rbac_authorization_v1beta1

package
v0.0.0-...-1e5aeb1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 6, 2021 License: Apache-2.0 Imports: 8 Imported by: 0

Documentation

Index

Constants

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleAcceptedCode int = 202

CreateRbacAuthorizationV1beta1ClusterRoleAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleAccepted

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode int = 202

CreateRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode int = 201

CreateRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200

CreateRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingOK

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode int = 401

CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleCreatedCode int = 201

CreateRbacAuthorizationV1beta1ClusterRoleCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleCreated

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleOKCode int = 200

CreateRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleOK

View Source
const CreateRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode int = 401

CreateRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleAcceptedCode int = 202

CreateRbacAuthorizationV1beta1NamespacedRoleAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleAccepted

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode int = 202

CreateRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode int = 201

CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200

CreateRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode int = 401

CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleCreatedCode int = 201

CreateRbacAuthorizationV1beta1NamespacedRoleCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleCreated

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200

CreateRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleOK

View Source
const CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode int = 401

CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1ClusterRoleAcceptedCode int = 202

DeleteRbacAuthorizationV1beta1ClusterRoleAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleAccepted

View Source
const DeleteRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode int = 202

DeleteRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted

View Source
const DeleteRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200

DeleteRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK

View Source
const DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1ClusterRoleOKCode int = 200

DeleteRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleOK

View Source
const DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOKCode int = 200

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK

View Source
const DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1CollectionClusterRoleOKCode int = 200

DeleteRbacAuthorizationV1beta1CollectionClusterRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK

View Source
const DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOKCode int = 200

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK

View Source
const DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOKCode int = 200

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK

View Source
const DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1NamespacedRoleAcceptedCode int = 202

DeleteRbacAuthorizationV1beta1NamespacedRoleAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted

View Source
const DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode int = 202

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

View Source
const DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK

View Source
const DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

View Source
const DeleteRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200

DeleteRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleOK

View Source
const DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode int = 401

DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized

View Source
const GetRbacAuthorizationV1beta1APIResourcesOKCode int = 200

GetRbacAuthorizationV1beta1APIResourcesOKCode is the HTTP code returned for type GetRbacAuthorizationV1beta1APIResourcesOK

View Source
const GetRbacAuthorizationV1beta1APIResourcesUnauthorizedCode int = 401

GetRbacAuthorizationV1beta1APIResourcesUnauthorizedCode is the HTTP code returned for type GetRbacAuthorizationV1beta1APIResourcesUnauthorized

View Source
const ListRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200

ListRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleBindingOK

View Source
const ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode int = 401

ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

View Source
const ListRbacAuthorizationV1beta1ClusterRoleOKCode int = 200

ListRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleOK

View Source
const ListRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode int = 401

ListRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleUnauthorized

View Source
const ListRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200

ListRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleBindingOK

View Source
const ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode int = 401

ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

View Source
const ListRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200

ListRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleOK

View Source
const ListRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode int = 401

ListRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized

View Source
const ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOKCode int = 200

ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK

View Source
const ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorizedCode int = 401

ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized

View Source
const ListRbacAuthorizationV1beta1RoleForAllNamespacesOKCode int = 200

ListRbacAuthorizationV1beta1RoleForAllNamespacesOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleForAllNamespacesOK

View Source
const ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorizedCode int = 401

ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized

View Source
const PatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200

PatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleBindingOK

View Source
const PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode int = 401

PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

View Source
const PatchRbacAuthorizationV1beta1ClusterRoleOKCode int = 200

PatchRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleOK

View Source
const PatchRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode int = 401

PatchRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

View Source
const PatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200

PatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

View Source
const PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode int = 401

PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

View Source
const PatchRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200

PatchRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleOK

View Source
const PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode int = 401

PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

View Source
const ReadRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200

ReadRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleBindingOK

View Source
const ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode int = 401

ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

View Source
const ReadRbacAuthorizationV1beta1ClusterRoleOKCode int = 200

ReadRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleOK

View Source
const ReadRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode int = 401

ReadRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized

View Source
const ReadRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200

ReadRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK

View Source
const ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode int = 401

ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

View Source
const ReadRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200

ReadRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleOK

View Source
const ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode int = 401

ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized

View Source
const ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode int = 201

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated

View Source
const ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK

View Source
const ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode int = 401

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

View Source
const ReplaceRbacAuthorizationV1beta1ClusterRoleCreatedCode int = 201

ReplaceRbacAuthorizationV1beta1ClusterRoleCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleCreated

View Source
const ReplaceRbacAuthorizationV1beta1ClusterRoleOKCode int = 200

ReplaceRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleOK

View Source
const ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode int = 401

ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized

View Source
const ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode int = 201

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated

View Source
const ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK

View Source
const ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode int = 401

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

View Source
const ReplaceRbacAuthorizationV1beta1NamespacedRoleCreatedCode int = 201

ReplaceRbacAuthorizationV1beta1NamespacedRoleCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated

View Source
const ReplaceRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200

ReplaceRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleOK

View Source
const ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode int = 401

ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleBindingListOKCode int = 200

WatchRbacAuthorizationV1beta1ClusterRoleBindingListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200

WatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingOK

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleListOKCode int = 200

WatchRbacAuthorizationV1beta1ClusterRoleListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleListOK

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleOKCode int = 200

WatchRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleOK

View Source
const WatchRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOKCode int = 200

WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200

WatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleListOKCode int = 200

WatchRbacAuthorizationV1beta1NamespacedRoleListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleListOK

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200

WatchRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleOK

View Source
const WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

View Source
const WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOKCode int = 200

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK

View Source
const WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized

View Source
const WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOKCode int = 200

WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK

View Source
const WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorizedCode int = 401

WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized

Variables

This section is empty.

Functions

This section is empty.

Types

type CreateRbacAuthorizationV1beta1ClusterRole

type CreateRbacAuthorizationV1beta1ClusterRole struct {
	Context *middleware.Context
	Handler CreateRbacAuthorizationV1beta1ClusterRoleHandler
}

CreateRbacAuthorizationV1beta1ClusterRole swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/clusterroles rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1ClusterRole

create a ClusterRole

func NewCreateRbacAuthorizationV1beta1ClusterRole

func NewCreateRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler CreateRbacAuthorizationV1beta1ClusterRoleHandler) *CreateRbacAuthorizationV1beta1ClusterRole

NewCreateRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the create rbac authorization v1beta1 cluster role operation

func (*CreateRbacAuthorizationV1beta1ClusterRole) ServeHTTP

type CreateRbacAuthorizationV1beta1ClusterRoleAccepted

type CreateRbacAuthorizationV1beta1ClusterRoleAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1ClusterRoleAccepted Accepted

swagger:response createRbacAuthorizationV1beta1ClusterRoleAccepted

func NewCreateRbacAuthorizationV1beta1ClusterRoleAccepted

func NewCreateRbacAuthorizationV1beta1ClusterRoleAccepted() *CreateRbacAuthorizationV1beta1ClusterRoleAccepted

NewCreateRbacAuthorizationV1beta1ClusterRoleAccepted creates CreateRbacAuthorizationV1beta1ClusterRoleAccepted with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 cluster role accepted response

func (*CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 cluster role accepted response

func (*CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1ClusterRoleBinding

type CreateRbacAuthorizationV1beta1ClusterRoleBinding struct {
	Context *middleware.Context
	Handler CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler
}

CreateRbacAuthorizationV1beta1ClusterRoleBinding swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1ClusterRoleBinding

create a ClusterRoleBinding

func NewCreateRbacAuthorizationV1beta1ClusterRoleBinding

NewCreateRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the create rbac authorization v1beta1 cluster role binding operation

func (*CreateRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP

type CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted

type CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted Accepted

swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingAccepted

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted() *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted

NewCreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted creates CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 cluster role binding accepted response

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 cluster role binding accepted response

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated

type CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated Created

swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingCreated

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingCreated

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingCreated() *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated

NewCreateRbacAuthorizationV1beta1ClusterRoleBindingCreated creates CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 cluster role binding created response

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 cluster role binding created response

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler

type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
	Handle(CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}

CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid create rbac authorization v1beta1 cluster role binding params

type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc

type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder

CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 cluster role binding handler

func (CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type CreateRbacAuthorizationV1beta1ClusterRoleBindingOK

type CreateRbacAuthorizationV1beta1ClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1ClusterRoleBindingOK OK

swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingOK() *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK

NewCreateRbacAuthorizationV1beta1ClusterRoleBindingOK creates CreateRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 cluster role binding o k response

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 cluster role binding o k response

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1ClusterRoleBindingParams

type CreateRbacAuthorizationV1beta1ClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1ClusterRoleBinding
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

CreateRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the create rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request

swagger:parameters createRbacAuthorizationV1beta1ClusterRoleBinding

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams() CreateRbacAuthorizationV1beta1ClusterRoleBindingParams

NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new CreateRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.

type CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

type CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct {
}

CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized

swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

NewCreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1ClusterRoleCreated

type CreateRbacAuthorizationV1beta1ClusterRoleCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1ClusterRoleCreated Created

swagger:response createRbacAuthorizationV1beta1ClusterRoleCreated

func NewCreateRbacAuthorizationV1beta1ClusterRoleCreated

func NewCreateRbacAuthorizationV1beta1ClusterRoleCreated() *CreateRbacAuthorizationV1beta1ClusterRoleCreated

NewCreateRbacAuthorizationV1beta1ClusterRoleCreated creates CreateRbacAuthorizationV1beta1ClusterRoleCreated with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 cluster role created response

func (*CreateRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 cluster role created response

func (*CreateRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1ClusterRoleHandler

type CreateRbacAuthorizationV1beta1ClusterRoleHandler interface {
	Handle(CreateRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}

CreateRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid create rbac authorization v1beta1 cluster role params

type CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc

type CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(CreateRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder

CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 cluster role handler

func (CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type CreateRbacAuthorizationV1beta1ClusterRoleOK

type CreateRbacAuthorizationV1beta1ClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1ClusterRoleOK OK

swagger:response createRbacAuthorizationV1beta1ClusterRoleOK

func NewCreateRbacAuthorizationV1beta1ClusterRoleOK

func NewCreateRbacAuthorizationV1beta1ClusterRoleOK() *CreateRbacAuthorizationV1beta1ClusterRoleOK

NewCreateRbacAuthorizationV1beta1ClusterRoleOK creates CreateRbacAuthorizationV1beta1ClusterRoleOK with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleOK) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 cluster role o k response

func (*CreateRbacAuthorizationV1beta1ClusterRoleOK) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 cluster role o k response

func (*CreateRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1ClusterRoleParams

type CreateRbacAuthorizationV1beta1ClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1ClusterRole
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

CreateRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the create rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request

swagger:parameters createRbacAuthorizationV1beta1ClusterRole

func NewCreateRbacAuthorizationV1beta1ClusterRoleParams

func NewCreateRbacAuthorizationV1beta1ClusterRoleParams() CreateRbacAuthorizationV1beta1ClusterRoleParams

NewCreateRbacAuthorizationV1beta1ClusterRoleParams creates a new CreateRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.

func (*CreateRbacAuthorizationV1beta1ClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1ClusterRoleParams() beforehand.

type CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized

type CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized struct {
}

CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized

swagger:response createRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewCreateRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewCreateRbacAuthorizationV1beta1ClusterRoleUnauthorized() *CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized

NewCreateRbacAuthorizationV1beta1ClusterRoleUnauthorized creates CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values

func (*CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRole

type CreateRbacAuthorizationV1beta1NamespacedRole struct {
	Context *middleware.Context
	Handler CreateRbacAuthorizationV1beta1NamespacedRoleHandler
}

CreateRbacAuthorizationV1beta1NamespacedRole swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1NamespacedRole

create a Role

func NewCreateRbacAuthorizationV1beta1NamespacedRole

NewCreateRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the create rbac authorization v1beta1 namespaced role operation

func (*CreateRbacAuthorizationV1beta1NamespacedRole) ServeHTTP

type CreateRbacAuthorizationV1beta1NamespacedRoleAccepted

type CreateRbacAuthorizationV1beta1NamespacedRoleAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1NamespacedRoleAccepted Accepted

swagger:response createRbacAuthorizationV1beta1NamespacedRoleAccepted

func NewCreateRbacAuthorizationV1beta1NamespacedRoleAccepted

func NewCreateRbacAuthorizationV1beta1NamespacedRoleAccepted() *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted

NewCreateRbacAuthorizationV1beta1NamespacedRoleAccepted creates CreateRbacAuthorizationV1beta1NamespacedRoleAccepted with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role accepted response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role accepted response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRoleBinding

type CreateRbacAuthorizationV1beta1NamespacedRoleBinding struct {
	Context *middleware.Context
	Handler CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler
}

CreateRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1NamespacedRoleBinding

create a RoleBinding

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBinding

NewCreateRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the create rbac authorization v1beta1 namespaced role binding operation

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted Accepted

swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role binding accepted response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role binding accepted response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated Created

swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingCreated

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated

NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role binding created response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role binding created response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
	Handle(CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}

CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid create rbac authorization v1beta1 namespaced role binding params

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder

CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 namespaced role binding handler

func (CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK OK

swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingOK() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK

NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingOK creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role binding o k response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role binding o k response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1RoleBinding
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the create rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters createRbacAuthorizationV1beta1NamespacedRoleBinding

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams() CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams

NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

type CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct {
}

CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized

swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRoleCreated

type CreateRbacAuthorizationV1beta1NamespacedRoleCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1NamespacedRoleCreated Created

swagger:response createRbacAuthorizationV1beta1NamespacedRoleCreated

func NewCreateRbacAuthorizationV1beta1NamespacedRoleCreated

func NewCreateRbacAuthorizationV1beta1NamespacedRoleCreated() *CreateRbacAuthorizationV1beta1NamespacedRoleCreated

NewCreateRbacAuthorizationV1beta1NamespacedRoleCreated creates CreateRbacAuthorizationV1beta1NamespacedRoleCreated with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role created response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role created response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRoleHandler

type CreateRbacAuthorizationV1beta1NamespacedRoleHandler interface {
	Handle(CreateRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}

CreateRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid create rbac authorization v1beta1 namespaced role params

type CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc

type CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(CreateRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder

CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 namespaced role handler

func (CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type CreateRbacAuthorizationV1beta1NamespacedRoleOK

type CreateRbacAuthorizationV1beta1NamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"`
}

CreateRbacAuthorizationV1beta1NamespacedRoleOK OK

swagger:response createRbacAuthorizationV1beta1NamespacedRoleOK

func NewCreateRbacAuthorizationV1beta1NamespacedRoleOK

func NewCreateRbacAuthorizationV1beta1NamespacedRoleOK() *CreateRbacAuthorizationV1beta1NamespacedRoleOK

NewCreateRbacAuthorizationV1beta1NamespacedRoleOK creates CreateRbacAuthorizationV1beta1NamespacedRoleOK with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload

SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role o k response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload

WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role o k response

func (*CreateRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse

WriteResponse to the client

type CreateRbacAuthorizationV1beta1NamespacedRoleParams

type CreateRbacAuthorizationV1beta1NamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1Role
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

CreateRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the create rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request

swagger:parameters createRbacAuthorizationV1beta1NamespacedRole

func NewCreateRbacAuthorizationV1beta1NamespacedRoleParams

func NewCreateRbacAuthorizationV1beta1NamespacedRoleParams() CreateRbacAuthorizationV1beta1NamespacedRoleParams

NewCreateRbacAuthorizationV1beta1NamespacedRoleParams creates a new CreateRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.

func (*CreateRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.

type CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized

type CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct {
}

CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized

swagger:response createRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewCreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewCreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized

NewCreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values

func (*CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1ClusterRole

type DeleteRbacAuthorizationV1beta1ClusterRole struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1ClusterRoleHandler
}

DeleteRbacAuthorizationV1beta1ClusterRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1ClusterRole

delete a ClusterRole

func NewDeleteRbacAuthorizationV1beta1ClusterRole

func NewDeleteRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1ClusterRoleHandler) *DeleteRbacAuthorizationV1beta1ClusterRole

NewDeleteRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the delete rbac authorization v1beta1 cluster role operation

func (*DeleteRbacAuthorizationV1beta1ClusterRole) ServeHTTP

type DeleteRbacAuthorizationV1beta1ClusterRoleAccepted

type DeleteRbacAuthorizationV1beta1ClusterRoleAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1ClusterRoleAccepted Accepted

swagger:response deleteRbacAuthorizationV1beta1ClusterRoleAccepted

func NewDeleteRbacAuthorizationV1beta1ClusterRoleAccepted

func NewDeleteRbacAuthorizationV1beta1ClusterRoleAccepted() *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted

NewDeleteRbacAuthorizationV1beta1ClusterRoleAccepted creates DeleteRbacAuthorizationV1beta1ClusterRoleAccepted with default headers values

func (*DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role accepted response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role accepted response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1ClusterRoleBinding

type DeleteRbacAuthorizationV1beta1ClusterRoleBinding struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler
}

DeleteRbacAuthorizationV1beta1ClusterRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1ClusterRoleBinding

delete a ClusterRoleBinding

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBinding

NewDeleteRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 cluster role binding operation

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted Accepted

swagger:response deleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted() *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted

NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted creates DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted with default headers values

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role binding accepted response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role binding accepted response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 cluster role binding params

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder

DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 cluster role binding handler

func (DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK OK

swagger:response deleteRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingOK() *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK

NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingOK creates DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role binding o k response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role binding o k response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*name of the ClusterRoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
}

DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1ClusterRoleBinding

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams() DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams

NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

type DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1ClusterRoleHandler

type DeleteRbacAuthorizationV1beta1ClusterRoleHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid delete rbac authorization v1beta1 cluster role params

type DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc

type DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder

DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 cluster role handler

func (DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1ClusterRoleOK

type DeleteRbacAuthorizationV1beta1ClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1ClusterRoleOK OK

swagger:response deleteRbacAuthorizationV1beta1ClusterRoleOK

func NewDeleteRbacAuthorizationV1beta1ClusterRoleOK

func NewDeleteRbacAuthorizationV1beta1ClusterRoleOK() *DeleteRbacAuthorizationV1beta1ClusterRoleOK

NewDeleteRbacAuthorizationV1beta1ClusterRoleOK creates DeleteRbacAuthorizationV1beta1ClusterRoleOK with default headers values

func (*DeleteRbacAuthorizationV1beta1ClusterRoleOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role o k response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role o k response

func (*DeleteRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1ClusterRoleParams

type DeleteRbacAuthorizationV1beta1ClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*name of the ClusterRole
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
}

DeleteRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the delete rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1ClusterRole

func NewDeleteRbacAuthorizationV1beta1ClusterRoleParams

func NewDeleteRbacAuthorizationV1beta1ClusterRoleParams() DeleteRbacAuthorizationV1beta1ClusterRoleParams

NewDeleteRbacAuthorizationV1beta1ClusterRoleParams creates a new DeleteRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1ClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1ClusterRoleParams() beforehand.

type DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized

type DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized() *DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized

NewDeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized creates DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionClusterRole

type DeleteRbacAuthorizationV1beta1CollectionClusterRole struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler
}

DeleteRbacAuthorizationV1beta1CollectionClusterRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterroles rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionClusterRole

delete collection of ClusterRole

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRole

NewDeleteRbacAuthorizationV1beta1CollectionClusterRole creates a new http.Handler for the delete rbac authorization v1beta1 collection cluster role operation

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRole) ServeHTTP

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionClusterRoleBinding

delete collection of ClusterRoleBinding

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding

NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 collection cluster role binding operation

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding) ServeHTTP

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 collection cluster role binding params

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) middleware.Responder

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection cluster role binding handler

func (DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK OK

swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK

NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 collection cluster role binding o k response

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 collection cluster role binding o k response

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 collection cluster role binding operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1CollectionClusterRoleBinding

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams() DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams

NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams() beforehand.

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized

NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler interface for that can handle valid delete rbac authorization v1beta1 collection cluster role params

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) middleware.Responder

DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection cluster role handler

func (DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK OK

swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleOK

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleOK

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleOK() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK

NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleOK creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 collection cluster role o k response

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 collection cluster role o k response

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams contains all the bound params for the delete rbac authorization v1beta1 collection cluster role operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1CollectionClusterRole

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams() DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams

NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams creates a new DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams() beforehand.

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized

type DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized

NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRole

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRole struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionNamespacedRole

delete collection of Role

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRole

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRole creates a new http.Handler for the delete rbac authorization v1beta1 collection namespaced role operation

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRole) ServeHTTP

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding

delete collection of RoleBinding

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 collection namespaced role binding operation

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding) ServeHTTP

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 collection namespaced role binding params

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) middleware.Responder

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection namespaced role binding handler

func (DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK OK

swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 collection namespaced role binding o k response

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 collection namespaced role binding o k response

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 collection namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams() DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams() beforehand.

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler interface for that can handle valid delete rbac authorization v1beta1 collection namespaced role params

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) middleware.Responder

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection namespaced role handler

func (DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK OK

swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 collection namespaced role o k response

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 collection namespaced role o k response

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams contains all the bound params for the delete rbac authorization v1beta1 collection namespaced role operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1CollectionNamespacedRole

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams() DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams creates a new DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams() beforehand.

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized

type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized

NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1NamespacedRole

type DeleteRbacAuthorizationV1beta1NamespacedRole struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1NamespacedRoleHandler
}

DeleteRbacAuthorizationV1beta1NamespacedRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1NamespacedRole

delete a Role

func NewDeleteRbacAuthorizationV1beta1NamespacedRole

NewDeleteRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the delete rbac authorization v1beta1 namespaced role operation

func (*DeleteRbacAuthorizationV1beta1NamespacedRole) ServeHTTP

type DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted

type DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted Accepted

swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleAccepted

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleAccepted

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleAccepted() *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted

NewDeleteRbacAuthorizationV1beta1NamespacedRoleAccepted creates DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted with default headers values

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role accepted response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role accepted response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1NamespacedRoleBinding

type DeleteRbacAuthorizationV1beta1NamespacedRoleBinding struct {
	Context *middleware.Context
	Handler DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler
}

DeleteRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1NamespacedRoleBinding

delete a RoleBinding

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBinding

NewDeleteRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 namespaced role binding operation

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted Accepted

swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted() *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted

NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted creates DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted with default headers values

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role binding accepted response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role binding accepted response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 namespaced role binding params

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 namespaced role binding handler

func (DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK OK

swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK() *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK

NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK creates DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role binding o k response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role binding o k response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*name of the RoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
}

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1NamespacedRoleBinding

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams() DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams

NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1NamespacedRoleHandler

type DeleteRbacAuthorizationV1beta1NamespacedRoleHandler interface {
	Handle(DeleteRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}

DeleteRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid delete rbac authorization v1beta1 namespaced role params

type DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc

type DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder

DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 namespaced role handler

func (DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type DeleteRbacAuthorizationV1beta1NamespacedRoleOK

type DeleteRbacAuthorizationV1beta1NamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"`
}

DeleteRbacAuthorizationV1beta1NamespacedRoleOK OK

swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleOK

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleOK

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleOK() *DeleteRbacAuthorizationV1beta1NamespacedRoleOK

NewDeleteRbacAuthorizationV1beta1NamespacedRoleOK creates DeleteRbacAuthorizationV1beta1NamespacedRoleOK with default headers values

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload

SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role o k response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload

WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role o k response

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse

WriteResponse to the client

type DeleteRbacAuthorizationV1beta1NamespacedRoleParams

type DeleteRbacAuthorizationV1beta1NamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  In: body
	*/
	Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately.
	  Unique: true
	  In: query
	*/
	GracePeriodSeconds *int64
	/*name of the Role
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both.
	  Unique: true
	  In: query
	*/
	OrphanDependents *bool
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground.
	  Unique: true
	  In: query
	*/
	PropagationPolicy *string
}

DeleteRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the delete rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request

swagger:parameters deleteRbacAuthorizationV1beta1NamespacedRole

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams() DeleteRbacAuthorizationV1beta1NamespacedRoleParams

NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams creates a new DeleteRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.

type DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized

type DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct {
}

DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized

swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewDeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized

NewDeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values

func (*DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type GetRbacAuthorizationV1beta1APIResources

type GetRbacAuthorizationV1beta1APIResources struct {
	Context *middleware.Context
	Handler GetRbacAuthorizationV1beta1APIResourcesHandler
}

GetRbacAuthorizationV1beta1APIResources swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/ rbacAuthorization_v1beta1 getRbacAuthorizationV1beta1ApiResources

get available resources

func NewGetRbacAuthorizationV1beta1APIResources

func NewGetRbacAuthorizationV1beta1APIResources(ctx *middleware.Context, handler GetRbacAuthorizationV1beta1APIResourcesHandler) *GetRbacAuthorizationV1beta1APIResources

NewGetRbacAuthorizationV1beta1APIResources creates a new http.Handler for the get rbac authorization v1beta1 API resources operation

func (*GetRbacAuthorizationV1beta1APIResources) ServeHTTP

type GetRbacAuthorizationV1beta1APIResourcesHandler

type GetRbacAuthorizationV1beta1APIResourcesHandler interface {
	Handle(GetRbacAuthorizationV1beta1APIResourcesParams) middleware.Responder
}

GetRbacAuthorizationV1beta1APIResourcesHandler interface for that can handle valid get rbac authorization v1beta1 API resources params

type GetRbacAuthorizationV1beta1APIResourcesHandlerFunc

type GetRbacAuthorizationV1beta1APIResourcesHandlerFunc func(GetRbacAuthorizationV1beta1APIResourcesParams) middleware.Responder

GetRbacAuthorizationV1beta1APIResourcesHandlerFunc turns a function with the right signature into a get rbac authorization v1beta1 API resources handler

func (GetRbacAuthorizationV1beta1APIResourcesHandlerFunc) Handle

Handle executing the request and returning a response

type GetRbacAuthorizationV1beta1APIResourcesOK

type GetRbacAuthorizationV1beta1APIResourcesOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1APIResourceList `json:"body,omitempty"`
}

GetRbacAuthorizationV1beta1APIResourcesOK OK

swagger:response getRbacAuthorizationV1beta1ApiResourcesOK

func NewGetRbacAuthorizationV1beta1APIResourcesOK

func NewGetRbacAuthorizationV1beta1APIResourcesOK() *GetRbacAuthorizationV1beta1APIResourcesOK

NewGetRbacAuthorizationV1beta1APIResourcesOK creates GetRbacAuthorizationV1beta1APIResourcesOK with default headers values

func (*GetRbacAuthorizationV1beta1APIResourcesOK) SetPayload

SetPayload sets the payload to the get rbac authorization v1beta1 Api resources o k response

func (*GetRbacAuthorizationV1beta1APIResourcesOK) WithPayload

WithPayload adds the payload to the get rbac authorization v1beta1 Api resources o k response

func (*GetRbacAuthorizationV1beta1APIResourcesOK) WriteResponse

WriteResponse to the client

type GetRbacAuthorizationV1beta1APIResourcesParams

type GetRbacAuthorizationV1beta1APIResourcesParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`
}

GetRbacAuthorizationV1beta1APIResourcesParams contains all the bound params for the get rbac authorization v1beta1 API resources operation typically these are obtained from a http.Request

swagger:parameters getRbacAuthorizationV1beta1APIResources

func NewGetRbacAuthorizationV1beta1APIResourcesParams

func NewGetRbacAuthorizationV1beta1APIResourcesParams() GetRbacAuthorizationV1beta1APIResourcesParams

NewGetRbacAuthorizationV1beta1APIResourcesParams creates a new GetRbacAuthorizationV1beta1APIResourcesParams object no default values defined in spec.

func (*GetRbacAuthorizationV1beta1APIResourcesParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewGetRbacAuthorizationV1beta1APIResourcesParams() beforehand.

type GetRbacAuthorizationV1beta1APIResourcesUnauthorized

type GetRbacAuthorizationV1beta1APIResourcesUnauthorized struct {
}

GetRbacAuthorizationV1beta1APIResourcesUnauthorized Unauthorized

swagger:response getRbacAuthorizationV1beta1ApiResourcesUnauthorized

func NewGetRbacAuthorizationV1beta1APIResourcesUnauthorized

func NewGetRbacAuthorizationV1beta1APIResourcesUnauthorized() *GetRbacAuthorizationV1beta1APIResourcesUnauthorized

NewGetRbacAuthorizationV1beta1APIResourcesUnauthorized creates GetRbacAuthorizationV1beta1APIResourcesUnauthorized with default headers values

func (*GetRbacAuthorizationV1beta1APIResourcesUnauthorized) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1ClusterRole

type ListRbacAuthorizationV1beta1ClusterRole struct {
	Context *middleware.Context
	Handler ListRbacAuthorizationV1beta1ClusterRoleHandler
}

ListRbacAuthorizationV1beta1ClusterRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterroles rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1ClusterRole

list or watch objects of kind ClusterRole

func NewListRbacAuthorizationV1beta1ClusterRole

func NewListRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1ClusterRoleHandler) *ListRbacAuthorizationV1beta1ClusterRole

NewListRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the list rbac authorization v1beta1 cluster role operation

func (*ListRbacAuthorizationV1beta1ClusterRole) ServeHTTP

type ListRbacAuthorizationV1beta1ClusterRoleBinding

type ListRbacAuthorizationV1beta1ClusterRoleBinding struct {
	Context *middleware.Context
	Handler ListRbacAuthorizationV1beta1ClusterRoleBindingHandler
}

ListRbacAuthorizationV1beta1ClusterRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1ClusterRoleBinding

list or watch objects of kind ClusterRoleBinding

func NewListRbacAuthorizationV1beta1ClusterRoleBinding

NewListRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the list rbac authorization v1beta1 cluster role binding operation

func (*ListRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP

type ListRbacAuthorizationV1beta1ClusterRoleBindingHandler

type ListRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
	Handle(ListRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}

ListRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid list rbac authorization v1beta1 cluster role binding params

type ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc

type ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(ListRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder

ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 cluster role binding handler

func (ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type ListRbacAuthorizationV1beta1ClusterRoleBindingOK

type ListRbacAuthorizationV1beta1ClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBindingList `json:"body,omitempty"`
}

ListRbacAuthorizationV1beta1ClusterRoleBindingOK OK

swagger:response listRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewListRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewListRbacAuthorizationV1beta1ClusterRoleBindingOK() *ListRbacAuthorizationV1beta1ClusterRoleBindingOK

NewListRbacAuthorizationV1beta1ClusterRoleBindingOK creates ListRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values

func (*ListRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the list rbac authorization v1beta1 cluster role binding o k response

func (*ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the list rbac authorization v1beta1 cluster role binding o k response

func (*ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1ClusterRoleBindingParams

type ListRbacAuthorizationV1beta1ClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

ListRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the list rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request

swagger:parameters listRbacAuthorizationV1beta1ClusterRoleBinding

func NewListRbacAuthorizationV1beta1ClusterRoleBindingParams

func NewListRbacAuthorizationV1beta1ClusterRoleBindingParams() ListRbacAuthorizationV1beta1ClusterRoleBindingParams

NewListRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new ListRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.

func (*ListRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.

type ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

type ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct {
}

ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized

swagger:response listRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

NewListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values

func (*ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1ClusterRoleHandler

type ListRbacAuthorizationV1beta1ClusterRoleHandler interface {
	Handle(ListRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}

ListRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid list rbac authorization v1beta1 cluster role params

type ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc

type ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(ListRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder

ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 cluster role handler

func (ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type ListRbacAuthorizationV1beta1ClusterRoleOK

type ListRbacAuthorizationV1beta1ClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleList `json:"body,omitempty"`
}

ListRbacAuthorizationV1beta1ClusterRoleOK OK

swagger:response listRbacAuthorizationV1beta1ClusterRoleOK

func NewListRbacAuthorizationV1beta1ClusterRoleOK

func NewListRbacAuthorizationV1beta1ClusterRoleOK() *ListRbacAuthorizationV1beta1ClusterRoleOK

NewListRbacAuthorizationV1beta1ClusterRoleOK creates ListRbacAuthorizationV1beta1ClusterRoleOK with default headers values

func (*ListRbacAuthorizationV1beta1ClusterRoleOK) SetPayload

SetPayload sets the payload to the list rbac authorization v1beta1 cluster role o k response

func (*ListRbacAuthorizationV1beta1ClusterRoleOK) WithPayload

WithPayload adds the payload to the list rbac authorization v1beta1 cluster role o k response

func (*ListRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1ClusterRoleParams

type ListRbacAuthorizationV1beta1ClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

ListRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the list rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request

swagger:parameters listRbacAuthorizationV1beta1ClusterRole

func NewListRbacAuthorizationV1beta1ClusterRoleParams

func NewListRbacAuthorizationV1beta1ClusterRoleParams() ListRbacAuthorizationV1beta1ClusterRoleParams

NewListRbacAuthorizationV1beta1ClusterRoleParams creates a new ListRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.

func (*ListRbacAuthorizationV1beta1ClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1ClusterRoleParams() beforehand.

type ListRbacAuthorizationV1beta1ClusterRoleUnauthorized

type ListRbacAuthorizationV1beta1ClusterRoleUnauthorized struct {
}

ListRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized

swagger:response listRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewListRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewListRbacAuthorizationV1beta1ClusterRoleUnauthorized() *ListRbacAuthorizationV1beta1ClusterRoleUnauthorized

NewListRbacAuthorizationV1beta1ClusterRoleUnauthorized creates ListRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values

func (*ListRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1NamespacedRole

type ListRbacAuthorizationV1beta1NamespacedRole struct {
	Context *middleware.Context
	Handler ListRbacAuthorizationV1beta1NamespacedRoleHandler
}

ListRbacAuthorizationV1beta1NamespacedRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1NamespacedRole

list or watch objects of kind Role

func NewListRbacAuthorizationV1beta1NamespacedRole

func NewListRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1NamespacedRoleHandler) *ListRbacAuthorizationV1beta1NamespacedRole

NewListRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the list rbac authorization v1beta1 namespaced role operation

func (*ListRbacAuthorizationV1beta1NamespacedRole) ServeHTTP

type ListRbacAuthorizationV1beta1NamespacedRoleBinding

type ListRbacAuthorizationV1beta1NamespacedRoleBinding struct {
	Context *middleware.Context
	Handler ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler
}

ListRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1NamespacedRoleBinding

list or watch objects of kind RoleBinding

func NewListRbacAuthorizationV1beta1NamespacedRoleBinding

NewListRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the list rbac authorization v1beta1 namespaced role binding operation

func (*ListRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP

type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler

type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
	Handle(ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}

ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid list rbac authorization v1beta1 namespaced role binding params

type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc

type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder

ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 namespaced role binding handler

func (ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type ListRbacAuthorizationV1beta1NamespacedRoleBindingOK

type ListRbacAuthorizationV1beta1NamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBindingList `json:"body,omitempty"`
}

ListRbacAuthorizationV1beta1NamespacedRoleBindingOK OK

swagger:response listRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewListRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewListRbacAuthorizationV1beta1NamespacedRoleBindingOK() *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK

NewListRbacAuthorizationV1beta1NamespacedRoleBindingOK creates ListRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values

func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the list rbac authorization v1beta1 namespaced role binding o k response

func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the list rbac authorization v1beta1 namespaced role binding o k response

func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1NamespacedRoleBindingParams

type ListRbacAuthorizationV1beta1NamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

ListRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the list rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters listRbacAuthorizationV1beta1NamespacedRoleBinding

func NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams

func NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams() ListRbacAuthorizationV1beta1NamespacedRoleBindingParams

NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new ListRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.

func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.

type ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

type ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct {
}

ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized

swagger:response listRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

NewListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values

func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1NamespacedRoleHandler

type ListRbacAuthorizationV1beta1NamespacedRoleHandler interface {
	Handle(ListRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}

ListRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid list rbac authorization v1beta1 namespaced role params

type ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc

type ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(ListRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder

ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 namespaced role handler

func (ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type ListRbacAuthorizationV1beta1NamespacedRoleOK

type ListRbacAuthorizationV1beta1NamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleList `json:"body,omitempty"`
}

ListRbacAuthorizationV1beta1NamespacedRoleOK OK

swagger:response listRbacAuthorizationV1beta1NamespacedRoleOK

func NewListRbacAuthorizationV1beta1NamespacedRoleOK

func NewListRbacAuthorizationV1beta1NamespacedRoleOK() *ListRbacAuthorizationV1beta1NamespacedRoleOK

NewListRbacAuthorizationV1beta1NamespacedRoleOK creates ListRbacAuthorizationV1beta1NamespacedRoleOK with default headers values

func (*ListRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload

SetPayload sets the payload to the list rbac authorization v1beta1 namespaced role o k response

func (*ListRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload

WithPayload adds the payload to the list rbac authorization v1beta1 namespaced role o k response

func (*ListRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1NamespacedRoleParams

type ListRbacAuthorizationV1beta1NamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

ListRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the list rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request

swagger:parameters listRbacAuthorizationV1beta1NamespacedRole

func NewListRbacAuthorizationV1beta1NamespacedRoleParams

func NewListRbacAuthorizationV1beta1NamespacedRoleParams() ListRbacAuthorizationV1beta1NamespacedRoleParams

NewListRbacAuthorizationV1beta1NamespacedRoleParams creates a new ListRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.

func (*ListRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.

type ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized

type ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct {
}

ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized

swagger:response listRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewListRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewListRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized

NewListRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values

func (*ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces struct {
	Context *middleware.Context
	Handler ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler
}

ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/rolebindings rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1RoleBindingForAllNamespaces

list or watch objects of kind RoleBinding

func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespaces

NewListRbacAuthorizationV1beta1RoleBindingForAllNamespaces creates a new http.Handler for the list rbac authorization v1beta1 role binding for all namespaces operation

func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces) ServeHTTP

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler interface {
	Handle(ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) middleware.Responder
}

ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler interface for that can handle valid list rbac authorization v1beta1 role binding for all namespaces params

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc func(ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) middleware.Responder

ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 role binding for all namespaces handler

func (ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc) Handle

Handle executing the request and returning a response

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBindingList `json:"body,omitempty"`
}

ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK OK

swagger:response listRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK

func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK

func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK() *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK

NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK creates ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK with default headers values

func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) SetPayload

SetPayload sets the payload to the list rbac authorization v1beta1 role binding for all namespaces o k response

func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WithPayload

WithPayload adds the payload to the list rbac authorization v1beta1 role binding for all namespaces o k response

func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams contains all the bound params for the list rbac authorization v1beta1 role binding for all namespaces operation typically these are obtained from a http.Request

swagger:parameters listRbacAuthorizationV1beta1RoleBindingForAllNamespaces

func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams

func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams() ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams

NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams creates a new ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams object no default values defined in spec.

func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams() beforehand.

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized

type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized struct {
}

ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized Unauthorized

swagger:response listRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized

func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized

func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized() *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized

NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized creates ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized with default headers values

func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1RoleForAllNamespaces

type ListRbacAuthorizationV1beta1RoleForAllNamespaces struct {
	Context *middleware.Context
	Handler ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler
}

ListRbacAuthorizationV1beta1RoleForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/roles rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1RoleForAllNamespaces

list or watch objects of kind Role

func NewListRbacAuthorizationV1beta1RoleForAllNamespaces

NewListRbacAuthorizationV1beta1RoleForAllNamespaces creates a new http.Handler for the list rbac authorization v1beta1 role for all namespaces operation

func (*ListRbacAuthorizationV1beta1RoleForAllNamespaces) ServeHTTP

type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler

type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler interface {
	Handle(ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) middleware.Responder
}

ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler interface for that can handle valid list rbac authorization v1beta1 role for all namespaces params

type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc

type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc func(ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) middleware.Responder

ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 role for all namespaces handler

func (ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc) Handle

Handle executing the request and returning a response

type ListRbacAuthorizationV1beta1RoleForAllNamespacesOK

type ListRbacAuthorizationV1beta1RoleForAllNamespacesOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleList `json:"body,omitempty"`
}

ListRbacAuthorizationV1beta1RoleForAllNamespacesOK OK

swagger:response listRbacAuthorizationV1beta1RoleForAllNamespacesOK

func NewListRbacAuthorizationV1beta1RoleForAllNamespacesOK

func NewListRbacAuthorizationV1beta1RoleForAllNamespacesOK() *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK

NewListRbacAuthorizationV1beta1RoleForAllNamespacesOK creates ListRbacAuthorizationV1beta1RoleForAllNamespacesOK with default headers values

func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) SetPayload

SetPayload sets the payload to the list rbac authorization v1beta1 role for all namespaces o k response

func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WithPayload

WithPayload adds the payload to the list rbac authorization v1beta1 role for all namespaces o k response

func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WriteResponse

WriteResponse to the client

type ListRbacAuthorizationV1beta1RoleForAllNamespacesParams

type ListRbacAuthorizationV1beta1RoleForAllNamespacesParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

ListRbacAuthorizationV1beta1RoleForAllNamespacesParams contains all the bound params for the list rbac authorization v1beta1 role for all namespaces operation typically these are obtained from a http.Request

swagger:parameters listRbacAuthorizationV1beta1RoleForAllNamespaces

func NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams

func NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams() ListRbacAuthorizationV1beta1RoleForAllNamespacesParams

NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams creates a new ListRbacAuthorizationV1beta1RoleForAllNamespacesParams object no default values defined in spec.

func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams() beforehand.

type ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized

type ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized struct {
}

ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized Unauthorized

swagger:response listRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized

func NewListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized

func NewListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized() *ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized

NewListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized creates ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized with default headers values

func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1ClusterRole

type PatchRbacAuthorizationV1beta1ClusterRole struct {
	Context *middleware.Context
	Handler PatchRbacAuthorizationV1beta1ClusterRoleHandler
}

PatchRbacAuthorizationV1beta1ClusterRole swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1ClusterRole

partially update the specified ClusterRole

func NewPatchRbacAuthorizationV1beta1ClusterRole

func NewPatchRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler PatchRbacAuthorizationV1beta1ClusterRoleHandler) *PatchRbacAuthorizationV1beta1ClusterRole

NewPatchRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the patch rbac authorization v1beta1 cluster role operation

func (*PatchRbacAuthorizationV1beta1ClusterRole) ServeHTTP

type PatchRbacAuthorizationV1beta1ClusterRoleBinding

type PatchRbacAuthorizationV1beta1ClusterRoleBinding struct {
	Context *middleware.Context
	Handler PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler
}

PatchRbacAuthorizationV1beta1ClusterRoleBinding swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1ClusterRoleBinding

partially update the specified ClusterRoleBinding

func NewPatchRbacAuthorizationV1beta1ClusterRoleBinding

NewPatchRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the patch rbac authorization v1beta1 cluster role binding operation

func (*PatchRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP

type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler

type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
	Handle(PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}

PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid patch rbac authorization v1beta1 cluster role binding params

type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc

type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder

PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 cluster role binding handler

func (PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type PatchRbacAuthorizationV1beta1ClusterRoleBindingOK

type PatchRbacAuthorizationV1beta1ClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"`
}

PatchRbacAuthorizationV1beta1ClusterRoleBindingOK OK

swagger:response patchRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingOK() *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK

NewPatchRbacAuthorizationV1beta1ClusterRoleBindingOK creates PatchRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values

func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the patch rbac authorization v1beta1 cluster role binding o k response

func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the patch rbac authorization v1beta1 cluster role binding o k response

func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1ClusterRoleBindingParams

type PatchRbacAuthorizationV1beta1ClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body models.IoK8sApimachineryPkgApisMetaV1Patch
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch).
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests.
	  Unique: true
	  In: query
	*/
	Force *bool
	/*name of the ClusterRoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

PatchRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the patch rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request

swagger:parameters patchRbacAuthorizationV1beta1ClusterRoleBinding

func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams

func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams() PatchRbacAuthorizationV1beta1ClusterRoleBindingParams

NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new PatchRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.

func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.

type PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

type PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct {
}

PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized

swagger:response patchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

NewPatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values

func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1ClusterRoleHandler

type PatchRbacAuthorizationV1beta1ClusterRoleHandler interface {
	Handle(PatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}

PatchRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid patch rbac authorization v1beta1 cluster role params

type PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc

type PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(PatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder

PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 cluster role handler

func (PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type PatchRbacAuthorizationV1beta1ClusterRoleOK

type PatchRbacAuthorizationV1beta1ClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"`
}

PatchRbacAuthorizationV1beta1ClusterRoleOK OK

swagger:response patchRbacAuthorizationV1beta1ClusterRoleOK

func NewPatchRbacAuthorizationV1beta1ClusterRoleOK

func NewPatchRbacAuthorizationV1beta1ClusterRoleOK() *PatchRbacAuthorizationV1beta1ClusterRoleOK

NewPatchRbacAuthorizationV1beta1ClusterRoleOK creates PatchRbacAuthorizationV1beta1ClusterRoleOK with default headers values

func (*PatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload

SetPayload sets the payload to the patch rbac authorization v1beta1 cluster role o k response

func (*PatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload

WithPayload adds the payload to the patch rbac authorization v1beta1 cluster role o k response

func (*PatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1ClusterRoleParams

type PatchRbacAuthorizationV1beta1ClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body models.IoK8sApimachineryPkgApisMetaV1Patch
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch).
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests.
	  Unique: true
	  In: query
	*/
	Force *bool
	/*name of the ClusterRole
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

PatchRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the patch rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request

swagger:parameters patchRbacAuthorizationV1beta1ClusterRole

func NewPatchRbacAuthorizationV1beta1ClusterRoleParams

func NewPatchRbacAuthorizationV1beta1ClusterRoleParams() PatchRbacAuthorizationV1beta1ClusterRoleParams

NewPatchRbacAuthorizationV1beta1ClusterRoleParams creates a new PatchRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.

func (*PatchRbacAuthorizationV1beta1ClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1ClusterRoleParams() beforehand.

type PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

type PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized struct {
}

PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized

swagger:response patchRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewPatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewPatchRbacAuthorizationV1beta1ClusterRoleUnauthorized() *PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

NewPatchRbacAuthorizationV1beta1ClusterRoleUnauthorized creates PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values

func (*PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1NamespacedRole

type PatchRbacAuthorizationV1beta1NamespacedRole struct {
	Context *middleware.Context
	Handler PatchRbacAuthorizationV1beta1NamespacedRoleHandler
}

PatchRbacAuthorizationV1beta1NamespacedRole swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1NamespacedRole

partially update the specified Role

func NewPatchRbacAuthorizationV1beta1NamespacedRole

NewPatchRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the patch rbac authorization v1beta1 namespaced role operation

func (*PatchRbacAuthorizationV1beta1NamespacedRole) ServeHTTP

type PatchRbacAuthorizationV1beta1NamespacedRoleBinding

type PatchRbacAuthorizationV1beta1NamespacedRoleBinding struct {
	Context *middleware.Context
	Handler PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler
}

PatchRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1NamespacedRoleBinding

partially update the specified RoleBinding

func NewPatchRbacAuthorizationV1beta1NamespacedRoleBinding

NewPatchRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the patch rbac authorization v1beta1 namespaced role binding operation

func (*PatchRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
	Handle(PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}

PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid patch rbac authorization v1beta1 namespaced role binding params

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder

PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 namespaced role binding handler

func (PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"`
}

PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK OK

swagger:response patchRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingOK() *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingOK creates PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values

func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the patch rbac authorization v1beta1 namespaced role binding o k response

func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the patch rbac authorization v1beta1 namespaced role binding o k response

func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body models.IoK8sApimachineryPkgApisMetaV1Patch
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch).
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests.
	  Unique: true
	  In: query
	*/
	Force *bool
	/*name of the RoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the patch rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters patchRbacAuthorizationV1beta1NamespacedRoleBinding

func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams

func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams

NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.

func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

type PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct {
}

PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized

swagger:response patchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values

func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1NamespacedRoleHandler

type PatchRbacAuthorizationV1beta1NamespacedRoleHandler interface {
	Handle(PatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}

PatchRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid patch rbac authorization v1beta1 namespaced role params

type PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc

type PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(PatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder

PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 namespaced role handler

func (PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type PatchRbacAuthorizationV1beta1NamespacedRoleOK

type PatchRbacAuthorizationV1beta1NamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"`
}

PatchRbacAuthorizationV1beta1NamespacedRoleOK OK

swagger:response patchRbacAuthorizationV1beta1NamespacedRoleOK

func NewPatchRbacAuthorizationV1beta1NamespacedRoleOK

func NewPatchRbacAuthorizationV1beta1NamespacedRoleOK() *PatchRbacAuthorizationV1beta1NamespacedRoleOK

NewPatchRbacAuthorizationV1beta1NamespacedRoleOK creates PatchRbacAuthorizationV1beta1NamespacedRoleOK with default headers values

func (*PatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload

SetPayload sets the payload to the patch rbac authorization v1beta1 namespaced role o k response

func (*PatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload

WithPayload adds the payload to the patch rbac authorization v1beta1 namespaced role o k response

func (*PatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse

WriteResponse to the client

type PatchRbacAuthorizationV1beta1NamespacedRoleParams

type PatchRbacAuthorizationV1beta1NamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body models.IoK8sApimachineryPkgApisMetaV1Patch
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch).
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests.
	  Unique: true
	  In: query
	*/
	Force *bool
	/*name of the Role
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

PatchRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the patch rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request

swagger:parameters patchRbacAuthorizationV1beta1NamespacedRole

func NewPatchRbacAuthorizationV1beta1NamespacedRoleParams

func NewPatchRbacAuthorizationV1beta1NamespacedRoleParams() PatchRbacAuthorizationV1beta1NamespacedRoleParams

NewPatchRbacAuthorizationV1beta1NamespacedRoleParams creates a new PatchRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.

func (*PatchRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.

type PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

type PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct {
}

PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized

swagger:response patchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewPatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewPatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

NewPatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values

func (*PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1ClusterRole

type ReadRbacAuthorizationV1beta1ClusterRole struct {
	Context *middleware.Context
	Handler ReadRbacAuthorizationV1beta1ClusterRoleHandler
}

ReadRbacAuthorizationV1beta1ClusterRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1ClusterRole

read the specified ClusterRole

func NewReadRbacAuthorizationV1beta1ClusterRole

func NewReadRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler ReadRbacAuthorizationV1beta1ClusterRoleHandler) *ReadRbacAuthorizationV1beta1ClusterRole

NewReadRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the read rbac authorization v1beta1 cluster role operation

func (*ReadRbacAuthorizationV1beta1ClusterRole) ServeHTTP

type ReadRbacAuthorizationV1beta1ClusterRoleBinding

type ReadRbacAuthorizationV1beta1ClusterRoleBinding struct {
	Context *middleware.Context
	Handler ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler
}

ReadRbacAuthorizationV1beta1ClusterRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1ClusterRoleBinding

read the specified ClusterRoleBinding

func NewReadRbacAuthorizationV1beta1ClusterRoleBinding

NewReadRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the read rbac authorization v1beta1 cluster role binding operation

func (*ReadRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP

type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler

type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
	Handle(ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}

ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid read rbac authorization v1beta1 cluster role binding params

type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc

type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder

ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 cluster role binding handler

func (ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type ReadRbacAuthorizationV1beta1ClusterRoleBindingOK

type ReadRbacAuthorizationV1beta1ClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"`
}

ReadRbacAuthorizationV1beta1ClusterRoleBindingOK OK

swagger:response readRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewReadRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewReadRbacAuthorizationV1beta1ClusterRoleBindingOK() *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK

NewReadRbacAuthorizationV1beta1ClusterRoleBindingOK creates ReadRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values

func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the read rbac authorization v1beta1 cluster role binding o k response

func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the read rbac authorization v1beta1 cluster role binding o k response

func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1ClusterRoleBindingParams

type ReadRbacAuthorizationV1beta1ClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*name of the ClusterRoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReadRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the read rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request

swagger:parameters readRbacAuthorizationV1beta1ClusterRoleBinding

func NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams

func NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams() ReadRbacAuthorizationV1beta1ClusterRoleBindingParams

NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new ReadRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.

func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.

type ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

type ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct {
}

ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized

swagger:response readRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

NewReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values

func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1ClusterRoleHandler

type ReadRbacAuthorizationV1beta1ClusterRoleHandler interface {
	Handle(ReadRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}

ReadRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid read rbac authorization v1beta1 cluster role params

type ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc

type ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(ReadRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder

ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 cluster role handler

func (ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type ReadRbacAuthorizationV1beta1ClusterRoleOK

type ReadRbacAuthorizationV1beta1ClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"`
}

ReadRbacAuthorizationV1beta1ClusterRoleOK OK

swagger:response readRbacAuthorizationV1beta1ClusterRoleOK

func NewReadRbacAuthorizationV1beta1ClusterRoleOK

func NewReadRbacAuthorizationV1beta1ClusterRoleOK() *ReadRbacAuthorizationV1beta1ClusterRoleOK

NewReadRbacAuthorizationV1beta1ClusterRoleOK creates ReadRbacAuthorizationV1beta1ClusterRoleOK with default headers values

func (*ReadRbacAuthorizationV1beta1ClusterRoleOK) SetPayload

SetPayload sets the payload to the read rbac authorization v1beta1 cluster role o k response

func (*ReadRbacAuthorizationV1beta1ClusterRoleOK) WithPayload

WithPayload adds the payload to the read rbac authorization v1beta1 cluster role o k response

func (*ReadRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1ClusterRoleParams

type ReadRbacAuthorizationV1beta1ClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*name of the ClusterRole
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReadRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the read rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request

swagger:parameters readRbacAuthorizationV1beta1ClusterRole

func NewReadRbacAuthorizationV1beta1ClusterRoleParams

func NewReadRbacAuthorizationV1beta1ClusterRoleParams() ReadRbacAuthorizationV1beta1ClusterRoleParams

NewReadRbacAuthorizationV1beta1ClusterRoleParams creates a new ReadRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.

func (*ReadRbacAuthorizationV1beta1ClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1ClusterRoleParams() beforehand.

type ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized

type ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized struct {
}

ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized

swagger:response readRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewReadRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewReadRbacAuthorizationV1beta1ClusterRoleUnauthorized() *ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized

NewReadRbacAuthorizationV1beta1ClusterRoleUnauthorized creates ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values

func (*ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1NamespacedRole

type ReadRbacAuthorizationV1beta1NamespacedRole struct {
	Context *middleware.Context
	Handler ReadRbacAuthorizationV1beta1NamespacedRoleHandler
}

ReadRbacAuthorizationV1beta1NamespacedRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1NamespacedRole

read the specified Role

func NewReadRbacAuthorizationV1beta1NamespacedRole

func NewReadRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler ReadRbacAuthorizationV1beta1NamespacedRoleHandler) *ReadRbacAuthorizationV1beta1NamespacedRole

NewReadRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the read rbac authorization v1beta1 namespaced role operation

func (*ReadRbacAuthorizationV1beta1NamespacedRole) ServeHTTP

type ReadRbacAuthorizationV1beta1NamespacedRoleBinding

type ReadRbacAuthorizationV1beta1NamespacedRoleBinding struct {
	Context *middleware.Context
	Handler ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler
}

ReadRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1NamespacedRoleBinding

read the specified RoleBinding

func NewReadRbacAuthorizationV1beta1NamespacedRoleBinding

NewReadRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the read rbac authorization v1beta1 namespaced role binding operation

func (*ReadRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
	Handle(ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}

ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid read rbac authorization v1beta1 namespaced role binding params

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder

ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 namespaced role binding handler

func (ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"`
}

ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK OK

swagger:response readRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingOK() *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK

NewReadRbacAuthorizationV1beta1NamespacedRoleBindingOK creates ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values

func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the read rbac authorization v1beta1 namespaced role binding o k response

func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the read rbac authorization v1beta1 namespaced role binding o k response

func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*name of the RoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the read rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters readRbacAuthorizationV1beta1NamespacedRoleBinding

func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams

func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams() ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams

NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.

func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

type ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct {
}

ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized

swagger:response readRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

NewReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values

func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1NamespacedRoleHandler

type ReadRbacAuthorizationV1beta1NamespacedRoleHandler interface {
	Handle(ReadRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}

ReadRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid read rbac authorization v1beta1 namespaced role params

type ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc

type ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(ReadRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder

ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 namespaced role handler

func (ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type ReadRbacAuthorizationV1beta1NamespacedRoleOK

type ReadRbacAuthorizationV1beta1NamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"`
}

ReadRbacAuthorizationV1beta1NamespacedRoleOK OK

swagger:response readRbacAuthorizationV1beta1NamespacedRoleOK

func NewReadRbacAuthorizationV1beta1NamespacedRoleOK

func NewReadRbacAuthorizationV1beta1NamespacedRoleOK() *ReadRbacAuthorizationV1beta1NamespacedRoleOK

NewReadRbacAuthorizationV1beta1NamespacedRoleOK creates ReadRbacAuthorizationV1beta1NamespacedRoleOK with default headers values

func (*ReadRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload

SetPayload sets the payload to the read rbac authorization v1beta1 namespaced role o k response

func (*ReadRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload

WithPayload adds the payload to the read rbac authorization v1beta1 namespaced role o k response

func (*ReadRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse

WriteResponse to the client

type ReadRbacAuthorizationV1beta1NamespacedRoleParams

type ReadRbacAuthorizationV1beta1NamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*name of the Role
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReadRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the read rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request

swagger:parameters readRbacAuthorizationV1beta1NamespacedRole

func NewReadRbacAuthorizationV1beta1NamespacedRoleParams

func NewReadRbacAuthorizationV1beta1NamespacedRoleParams() ReadRbacAuthorizationV1beta1NamespacedRoleParams

NewReadRbacAuthorizationV1beta1NamespacedRoleParams creates a new ReadRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.

func (*ReadRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.

type ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized

type ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct {
}

ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized

swagger:response readRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized

NewReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values

func (*ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1ClusterRole

type ReplaceRbacAuthorizationV1beta1ClusterRole struct {
	Context *middleware.Context
	Handler ReplaceRbacAuthorizationV1beta1ClusterRoleHandler
}

ReplaceRbacAuthorizationV1beta1ClusterRole swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1ClusterRole

replace the specified ClusterRole

func NewReplaceRbacAuthorizationV1beta1ClusterRole

func NewReplaceRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler ReplaceRbacAuthorizationV1beta1ClusterRoleHandler) *ReplaceRbacAuthorizationV1beta1ClusterRole

NewReplaceRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the replace rbac authorization v1beta1 cluster role operation

func (*ReplaceRbacAuthorizationV1beta1ClusterRole) ServeHTTP

type ReplaceRbacAuthorizationV1beta1ClusterRoleBinding

type ReplaceRbacAuthorizationV1beta1ClusterRoleBinding struct {
	Context *middleware.Context
	Handler ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler
}

ReplaceRbacAuthorizationV1beta1ClusterRoleBinding swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1ClusterRoleBinding

replace the specified ClusterRoleBinding

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBinding

NewReplaceRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the replace rbac authorization v1beta1 cluster role binding operation

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated Created

swagger:response replaceRbacAuthorizationV1beta1ClusterRoleBindingCreated

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated() *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated

NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated creates ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated with default headers values

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role binding created response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role binding created response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
	Handle(ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid replace rbac authorization v1beta1 cluster role binding params

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 cluster role binding handler

func (ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK OK

swagger:response replaceRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK() *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK

NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK creates ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role binding o k response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role binding o k response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1ClusterRoleBinding
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*name of the ClusterRoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the replace rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request

swagger:parameters replaceRbacAuthorizationV1beta1ClusterRoleBinding

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams() ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams

NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct {
}

ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized

swagger:response replaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1ClusterRoleCreated

type ReplaceRbacAuthorizationV1beta1ClusterRoleCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1ClusterRoleCreated Created

swagger:response replaceRbacAuthorizationV1beta1ClusterRoleCreated

func NewReplaceRbacAuthorizationV1beta1ClusterRoleCreated

func NewReplaceRbacAuthorizationV1beta1ClusterRoleCreated() *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated

NewReplaceRbacAuthorizationV1beta1ClusterRoleCreated creates ReplaceRbacAuthorizationV1beta1ClusterRoleCreated with default headers values

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role created response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role created response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1ClusterRoleHandler

type ReplaceRbacAuthorizationV1beta1ClusterRoleHandler interface {
	Handle(ReplaceRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}

ReplaceRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid replace rbac authorization v1beta1 cluster role params

type ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc

type ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(ReplaceRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder

ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 cluster role handler

func (ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type ReplaceRbacAuthorizationV1beta1ClusterRoleOK

type ReplaceRbacAuthorizationV1beta1ClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1ClusterRoleOK OK

swagger:response replaceRbacAuthorizationV1beta1ClusterRoleOK

func NewReplaceRbacAuthorizationV1beta1ClusterRoleOK

func NewReplaceRbacAuthorizationV1beta1ClusterRoleOK() *ReplaceRbacAuthorizationV1beta1ClusterRoleOK

NewReplaceRbacAuthorizationV1beta1ClusterRoleOK creates ReplaceRbacAuthorizationV1beta1ClusterRoleOK with default headers values

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleOK) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role o k response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role o k response

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1ClusterRoleParams

type ReplaceRbacAuthorizationV1beta1ClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1ClusterRole
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*name of the ClusterRole
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReplaceRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the replace rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request

swagger:parameters replaceRbacAuthorizationV1beta1ClusterRole

func NewReplaceRbacAuthorizationV1beta1ClusterRoleParams

func NewReplaceRbacAuthorizationV1beta1ClusterRoleParams() ReplaceRbacAuthorizationV1beta1ClusterRoleParams

NewReplaceRbacAuthorizationV1beta1ClusterRoleParams creates a new ReplaceRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1ClusterRoleParams() beforehand.

type ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized

type ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized struct {
}

ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized

swagger:response replaceRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized() *ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized

NewReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized creates ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values

func (*ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1NamespacedRole

type ReplaceRbacAuthorizationV1beta1NamespacedRole struct {
	Context *middleware.Context
	Handler ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler
}

ReplaceRbacAuthorizationV1beta1NamespacedRole swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1NamespacedRole

replace the specified Role

func NewReplaceRbacAuthorizationV1beta1NamespacedRole

NewReplaceRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the replace rbac authorization v1beta1 namespaced role operation

func (*ReplaceRbacAuthorizationV1beta1NamespacedRole) ServeHTTP

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding struct {
	Context *middleware.Context
	Handler ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1NamespacedRoleBinding

replace the specified RoleBinding

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBinding

NewReplaceRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the replace rbac authorization v1beta1 namespaced role binding operation

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated Created

swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated() *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated

NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated creates ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated with default headers values

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role binding created response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role binding created response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
	Handle(ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid replace rbac authorization v1beta1 namespaced role binding params

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 namespaced role binding handler

func (ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK OK

swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK() *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK

NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK creates ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role binding o k response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role binding o k response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1RoleBinding
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*name of the RoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the replace rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters replaceRbacAuthorizationV1beta1NamespacedRoleBinding

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams() ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams

NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct {
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized

swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated

type ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated Created

swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleCreated

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleCreated

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleCreated() *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated

NewReplaceRbacAuthorizationV1beta1NamespacedRoleCreated creates ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated with default headers values

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role created response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role created response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler

type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler interface {
	Handle(ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid replace rbac authorization v1beta1 namespaced role params

type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc

type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder

ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 namespaced role handler

func (ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type ReplaceRbacAuthorizationV1beta1NamespacedRoleOK

type ReplaceRbacAuthorizationV1beta1NamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"`
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleOK OK

swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleOK

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleOK

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleOK() *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK

NewReplaceRbacAuthorizationV1beta1NamespacedRoleOK creates ReplaceRbacAuthorizationV1beta1NamespacedRoleOK with default headers values

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload

SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role o k response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload

WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role o k response

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse

WriteResponse to the client

type ReplaceRbacAuthorizationV1beta1NamespacedRoleParams

type ReplaceRbacAuthorizationV1beta1NamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*
	  Required: true
	  In: body
	*/
	Body *models.IoK8sAPIRbacV1beta1Role
	/*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed
	  Unique: true
	  In: query
	*/
	DryRun *string
	/*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint.
	  Unique: true
	  In: query
	*/
	FieldManager *string
	/*name of the Role
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the replace rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request

swagger:parameters replaceRbacAuthorizationV1beta1NamespacedRole

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams() ReplaceRbacAuthorizationV1beta1NamespacedRoleParams

NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams creates a new ReplaceRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.

type ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized

type ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct {
}

ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized

swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized

NewReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values

func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRole

type WatchRbacAuthorizationV1beta1ClusterRole struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1ClusterRoleHandler
}

WatchRbacAuthorizationV1beta1ClusterRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterroles/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRole

watch changes to an object of kind ClusterRole. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.

func NewWatchRbacAuthorizationV1beta1ClusterRole

func NewWatchRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1ClusterRoleHandler) *WatchRbacAuthorizationV1beta1ClusterRole

NewWatchRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the watch rbac authorization v1beta1 cluster role operation

func (*WatchRbacAuthorizationV1beta1ClusterRole) ServeHTTP

type WatchRbacAuthorizationV1beta1ClusterRoleBinding

type WatchRbacAuthorizationV1beta1ClusterRoleBinding struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler
}

WatchRbacAuthorizationV1beta1ClusterRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRoleBinding

watch changes to an object of kind ClusterRoleBinding. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.

func NewWatchRbacAuthorizationV1beta1ClusterRoleBinding

NewWatchRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the watch rbac authorization v1beta1 cluster role binding operation

func (*WatchRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP

type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler

type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
	Handle(WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role binding params

type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc

type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder

WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role binding handler

func (WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1ClusterRoleBindingList

type WatchRbacAuthorizationV1beta1ClusterRoleBindingList struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRoleBindingList

watch individual changes to a list of ClusterRoleBinding. deprecated: use the 'watch' parameter with a list operation instead.

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingList

NewWatchRbacAuthorizationV1beta1ClusterRoleBindingList creates a new http.Handler for the watch rbac authorization v1beta1 cluster role binding list operation

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingList) ServeHTTP

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler interface {
	Handle(WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role binding list params

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) middleware.Responder

WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role binding list handler

func (WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK OK

swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingListOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListOK() *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK

NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListOK creates WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role binding list o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role binding list o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams contains all the bound params for the watch rbac authorization v1beta1 cluster role binding list operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1ClusterRoleBindingList

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams() WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams

NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams() beforehand.

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized

type WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized struct {
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized

NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRoleBindingOK

type WatchRbacAuthorizationV1beta1ClusterRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingOK OK

swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingOK() *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK

NewWatchRbacAuthorizationV1beta1ClusterRoleBindingOK creates WatchRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role binding o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role binding o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRoleBindingParams

type WatchRbacAuthorizationV1beta1ClusterRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*name of the ClusterRoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the watch rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1ClusterRoleBinding

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams() WatchRbacAuthorizationV1beta1ClusterRoleBindingParams

NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.

type WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

type WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct {
}

WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized

NewWatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRoleHandler

type WatchRbacAuthorizationV1beta1ClusterRoleHandler interface {
	Handle(WatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role params

type WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc

type WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder

WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role handler

func (WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1ClusterRoleList

type WatchRbacAuthorizationV1beta1ClusterRoleList struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1ClusterRoleListHandler
}

WatchRbacAuthorizationV1beta1ClusterRoleList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterroles rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRoleList

watch individual changes to a list of ClusterRole. deprecated: use the 'watch' parameter with a list operation instead.

func NewWatchRbacAuthorizationV1beta1ClusterRoleList

NewWatchRbacAuthorizationV1beta1ClusterRoleList creates a new http.Handler for the watch rbac authorization v1beta1 cluster role list operation

func (*WatchRbacAuthorizationV1beta1ClusterRoleList) ServeHTTP

type WatchRbacAuthorizationV1beta1ClusterRoleListHandler

type WatchRbacAuthorizationV1beta1ClusterRoleListHandler interface {
	Handle(WatchRbacAuthorizationV1beta1ClusterRoleListParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1ClusterRoleListHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role list params

type WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc

type WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleListParams) middleware.Responder

WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role list handler

func (WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1ClusterRoleListOK

type WatchRbacAuthorizationV1beta1ClusterRoleListOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1ClusterRoleListOK OK

swagger:response watchRbacAuthorizationV1beta1ClusterRoleListOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleListOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleListOK() *WatchRbacAuthorizationV1beta1ClusterRoleListOK

NewWatchRbacAuthorizationV1beta1ClusterRoleListOK creates WatchRbacAuthorizationV1beta1ClusterRoleListOK with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleListOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role list o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleListOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role list o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleListOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRoleListParams

type WatchRbacAuthorizationV1beta1ClusterRoleListParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1ClusterRoleListParams contains all the bound params for the watch rbac authorization v1beta1 cluster role list operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1ClusterRoleList

func NewWatchRbacAuthorizationV1beta1ClusterRoleListParams

func NewWatchRbacAuthorizationV1beta1ClusterRoleListParams() WatchRbacAuthorizationV1beta1ClusterRoleListParams

NewWatchRbacAuthorizationV1beta1ClusterRoleListParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleListParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1ClusterRoleListParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleListParams() beforehand.

type WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized

type WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized struct {
}

WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1ClusterRoleListUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized

NewWatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRoleOK

type WatchRbacAuthorizationV1beta1ClusterRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1ClusterRoleOK OK

swagger:response watchRbacAuthorizationV1beta1ClusterRoleOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleOK

func NewWatchRbacAuthorizationV1beta1ClusterRoleOK() *WatchRbacAuthorizationV1beta1ClusterRoleOK

NewWatchRbacAuthorizationV1beta1ClusterRoleOK creates WatchRbacAuthorizationV1beta1ClusterRoleOK with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role o k response

func (*WatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1ClusterRoleParams

type WatchRbacAuthorizationV1beta1ClusterRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*name of the ClusterRole
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the watch rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1ClusterRole

func NewWatchRbacAuthorizationV1beta1ClusterRoleParams

func NewWatchRbacAuthorizationV1beta1ClusterRoleParams() WatchRbacAuthorizationV1beta1ClusterRoleParams

NewWatchRbacAuthorizationV1beta1ClusterRoleParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1ClusterRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleParams() beforehand.

type WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

type WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized struct {
}

WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

func NewWatchRbacAuthorizationV1beta1ClusterRoleUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized

NewWatchRbacAuthorizationV1beta1ClusterRoleUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRole

type WatchRbacAuthorizationV1beta1NamespacedRole struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1NamespacedRoleHandler
}

WatchRbacAuthorizationV1beta1NamespacedRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRole

watch changes to an object of kind Role. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.

func NewWatchRbacAuthorizationV1beta1NamespacedRole

NewWatchRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role operation

func (*WatchRbacAuthorizationV1beta1NamespacedRole) ServeHTTP

type WatchRbacAuthorizationV1beta1NamespacedRoleBinding

type WatchRbacAuthorizationV1beta1NamespacedRoleBinding struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler
}

WatchRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRoleBinding

watch changes to an object of kind RoleBinding. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBinding

NewWatchRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role binding operation

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
	Handle(WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role binding params

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder

WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role binding handler

func (WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingList

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingList struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRoleBindingList

watch individual changes to a list of RoleBinding. deprecated: use the 'watch' parameter with a list operation instead.

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingList

NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingList creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role binding list operation

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingList) ServeHTTP

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler interface {
	Handle(WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role binding list params

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) middleware.Responder

WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role binding list handler

func (WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK OK

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingListOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK

NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role binding list o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role binding list o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role binding list operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1NamespacedRoleBindingList

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams() WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams

NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams() beforehand.

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized struct {
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized

NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK OK

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingOK() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK

NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingOK creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role binding o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role binding o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*name of the RoleBinding
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1NamespacedRoleBinding

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams

NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

type WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct {
}

WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized

NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRoleHandler

type WatchRbacAuthorizationV1beta1NamespacedRoleHandler interface {
	Handle(WatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role params

type WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc

type WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder

WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role handler

func (WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1NamespacedRoleList

type WatchRbacAuthorizationV1beta1NamespacedRoleList struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1NamespacedRoleListHandler
}

WatchRbacAuthorizationV1beta1NamespacedRoleList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/roles rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRoleList

watch individual changes to a list of Role. deprecated: use the 'watch' parameter with a list operation instead.

func NewWatchRbacAuthorizationV1beta1NamespacedRoleList

NewWatchRbacAuthorizationV1beta1NamespacedRoleList creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role list operation

func (*WatchRbacAuthorizationV1beta1NamespacedRoleList) ServeHTTP

type WatchRbacAuthorizationV1beta1NamespacedRoleListHandler

type WatchRbacAuthorizationV1beta1NamespacedRoleListHandler interface {
	Handle(WatchRbacAuthorizationV1beta1NamespacedRoleListParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1NamespacedRoleListHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role list params

type WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc

type WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleListParams) middleware.Responder

WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role list handler

func (WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1NamespacedRoleListOK

type WatchRbacAuthorizationV1beta1NamespacedRoleListOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1NamespacedRoleListOK OK

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleListOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleListOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleListOK() *WatchRbacAuthorizationV1beta1NamespacedRoleListOK

NewWatchRbacAuthorizationV1beta1NamespacedRoleListOK creates WatchRbacAuthorizationV1beta1NamespacedRoleListOK with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleListOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role list o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role list o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRoleListParams

type WatchRbacAuthorizationV1beta1NamespacedRoleListParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1NamespacedRoleListParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role list operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1NamespacedRoleList

func NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams

func NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams() WatchRbacAuthorizationV1beta1NamespacedRoleListParams

NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleListParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1NamespacedRoleListParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams() beforehand.

type WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized

type WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized struct {
}

WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized

NewWatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRoleOK

type WatchRbacAuthorizationV1beta1NamespacedRoleOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1NamespacedRoleOK OK

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleOK

func NewWatchRbacAuthorizationV1beta1NamespacedRoleOK() *WatchRbacAuthorizationV1beta1NamespacedRoleOK

NewWatchRbacAuthorizationV1beta1NamespacedRoleOK creates WatchRbacAuthorizationV1beta1NamespacedRoleOK with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role o k response

func (*WatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1NamespacedRoleParams

type WatchRbacAuthorizationV1beta1NamespacedRoleParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*name of the Role
	  Required: true
	  Unique: true
	  In: path
	*/
	Name string
	/*object name and auth scope, such as for teams and projects
	  Required: true
	  Unique: true
	  In: path
	*/
	Namespace string
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1NamespacedRole

func NewWatchRbacAuthorizationV1beta1NamespacedRoleParams

func NewWatchRbacAuthorizationV1beta1NamespacedRoleParams() WatchRbacAuthorizationV1beta1NamespacedRoleParams

NewWatchRbacAuthorizationV1beta1NamespacedRoleParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.

type WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

type WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct {
}

WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

func NewWatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized

NewWatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler
}

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/rolebindings rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces

watch individual changes to a list of RoleBinding. deprecated: use the 'watch' parameter with a list operation instead.

func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces

NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces creates a new http.Handler for the watch rbac authorization v1beta1 role binding list for all namespaces operation

func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces) ServeHTTP

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler interface {
	Handle(WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler interface for that can handle valid watch rbac authorization v1beta1 role binding list for all namespaces params

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc func(WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) middleware.Responder

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 role binding list for all namespaces handler

func (WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK OK

swagger:response watchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK

func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK

func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK() *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK

NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK creates WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK with default headers values

func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 role binding list for all namespaces o k response

func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 role binding list for all namespaces o k response

func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams contains all the bound params for the watch rbac authorization v1beta1 role binding list for all namespaces operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces

func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams

func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams() WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams

NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams creates a new WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams() beforehand.

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized

type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized struct {
}

WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized

func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized

func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized() *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized

NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized creates WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1RoleListForAllNamespaces

type WatchRbacAuthorizationV1beta1RoleListForAllNamespaces struct {
	Context *middleware.Context
	Handler WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler
}

WatchRbacAuthorizationV1beta1RoleListForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/roles rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1RoleListForAllNamespaces

watch individual changes to a list of Role. deprecated: use the 'watch' parameter with a list operation instead.

func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespaces

NewWatchRbacAuthorizationV1beta1RoleListForAllNamespaces creates a new http.Handler for the watch rbac authorization v1beta1 role list for all namespaces operation

func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespaces) ServeHTTP

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler interface {
	Handle(WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) middleware.Responder
}

WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler interface for that can handle valid watch rbac authorization v1beta1 role list for all namespaces params

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc func(WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) middleware.Responder

WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 role list for all namespaces handler

func (WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc) Handle

Handle executing the request and returning a response

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK struct {

	/*
	  In: Body
	*/
	Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"`
}

WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK OK

swagger:response watchRbacAuthorizationV1beta1RoleListForAllNamespacesOK

func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK

func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK() *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK

NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK creates WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK with default headers values

func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) SetPayload

SetPayload sets the payload to the watch rbac authorization v1beta1 role list for all namespaces o k response

func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WithPayload

WithPayload adds the payload to the watch rbac authorization v1beta1 role list for all namespaces o k response

func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WriteResponse

WriteResponse to the client

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams struct {

	// HTTP Request Object
	HTTPRequest *http.Request `json:"-"`

	/*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored.
	  Unique: true
	  In: query
	*/
	AllowWatchBookmarks *bool
	/*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key".

	This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications.
	  Unique: true
	  In: query
	*/
	Continue *string
	/*A selector to restrict the list of returned objects by their fields. Defaults to everything.
	  Unique: true
	  In: query
	*/
	FieldSelector *string
	/*A selector to restrict the list of returned objects by their labels. Defaults to everything.
	  Unique: true
	  In: query
	*/
	LabelSelector *string
	/*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true.

	The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned.
	  Unique: true
	  In: query
	*/
	Limit *int64
	/*If 'true', then the output is pretty printed.
	  Unique: true
	  In: query
	*/
	Pretty *string
	/*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersion *string
	/*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details.

	Defaults to unset
	  Unique: true
	  In: query
	*/
	ResourceVersionMatch *string
	/*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity.
	  Unique: true
	  In: query
	*/
	TimeoutSeconds *int64
	/*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion.
	  Unique: true
	  In: query
	*/
	Watch *bool
}

WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams contains all the bound params for the watch rbac authorization v1beta1 role list for all namespaces operation typically these are obtained from a http.Request

swagger:parameters watchRbacAuthorizationV1beta1RoleListForAllNamespaces

func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams

func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams() WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams

NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams creates a new WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams object no default values defined in spec.

func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) BindRequest

BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.

To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams() beforehand.

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized

type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized struct {
}

WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized Unauthorized

swagger:response watchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized

func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized

func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized() *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized

NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized creates WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized with default headers values

func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized) WriteResponse

WriteResponse to the client

Source Files

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL