecCredential) DeepCopyInto(out *ExecCredential) { | ||||
| 	*out = *in | ||||
| @@ -63,6 +87,11 @@ func (in *ExecCredentialSpec) DeepCopyInto(out *ExecCredentialSpec) { | ||||
| 		*out = new(Response) | ||||
| 		(*in).DeepCopyInto(*out) | ||||
| 	} | ||||
| 	if in.Cluster != nil { | ||||
| 		in, out := &in.Cluster, &out.Cluster | ||||
| 		*out = new(Cluster) | ||||
| 		(*in).DeepCopyInto(*out) | ||||
| 	} | ||||
| 	return | ||||
| } | ||||
|  | ||||
|   | ||||
							
								
								
									
										2
									
								
								vendor/k8s.io/client-go/pkg/version/base.go
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								vendor/k8s.io/client-go/pkg/version/base.go
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -55,7 +55,7 @@ var ( | ||||
| 	// NOTE: The $Format strings are replaced during 'git archive' thanks to the | ||||
| 	// companion .gitattributes file containing 'export-subst' in this same | ||||
| 	// directory.  See also https://git-scm.com/docs/gitattributes | ||||
| 	gitVersion   string = "v0.0.0-master+$Format:%h$" | ||||
| 	gitVersion   string = "v0.0.0-master+$Format:%H$" | ||||
| 	gitCommit    string = "$Format:%H$" // sha1 from git, output of $(git rev-parse HEAD) | ||||
| 	gitTreeState string = ""            // state of git tree, either "clean" or "dirty" | ||||
|  | ||||
|   | ||||
							
								
								
									
										38
									
								
								vendor/k8s.io/client-go/pkg/version/def.bzl
									
									
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										38
									
								
								vendor/k8s.io/client-go/pkg/version/def.bzl
									
									
									
										generated
									
									
										vendored
									
									
								
							| @@ -1,38 +0,0 @@ | ||||
| # Copyright 2017 The Kubernetes Authors. | ||||
| # | ||||
| # Licensed under the Apache License, Version 2.0 (the "License"); | ||||
| # you may not use this file except in compliance with the License. | ||||
| # You may obtain a copy of the License at | ||||
| # | ||||
| #     http://www.apache.org/licenses/LICENSE-2.0 | ||||
| # | ||||
| # Unless required by applicable law or agreed to in writing, software | ||||
| # distributed under the License is distributed on an "AS IS" BASIS, | ||||
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||
| # See the License for the specific language governing permissions and | ||||
| # limitations under the License. | ||||
|  | ||||
| # Implements hack/lib/version.sh's kube::version::ldflags() for Bazel. | ||||
| def version_x_defs(): | ||||
|   # This should match the list of packages in kube::version::ldflag | ||||
|   stamp_pkgs = [ | ||||
|       "k8s.io/kubernetes/pkg/version", | ||||
|       # In hack/lib/version.sh, this has a vendor/ prefix. That isn't needed here? | ||||
|       "k8s.io/client-go/pkg/version", | ||||
|       ] | ||||
|   # This should match the list of vars in kube::version::ldflags | ||||
|   # It should also match the list of vars set in hack/print-workspace-status.sh. | ||||
|   stamp_vars = [ | ||||
|       "buildDate", | ||||
|       "gitCommit", | ||||
|       "gitMajor", | ||||
|       "gitMinor", | ||||
|       "gitTreeState", | ||||
|       "gitVersion", | ||||
|   ] | ||||
|   # Generate the cross-product. | ||||
|   x_defs = {} | ||||
|   for pkg in stamp_pkgs: | ||||
|     for var in stamp_vars: | ||||
|       x_defs["%s.%s" % (pkg, var)] = "{%s}" % var | ||||
|   return x_defs | ||||
		Reference in New Issue
	
	Block a user