Documentation ¶
Index ¶
- Constants
- type CreateRbacAuthorizationV1beta1ClusterRole
- type CreateRbacAuthorizationV1beta1ClusterRoleAccepted
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *CreateRbacAuthorizationV1beta1ClusterRoleAccepted
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1ClusterRoleBinding
- type CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler
- type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc
- type CreateRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1ClusterRoleBindingParams
- type CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
- type CreateRbacAuthorizationV1beta1ClusterRoleCreated
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *CreateRbacAuthorizationV1beta1ClusterRoleCreated
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1ClusterRoleHandler
- type CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc
- type CreateRbacAuthorizationV1beta1ClusterRoleOK
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *CreateRbacAuthorizationV1beta1ClusterRoleOK
- func (o *CreateRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1ClusterRoleParams
- type CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized
- type CreateRbacAuthorizationV1beta1NamespacedRole
- type CreateRbacAuthorizationV1beta1NamespacedRoleAccepted
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1NamespacedRoleBinding
- type CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler
- type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc
- type CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams
- type CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
- type CreateRbacAuthorizationV1beta1NamespacedRoleCreated
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *CreateRbacAuthorizationV1beta1NamespacedRoleCreated
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1NamespacedRoleHandler
- type CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc
- type CreateRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *CreateRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *CreateRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type CreateRbacAuthorizationV1beta1NamespacedRoleParams
- type CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized
- type DeleteRbacAuthorizationV1beta1ClusterRole
- type DeleteRbacAuthorizationV1beta1ClusterRoleAccepted
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1ClusterRoleBinding
- type DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler
- type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc
- type DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams
- type DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
- type DeleteRbacAuthorizationV1beta1ClusterRoleHandler
- type DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc
- type DeleteRbacAuthorizationV1beta1ClusterRoleOK
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleOK
- func (o *DeleteRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1ClusterRoleParams
- type DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized
- type DeleteRbacAuthorizationV1beta1CollectionClusterRole
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams
- type DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRole
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK
- func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams
- type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized
- type DeleteRbacAuthorizationV1beta1NamespacedRole
- type DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1NamespacedRoleBinding
- type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler
- type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc
- type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams
- type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
- type DeleteRbacAuthorizationV1beta1NamespacedRoleHandler
- type DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc
- type DeleteRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type DeleteRbacAuthorizationV1beta1NamespacedRoleParams
- type DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized
- type GetRbacAuthorizationV1beta1APIResources
- type GetRbacAuthorizationV1beta1APIResourcesHandler
- type GetRbacAuthorizationV1beta1APIResourcesHandlerFunc
- type GetRbacAuthorizationV1beta1APIResourcesOK
- func (o *GetRbacAuthorizationV1beta1APIResourcesOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1APIResourceList)
- func (o *GetRbacAuthorizationV1beta1APIResourcesOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1APIResourceList) *GetRbacAuthorizationV1beta1APIResourcesOK
- func (o *GetRbacAuthorizationV1beta1APIResourcesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type GetRbacAuthorizationV1beta1APIResourcesParams
- type GetRbacAuthorizationV1beta1APIResourcesUnauthorized
- type ListRbacAuthorizationV1beta1ClusterRole
- type ListRbacAuthorizationV1beta1ClusterRoleBinding
- type ListRbacAuthorizationV1beta1ClusterRoleBindingHandler
- type ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc
- type ListRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBindingList)
- func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBindingList) *ListRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ListRbacAuthorizationV1beta1ClusterRoleBindingParams
- type ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
- type ListRbacAuthorizationV1beta1ClusterRoleHandler
- type ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc
- type ListRbacAuthorizationV1beta1ClusterRoleOK
- func (o *ListRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleList)
- func (o *ListRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleList) *ListRbacAuthorizationV1beta1ClusterRoleOK
- func (o *ListRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ListRbacAuthorizationV1beta1ClusterRoleParams
- type ListRbacAuthorizationV1beta1ClusterRoleUnauthorized
- type ListRbacAuthorizationV1beta1NamespacedRole
- type ListRbacAuthorizationV1beta1NamespacedRoleBinding
- type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler
- type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc
- type ListRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList)
- func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList) *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ListRbacAuthorizationV1beta1NamespacedRoleBindingParams
- type ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
- type ListRbacAuthorizationV1beta1NamespacedRoleHandler
- type ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc
- type ListRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *ListRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleList)
- func (o *ListRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleList) *ListRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *ListRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ListRbacAuthorizationV1beta1NamespacedRoleParams
- type ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized
- type ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces
- type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler
- type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc
- type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK
- func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList)
- func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList) *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK
- func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams
- type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized
- type ListRbacAuthorizationV1beta1RoleForAllNamespaces
- type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler
- type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc
- type ListRbacAuthorizationV1beta1RoleForAllNamespacesOK
- func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleList)
- func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleList) *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK
- func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ListRbacAuthorizationV1beta1RoleForAllNamespacesParams
- type ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized
- type PatchRbacAuthorizationV1beta1ClusterRole
- type PatchRbacAuthorizationV1beta1ClusterRoleBinding
- type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler
- type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc
- type PatchRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
- func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type PatchRbacAuthorizationV1beta1ClusterRoleBindingParams
- type PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
- type PatchRbacAuthorizationV1beta1ClusterRoleHandler
- type PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc
- type PatchRbacAuthorizationV1beta1ClusterRoleOK
- func (o *PatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
- func (o *PatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *PatchRbacAuthorizationV1beta1ClusterRoleOK
- func (o *PatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type PatchRbacAuthorizationV1beta1ClusterRoleParams
- type PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized
- type PatchRbacAuthorizationV1beta1NamespacedRole
- type PatchRbacAuthorizationV1beta1NamespacedRoleBinding
- type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler
- type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc
- type PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
- func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams
- type PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
- type PatchRbacAuthorizationV1beta1NamespacedRoleHandler
- type PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc
- type PatchRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *PatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
- func (o *PatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *PatchRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *PatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type PatchRbacAuthorizationV1beta1NamespacedRoleParams
- type PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
- type ReadRbacAuthorizationV1beta1ClusterRole
- type ReadRbacAuthorizationV1beta1ClusterRoleBinding
- type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler
- type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc
- type ReadRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
- func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReadRbacAuthorizationV1beta1ClusterRoleBindingParams
- type ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
- type ReadRbacAuthorizationV1beta1ClusterRoleHandler
- type ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc
- type ReadRbacAuthorizationV1beta1ClusterRoleOK
- func (o *ReadRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
- func (o *ReadRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *ReadRbacAuthorizationV1beta1ClusterRoleOK
- func (o *ReadRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReadRbacAuthorizationV1beta1ClusterRoleParams
- type ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized
- type ReadRbacAuthorizationV1beta1NamespacedRole
- type ReadRbacAuthorizationV1beta1NamespacedRoleBinding
- type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler
- type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc
- type ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
- func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams
- type ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
- type ReadRbacAuthorizationV1beta1NamespacedRoleHandler
- type ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc
- type ReadRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *ReadRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
- func (o *ReadRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *ReadRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *ReadRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReadRbacAuthorizationV1beta1NamespacedRoleParams
- type ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized
- type ReplaceRbacAuthorizationV1beta1ClusterRole
- type ReplaceRbacAuthorizationV1beta1ClusterRoleBinding
- type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler
- type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc
- type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams
- type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
- type ReplaceRbacAuthorizationV1beta1ClusterRoleCreated
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1ClusterRoleHandler
- type ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc
- type ReplaceRbacAuthorizationV1beta1ClusterRoleOK
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *ReplaceRbacAuthorizationV1beta1ClusterRoleOK
- func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1ClusterRoleParams
- type ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized
- type ReplaceRbacAuthorizationV1beta1NamespacedRole
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleParams
- type ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized
- type WatchRbacAuthorizationV1beta1ClusterRole
- type WatchRbacAuthorizationV1beta1ClusterRoleBinding
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingList
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingParams
- type WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
- type WatchRbacAuthorizationV1beta1ClusterRoleHandler
- type WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc
- type WatchRbacAuthorizationV1beta1ClusterRoleList
- type WatchRbacAuthorizationV1beta1ClusterRoleListHandler
- type WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc
- type WatchRbacAuthorizationV1beta1ClusterRoleListOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleListOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1ClusterRoleListParams
- type WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized
- type WatchRbacAuthorizationV1beta1ClusterRoleOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleOK
- func (o *WatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1ClusterRoleParams
- type WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized
- type WatchRbacAuthorizationV1beta1NamespacedRole
- type WatchRbacAuthorizationV1beta1NamespacedRoleBinding
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingList
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams
- type WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
- type WatchRbacAuthorizationV1beta1NamespacedRoleHandler
- type WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc
- type WatchRbacAuthorizationV1beta1NamespacedRoleList
- type WatchRbacAuthorizationV1beta1NamespacedRoleListHandler
- type WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc
- type WatchRbacAuthorizationV1beta1NamespacedRoleListOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleListOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1NamespacedRoleListParams
- type WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized
- type WatchRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleOK
- func (o *WatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1NamespacedRoleParams
- type WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
- type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces
- type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler
- type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc
- type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK
- func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK
- func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams
- type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized
- type WatchRbacAuthorizationV1beta1RoleListForAllNamespaces
- type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler
- type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc
- type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK
- func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
- func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK
- func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
- type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams
- type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized
Constants ¶
const CreateRbacAuthorizationV1beta1ClusterRoleAcceptedCode int = 202
CreateRbacAuthorizationV1beta1ClusterRoleAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleAccepted
const CreateRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode int = 202
CreateRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted
const CreateRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode int = 201
CreateRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated
const CreateRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200
CreateRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingOK
CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
const CreateRbacAuthorizationV1beta1ClusterRoleCreatedCode int = 201
CreateRbacAuthorizationV1beta1ClusterRoleCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleCreated
const CreateRbacAuthorizationV1beta1ClusterRoleOKCode int = 200
CreateRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleOK
CreateRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized
const CreateRbacAuthorizationV1beta1NamespacedRoleAcceptedCode int = 202
CreateRbacAuthorizationV1beta1NamespacedRoleAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleAccepted
const CreateRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode int = 202
CreateRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
const CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode int = 201
CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated
const CreateRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200
CreateRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK
CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
const CreateRbacAuthorizationV1beta1NamespacedRoleCreatedCode int = 201
CreateRbacAuthorizationV1beta1NamespacedRoleCreatedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleCreated
const CreateRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200
CreateRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleOK
CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized
const DeleteRbacAuthorizationV1beta1ClusterRoleAcceptedCode int = 202
DeleteRbacAuthorizationV1beta1ClusterRoleAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleAccepted
const DeleteRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode int = 202
DeleteRbacAuthorizationV1beta1ClusterRoleBindingAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted
const DeleteRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200
DeleteRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK
DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
const DeleteRbacAuthorizationV1beta1ClusterRoleOKCode int = 200
DeleteRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleOK
DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized
const DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOKCode int = 200
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized
const DeleteRbacAuthorizationV1beta1CollectionClusterRoleOKCode int = 200
DeleteRbacAuthorizationV1beta1CollectionClusterRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK
DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized
const DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOKCode int = 200
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized
const DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOKCode int = 200
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized
const DeleteRbacAuthorizationV1beta1NamespacedRoleAcceptedCode int = 202
DeleteRbacAuthorizationV1beta1NamespacedRoleAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted
const DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode int = 202
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAcceptedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
const DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
const DeleteRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200
DeleteRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleOK
DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized
const GetRbacAuthorizationV1beta1APIResourcesOKCode int = 200
GetRbacAuthorizationV1beta1APIResourcesOKCode is the HTTP code returned for type GetRbacAuthorizationV1beta1APIResourcesOK
GetRbacAuthorizationV1beta1APIResourcesUnauthorizedCode is the HTTP code returned for type GetRbacAuthorizationV1beta1APIResourcesUnauthorized
const ListRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200
ListRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleBindingOK
ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
const ListRbacAuthorizationV1beta1ClusterRoleOKCode int = 200
ListRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleOK
ListRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1ClusterRoleUnauthorized
const ListRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200
ListRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleBindingOK
ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
const ListRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200
ListRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleOK
ListRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized
const ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOKCode int = 200
ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK
ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized
const ListRbacAuthorizationV1beta1RoleForAllNamespacesOKCode int = 200
ListRbacAuthorizationV1beta1RoleForAllNamespacesOKCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleForAllNamespacesOK
ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorizedCode is the HTTP code returned for type ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized
const PatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200
PatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleBindingOK
PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
const PatchRbacAuthorizationV1beta1ClusterRoleOKCode int = 200
PatchRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleOK
PatchRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized
const PatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200
PatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
const PatchRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200
PatchRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleOK
PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
const ReadRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200
ReadRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleBindingOK
ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
const ReadRbacAuthorizationV1beta1ClusterRoleOKCode int = 200
ReadRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleOK
ReadRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized
const ReadRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200
ReadRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK
ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
const ReadRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200
ReadRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleOK
ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized
const ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode int = 201
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated
const ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
const ReplaceRbacAuthorizationV1beta1ClusterRoleCreatedCode int = 201
ReplaceRbacAuthorizationV1beta1ClusterRoleCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleCreated
const ReplaceRbacAuthorizationV1beta1ClusterRoleOKCode int = 200
ReplaceRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleOK
ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized
const ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode int = 201
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated
const ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
const ReplaceRbacAuthorizationV1beta1NamespacedRoleCreatedCode int = 201
ReplaceRbacAuthorizationV1beta1NamespacedRoleCreatedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated
const ReplaceRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200
ReplaceRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleOK
ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized
const WatchRbacAuthorizationV1beta1ClusterRoleBindingListOKCode int = 200
WatchRbacAuthorizationV1beta1ClusterRoleBindingListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK
WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized
const WatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode int = 200
WatchRbacAuthorizationV1beta1ClusterRoleBindingOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingOK
WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
const WatchRbacAuthorizationV1beta1ClusterRoleListOKCode int = 200
WatchRbacAuthorizationV1beta1ClusterRoleListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleListOK
WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized
const WatchRbacAuthorizationV1beta1ClusterRoleOKCode int = 200
WatchRbacAuthorizationV1beta1ClusterRoleOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleOK
WatchRbacAuthorizationV1beta1ClusterRoleUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized
const WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOKCode int = 200
WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK
WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized
const WatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode int = 200
WatchRbacAuthorizationV1beta1NamespacedRoleBindingOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
const WatchRbacAuthorizationV1beta1NamespacedRoleListOKCode int = 200
WatchRbacAuthorizationV1beta1NamespacedRoleListOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleListOK
WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized
const WatchRbacAuthorizationV1beta1NamespacedRoleOKCode int = 200
WatchRbacAuthorizationV1beta1NamespacedRoleOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleOK
WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
const WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOKCode int = 200
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized
const WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOKCode int = 200
WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOKCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK
WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorizedCode is the HTTP code returned for type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type CreateRbacAuthorizationV1beta1ClusterRole ¶
type CreateRbacAuthorizationV1beta1ClusterRole struct { Context *middleware.Context Handler CreateRbacAuthorizationV1beta1ClusterRoleHandler }
CreateRbacAuthorizationV1beta1ClusterRole swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/clusterroles rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1ClusterRole
create a ClusterRole
func NewCreateRbacAuthorizationV1beta1ClusterRole ¶
func NewCreateRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler CreateRbacAuthorizationV1beta1ClusterRoleHandler) *CreateRbacAuthorizationV1beta1ClusterRole
NewCreateRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the create rbac authorization v1beta1 cluster role operation
func (*CreateRbacAuthorizationV1beta1ClusterRole) ServeHTTP ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type CreateRbacAuthorizationV1beta1ClusterRoleAccepted ¶
type CreateRbacAuthorizationV1beta1ClusterRoleAccepted struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1ClusterRoleAccepted Accepted
swagger:response createRbacAuthorizationV1beta1ClusterRoleAccepted
func NewCreateRbacAuthorizationV1beta1ClusterRoleAccepted ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleAccepted() *CreateRbacAuthorizationV1beta1ClusterRoleAccepted
NewCreateRbacAuthorizationV1beta1ClusterRoleAccepted creates CreateRbacAuthorizationV1beta1ClusterRoleAccepted with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
SetPayload sets the payload to the create rbac authorization v1beta1 cluster role accepted response
func (*CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *CreateRbacAuthorizationV1beta1ClusterRoleAccepted
WithPayload adds the payload to the create rbac authorization v1beta1 cluster role accepted response
func (*CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1ClusterRoleBinding ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBinding struct { Context *middleware.Context Handler CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler }
CreateRbacAuthorizationV1beta1ClusterRoleBinding swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1ClusterRoleBinding
create a ClusterRoleBinding
func NewCreateRbacAuthorizationV1beta1ClusterRoleBinding ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleBinding(ctx *middleware.Context, handler CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler) *CreateRbacAuthorizationV1beta1ClusterRoleBinding
NewCreateRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the create rbac authorization v1beta1 cluster role binding operation
func (*CreateRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted Accepted
swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingAccepted
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted() *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted
NewCreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted creates CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
SetPayload sets the payload to the create rbac authorization v1beta1 cluster role binding accepted response
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted
WithPayload adds the payload to the create rbac authorization v1beta1 cluster role binding accepted response
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated Created
swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingCreated
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingCreated ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingCreated() *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated
NewCreateRbacAuthorizationV1beta1ClusterRoleBindingCreated creates CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
SetPayload sets the payload to the create rbac authorization v1beta1 cluster role binding created response
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated
WithPayload adds the payload to the create rbac authorization v1beta1 cluster role binding created response
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
Handle(CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}
CreateRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid create rbac authorization v1beta1 cluster role binding params
type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 cluster role binding handler
func (CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle ¶
func (fn CreateRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle(params CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type CreateRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1ClusterRoleBindingOK OK
swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingOK
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingOK() *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK
NewCreateRbacAuthorizationV1beta1ClusterRoleBindingOK creates CreateRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
SetPayload sets the payload to the create rbac authorization v1beta1 cluster role binding o k response
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK
WithPayload adds the payload to the create rbac authorization v1beta1 cluster role binding o k response
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1ClusterRoleBinding /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
CreateRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the create rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request
swagger:parameters createRbacAuthorizationV1beta1ClusterRoleBinding
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams() CreateRbacAuthorizationV1beta1ClusterRoleBindingParams
NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new CreateRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.
type CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
type CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct { }
CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized
swagger:response createRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
NewCreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1ClusterRoleCreated ¶
type CreateRbacAuthorizationV1beta1ClusterRoleCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1ClusterRoleCreated Created
swagger:response createRbacAuthorizationV1beta1ClusterRoleCreated
func NewCreateRbacAuthorizationV1beta1ClusterRoleCreated ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleCreated() *CreateRbacAuthorizationV1beta1ClusterRoleCreated
NewCreateRbacAuthorizationV1beta1ClusterRoleCreated creates CreateRbacAuthorizationV1beta1ClusterRoleCreated with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
SetPayload sets the payload to the create rbac authorization v1beta1 cluster role created response
func (*CreateRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *CreateRbacAuthorizationV1beta1ClusterRoleCreated
WithPayload adds the payload to the create rbac authorization v1beta1 cluster role created response
func (*CreateRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1ClusterRoleHandler ¶
type CreateRbacAuthorizationV1beta1ClusterRoleHandler interface {
Handle(CreateRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}
CreateRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid create rbac authorization v1beta1 cluster role params
type CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc ¶
type CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(CreateRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 cluster role handler
func (CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle ¶
func (fn CreateRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle(params CreateRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type CreateRbacAuthorizationV1beta1ClusterRoleOK ¶
type CreateRbacAuthorizationV1beta1ClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1ClusterRoleOK OK
swagger:response createRbacAuthorizationV1beta1ClusterRoleOK
func NewCreateRbacAuthorizationV1beta1ClusterRoleOK ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleOK() *CreateRbacAuthorizationV1beta1ClusterRoleOK
NewCreateRbacAuthorizationV1beta1ClusterRoleOK creates CreateRbacAuthorizationV1beta1ClusterRoleOK with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleOK) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
SetPayload sets the payload to the create rbac authorization v1beta1 cluster role o k response
func (*CreateRbacAuthorizationV1beta1ClusterRoleOK) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *CreateRbacAuthorizationV1beta1ClusterRoleOK
WithPayload adds the payload to the create rbac authorization v1beta1 cluster role o k response
func (*CreateRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1ClusterRoleParams ¶
type CreateRbacAuthorizationV1beta1ClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1ClusterRole /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
CreateRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the create rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request
swagger:parameters createRbacAuthorizationV1beta1ClusterRole
func NewCreateRbacAuthorizationV1beta1ClusterRoleParams ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleParams() CreateRbacAuthorizationV1beta1ClusterRoleParams
NewCreateRbacAuthorizationV1beta1ClusterRoleParams creates a new CreateRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.
func (*CreateRbacAuthorizationV1beta1ClusterRoleParams) BindRequest ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1ClusterRoleParams() beforehand.
type CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
type CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized struct { }
CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized
swagger:response createRbacAuthorizationV1beta1ClusterRoleUnauthorized
func NewCreateRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
func NewCreateRbacAuthorizationV1beta1ClusterRoleUnauthorized() *CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized
NewCreateRbacAuthorizationV1beta1ClusterRoleUnauthorized creates CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values
func (*CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRole ¶
type CreateRbacAuthorizationV1beta1NamespacedRole struct { Context *middleware.Context Handler CreateRbacAuthorizationV1beta1NamespacedRoleHandler }
CreateRbacAuthorizationV1beta1NamespacedRole swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1NamespacedRole
create a Role
func NewCreateRbacAuthorizationV1beta1NamespacedRole ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler CreateRbacAuthorizationV1beta1NamespacedRoleHandler) *CreateRbacAuthorizationV1beta1NamespacedRole
NewCreateRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the create rbac authorization v1beta1 namespaced role operation
func (*CreateRbacAuthorizationV1beta1NamespacedRole) ServeHTTP ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type CreateRbacAuthorizationV1beta1NamespacedRoleAccepted ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleAccepted struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1NamespacedRoleAccepted Accepted
swagger:response createRbacAuthorizationV1beta1NamespacedRoleAccepted
func NewCreateRbacAuthorizationV1beta1NamespacedRoleAccepted ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleAccepted() *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted
NewCreateRbacAuthorizationV1beta1NamespacedRoleAccepted creates CreateRbacAuthorizationV1beta1NamespacedRoleAccepted with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role accepted response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted
WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role accepted response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRoleBinding ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBinding struct { Context *middleware.Context Handler CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler }
CreateRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route POST /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 createRbacAuthorizationV1beta1NamespacedRoleBinding
create a RoleBinding
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBinding ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBinding(ctx *middleware.Context, handler CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler) *CreateRbacAuthorizationV1beta1NamespacedRoleBinding
NewCreateRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the create rbac authorization v1beta1 namespaced role binding operation
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted Accepted
swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role binding accepted response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role binding accepted response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated Created
swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingCreated
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated
NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role binding created response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated
WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role binding created response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
Handle(CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}
CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid create rbac authorization v1beta1 namespaced role binding params
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 namespaced role binding handler
func (CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle ¶
func (fn CreateRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle(params CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK OK
swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingOK
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingOK() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK
NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingOK creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role binding o k response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK
WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role binding o k response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1RoleBinding /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the create rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters createRbacAuthorizationV1beta1NamespacedRoleBinding
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams() CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams
NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct { }
CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized
swagger:response createRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
NewCreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRoleCreated ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1NamespacedRoleCreated Created
swagger:response createRbacAuthorizationV1beta1NamespacedRoleCreated
func NewCreateRbacAuthorizationV1beta1NamespacedRoleCreated ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleCreated() *CreateRbacAuthorizationV1beta1NamespacedRoleCreated
NewCreateRbacAuthorizationV1beta1NamespacedRoleCreated creates CreateRbacAuthorizationV1beta1NamespacedRoleCreated with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role created response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *CreateRbacAuthorizationV1beta1NamespacedRoleCreated
WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role created response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRoleHandler ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleHandler interface {
Handle(CreateRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}
CreateRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid create rbac authorization v1beta1 namespaced role params
type CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(CreateRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a create rbac authorization v1beta1 namespaced role handler
func (CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle ¶
func (fn CreateRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle(params CreateRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type CreateRbacAuthorizationV1beta1NamespacedRoleOK ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"` }
CreateRbacAuthorizationV1beta1NamespacedRoleOK OK
swagger:response createRbacAuthorizationV1beta1NamespacedRoleOK
func NewCreateRbacAuthorizationV1beta1NamespacedRoleOK ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleOK() *CreateRbacAuthorizationV1beta1NamespacedRoleOK
NewCreateRbacAuthorizationV1beta1NamespacedRoleOK creates CreateRbacAuthorizationV1beta1NamespacedRoleOK with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
SetPayload sets the payload to the create rbac authorization v1beta1 namespaced role o k response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *CreateRbacAuthorizationV1beta1NamespacedRoleOK
WithPayload adds the payload to the create rbac authorization v1beta1 namespaced role o k response
func (*CreateRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type CreateRbacAuthorizationV1beta1NamespacedRoleParams ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1Role /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
CreateRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the create rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request
swagger:parameters createRbacAuthorizationV1beta1NamespacedRole
func NewCreateRbacAuthorizationV1beta1NamespacedRoleParams ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleParams() CreateRbacAuthorizationV1beta1NamespacedRoleParams
NewCreateRbacAuthorizationV1beta1NamespacedRoleParams creates a new CreateRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.
func (*CreateRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewCreateRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.
type CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
type CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct { }
CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized
swagger:response createRbacAuthorizationV1beta1NamespacedRoleUnauthorized
func NewCreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
func NewCreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized
NewCreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values
func (*CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse ¶
func (o *CreateRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1ClusterRole ¶
type DeleteRbacAuthorizationV1beta1ClusterRole struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1ClusterRoleHandler }
DeleteRbacAuthorizationV1beta1ClusterRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1ClusterRole
delete a ClusterRole
func NewDeleteRbacAuthorizationV1beta1ClusterRole ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1ClusterRoleHandler) *DeleteRbacAuthorizationV1beta1ClusterRole
NewDeleteRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the delete rbac authorization v1beta1 cluster role operation
func (*DeleteRbacAuthorizationV1beta1ClusterRole) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1ClusterRoleAccepted ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleAccepted struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1ClusterRoleAccepted Accepted
swagger:response deleteRbacAuthorizationV1beta1ClusterRoleAccepted
func NewDeleteRbacAuthorizationV1beta1ClusterRoleAccepted ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleAccepted() *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted
NewDeleteRbacAuthorizationV1beta1ClusterRoleAccepted creates DeleteRbacAuthorizationV1beta1ClusterRoleAccepted with default headers values
func (*DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role accepted response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted
WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role accepted response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1ClusterRoleBinding ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleBinding struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler }
DeleteRbacAuthorizationV1beta1ClusterRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1ClusterRoleBinding
delete a ClusterRoleBinding
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBinding ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBinding(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler) *DeleteRbacAuthorizationV1beta1ClusterRoleBinding
NewDeleteRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 cluster role binding operation
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted Accepted
swagger:response deleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted() *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted
NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted creates DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted with default headers values
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role binding accepted response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted
WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role binding accepted response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
Handle(DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 cluster role binding params
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 cluster role binding handler
func (DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK OK
swagger:response deleteRbacAuthorizationV1beta1ClusterRoleBindingOK
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingOK() *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK
NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingOK creates DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role binding o k response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK
WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role binding o k response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*name of the ClusterRoleBinding Required: true Unique: true In: path */ Name string /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string }
DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1ClusterRoleBinding
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams() DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams
NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct { }
DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
NewDeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1ClusterRoleHandler ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleHandler interface {
Handle(DeleteRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid delete rbac authorization v1beta1 cluster role params
type DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 cluster role handler
func (DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1ClusterRoleOK ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1ClusterRoleOK OK
swagger:response deleteRbacAuthorizationV1beta1ClusterRoleOK
func NewDeleteRbacAuthorizationV1beta1ClusterRoleOK ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleOK() *DeleteRbacAuthorizationV1beta1ClusterRoleOK
NewDeleteRbacAuthorizationV1beta1ClusterRoleOK creates DeleteRbacAuthorizationV1beta1ClusterRoleOK with default headers values
func (*DeleteRbacAuthorizationV1beta1ClusterRoleOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 cluster role o k response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1ClusterRoleOK
WithPayload adds the payload to the delete rbac authorization v1beta1 cluster role o k response
func (*DeleteRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1ClusterRoleParams ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*name of the ClusterRole Required: true Unique: true In: path */ Name string /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string }
DeleteRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the delete rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1ClusterRole
func NewDeleteRbacAuthorizationV1beta1ClusterRoleParams ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleParams() DeleteRbacAuthorizationV1beta1ClusterRoleParams
NewDeleteRbacAuthorizationV1beta1ClusterRoleParams creates a new DeleteRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1ClusterRoleParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1ClusterRoleParams() beforehand.
type DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
type DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized struct { }
DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1ClusterRoleUnauthorized
func NewDeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized() *DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized
NewDeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized creates DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionClusterRole ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRole struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler }
DeleteRbacAuthorizationV1beta1CollectionClusterRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterroles rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionClusterRole
delete collection of ClusterRole
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRole ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRole(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler) *DeleteRbacAuthorizationV1beta1CollectionClusterRole
NewDeleteRbacAuthorizationV1beta1CollectionClusterRole creates a new http.Handler for the delete rbac authorization v1beta1 collection cluster role operation
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRole) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler }
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionClusterRoleBinding
delete collection of ClusterRoleBinding
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler) *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding
NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 collection cluster role binding operation
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler interface {
Handle(DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 collection cluster role binding params
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) middleware.Responder
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection cluster role binding handler
func (DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK OK
swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK
NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 collection cluster role binding o k response
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK
WithPayload adds the payload to the delete rbac authorization v1beta1 collection cluster role binding o k response
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 }
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 collection cluster role binding operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1CollectionClusterRoleBinding
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams() DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams
NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingParams() beforehand.
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized struct { }
DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized
NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler interface {
Handle(DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandler interface for that can handle valid delete rbac authorization v1beta1 collection cluster role params
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) middleware.Responder
DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection cluster role handler
func (DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1CollectionClusterRoleHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK OK
swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleOK
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleOK ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleOK() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK
NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleOK creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 collection cluster role o k response
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK
WithPayload adds the payload to the delete rbac authorization v1beta1 collection cluster role o k response
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 }
DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams contains all the bound params for the delete rbac authorization v1beta1 collection cluster role operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1CollectionClusterRole
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams() DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams
NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams creates a new DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleParams() beforehand.
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized ¶
type DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized struct { }
DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized
NewDeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRole ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRole struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionNamespacedRole
delete collection of Role
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRole ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRole(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler) *DeleteRbacAuthorizationV1beta1CollectionNamespacedRole
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRole creates a new http.Handler for the delete rbac authorization v1beta1 collection namespaced role operation
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRole) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding
delete collection of RoleBinding
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler) *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 collection namespaced role binding operation
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler interface {
Handle(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 collection namespaced role binding params
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) middleware.Responder
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection namespaced role binding handler
func (DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK OK
swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 collection namespaced role binding o k response
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK
WithPayload adds the payload to the delete rbac authorization v1beta1 collection namespaced role binding o k response
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 collection namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBinding
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams() DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingParams() beforehand.
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized struct { }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler interface {
Handle(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandler interface for that can handle valid delete rbac authorization v1beta1 collection namespaced role params
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) middleware.Responder
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 collection namespaced role handler
func (DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK OK
swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 collection namespaced role o k response
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK
WithPayload adds the payload to the delete rbac authorization v1beta1 collection namespaced role o k response
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams contains all the bound params for the delete rbac authorization v1beta1 collection namespaced role operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1CollectionNamespacedRole
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams() DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams creates a new DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleParams() beforehand.
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized ¶
type DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized struct { }
DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized() *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized
NewDeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized creates DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1CollectionNamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1NamespacedRole ¶
type DeleteRbacAuthorizationV1beta1NamespacedRole struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1NamespacedRoleHandler }
DeleteRbacAuthorizationV1beta1NamespacedRole swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1NamespacedRole
delete a Role
func NewDeleteRbacAuthorizationV1beta1NamespacedRole ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1NamespacedRoleHandler) *DeleteRbacAuthorizationV1beta1NamespacedRole
NewDeleteRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the delete rbac authorization v1beta1 namespaced role operation
func (*DeleteRbacAuthorizationV1beta1NamespacedRole) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted Accepted
swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleAccepted
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleAccepted ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleAccepted() *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted
NewDeleteRbacAuthorizationV1beta1NamespacedRoleAccepted creates DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted with default headers values
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role accepted response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted
WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role accepted response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1NamespacedRoleBinding ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleBinding struct { Context *middleware.Context Handler DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler }
DeleteRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route DELETE /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 deleteRbacAuthorizationV1beta1NamespacedRoleBinding
delete a RoleBinding
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBinding ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBinding(ctx *middleware.Context, handler DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler) *DeleteRbacAuthorizationV1beta1NamespacedRoleBinding
NewDeleteRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the delete rbac authorization v1beta1 namespaced role binding operation
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted Accepted
swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted() *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted creates DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted with default headers values
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role binding accepted response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted
WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role binding accepted response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingAccepted) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
Handle(DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid delete rbac authorization v1beta1 namespaced role binding params
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 namespaced role binding handler
func (DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK OK
swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleBindingOK
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK() *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK
NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK creates DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role binding o k response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK
WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role binding o k response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*name of the RoleBinding Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string }
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the delete rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1NamespacedRoleBinding
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams() DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams
NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct { }
DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
NewDeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1NamespacedRoleHandler ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleHandler interface {
Handle(DeleteRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}
DeleteRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid delete rbac authorization v1beta1 namespaced role params
type DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(DeleteRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a delete rbac authorization v1beta1 namespaced role handler
func (DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle ¶
func (fn DeleteRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle(params DeleteRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type DeleteRbacAuthorizationV1beta1NamespacedRoleOK ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1Status `json:"body,omitempty"` }
DeleteRbacAuthorizationV1beta1NamespacedRoleOK OK
swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleOK
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleOK ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleOK() *DeleteRbacAuthorizationV1beta1NamespacedRoleOK
NewDeleteRbacAuthorizationV1beta1NamespacedRoleOK creates DeleteRbacAuthorizationV1beta1NamespacedRoleOK with default headers values
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status)
SetPayload sets the payload to the delete rbac authorization v1beta1 namespaced role o k response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1Status) *DeleteRbacAuthorizationV1beta1NamespacedRoleOK
WithPayload adds the payload to the delete rbac authorization v1beta1 namespaced role o k response
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type DeleteRbacAuthorizationV1beta1NamespacedRoleParams ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* In: body */ Body *models.IoK8sApimachineryPkgApisMetaV1DeleteOptions /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*The duration in seconds before the object should be deleted. Value must be non-negative integer. The value zero indicates delete immediately. If this value is nil, the default grace period for the specified type will be used. Defaults to a per object value if not specified. zero means delete immediately. Unique: true In: query */ GracePeriodSeconds *int64 /*name of the Role Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*Deprecated: please use the PropagationPolicy, this field will be deprecated in 1.7. Should the dependent objects be orphaned. If true/false, the "orphan" finalizer will be added to/removed from the object's finalizers list. Either this field or PropagationPolicy may be set, but not both. Unique: true In: query */ OrphanDependents *bool /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*Whether and how garbage collection will be performed. Either this field or OrphanDependents may be set, but not both. The default policy is decided by the existing finalizer set in the metadata.finalizers and the resource-specific default policy. Acceptable values are: 'Orphan' - orphan the dependents; 'Background' - allow the garbage collector to delete the dependents in the background; 'Foreground' - a cascading policy that deletes all dependents in the foreground. Unique: true In: query */ PropagationPolicy *string }
DeleteRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the delete rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request
swagger:parameters deleteRbacAuthorizationV1beta1NamespacedRole
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams() DeleteRbacAuthorizationV1beta1NamespacedRoleParams
NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams creates a new DeleteRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewDeleteRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.
type DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
type DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct { }
DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized
swagger:response deleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
func NewDeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized
NewDeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values
func (*DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse ¶
func (o *DeleteRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type GetRbacAuthorizationV1beta1APIResources ¶
type GetRbacAuthorizationV1beta1APIResources struct { Context *middleware.Context Handler GetRbacAuthorizationV1beta1APIResourcesHandler }
GetRbacAuthorizationV1beta1APIResources swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/ rbacAuthorization_v1beta1 getRbacAuthorizationV1beta1ApiResources
get available resources
func NewGetRbacAuthorizationV1beta1APIResources ¶
func NewGetRbacAuthorizationV1beta1APIResources(ctx *middleware.Context, handler GetRbacAuthorizationV1beta1APIResourcesHandler) *GetRbacAuthorizationV1beta1APIResources
NewGetRbacAuthorizationV1beta1APIResources creates a new http.Handler for the get rbac authorization v1beta1 API resources operation
func (*GetRbacAuthorizationV1beta1APIResources) ServeHTTP ¶
func (o *GetRbacAuthorizationV1beta1APIResources) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type GetRbacAuthorizationV1beta1APIResourcesHandler ¶
type GetRbacAuthorizationV1beta1APIResourcesHandler interface {
Handle(GetRbacAuthorizationV1beta1APIResourcesParams) middleware.Responder
}
GetRbacAuthorizationV1beta1APIResourcesHandler interface for that can handle valid get rbac authorization v1beta1 API resources params
type GetRbacAuthorizationV1beta1APIResourcesHandlerFunc ¶
type GetRbacAuthorizationV1beta1APIResourcesHandlerFunc func(GetRbacAuthorizationV1beta1APIResourcesParams) middleware.Responder
GetRbacAuthorizationV1beta1APIResourcesHandlerFunc turns a function with the right signature into a get rbac authorization v1beta1 API resources handler
func (GetRbacAuthorizationV1beta1APIResourcesHandlerFunc) Handle ¶
func (fn GetRbacAuthorizationV1beta1APIResourcesHandlerFunc) Handle(params GetRbacAuthorizationV1beta1APIResourcesParams) middleware.Responder
Handle executing the request and returning a response
type GetRbacAuthorizationV1beta1APIResourcesOK ¶
type GetRbacAuthorizationV1beta1APIResourcesOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1APIResourceList `json:"body,omitempty"` }
GetRbacAuthorizationV1beta1APIResourcesOK OK
swagger:response getRbacAuthorizationV1beta1ApiResourcesOK
func NewGetRbacAuthorizationV1beta1APIResourcesOK ¶
func NewGetRbacAuthorizationV1beta1APIResourcesOK() *GetRbacAuthorizationV1beta1APIResourcesOK
NewGetRbacAuthorizationV1beta1APIResourcesOK creates GetRbacAuthorizationV1beta1APIResourcesOK with default headers values
func (*GetRbacAuthorizationV1beta1APIResourcesOK) SetPayload ¶
func (o *GetRbacAuthorizationV1beta1APIResourcesOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1APIResourceList)
SetPayload sets the payload to the get rbac authorization v1beta1 Api resources o k response
func (*GetRbacAuthorizationV1beta1APIResourcesOK) WithPayload ¶
func (o *GetRbacAuthorizationV1beta1APIResourcesOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1APIResourceList) *GetRbacAuthorizationV1beta1APIResourcesOK
WithPayload adds the payload to the get rbac authorization v1beta1 Api resources o k response
func (*GetRbacAuthorizationV1beta1APIResourcesOK) WriteResponse ¶
func (o *GetRbacAuthorizationV1beta1APIResourcesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type GetRbacAuthorizationV1beta1APIResourcesParams ¶
type GetRbacAuthorizationV1beta1APIResourcesParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` }
GetRbacAuthorizationV1beta1APIResourcesParams contains all the bound params for the get rbac authorization v1beta1 API resources operation typically these are obtained from a http.Request
swagger:parameters getRbacAuthorizationV1beta1APIResources
func NewGetRbacAuthorizationV1beta1APIResourcesParams ¶
func NewGetRbacAuthorizationV1beta1APIResourcesParams() GetRbacAuthorizationV1beta1APIResourcesParams
NewGetRbacAuthorizationV1beta1APIResourcesParams creates a new GetRbacAuthorizationV1beta1APIResourcesParams object no default values defined in spec.
func (*GetRbacAuthorizationV1beta1APIResourcesParams) BindRequest ¶
func (o *GetRbacAuthorizationV1beta1APIResourcesParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewGetRbacAuthorizationV1beta1APIResourcesParams() beforehand.
type GetRbacAuthorizationV1beta1APIResourcesUnauthorized ¶
type GetRbacAuthorizationV1beta1APIResourcesUnauthorized struct { }
GetRbacAuthorizationV1beta1APIResourcesUnauthorized Unauthorized
swagger:response getRbacAuthorizationV1beta1ApiResourcesUnauthorized
func NewGetRbacAuthorizationV1beta1APIResourcesUnauthorized ¶
func NewGetRbacAuthorizationV1beta1APIResourcesUnauthorized() *GetRbacAuthorizationV1beta1APIResourcesUnauthorized
NewGetRbacAuthorizationV1beta1APIResourcesUnauthorized creates GetRbacAuthorizationV1beta1APIResourcesUnauthorized with default headers values
func (*GetRbacAuthorizationV1beta1APIResourcesUnauthorized) WriteResponse ¶
func (o *GetRbacAuthorizationV1beta1APIResourcesUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1ClusterRole ¶
type ListRbacAuthorizationV1beta1ClusterRole struct { Context *middleware.Context Handler ListRbacAuthorizationV1beta1ClusterRoleHandler }
ListRbacAuthorizationV1beta1ClusterRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterroles rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1ClusterRole
list or watch objects of kind ClusterRole
func NewListRbacAuthorizationV1beta1ClusterRole ¶
func NewListRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1ClusterRoleHandler) *ListRbacAuthorizationV1beta1ClusterRole
NewListRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the list rbac authorization v1beta1 cluster role operation
func (*ListRbacAuthorizationV1beta1ClusterRole) ServeHTTP ¶
func (o *ListRbacAuthorizationV1beta1ClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ListRbacAuthorizationV1beta1ClusterRoleBinding ¶
type ListRbacAuthorizationV1beta1ClusterRoleBinding struct { Context *middleware.Context Handler ListRbacAuthorizationV1beta1ClusterRoleBindingHandler }
ListRbacAuthorizationV1beta1ClusterRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1ClusterRoleBinding
list or watch objects of kind ClusterRoleBinding
func NewListRbacAuthorizationV1beta1ClusterRoleBinding ¶
func NewListRbacAuthorizationV1beta1ClusterRoleBinding(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1ClusterRoleBindingHandler) *ListRbacAuthorizationV1beta1ClusterRoleBinding
NewListRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the list rbac authorization v1beta1 cluster role binding operation
func (*ListRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ListRbacAuthorizationV1beta1ClusterRoleBindingHandler ¶
type ListRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
Handle(ListRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}
ListRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid list rbac authorization v1beta1 cluster role binding params
type ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc ¶
type ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(ListRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 cluster role binding handler
func (ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle ¶
func (fn ListRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle(params ListRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type ListRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
type ListRbacAuthorizationV1beta1ClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBindingList `json:"body,omitempty"` }
ListRbacAuthorizationV1beta1ClusterRoleBindingOK OK
swagger:response listRbacAuthorizationV1beta1ClusterRoleBindingOK
func NewListRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
func NewListRbacAuthorizationV1beta1ClusterRoleBindingOK() *ListRbacAuthorizationV1beta1ClusterRoleBindingOK
NewListRbacAuthorizationV1beta1ClusterRoleBindingOK creates ListRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values
func (*ListRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBindingList)
SetPayload sets the payload to the list rbac authorization v1beta1 cluster role binding o k response
func (*ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBindingList) *ListRbacAuthorizationV1beta1ClusterRoleBindingOK
WithPayload adds the payload to the list rbac authorization v1beta1 cluster role binding o k response
func (*ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
type ListRbacAuthorizationV1beta1ClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
ListRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the list rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request
swagger:parameters listRbacAuthorizationV1beta1ClusterRoleBinding
func NewListRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
func NewListRbacAuthorizationV1beta1ClusterRoleBindingParams() ListRbacAuthorizationV1beta1ClusterRoleBindingParams
NewListRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new ListRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.
func (*ListRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.
type ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
type ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct { }
ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized
swagger:response listRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
func NewListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
func NewListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
NewListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values
func (*ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1ClusterRoleHandler ¶
type ListRbacAuthorizationV1beta1ClusterRoleHandler interface {
Handle(ListRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}
ListRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid list rbac authorization v1beta1 cluster role params
type ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc ¶
type ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(ListRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 cluster role handler
func (ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle ¶
func (fn ListRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle(params ListRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type ListRbacAuthorizationV1beta1ClusterRoleOK ¶
type ListRbacAuthorizationV1beta1ClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleList `json:"body,omitempty"` }
ListRbacAuthorizationV1beta1ClusterRoleOK OK
swagger:response listRbacAuthorizationV1beta1ClusterRoleOK
func NewListRbacAuthorizationV1beta1ClusterRoleOK ¶
func NewListRbacAuthorizationV1beta1ClusterRoleOK() *ListRbacAuthorizationV1beta1ClusterRoleOK
NewListRbacAuthorizationV1beta1ClusterRoleOK creates ListRbacAuthorizationV1beta1ClusterRoleOK with default headers values
func (*ListRbacAuthorizationV1beta1ClusterRoleOK) SetPayload ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleList)
SetPayload sets the payload to the list rbac authorization v1beta1 cluster role o k response
func (*ListRbacAuthorizationV1beta1ClusterRoleOK) WithPayload ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleList) *ListRbacAuthorizationV1beta1ClusterRoleOK
WithPayload adds the payload to the list rbac authorization v1beta1 cluster role o k response
func (*ListRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1ClusterRoleParams ¶
type ListRbacAuthorizationV1beta1ClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
ListRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the list rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request
swagger:parameters listRbacAuthorizationV1beta1ClusterRole
func NewListRbacAuthorizationV1beta1ClusterRoleParams ¶
func NewListRbacAuthorizationV1beta1ClusterRoleParams() ListRbacAuthorizationV1beta1ClusterRoleParams
NewListRbacAuthorizationV1beta1ClusterRoleParams creates a new ListRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.
func (*ListRbacAuthorizationV1beta1ClusterRoleParams) BindRequest ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1ClusterRoleParams() beforehand.
type ListRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
type ListRbacAuthorizationV1beta1ClusterRoleUnauthorized struct { }
ListRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized
swagger:response listRbacAuthorizationV1beta1ClusterRoleUnauthorized
func NewListRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
func NewListRbacAuthorizationV1beta1ClusterRoleUnauthorized() *ListRbacAuthorizationV1beta1ClusterRoleUnauthorized
NewListRbacAuthorizationV1beta1ClusterRoleUnauthorized creates ListRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values
func (*ListRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1NamespacedRole ¶
type ListRbacAuthorizationV1beta1NamespacedRole struct { Context *middleware.Context Handler ListRbacAuthorizationV1beta1NamespacedRoleHandler }
ListRbacAuthorizationV1beta1NamespacedRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1NamespacedRole
list or watch objects of kind Role
func NewListRbacAuthorizationV1beta1NamespacedRole ¶
func NewListRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1NamespacedRoleHandler) *ListRbacAuthorizationV1beta1NamespacedRole
NewListRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the list rbac authorization v1beta1 namespaced role operation
func (*ListRbacAuthorizationV1beta1NamespacedRole) ServeHTTP ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ListRbacAuthorizationV1beta1NamespacedRoleBinding ¶
type ListRbacAuthorizationV1beta1NamespacedRoleBinding struct { Context *middleware.Context Handler ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler }
ListRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1NamespacedRoleBinding
list or watch objects of kind RoleBinding
func NewListRbacAuthorizationV1beta1NamespacedRoleBinding ¶
func NewListRbacAuthorizationV1beta1NamespacedRoleBinding(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler) *ListRbacAuthorizationV1beta1NamespacedRoleBinding
NewListRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the list rbac authorization v1beta1 namespaced role binding operation
func (*ListRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler ¶
type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
Handle(ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}
ListRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid list rbac authorization v1beta1 namespaced role binding params
type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc ¶
type ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 namespaced role binding handler
func (ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle ¶
func (fn ListRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle(params ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type ListRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
type ListRbacAuthorizationV1beta1NamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBindingList `json:"body,omitempty"` }
ListRbacAuthorizationV1beta1NamespacedRoleBindingOK OK
swagger:response listRbacAuthorizationV1beta1NamespacedRoleBindingOK
func NewListRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
func NewListRbacAuthorizationV1beta1NamespacedRoleBindingOK() *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK
NewListRbacAuthorizationV1beta1NamespacedRoleBindingOK creates ListRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values
func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList)
SetPayload sets the payload to the list rbac authorization v1beta1 namespaced role binding o k response
func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList) *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK
WithPayload adds the payload to the list rbac authorization v1beta1 namespaced role binding o k response
func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
type ListRbacAuthorizationV1beta1NamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
ListRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the list rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters listRbacAuthorizationV1beta1NamespacedRoleBinding
func NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
func NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams() ListRbacAuthorizationV1beta1NamespacedRoleBindingParams
NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new ListRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.
func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.
type ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
type ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct { }
ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized
swagger:response listRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
func NewListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
func NewListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
NewListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values
func (*ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1NamespacedRoleHandler ¶
type ListRbacAuthorizationV1beta1NamespacedRoleHandler interface {
Handle(ListRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}
ListRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid list rbac authorization v1beta1 namespaced role params
type ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc ¶
type ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(ListRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 namespaced role handler
func (ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle ¶
func (fn ListRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle(params ListRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type ListRbacAuthorizationV1beta1NamespacedRoleOK ¶
type ListRbacAuthorizationV1beta1NamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleList `json:"body,omitempty"` }
ListRbacAuthorizationV1beta1NamespacedRoleOK OK
swagger:response listRbacAuthorizationV1beta1NamespacedRoleOK
func NewListRbacAuthorizationV1beta1NamespacedRoleOK ¶
func NewListRbacAuthorizationV1beta1NamespacedRoleOK() *ListRbacAuthorizationV1beta1NamespacedRoleOK
NewListRbacAuthorizationV1beta1NamespacedRoleOK creates ListRbacAuthorizationV1beta1NamespacedRoleOK with default headers values
func (*ListRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleList)
SetPayload sets the payload to the list rbac authorization v1beta1 namespaced role o k response
func (*ListRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleList) *ListRbacAuthorizationV1beta1NamespacedRoleOK
WithPayload adds the payload to the list rbac authorization v1beta1 namespaced role o k response
func (*ListRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1NamespacedRoleParams ¶
type ListRbacAuthorizationV1beta1NamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
ListRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the list rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request
swagger:parameters listRbacAuthorizationV1beta1NamespacedRole
func NewListRbacAuthorizationV1beta1NamespacedRoleParams ¶
func NewListRbacAuthorizationV1beta1NamespacedRoleParams() ListRbacAuthorizationV1beta1NamespacedRoleParams
NewListRbacAuthorizationV1beta1NamespacedRoleParams creates a new ListRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.
func (*ListRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.
type ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
type ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct { }
ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized
swagger:response listRbacAuthorizationV1beta1NamespacedRoleUnauthorized
func NewListRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
func NewListRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized
NewListRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values
func (*ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces ¶
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces struct { Context *middleware.Context Handler ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler }
ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/rolebindings rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1RoleBindingForAllNamespaces
list or watch objects of kind RoleBinding
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespaces ¶
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespaces(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler) *ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces
NewListRbacAuthorizationV1beta1RoleBindingForAllNamespaces creates a new http.Handler for the list rbac authorization v1beta1 role binding for all namespaces operation
func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces) ServeHTTP ¶
func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespaces) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler ¶
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler interface {
Handle(ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) middleware.Responder
}
ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandler interface for that can handle valid list rbac authorization v1beta1 role binding for all namespaces params
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc ¶
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc func(ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) middleware.Responder
ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 role binding for all namespaces handler
func (ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc) Handle ¶
func (fn ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesHandlerFunc) Handle(params ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) middleware.Responder
Handle executing the request and returning a response
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK ¶
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBindingList `json:"body,omitempty"` }
ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK OK
swagger:response listRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK ¶
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK() *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK
NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK creates ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK with default headers values
func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) SetPayload ¶
func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList)
SetPayload sets the payload to the list rbac authorization v1beta1 role binding for all namespaces o k response
func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WithPayload ¶
func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBindingList) *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK
WithPayload adds the payload to the list rbac authorization v1beta1 role binding for all namespaces o k response
func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams ¶
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams contains all the bound params for the list rbac authorization v1beta1 role binding for all namespaces operation typically these are obtained from a http.Request
swagger:parameters listRbacAuthorizationV1beta1RoleBindingForAllNamespaces
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams ¶
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams() ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams
NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams creates a new ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams object no default values defined in spec.
func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) BindRequest ¶
func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesParams() beforehand.
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized ¶
type ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized struct { }
ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized Unauthorized
swagger:response listRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized ¶
func NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized() *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized
NewListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized creates ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized with default headers values
func (*ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1RoleBindingForAllNamespacesUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1RoleForAllNamespaces ¶
type ListRbacAuthorizationV1beta1RoleForAllNamespaces struct { Context *middleware.Context Handler ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler }
ListRbacAuthorizationV1beta1RoleForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/roles rbacAuthorization_v1beta1 listRbacAuthorizationV1beta1RoleForAllNamespaces
list or watch objects of kind Role
func NewListRbacAuthorizationV1beta1RoleForAllNamespaces ¶
func NewListRbacAuthorizationV1beta1RoleForAllNamespaces(ctx *middleware.Context, handler ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler) *ListRbacAuthorizationV1beta1RoleForAllNamespaces
NewListRbacAuthorizationV1beta1RoleForAllNamespaces creates a new http.Handler for the list rbac authorization v1beta1 role for all namespaces operation
func (*ListRbacAuthorizationV1beta1RoleForAllNamespaces) ServeHTTP ¶
func (o *ListRbacAuthorizationV1beta1RoleForAllNamespaces) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler ¶
type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler interface {
Handle(ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) middleware.Responder
}
ListRbacAuthorizationV1beta1RoleForAllNamespacesHandler interface for that can handle valid list rbac authorization v1beta1 role for all namespaces params
type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc ¶
type ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc func(ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) middleware.Responder
ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc turns a function with the right signature into a list rbac authorization v1beta1 role for all namespaces handler
func (ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc) Handle ¶
func (fn ListRbacAuthorizationV1beta1RoleForAllNamespacesHandlerFunc) Handle(params ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) middleware.Responder
Handle executing the request and returning a response
type ListRbacAuthorizationV1beta1RoleForAllNamespacesOK ¶
type ListRbacAuthorizationV1beta1RoleForAllNamespacesOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleList `json:"body,omitempty"` }
ListRbacAuthorizationV1beta1RoleForAllNamespacesOK OK
swagger:response listRbacAuthorizationV1beta1RoleForAllNamespacesOK
func NewListRbacAuthorizationV1beta1RoleForAllNamespacesOK ¶
func NewListRbacAuthorizationV1beta1RoleForAllNamespacesOK() *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK
NewListRbacAuthorizationV1beta1RoleForAllNamespacesOK creates ListRbacAuthorizationV1beta1RoleForAllNamespacesOK with default headers values
func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) SetPayload ¶
func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleList)
SetPayload sets the payload to the list rbac authorization v1beta1 role for all namespaces o k response
func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WithPayload ¶
func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleList) *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK
WithPayload adds the payload to the list rbac authorization v1beta1 role for all namespaces o k response
func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ListRbacAuthorizationV1beta1RoleForAllNamespacesParams ¶
type ListRbacAuthorizationV1beta1RoleForAllNamespacesParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
ListRbacAuthorizationV1beta1RoleForAllNamespacesParams contains all the bound params for the list rbac authorization v1beta1 role for all namespaces operation typically these are obtained from a http.Request
swagger:parameters listRbacAuthorizationV1beta1RoleForAllNamespaces
func NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams ¶
func NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams() ListRbacAuthorizationV1beta1RoleForAllNamespacesParams
NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams creates a new ListRbacAuthorizationV1beta1RoleForAllNamespacesParams object no default values defined in spec.
func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) BindRequest ¶
func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewListRbacAuthorizationV1beta1RoleForAllNamespacesParams() beforehand.
type ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized ¶
type ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized struct { }
ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized Unauthorized
swagger:response listRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized
func NewListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized ¶
func NewListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized() *ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized
NewListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized creates ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized with default headers values
func (*ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized) WriteResponse ¶
func (o *ListRbacAuthorizationV1beta1RoleForAllNamespacesUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1ClusterRole ¶
type PatchRbacAuthorizationV1beta1ClusterRole struct { Context *middleware.Context Handler PatchRbacAuthorizationV1beta1ClusterRoleHandler }
PatchRbacAuthorizationV1beta1ClusterRole swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1ClusterRole
partially update the specified ClusterRole
func NewPatchRbacAuthorizationV1beta1ClusterRole ¶
func NewPatchRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler PatchRbacAuthorizationV1beta1ClusterRoleHandler) *PatchRbacAuthorizationV1beta1ClusterRole
NewPatchRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the patch rbac authorization v1beta1 cluster role operation
func (*PatchRbacAuthorizationV1beta1ClusterRole) ServeHTTP ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type PatchRbacAuthorizationV1beta1ClusterRoleBinding ¶
type PatchRbacAuthorizationV1beta1ClusterRoleBinding struct { Context *middleware.Context Handler PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler }
PatchRbacAuthorizationV1beta1ClusterRoleBinding swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1ClusterRoleBinding
partially update the specified ClusterRoleBinding
func NewPatchRbacAuthorizationV1beta1ClusterRoleBinding ¶
func NewPatchRbacAuthorizationV1beta1ClusterRoleBinding(ctx *middleware.Context, handler PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler) *PatchRbacAuthorizationV1beta1ClusterRoleBinding
NewPatchRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the patch rbac authorization v1beta1 cluster role binding operation
func (*PatchRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler ¶
type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
Handle(PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}
PatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid patch rbac authorization v1beta1 cluster role binding params
type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc ¶
type PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 cluster role binding handler
func (PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle ¶
func (fn PatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle(params PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type PatchRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
type PatchRbacAuthorizationV1beta1ClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"` }
PatchRbacAuthorizationV1beta1ClusterRoleBindingOK OK
swagger:response patchRbacAuthorizationV1beta1ClusterRoleBindingOK
func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingOK() *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK
NewPatchRbacAuthorizationV1beta1ClusterRoleBindingOK creates PatchRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values
func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
SetPayload sets the payload to the patch rbac authorization v1beta1 cluster role binding o k response
func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK
WithPayload adds the payload to the patch rbac authorization v1beta1 cluster role binding o k response
func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
type PatchRbacAuthorizationV1beta1ClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body models.IoK8sApimachineryPkgApisMetaV1Patch /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). Unique: true In: query */ FieldManager *string /*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. Unique: true In: query */ Force *bool /*name of the ClusterRoleBinding Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
PatchRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the patch rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request
swagger:parameters patchRbacAuthorizationV1beta1ClusterRoleBinding
func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams() PatchRbacAuthorizationV1beta1ClusterRoleBindingParams
NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new PatchRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.
func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.
type PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
type PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct { }
PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized
swagger:response patchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
func NewPatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
NewPatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values
func (*PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1ClusterRoleHandler ¶
type PatchRbacAuthorizationV1beta1ClusterRoleHandler interface {
Handle(PatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}
PatchRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid patch rbac authorization v1beta1 cluster role params
type PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc ¶
type PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(PatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 cluster role handler
func (PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle ¶
func (fn PatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle(params PatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type PatchRbacAuthorizationV1beta1ClusterRoleOK ¶
type PatchRbacAuthorizationV1beta1ClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"` }
PatchRbacAuthorizationV1beta1ClusterRoleOK OK
swagger:response patchRbacAuthorizationV1beta1ClusterRoleOK
func NewPatchRbacAuthorizationV1beta1ClusterRoleOK ¶
func NewPatchRbacAuthorizationV1beta1ClusterRoleOK() *PatchRbacAuthorizationV1beta1ClusterRoleOK
NewPatchRbacAuthorizationV1beta1ClusterRoleOK creates PatchRbacAuthorizationV1beta1ClusterRoleOK with default headers values
func (*PatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
SetPayload sets the payload to the patch rbac authorization v1beta1 cluster role o k response
func (*PatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *PatchRbacAuthorizationV1beta1ClusterRoleOK
WithPayload adds the payload to the patch rbac authorization v1beta1 cluster role o k response
func (*PatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1ClusterRoleParams ¶
type PatchRbacAuthorizationV1beta1ClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body models.IoK8sApimachineryPkgApisMetaV1Patch /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). Unique: true In: query */ FieldManager *string /*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. Unique: true In: query */ Force *bool /*name of the ClusterRole Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
PatchRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the patch rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request
swagger:parameters patchRbacAuthorizationV1beta1ClusterRole
func NewPatchRbacAuthorizationV1beta1ClusterRoleParams ¶
func NewPatchRbacAuthorizationV1beta1ClusterRoleParams() PatchRbacAuthorizationV1beta1ClusterRoleParams
NewPatchRbacAuthorizationV1beta1ClusterRoleParams creates a new PatchRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.
func (*PatchRbacAuthorizationV1beta1ClusterRoleParams) BindRequest ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1ClusterRoleParams() beforehand.
type PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
type PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized struct { }
PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized
swagger:response patchRbacAuthorizationV1beta1ClusterRoleUnauthorized
func NewPatchRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
func NewPatchRbacAuthorizationV1beta1ClusterRoleUnauthorized() *PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized
NewPatchRbacAuthorizationV1beta1ClusterRoleUnauthorized creates PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values
func (*PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1NamespacedRole ¶
type PatchRbacAuthorizationV1beta1NamespacedRole struct { Context *middleware.Context Handler PatchRbacAuthorizationV1beta1NamespacedRoleHandler }
PatchRbacAuthorizationV1beta1NamespacedRole swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1NamespacedRole
partially update the specified Role
func NewPatchRbacAuthorizationV1beta1NamespacedRole ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler PatchRbacAuthorizationV1beta1NamespacedRoleHandler) *PatchRbacAuthorizationV1beta1NamespacedRole
NewPatchRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the patch rbac authorization v1beta1 namespaced role operation
func (*PatchRbacAuthorizationV1beta1NamespacedRole) ServeHTTP ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type PatchRbacAuthorizationV1beta1NamespacedRoleBinding ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleBinding struct { Context *middleware.Context Handler PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler }
PatchRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route PATCH /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 patchRbacAuthorizationV1beta1NamespacedRoleBinding
partially update the specified RoleBinding
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBinding ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBinding(ctx *middleware.Context, handler PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler) *PatchRbacAuthorizationV1beta1NamespacedRoleBinding
NewPatchRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the patch rbac authorization v1beta1 namespaced role binding operation
func (*PatchRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
Handle(PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}
PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid patch rbac authorization v1beta1 namespaced role binding params
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 namespaced role binding handler
func (PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle ¶
func (fn PatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle(params PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"` }
PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK OK
swagger:response patchRbacAuthorizationV1beta1NamespacedRoleBindingOK
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingOK() *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingOK creates PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values
func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
SetPayload sets the payload to the patch rbac authorization v1beta1 namespaced role binding o k response
func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
WithPayload adds the payload to the patch rbac authorization v1beta1 namespaced role binding o k response
func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body models.IoK8sApimachineryPkgApisMetaV1Patch /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). Unique: true In: query */ FieldManager *string /*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. Unique: true In: query */ Force *bool /*name of the RoleBinding Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the patch rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters patchRbacAuthorizationV1beta1NamespacedRoleBinding
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams
NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.
func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct { }
PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized
swagger:response patchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
NewPatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values
func (*PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1NamespacedRoleHandler ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleHandler interface {
Handle(PatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}
PatchRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid patch rbac authorization v1beta1 namespaced role params
type PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(PatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a patch rbac authorization v1beta1 namespaced role handler
func (PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle ¶
func (fn PatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle(params PatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type PatchRbacAuthorizationV1beta1NamespacedRoleOK ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"` }
PatchRbacAuthorizationV1beta1NamespacedRoleOK OK
swagger:response patchRbacAuthorizationV1beta1NamespacedRoleOK
func NewPatchRbacAuthorizationV1beta1NamespacedRoleOK ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRoleOK() *PatchRbacAuthorizationV1beta1NamespacedRoleOK
NewPatchRbacAuthorizationV1beta1NamespacedRoleOK creates PatchRbacAuthorizationV1beta1NamespacedRoleOK with default headers values
func (*PatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
SetPayload sets the payload to the patch rbac authorization v1beta1 namespaced role o k response
func (*PatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *PatchRbacAuthorizationV1beta1NamespacedRoleOK
WithPayload adds the payload to the patch rbac authorization v1beta1 namespaced role o k response
func (*PatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type PatchRbacAuthorizationV1beta1NamespacedRoleParams ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body models.IoK8sApimachineryPkgApisMetaV1Patch /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. This field is required for apply requests (application/apply-patch) but optional for non-apply patch types (JsonPatch, MergePatch, StrategicMergePatch). Unique: true In: query */ FieldManager *string /*Force is going to "force" Apply requests. It means user will re-acquire conflicting fields owned by other people. Force flag must be unset for non-apply patch requests. Unique: true In: query */ Force *bool /*name of the Role Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
PatchRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the patch rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request
swagger:parameters patchRbacAuthorizationV1beta1NamespacedRole
func NewPatchRbacAuthorizationV1beta1NamespacedRoleParams ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRoleParams() PatchRbacAuthorizationV1beta1NamespacedRoleParams
NewPatchRbacAuthorizationV1beta1NamespacedRoleParams creates a new PatchRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.
func (*PatchRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewPatchRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.
type PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
type PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct { }
PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized
swagger:response patchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
func NewPatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
func NewPatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
NewPatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values
func (*PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse ¶
func (o *PatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1ClusterRole ¶
type ReadRbacAuthorizationV1beta1ClusterRole struct { Context *middleware.Context Handler ReadRbacAuthorizationV1beta1ClusterRoleHandler }
ReadRbacAuthorizationV1beta1ClusterRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1ClusterRole
read the specified ClusterRole
func NewReadRbacAuthorizationV1beta1ClusterRole ¶
func NewReadRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler ReadRbacAuthorizationV1beta1ClusterRoleHandler) *ReadRbacAuthorizationV1beta1ClusterRole
NewReadRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the read rbac authorization v1beta1 cluster role operation
func (*ReadRbacAuthorizationV1beta1ClusterRole) ServeHTTP ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReadRbacAuthorizationV1beta1ClusterRoleBinding ¶
type ReadRbacAuthorizationV1beta1ClusterRoleBinding struct { Context *middleware.Context Handler ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler }
ReadRbacAuthorizationV1beta1ClusterRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1ClusterRoleBinding
read the specified ClusterRoleBinding
func NewReadRbacAuthorizationV1beta1ClusterRoleBinding ¶
func NewReadRbacAuthorizationV1beta1ClusterRoleBinding(ctx *middleware.Context, handler ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler) *ReadRbacAuthorizationV1beta1ClusterRoleBinding
NewReadRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the read rbac authorization v1beta1 cluster role binding operation
func (*ReadRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler ¶
type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
Handle(ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}
ReadRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid read rbac authorization v1beta1 cluster role binding params
type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc ¶
type ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 cluster role binding handler
func (ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle ¶
func (fn ReadRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle(params ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type ReadRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
type ReadRbacAuthorizationV1beta1ClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"` }
ReadRbacAuthorizationV1beta1ClusterRoleBindingOK OK
swagger:response readRbacAuthorizationV1beta1ClusterRoleBindingOK
func NewReadRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
func NewReadRbacAuthorizationV1beta1ClusterRoleBindingOK() *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK
NewReadRbacAuthorizationV1beta1ClusterRoleBindingOK creates ReadRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values
func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
SetPayload sets the payload to the read rbac authorization v1beta1 cluster role binding o k response
func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK
WithPayload adds the payload to the read rbac authorization v1beta1 cluster role binding o k response
func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
type ReadRbacAuthorizationV1beta1ClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*name of the ClusterRoleBinding Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReadRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the read rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request
swagger:parameters readRbacAuthorizationV1beta1ClusterRoleBinding
func NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
func NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams() ReadRbacAuthorizationV1beta1ClusterRoleBindingParams
NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new ReadRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.
func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.
type ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
type ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct { }
ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized
swagger:response readRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
func NewReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
func NewReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
NewReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values
func (*ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1ClusterRoleHandler ¶
type ReadRbacAuthorizationV1beta1ClusterRoleHandler interface {
Handle(ReadRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}
ReadRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid read rbac authorization v1beta1 cluster role params
type ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc ¶
type ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(ReadRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 cluster role handler
func (ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle ¶
func (fn ReadRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle(params ReadRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type ReadRbacAuthorizationV1beta1ClusterRoleOK ¶
type ReadRbacAuthorizationV1beta1ClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"` }
ReadRbacAuthorizationV1beta1ClusterRoleOK OK
swagger:response readRbacAuthorizationV1beta1ClusterRoleOK
func NewReadRbacAuthorizationV1beta1ClusterRoleOK ¶
func NewReadRbacAuthorizationV1beta1ClusterRoleOK() *ReadRbacAuthorizationV1beta1ClusterRoleOK
NewReadRbacAuthorizationV1beta1ClusterRoleOK creates ReadRbacAuthorizationV1beta1ClusterRoleOK with default headers values
func (*ReadRbacAuthorizationV1beta1ClusterRoleOK) SetPayload ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
SetPayload sets the payload to the read rbac authorization v1beta1 cluster role o k response
func (*ReadRbacAuthorizationV1beta1ClusterRoleOK) WithPayload ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *ReadRbacAuthorizationV1beta1ClusterRoleOK
WithPayload adds the payload to the read rbac authorization v1beta1 cluster role o k response
func (*ReadRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1ClusterRoleParams ¶
type ReadRbacAuthorizationV1beta1ClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*name of the ClusterRole Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReadRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the read rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request
swagger:parameters readRbacAuthorizationV1beta1ClusterRole
func NewReadRbacAuthorizationV1beta1ClusterRoleParams ¶
func NewReadRbacAuthorizationV1beta1ClusterRoleParams() ReadRbacAuthorizationV1beta1ClusterRoleParams
NewReadRbacAuthorizationV1beta1ClusterRoleParams creates a new ReadRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.
func (*ReadRbacAuthorizationV1beta1ClusterRoleParams) BindRequest ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1ClusterRoleParams() beforehand.
type ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
type ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized struct { }
ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized
swagger:response readRbacAuthorizationV1beta1ClusterRoleUnauthorized
func NewReadRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
func NewReadRbacAuthorizationV1beta1ClusterRoleUnauthorized() *ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized
NewReadRbacAuthorizationV1beta1ClusterRoleUnauthorized creates ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values
func (*ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1NamespacedRole ¶
type ReadRbacAuthorizationV1beta1NamespacedRole struct { Context *middleware.Context Handler ReadRbacAuthorizationV1beta1NamespacedRoleHandler }
ReadRbacAuthorizationV1beta1NamespacedRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1NamespacedRole
read the specified Role
func NewReadRbacAuthorizationV1beta1NamespacedRole ¶
func NewReadRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler ReadRbacAuthorizationV1beta1NamespacedRoleHandler) *ReadRbacAuthorizationV1beta1NamespacedRole
NewReadRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the read rbac authorization v1beta1 namespaced role operation
func (*ReadRbacAuthorizationV1beta1NamespacedRole) ServeHTTP ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReadRbacAuthorizationV1beta1NamespacedRoleBinding ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleBinding struct { Context *middleware.Context Handler ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler }
ReadRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 readRbacAuthorizationV1beta1NamespacedRoleBinding
read the specified RoleBinding
func NewReadRbacAuthorizationV1beta1NamespacedRoleBinding ¶
func NewReadRbacAuthorizationV1beta1NamespacedRoleBinding(ctx *middleware.Context, handler ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler) *ReadRbacAuthorizationV1beta1NamespacedRoleBinding
NewReadRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the read rbac authorization v1beta1 namespaced role binding operation
func (*ReadRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
Handle(ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}
ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid read rbac authorization v1beta1 namespaced role binding params
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 namespaced role binding handler
func (ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle ¶
func (fn ReadRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle(params ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"` }
ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK OK
swagger:response readRbacAuthorizationV1beta1NamespacedRoleBindingOK
func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingOK() *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK
NewReadRbacAuthorizationV1beta1NamespacedRoleBindingOK creates ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values
func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
SetPayload sets the payload to the read rbac authorization v1beta1 namespaced role binding o k response
func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK
WithPayload adds the payload to the read rbac authorization v1beta1 namespaced role binding o k response
func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*name of the RoleBinding Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the read rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters readRbacAuthorizationV1beta1NamespacedRoleBinding
func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams() ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams
NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.
func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct { }
ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized
swagger:response readRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
func NewReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
NewReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values
func (*ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1NamespacedRoleHandler ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleHandler interface {
Handle(ReadRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}
ReadRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid read rbac authorization v1beta1 namespaced role params
type ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(ReadRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a read rbac authorization v1beta1 namespaced role handler
func (ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle ¶
func (fn ReadRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle(params ReadRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type ReadRbacAuthorizationV1beta1NamespacedRoleOK ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"` }
ReadRbacAuthorizationV1beta1NamespacedRoleOK OK
swagger:response readRbacAuthorizationV1beta1NamespacedRoleOK
func NewReadRbacAuthorizationV1beta1NamespacedRoleOK ¶
func NewReadRbacAuthorizationV1beta1NamespacedRoleOK() *ReadRbacAuthorizationV1beta1NamespacedRoleOK
NewReadRbacAuthorizationV1beta1NamespacedRoleOK creates ReadRbacAuthorizationV1beta1NamespacedRoleOK with default headers values
func (*ReadRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
SetPayload sets the payload to the read rbac authorization v1beta1 namespaced role o k response
func (*ReadRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *ReadRbacAuthorizationV1beta1NamespacedRoleOK
WithPayload adds the payload to the read rbac authorization v1beta1 namespaced role o k response
func (*ReadRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReadRbacAuthorizationV1beta1NamespacedRoleParams ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*name of the Role Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReadRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the read rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request
swagger:parameters readRbacAuthorizationV1beta1NamespacedRole
func NewReadRbacAuthorizationV1beta1NamespacedRoleParams ¶
func NewReadRbacAuthorizationV1beta1NamespacedRoleParams() ReadRbacAuthorizationV1beta1NamespacedRoleParams
NewReadRbacAuthorizationV1beta1NamespacedRoleParams creates a new ReadRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.
func (*ReadRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReadRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.
type ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
type ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct { }
ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized
swagger:response readRbacAuthorizationV1beta1NamespacedRoleUnauthorized
func NewReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
func NewReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized
NewReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values
func (*ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse ¶
func (o *ReadRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1ClusterRole ¶
type ReplaceRbacAuthorizationV1beta1ClusterRole struct { Context *middleware.Context Handler ReplaceRbacAuthorizationV1beta1ClusterRoleHandler }
ReplaceRbacAuthorizationV1beta1ClusterRole swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/clusterroles/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1ClusterRole
replace the specified ClusterRole
func NewReplaceRbacAuthorizationV1beta1ClusterRole ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler ReplaceRbacAuthorizationV1beta1ClusterRoleHandler) *ReplaceRbacAuthorizationV1beta1ClusterRole
NewReplaceRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the replace rbac authorization v1beta1 cluster role operation
func (*ReplaceRbacAuthorizationV1beta1ClusterRole) ServeHTTP ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReplaceRbacAuthorizationV1beta1ClusterRoleBinding ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleBinding struct { Context *middleware.Context Handler ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler }
ReplaceRbacAuthorizationV1beta1ClusterRoleBinding swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/clusterrolebindings/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1ClusterRoleBinding
replace the specified ClusterRoleBinding
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBinding ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBinding(ctx *middleware.Context, handler ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler) *ReplaceRbacAuthorizationV1beta1ClusterRoleBinding
NewReplaceRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the replace rbac authorization v1beta1 cluster role binding operation
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated Created
swagger:response replaceRbacAuthorizationV1beta1ClusterRoleBindingCreated
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated() *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated
NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated creates ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated with default headers values
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role binding created response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated
WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role binding created response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
Handle(ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid replace rbac authorization v1beta1 cluster role binding params
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 cluster role binding handler
func (ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle ¶
func (fn ReplaceRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle(params ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK OK
swagger:response replaceRbacAuthorizationV1beta1ClusterRoleBindingOK
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK() *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK
NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK creates ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding)
SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role binding o k response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRoleBinding) *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK
WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role binding o k response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1ClusterRoleBinding /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*name of the ClusterRoleBinding Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the replace rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request
swagger:parameters replaceRbacAuthorizationV1beta1ClusterRoleBinding
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams() ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams
NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct { }
ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized
swagger:response replaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
NewReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1ClusterRoleCreated ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1ClusterRoleCreated Created
swagger:response replaceRbacAuthorizationV1beta1ClusterRoleCreated
func NewReplaceRbacAuthorizationV1beta1ClusterRoleCreated ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleCreated() *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated
NewReplaceRbacAuthorizationV1beta1ClusterRoleCreated creates ReplaceRbacAuthorizationV1beta1ClusterRoleCreated with default headers values
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role created response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated
WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role created response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1ClusterRoleHandler ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleHandler interface {
Handle(ReplaceRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}
ReplaceRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid replace rbac authorization v1beta1 cluster role params
type ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(ReplaceRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 cluster role handler
func (ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle ¶
func (fn ReplaceRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle(params ReplaceRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type ReplaceRbacAuthorizationV1beta1ClusterRoleOK ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1ClusterRole `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1ClusterRoleOK OK
swagger:response replaceRbacAuthorizationV1beta1ClusterRoleOK
func NewReplaceRbacAuthorizationV1beta1ClusterRoleOK ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleOK() *ReplaceRbacAuthorizationV1beta1ClusterRoleOK
NewReplaceRbacAuthorizationV1beta1ClusterRoleOK creates ReplaceRbacAuthorizationV1beta1ClusterRoleOK with default headers values
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleOK) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole)
SetPayload sets the payload to the replace rbac authorization v1beta1 cluster role o k response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1ClusterRole) *ReplaceRbacAuthorizationV1beta1ClusterRoleOK
WithPayload adds the payload to the replace rbac authorization v1beta1 cluster role o k response
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1ClusterRoleParams ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1ClusterRole /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*name of the ClusterRole Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReplaceRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the replace rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request
swagger:parameters replaceRbacAuthorizationV1beta1ClusterRole
func NewReplaceRbacAuthorizationV1beta1ClusterRoleParams ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleParams() ReplaceRbacAuthorizationV1beta1ClusterRoleParams
NewReplaceRbacAuthorizationV1beta1ClusterRoleParams creates a new ReplaceRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleParams) BindRequest ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1ClusterRoleParams() beforehand.
type ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
type ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized struct { }
ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized
swagger:response replaceRbacAuthorizationV1beta1ClusterRoleUnauthorized
func NewReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
func NewReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized() *ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized
NewReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized creates ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values
func (*ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1NamespacedRole ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRole struct { Context *middleware.Context Handler ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler }
ReplaceRbacAuthorizationV1beta1NamespacedRole swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1NamespacedRole
replace the specified Role
func NewReplaceRbacAuthorizationV1beta1NamespacedRole ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler) *ReplaceRbacAuthorizationV1beta1NamespacedRole
NewReplaceRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the replace rbac authorization v1beta1 namespaced role operation
func (*ReplaceRbacAuthorizationV1beta1NamespacedRole) ServeHTTP ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding struct { Context *middleware.Context Handler ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler }
ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route PUT /apis/rbac.authorization.k8s.io/v1beta1/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 replaceRbacAuthorizationV1beta1NamespacedRoleBinding
replace the specified RoleBinding
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBinding ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBinding(ctx *middleware.Context, handler ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler) *ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding
NewReplaceRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the replace rbac authorization v1beta1 namespaced role binding operation
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated Created
swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated() *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated
NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated creates ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated with default headers values
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role binding created response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated
WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role binding created response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
Handle(ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid replace rbac authorization v1beta1 namespaced role binding params
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 namespaced role binding handler
func (ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle ¶
func (fn ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle(params ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1RoleBinding `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK OK
swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleBindingOK
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK() *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK
NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK creates ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding)
SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role binding o k response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1RoleBinding) *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK
WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role binding o k response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1RoleBinding /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*name of the RoleBinding Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the replace rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters replaceRbacAuthorizationV1beta1NamespacedRoleBinding
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams() ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams
NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct { }
ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized
swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
NewReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated Created
swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleCreated
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleCreated ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleCreated() *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated
NewReplaceRbacAuthorizationV1beta1NamespacedRoleCreated creates ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated with default headers values
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role created response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated
WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role created response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleCreated) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler interface {
Handle(ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}
ReplaceRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid replace rbac authorization v1beta1 namespaced role params
type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a replace rbac authorization v1beta1 namespaced role handler
func (ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle ¶
func (fn ReplaceRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle(params ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type ReplaceRbacAuthorizationV1beta1NamespacedRoleOK ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sAPIRbacV1beta1Role `json:"body,omitempty"` }
ReplaceRbacAuthorizationV1beta1NamespacedRoleOK OK
swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleOK
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleOK ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleOK() *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK
NewReplaceRbacAuthorizationV1beta1NamespacedRoleOK creates ReplaceRbacAuthorizationV1beta1NamespacedRoleOK with default headers values
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sAPIRbacV1beta1Role)
SetPayload sets the payload to the replace rbac authorization v1beta1 namespaced role o k response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sAPIRbacV1beta1Role) *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK
WithPayload adds the payload to the replace rbac authorization v1beta1 namespaced role o k response
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type ReplaceRbacAuthorizationV1beta1NamespacedRoleParams ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /* Required: true In: body */ Body *models.IoK8sAPIRbacV1beta1Role /*When present, indicates that modifications should not be persisted. An invalid or unrecognized dryRun directive will result in an error response and no further processing of the request. Valid values are: - All: all dry run stages will be processed Unique: true In: query */ DryRun *string /*fieldManager is a name associated with the actor or entity that is making these changes. The value must be less than or 128 characters long, and only contain printable characters, as defined by https://golang.org/pkg/unicode/#IsPrint. Unique: true In: query */ FieldManager *string /*name of the Role Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string }
ReplaceRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the replace rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request
swagger:parameters replaceRbacAuthorizationV1beta1NamespacedRole
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams() ReplaceRbacAuthorizationV1beta1NamespacedRoleParams
NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams creates a new ReplaceRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewReplaceRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.
type ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
type ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct { }
ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized
swagger:response replaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
func NewReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized
NewReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values
func (*ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse ¶
func (o *ReplaceRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRole ¶
type WatchRbacAuthorizationV1beta1ClusterRole struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1ClusterRoleHandler }
WatchRbacAuthorizationV1beta1ClusterRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterroles/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRole
watch changes to an object of kind ClusterRole. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.
func NewWatchRbacAuthorizationV1beta1ClusterRole ¶
func NewWatchRbacAuthorizationV1beta1ClusterRole(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1ClusterRoleHandler) *WatchRbacAuthorizationV1beta1ClusterRole
NewWatchRbacAuthorizationV1beta1ClusterRole creates a new http.Handler for the watch rbac authorization v1beta1 cluster role operation
func (*WatchRbacAuthorizationV1beta1ClusterRole) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1ClusterRoleBinding ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBinding struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler }
WatchRbacAuthorizationV1beta1ClusterRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRoleBinding
watch changes to an object of kind ClusterRoleBinding. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.
func NewWatchRbacAuthorizationV1beta1ClusterRoleBinding ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBinding(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler) *WatchRbacAuthorizationV1beta1ClusterRoleBinding
NewWatchRbacAuthorizationV1beta1ClusterRoleBinding creates a new http.Handler for the watch rbac authorization v1beta1 cluster role binding operation
func (*WatchRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface {
Handle(WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1ClusterRoleBindingHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role binding params
type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role binding handler
func (WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1ClusterRoleBindingHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1ClusterRoleBindingList ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingList struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler }
WatchRbacAuthorizationV1beta1ClusterRoleBindingList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterrolebindings rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRoleBindingList
watch individual changes to a list of ClusterRoleBinding. deprecated: use the 'watch' parameter with a list operation instead.
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingList ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingList(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler) *WatchRbacAuthorizationV1beta1ClusterRoleBindingList
NewWatchRbacAuthorizationV1beta1ClusterRoleBindingList creates a new http.Handler for the watch rbac authorization v1beta1 cluster role binding list operation
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingList) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingList) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler interface {
Handle(WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role binding list params
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) middleware.Responder
WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role binding list handler
func (WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1ClusterRoleBindingListHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK OK
swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingListOK
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListOK ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListOK() *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK
NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListOK creates WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role binding list o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK
WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role binding list o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams contains all the bound params for the watch rbac authorization v1beta1 cluster role binding list operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1ClusterRoleBindingList
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams() WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams
NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListParams() beforehand.
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized struct { }
WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized
NewWatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingListUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1ClusterRoleBindingOK OK
swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingOK
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingOK ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingOK() *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK
NewWatchRbacAuthorizationV1beta1ClusterRoleBindingOK creates WatchRbacAuthorizationV1beta1ClusterRoleBindingOK with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role binding o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK
WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role binding o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*name of the ClusterRoleBinding Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1ClusterRoleBindingParams contains all the bound params for the watch rbac authorization v1beta1 cluster role binding operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1ClusterRoleBinding
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams() WatchRbacAuthorizationV1beta1ClusterRoleBindingParams
NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleBindingParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleBindingParams() beforehand.
type WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
type WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized struct { }
WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized
NewWatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRoleHandler ¶
type WatchRbacAuthorizationV1beta1ClusterRoleHandler interface {
Handle(WatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1ClusterRoleHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role params
type WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc ¶
type WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role handler
func (WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1ClusterRoleHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1ClusterRoleParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1ClusterRoleList ¶
type WatchRbacAuthorizationV1beta1ClusterRoleList struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1ClusterRoleListHandler }
WatchRbacAuthorizationV1beta1ClusterRoleList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/clusterroles rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1ClusterRoleList
watch individual changes to a list of ClusterRole. deprecated: use the 'watch' parameter with a list operation instead.
func NewWatchRbacAuthorizationV1beta1ClusterRoleList ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleList(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1ClusterRoleListHandler) *WatchRbacAuthorizationV1beta1ClusterRoleList
NewWatchRbacAuthorizationV1beta1ClusterRoleList creates a new http.Handler for the watch rbac authorization v1beta1 cluster role list operation
func (*WatchRbacAuthorizationV1beta1ClusterRoleList) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleList) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1ClusterRoleListHandler ¶
type WatchRbacAuthorizationV1beta1ClusterRoleListHandler interface {
Handle(WatchRbacAuthorizationV1beta1ClusterRoleListParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1ClusterRoleListHandler interface for that can handle valid watch rbac authorization v1beta1 cluster role list params
type WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc ¶
type WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc func(WatchRbacAuthorizationV1beta1ClusterRoleListParams) middleware.Responder
WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 cluster role list handler
func (WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1ClusterRoleListHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1ClusterRoleListParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1ClusterRoleListOK ¶
type WatchRbacAuthorizationV1beta1ClusterRoleListOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1ClusterRoleListOK OK
swagger:response watchRbacAuthorizationV1beta1ClusterRoleListOK
func NewWatchRbacAuthorizationV1beta1ClusterRoleListOK ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleListOK() *WatchRbacAuthorizationV1beta1ClusterRoleListOK
NewWatchRbacAuthorizationV1beta1ClusterRoleListOK creates WatchRbacAuthorizationV1beta1ClusterRoleListOK with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleListOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role list o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleListOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleListOK
WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role list o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleListOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRoleListParams ¶
type WatchRbacAuthorizationV1beta1ClusterRoleListParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1ClusterRoleListParams contains all the bound params for the watch rbac authorization v1beta1 cluster role list operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1ClusterRoleList
func NewWatchRbacAuthorizationV1beta1ClusterRoleListParams ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleListParams() WatchRbacAuthorizationV1beta1ClusterRoleListParams
NewWatchRbacAuthorizationV1beta1ClusterRoleListParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleListParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1ClusterRoleListParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleListParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleListParams() beforehand.
type WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized ¶
type WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized struct { }
WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1ClusterRoleListUnauthorized
func NewWatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized
NewWatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleListUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRoleOK ¶
type WatchRbacAuthorizationV1beta1ClusterRoleOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1ClusterRoleOK OK
swagger:response watchRbacAuthorizationV1beta1ClusterRoleOK
func NewWatchRbacAuthorizationV1beta1ClusterRoleOK ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleOK() *WatchRbacAuthorizationV1beta1ClusterRoleOK
NewWatchRbacAuthorizationV1beta1ClusterRoleOK creates WatchRbacAuthorizationV1beta1ClusterRoleOK with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 cluster role o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1ClusterRoleOK
WithPayload adds the payload to the watch rbac authorization v1beta1 cluster role o k response
func (*WatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1ClusterRoleParams ¶
type WatchRbacAuthorizationV1beta1ClusterRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*name of the ClusterRole Required: true Unique: true In: path */ Name string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1ClusterRoleParams contains all the bound params for the watch rbac authorization v1beta1 cluster role operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1ClusterRole
func NewWatchRbacAuthorizationV1beta1ClusterRoleParams ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleParams() WatchRbacAuthorizationV1beta1ClusterRoleParams
NewWatchRbacAuthorizationV1beta1ClusterRoleParams creates a new WatchRbacAuthorizationV1beta1ClusterRoleParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1ClusterRoleParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1ClusterRoleParams() beforehand.
type WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
type WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized struct { }
WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1ClusterRoleUnauthorized
func NewWatchRbacAuthorizationV1beta1ClusterRoleUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1ClusterRoleUnauthorized() *WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized
NewWatchRbacAuthorizationV1beta1ClusterRoleUnauthorized creates WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1ClusterRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRole ¶
type WatchRbacAuthorizationV1beta1NamespacedRole struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1NamespacedRoleHandler }
WatchRbacAuthorizationV1beta1NamespacedRole swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/roles/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRole
watch changes to an object of kind Role. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.
func NewWatchRbacAuthorizationV1beta1NamespacedRole ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRole(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1NamespacedRoleHandler) *WatchRbacAuthorizationV1beta1NamespacedRole
NewWatchRbacAuthorizationV1beta1NamespacedRole creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role operation
func (*WatchRbacAuthorizationV1beta1NamespacedRole) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRole) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1NamespacedRoleBinding ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBinding struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler }
WatchRbacAuthorizationV1beta1NamespacedRoleBinding swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/rolebindings/{name} rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRoleBinding
watch changes to an object of kind RoleBinding. deprecated: use the 'watch' parameter with a list operation instead, filtered to a single item with the 'fieldSelector' parameter.
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBinding ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBinding(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler) *WatchRbacAuthorizationV1beta1NamespacedRoleBinding
NewWatchRbacAuthorizationV1beta1NamespacedRoleBinding creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role binding operation
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBinding) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface {
Handle(WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role binding params
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role binding handler
func (WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1NamespacedRoleBindingHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingList ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingList struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler }
WatchRbacAuthorizationV1beta1NamespacedRoleBindingList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/rolebindings rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRoleBindingList
watch individual changes to a list of RoleBinding. deprecated: use the 'watch' parameter with a list operation instead.
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingList ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingList(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler) *WatchRbacAuthorizationV1beta1NamespacedRoleBindingList
NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingList creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role binding list operation
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingList) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingList) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler interface {
Handle(WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role binding list params
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) middleware.Responder
WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role binding list handler
func (WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1NamespacedRoleBindingListHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK OK
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingListOK
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK
NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role binding list o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK
WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role binding list o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role binding list operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1NamespacedRoleBindingList
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams() WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams
NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListParams() beforehand.
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized struct { }
WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized
NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingListUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK OK
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingOK
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingOK ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingOK() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingOK creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role binding o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK
WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role binding o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*name of the RoleBinding Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role binding operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1NamespacedRoleBinding
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams
NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingParams() beforehand.
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized struct { }
WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized
NewWatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleBindingUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRoleHandler ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleHandler interface {
Handle(WatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1NamespacedRoleHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role params
type WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role handler
func (WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1NamespacedRoleHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1NamespacedRoleParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1NamespacedRoleList ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleList struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1NamespacedRoleListHandler }
WatchRbacAuthorizationV1beta1NamespacedRoleList swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/namespaces/{namespace}/roles rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1NamespacedRoleList
watch individual changes to a list of Role. deprecated: use the 'watch' parameter with a list operation instead.
func NewWatchRbacAuthorizationV1beta1NamespacedRoleList ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleList(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1NamespacedRoleListHandler) *WatchRbacAuthorizationV1beta1NamespacedRoleList
NewWatchRbacAuthorizationV1beta1NamespacedRoleList creates a new http.Handler for the watch rbac authorization v1beta1 namespaced role list operation
func (*WatchRbacAuthorizationV1beta1NamespacedRoleList) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleList) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1NamespacedRoleListHandler ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleListHandler interface {
Handle(WatchRbacAuthorizationV1beta1NamespacedRoleListParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1NamespacedRoleListHandler interface for that can handle valid watch rbac authorization v1beta1 namespaced role list params
type WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc func(WatchRbacAuthorizationV1beta1NamespacedRoleListParams) middleware.Responder
WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 namespaced role list handler
func (WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1NamespacedRoleListHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1NamespacedRoleListParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1NamespacedRoleListOK ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleListOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1NamespacedRoleListOK OK
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleListOK
func NewWatchRbacAuthorizationV1beta1NamespacedRoleListOK ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleListOK() *WatchRbacAuthorizationV1beta1NamespacedRoleListOK
NewWatchRbacAuthorizationV1beta1NamespacedRoleListOK creates WatchRbacAuthorizationV1beta1NamespacedRoleListOK with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleListOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role list o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleListOK
WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role list o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRoleListParams ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleListParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1NamespacedRoleListParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role list operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1NamespacedRoleList
func NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams() WatchRbacAuthorizationV1beta1NamespacedRoleListParams
NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleListParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1NamespacedRoleListParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleListParams() beforehand.
type WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized struct { }
WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized
func NewWatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized
NewWatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleListUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRoleOK ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1NamespacedRoleOK OK
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleOK
func NewWatchRbacAuthorizationV1beta1NamespacedRoleOK ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleOK() *WatchRbacAuthorizationV1beta1NamespacedRoleOK
NewWatchRbacAuthorizationV1beta1NamespacedRoleOK creates WatchRbacAuthorizationV1beta1NamespacedRoleOK with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 namespaced role o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1NamespacedRoleOK
WithPayload adds the payload to the watch rbac authorization v1beta1 namespaced role o k response
func (*WatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1NamespacedRoleParams ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*name of the Role Required: true Unique: true In: path */ Name string /*object name and auth scope, such as for teams and projects Required: true Unique: true In: path */ Namespace string /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1NamespacedRoleParams contains all the bound params for the watch rbac authorization v1beta1 namespaced role operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1NamespacedRole
func NewWatchRbacAuthorizationV1beta1NamespacedRoleParams ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleParams() WatchRbacAuthorizationV1beta1NamespacedRoleParams
NewWatchRbacAuthorizationV1beta1NamespacedRoleParams creates a new WatchRbacAuthorizationV1beta1NamespacedRoleParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1NamespacedRoleParams() beforehand.
type WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
type WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized struct { }
WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
func NewWatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized() *WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized
NewWatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized creates WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1NamespacedRoleUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces ¶
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler }
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/rolebindings rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces
watch individual changes to a list of RoleBinding. deprecated: use the 'watch' parameter with a list operation instead.
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces ¶
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler) *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces
NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces creates a new http.Handler for the watch rbac authorization v1beta1 role binding list for all namespaces operation
func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler ¶
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler interface {
Handle(WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandler interface for that can handle valid watch rbac authorization v1beta1 role binding list for all namespaces params
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc ¶
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc func(WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) middleware.Responder
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 role binding list for all namespaces handler
func (WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK ¶
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK OK
swagger:response watchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK ¶
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK() *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK
NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK creates WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK with default headers values
func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 role binding list for all namespaces o k response
func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK
WithPayload adds the payload to the watch rbac authorization v1beta1 role binding list for all namespaces o k response
func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams ¶
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams contains all the bound params for the watch rbac authorization v1beta1 role binding list for all namespaces operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1RoleBindingListForAllNamespaces
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams ¶
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams() WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams
NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams creates a new WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesParams() beforehand.
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized ¶
type WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized struct { }
WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized() *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized
NewWatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized creates WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1RoleBindingListForAllNamespacesUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1RoleListForAllNamespaces ¶
type WatchRbacAuthorizationV1beta1RoleListForAllNamespaces struct { Context *middleware.Context Handler WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler }
WatchRbacAuthorizationV1beta1RoleListForAllNamespaces swagger:route GET /apis/rbac.authorization.k8s.io/v1beta1/watch/roles rbacAuthorization_v1beta1 watchRbacAuthorizationV1beta1RoleListForAllNamespaces
watch individual changes to a list of Role. deprecated: use the 'watch' parameter with a list operation instead.
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespaces ¶
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespaces(ctx *middleware.Context, handler WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler) *WatchRbacAuthorizationV1beta1RoleListForAllNamespaces
NewWatchRbacAuthorizationV1beta1RoleListForAllNamespaces creates a new http.Handler for the watch rbac authorization v1beta1 role list for all namespaces operation
func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespaces) ServeHTTP ¶
func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespaces) ServeHTTP(rw http.ResponseWriter, r *http.Request)
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler ¶
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler interface {
Handle(WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) middleware.Responder
}
WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandler interface for that can handle valid watch rbac authorization v1beta1 role list for all namespaces params
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc ¶
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc func(WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) middleware.Responder
WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc turns a function with the right signature into a watch rbac authorization v1beta1 role list for all namespaces handler
func (WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc) Handle ¶
func (fn WatchRbacAuthorizationV1beta1RoleListForAllNamespacesHandlerFunc) Handle(params WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) middleware.Responder
Handle executing the request and returning a response
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK ¶
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK struct { /* In: Body */ Payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent `json:"body,omitempty"` }
WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK OK
swagger:response watchRbacAuthorizationV1beta1RoleListForAllNamespacesOK
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK ¶
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK() *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK
NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK creates WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK with default headers values
func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) SetPayload ¶
func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) SetPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent)
SetPayload sets the payload to the watch rbac authorization v1beta1 role list for all namespaces o k response
func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WithPayload ¶
func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WithPayload(payload *models.IoK8sApimachineryPkgApisMetaV1WatchEvent) *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK
WithPayload adds the payload to the watch rbac authorization v1beta1 role list for all namespaces o k response
func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesOK) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams ¶
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams struct { // HTTP Request Object HTTPRequest *http.Request `json:"-"` /*allowWatchBookmarks requests watch events with type "BOOKMARK". Servers that do not implement bookmarks may ignore this flag and bookmarks are sent at the server's discretion. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. If this is not a watch, this field is ignored. If the feature gate WatchBookmarks is not enabled in apiserver, this field is ignored. Unique: true In: query */ AllowWatchBookmarks *bool /*The continue option should be set when retrieving more results from the server. Since this value is server defined, clients may only use the continue value from a previous query result with identical query parameters (except for the value of continue) and the server may reject a continue value it does not recognize. If the specified continue value is no longer valid whether due to expiration (generally five to fifteen minutes) or a configuration change on the server, the server will respond with a 410 ResourceExpired error together with a continue token. If the client needs a consistent list, it must restart their list without the continue field. Otherwise, the client may send another list request with the token received with the 410 error, the server will respond with a list starting from the next key, but from the latest snapshot, which is inconsistent from the previous list results - objects that are created, modified, or deleted after the first list request will be included in the response, as long as their keys are after the "next key". This field is not supported when watch is true. Clients may start a watch from the last resourceVersion value returned by the server and not miss any modifications. Unique: true In: query */ Continue *string /*A selector to restrict the list of returned objects by their fields. Defaults to everything. Unique: true In: query */ FieldSelector *string /*A selector to restrict the list of returned objects by their labels. Defaults to everything. Unique: true In: query */ LabelSelector *string /*limit is a maximum number of responses to return for a list call. If more items exist, the server will set the `continue` field on the list metadata to a value that can be used with the same initial query to retrieve the next set of results. Setting a limit may return fewer than the requested amount of items (up to zero items) in the event all requested objects are filtered out and clients should only use the presence of the continue field to determine whether more results are available. Servers may choose not to support the limit argument and will return all of the available results. If limit is specified and the continue field is empty, clients may assume that no more results are available. This field is not supported if watch is true. The server guarantees that the objects returned when using continue will be identical to issuing a single list call without a limit - that is, no objects created, modified, or deleted after the first request is issued will be included in any subsequent continued requests. This is sometimes referred to as a consistent snapshot, and ensures that a client that is using limit to receive smaller chunks of a very large result can ensure they see all possible objects. If objects are updated during a chunked list the version of the object that was present at the time the first list result was calculated is returned. Unique: true In: query */ Limit *int64 /*If 'true', then the output is pretty printed. Unique: true In: query */ Pretty *string /*resourceVersion sets a constraint on what resource versions a request may be served from. See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersion *string /*resourceVersionMatch determines how resourceVersion is applied to list calls. It is highly recommended that resourceVersionMatch be set for list calls where resourceVersion is set See https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions for details. Defaults to unset Unique: true In: query */ ResourceVersionMatch *string /*Timeout for the list/watch call. This limits the duration of the call, regardless of any activity or inactivity. Unique: true In: query */ TimeoutSeconds *int64 /*Watch for changes to the described resources and return them as a stream of add, update, and remove notifications. Specify resourceVersion. Unique: true In: query */ Watch *bool }
WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams contains all the bound params for the watch rbac authorization v1beta1 role list for all namespaces operation typically these are obtained from a http.Request
swagger:parameters watchRbacAuthorizationV1beta1RoleListForAllNamespaces
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams ¶
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams() WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams
NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams creates a new WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams object no default values defined in spec.
func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) BindRequest ¶
func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams) BindRequest(r *http.Request, route *middleware.MatchedRoute) error
BindRequest both binds and validates a request, it assumes that complex things implement a Validatable(strfmt.Registry) error interface for simple values it will use straight method calls.
To ensure default values, the struct must have been initialized with NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesParams() beforehand.
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized ¶
type WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized struct { }
WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized Unauthorized
swagger:response watchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized ¶
func NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized() *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized
NewWatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized creates WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized with default headers values
func (*WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized) WriteResponse ¶
func (o *WatchRbacAuthorizationV1beta1RoleListForAllNamespacesUnauthorized) WriteResponse(rw http.ResponseWriter, producer runtime.Producer)
WriteResponse to the client
Source Files ¶
- create_rbac_authorization_v1beta1_cluster_role.go
- create_rbac_authorization_v1beta1_cluster_role_binding.go
- create_rbac_authorization_v1beta1_cluster_role_binding_parameters.go
- create_rbac_authorization_v1beta1_cluster_role_binding_responses.go
- create_rbac_authorization_v1beta1_cluster_role_parameters.go
- create_rbac_authorization_v1beta1_cluster_role_responses.go
- create_rbac_authorization_v1beta1_namespaced_role.go
- create_rbac_authorization_v1beta1_namespaced_role_binding.go
- create_rbac_authorization_v1beta1_namespaced_role_binding_parameters.go
- create_rbac_authorization_v1beta1_namespaced_role_binding_responses.go
- create_rbac_authorization_v1beta1_namespaced_role_parameters.go
- create_rbac_authorization_v1beta1_namespaced_role_responses.go
- delete_rbac_authorization_v1beta1_cluster_role.go
- delete_rbac_authorization_v1beta1_cluster_role_binding.go
- delete_rbac_authorization_v1beta1_cluster_role_binding_parameters.go
- delete_rbac_authorization_v1beta1_cluster_role_binding_responses.go
- delete_rbac_authorization_v1beta1_cluster_role_parameters.go
- delete_rbac_authorization_v1beta1_cluster_role_responses.go
- delete_rbac_authorization_v1beta1_collection_cluster_role.go
- delete_rbac_authorization_v1beta1_collection_cluster_role_binding.go
- delete_rbac_authorization_v1beta1_collection_cluster_role_binding_parameters.go
- delete_rbac_authorization_v1beta1_collection_cluster_role_binding_responses.go
- delete_rbac_authorization_v1beta1_collection_cluster_role_parameters.go
- delete_rbac_authorization_v1beta1_collection_cluster_role_responses.go
- delete_rbac_authorization_v1beta1_collection_namespaced_role.go
- delete_rbac_authorization_v1beta1_collection_namespaced_role_binding.go
- delete_rbac_authorization_v1beta1_collection_namespaced_role_binding_parameters.go
- delete_rbac_authorization_v1beta1_collection_namespaced_role_binding_responses.go
- delete_rbac_authorization_v1beta1_collection_namespaced_role_parameters.go
- delete_rbac_authorization_v1beta1_collection_namespaced_role_responses.go
- delete_rbac_authorization_v1beta1_namespaced_role.go
- delete_rbac_authorization_v1beta1_namespaced_role_binding.go
- delete_rbac_authorization_v1beta1_namespaced_role_binding_parameters.go
- delete_rbac_authorization_v1beta1_namespaced_role_binding_responses.go
- delete_rbac_authorization_v1beta1_namespaced_role_parameters.go
- delete_rbac_authorization_v1beta1_namespaced_role_responses.go
- get_rbac_authorization_v1beta1_api_resources.go
- get_rbac_authorization_v1beta1_api_resources_parameters.go
- get_rbac_authorization_v1beta1_api_resources_responses.go
- list_rbac_authorization_v1beta1_cluster_role.go
- list_rbac_authorization_v1beta1_cluster_role_binding.go
- list_rbac_authorization_v1beta1_cluster_role_binding_parameters.go
- list_rbac_authorization_v1beta1_cluster_role_binding_responses.go
- list_rbac_authorization_v1beta1_cluster_role_parameters.go
- list_rbac_authorization_v1beta1_cluster_role_responses.go
- list_rbac_authorization_v1beta1_namespaced_role.go
- list_rbac_authorization_v1beta1_namespaced_role_binding.go
- list_rbac_authorization_v1beta1_namespaced_role_binding_parameters.go
- list_rbac_authorization_v1beta1_namespaced_role_binding_responses.go
- list_rbac_authorization_v1beta1_namespaced_role_parameters.go
- list_rbac_authorization_v1beta1_namespaced_role_responses.go
- list_rbac_authorization_v1beta1_role_binding_for_all_namespaces.go
- list_rbac_authorization_v1beta1_role_binding_for_all_namespaces_parameters.go
- list_rbac_authorization_v1beta1_role_binding_for_all_namespaces_responses.go
- list_rbac_authorization_v1beta1_role_for_all_namespaces.go
- list_rbac_authorization_v1beta1_role_for_all_namespaces_parameters.go
- list_rbac_authorization_v1beta1_role_for_all_namespaces_responses.go
- patch_rbac_authorization_v1beta1_cluster_role.go
- patch_rbac_authorization_v1beta1_cluster_role_binding.go
- patch_rbac_authorization_v1beta1_cluster_role_binding_parameters.go
- patch_rbac_authorization_v1beta1_cluster_role_binding_responses.go
- patch_rbac_authorization_v1beta1_cluster_role_parameters.go
- patch_rbac_authorization_v1beta1_cluster_role_responses.go
- patch_rbac_authorization_v1beta1_namespaced_role.go
- patch_rbac_authorization_v1beta1_namespaced_role_binding.go
- patch_rbac_authorization_v1beta1_namespaced_role_binding_parameters.go
- patch_rbac_authorization_v1beta1_namespaced_role_binding_responses.go
- patch_rbac_authorization_v1beta1_namespaced_role_parameters.go
- patch_rbac_authorization_v1beta1_namespaced_role_responses.go
- read_rbac_authorization_v1beta1_cluster_role.go
- read_rbac_authorization_v1beta1_cluster_role_binding.go
- read_rbac_authorization_v1beta1_cluster_role_binding_parameters.go
- read_rbac_authorization_v1beta1_cluster_role_binding_responses.go
- read_rbac_authorization_v1beta1_cluster_role_parameters.go
- read_rbac_authorization_v1beta1_cluster_role_responses.go
- read_rbac_authorization_v1beta1_namespaced_role.go
- read_rbac_authorization_v1beta1_namespaced_role_binding.go
- read_rbac_authorization_v1beta1_namespaced_role_binding_parameters.go
- read_rbac_authorization_v1beta1_namespaced_role_binding_responses.go
- read_rbac_authorization_v1beta1_namespaced_role_parameters.go
- read_rbac_authorization_v1beta1_namespaced_role_responses.go
- replace_rbac_authorization_v1beta1_cluster_role.go
- replace_rbac_authorization_v1beta1_cluster_role_binding.go
- replace_rbac_authorization_v1beta1_cluster_role_binding_parameters.go
- replace_rbac_authorization_v1beta1_cluster_role_binding_responses.go
- replace_rbac_authorization_v1beta1_cluster_role_parameters.go
- replace_rbac_authorization_v1beta1_cluster_role_responses.go
- replace_rbac_authorization_v1beta1_namespaced_role.go
- replace_rbac_authorization_v1beta1_namespaced_role_binding.go
- replace_rbac_authorization_v1beta1_namespaced_role_binding_parameters.go
- replace_rbac_authorization_v1beta1_namespaced_role_binding_responses.go
- replace_rbac_authorization_v1beta1_namespaced_role_parameters.go
- replace_rbac_authorization_v1beta1_namespaced_role_responses.go
- watch_rbac_authorization_v1beta1_cluster_role.go
- watch_rbac_authorization_v1beta1_cluster_role_binding.go
- watch_rbac_authorization_v1beta1_cluster_role_binding_list.go
- watch_rbac_authorization_v1beta1_cluster_role_binding_list_parameters.go
- watch_rbac_authorization_v1beta1_cluster_role_binding_list_responses.go
- watch_rbac_authorization_v1beta1_cluster_role_binding_parameters.go
- watch_rbac_authorization_v1beta1_cluster_role_binding_responses.go
- watch_rbac_authorization_v1beta1_cluster_role_list.go
- watch_rbac_authorization_v1beta1_cluster_role_list_parameters.go
- watch_rbac_authorization_v1beta1_cluster_role_list_responses.go
- watch_rbac_authorization_v1beta1_cluster_role_parameters.go
- watch_rbac_authorization_v1beta1_cluster_role_responses.go
- watch_rbac_authorization_v1beta1_namespaced_role.go
- watch_rbac_authorization_v1beta1_namespaced_role_binding.go
- watch_rbac_authorization_v1beta1_namespaced_role_binding_list.go
- watch_rbac_authorization_v1beta1_namespaced_role_binding_list_parameters.go
- watch_rbac_authorization_v1beta1_namespaced_role_binding_list_responses.go
- watch_rbac_authorization_v1beta1_namespaced_role_binding_parameters.go
- watch_rbac_authorization_v1beta1_namespaced_role_binding_responses.go
- watch_rbac_authorization_v1beta1_namespaced_role_list.go
- watch_rbac_authorization_v1beta1_namespaced_role_list_parameters.go
- watch_rbac_authorization_v1beta1_namespaced_role_list_responses.go
- watch_rbac_authorization_v1beta1_namespaced_role_parameters.go
- watch_rbac_authorization_v1beta1_namespaced_role_responses.go
- watch_rbac_authorization_v1beta1_role_binding_list_for_all_namespaces.go
- watch_rbac_authorization_v1beta1_role_binding_list_for_all_namespaces_parameters.go
- watch_rbac_authorization_v1beta1_role_binding_list_for_all_namespaces_responses.go
- watch_rbac_authorization_v1beta1_role_list_for_all_namespaces.go
- watch_rbac_authorization_v1beta1_role_list_for_all_namespaces_parameters.go
- watch_rbac_authorization_v1beta1_role_list_for_all_namespaces_responses.go