v1sets

package
v0.3.1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Nov 8, 2024 License: Apache-2.0 Imports: 5 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type ClusterRoleBindingSet

type ClusterRoleBindingSet interface {
	// Get the set stored keys
	Keys() sets.String
	// List of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	List(filterResource ...func(*rbac_authorization_k8s_io_v1.ClusterRoleBinding) bool) []*rbac_authorization_k8s_io_v1.ClusterRoleBinding
	// Unsorted list of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	UnsortedList(filterResource ...func(*rbac_authorization_k8s_io_v1.ClusterRoleBinding) bool) []*rbac_authorization_k8s_io_v1.ClusterRoleBinding
	// Return the Set as a map of key to resource.
	Map() map[string]*rbac_authorization_k8s_io_v1.ClusterRoleBinding
	// Insert a resource into the set.
	Insert(clusterRoleBinding ...*rbac_authorization_k8s_io_v1.ClusterRoleBinding)
	// Compare the equality of the keys in two sets (not the resources themselves)
	Equal(clusterRoleBindingSet ClusterRoleBindingSet) bool
	// Check if the set contains a key matching the resource (not the resource itself)
	Has(clusterRoleBinding ezkube.ResourceId) bool
	// Delete the key matching the resource
	Delete(clusterRoleBinding ezkube.ResourceId)
	// Return the union with the provided set
	Union(set ClusterRoleBindingSet) ClusterRoleBindingSet
	// Return the difference with the provided set
	Difference(set ClusterRoleBindingSet) ClusterRoleBindingSet
	// Return the intersection with the provided set
	Intersection(set ClusterRoleBindingSet) ClusterRoleBindingSet
	// Find the resource with the given ID
	Find(id ezkube.ResourceId) (*rbac_authorization_k8s_io_v1.ClusterRoleBinding, error)
	// Get the length of the set
	Length() int
	// returns the generic implementation of the set
	Generic() sksets.ResourceSet
	// returns the delta between this and and another ClusterRoleBindingSet
	Delta(newSet ClusterRoleBindingSet) sksets.ResourceDelta
	// Create a deep copy of the current ClusterRoleBindingSet
	Clone() ClusterRoleBindingSet
}

func NewClusterRoleBindingSet

func NewClusterRoleBindingSet(clusterRoleBindingList ...*rbac_authorization_k8s_io_v1.ClusterRoleBinding) ClusterRoleBindingSet

func NewClusterRoleBindingSetFromList

func NewClusterRoleBindingSetFromList(clusterRoleBindingList *rbac_authorization_k8s_io_v1.ClusterRoleBindingList) ClusterRoleBindingSet

type ClusterRoleSet

type ClusterRoleSet interface {
	// Get the set stored keys
	Keys() sets.String
	// List of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	List(filterResource ...func(*rbac_authorization_k8s_io_v1.ClusterRole) bool) []*rbac_authorization_k8s_io_v1.ClusterRole
	// Unsorted list of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	UnsortedList(filterResource ...func(*rbac_authorization_k8s_io_v1.ClusterRole) bool) []*rbac_authorization_k8s_io_v1.ClusterRole
	// Return the Set as a map of key to resource.
	Map() map[string]*rbac_authorization_k8s_io_v1.ClusterRole
	// Insert a resource into the set.
	Insert(clusterRole ...*rbac_authorization_k8s_io_v1.ClusterRole)
	// Compare the equality of the keys in two sets (not the resources themselves)
	Equal(clusterRoleSet ClusterRoleSet) bool
	// Check if the set contains a key matching the resource (not the resource itself)
	Has(clusterRole ezkube.ResourceId) bool
	// Delete the key matching the resource
	Delete(clusterRole ezkube.ResourceId)
	// Return the union with the provided set
	Union(set ClusterRoleSet) ClusterRoleSet
	// Return the difference with the provided set
	Difference(set ClusterRoleSet) ClusterRoleSet
	// Return the intersection with the provided set
	Intersection(set ClusterRoleSet) ClusterRoleSet
	// Find the resource with the given ID
	Find(id ezkube.ResourceId) (*rbac_authorization_k8s_io_v1.ClusterRole, error)
	// Get the length of the set
	Length() int
	// returns the generic implementation of the set
	Generic() sksets.ResourceSet
	// returns the delta between this and and another ClusterRoleSet
	Delta(newSet ClusterRoleSet) sksets.ResourceDelta
	// Create a deep copy of the current ClusterRoleSet
	Clone() ClusterRoleSet
}

func NewClusterRoleSet

func NewClusterRoleSet(clusterRoleList ...*rbac_authorization_k8s_io_v1.ClusterRole) ClusterRoleSet

func NewClusterRoleSetFromList

func NewClusterRoleSetFromList(clusterRoleList *rbac_authorization_k8s_io_v1.ClusterRoleList) ClusterRoleSet

type RoleBindingSet

type RoleBindingSet interface {
	// Get the set stored keys
	Keys() sets.String
	// List of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	List(filterResource ...func(*rbac_authorization_k8s_io_v1.RoleBinding) bool) []*rbac_authorization_k8s_io_v1.RoleBinding
	// Unsorted list of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	UnsortedList(filterResource ...func(*rbac_authorization_k8s_io_v1.RoleBinding) bool) []*rbac_authorization_k8s_io_v1.RoleBinding
	// Return the Set as a map of key to resource.
	Map() map[string]*rbac_authorization_k8s_io_v1.RoleBinding
	// Insert a resource into the set.
	Insert(roleBinding ...*rbac_authorization_k8s_io_v1.RoleBinding)
	// Compare the equality of the keys in two sets (not the resources themselves)
	Equal(roleBindingSet RoleBindingSet) bool
	// Check if the set contains a key matching the resource (not the resource itself)
	Has(roleBinding ezkube.ResourceId) bool
	// Delete the key matching the resource
	Delete(roleBinding ezkube.ResourceId)
	// Return the union with the provided set
	Union(set RoleBindingSet) RoleBindingSet
	// Return the difference with the provided set
	Difference(set RoleBindingSet) RoleBindingSet
	// Return the intersection with the provided set
	Intersection(set RoleBindingSet) RoleBindingSet
	// Find the resource with the given ID
	Find(id ezkube.ResourceId) (*rbac_authorization_k8s_io_v1.RoleBinding, error)
	// Get the length of the set
	Length() int
	// returns the generic implementation of the set
	Generic() sksets.ResourceSet
	// returns the delta between this and and another RoleBindingSet
	Delta(newSet RoleBindingSet) sksets.ResourceDelta
	// Create a deep copy of the current RoleBindingSet
	Clone() RoleBindingSet
}

func NewRoleBindingSet

func NewRoleBindingSet(roleBindingList ...*rbac_authorization_k8s_io_v1.RoleBinding) RoleBindingSet

func NewRoleBindingSetFromList

func NewRoleBindingSetFromList(roleBindingList *rbac_authorization_k8s_io_v1.RoleBindingList) RoleBindingSet

type RoleSet

type RoleSet interface {
	// Get the set stored keys
	Keys() sets.String
	// List of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	List(filterResource ...func(*rbac_authorization_k8s_io_v1.Role) bool) []*rbac_authorization_k8s_io_v1.Role
	// Unsorted list of resources stored in the set. Pass an optional filter function to filter on the list.
	// The filter function should return false to keep the resource, true to drop it.
	UnsortedList(filterResource ...func(*rbac_authorization_k8s_io_v1.Role) bool) []*rbac_authorization_k8s_io_v1.Role
	// Return the Set as a map of key to resource.
	Map() map[string]*rbac_authorization_k8s_io_v1.Role
	// Insert a resource into the set.
	Insert(role ...*rbac_authorization_k8s_io_v1.Role)
	// Compare the equality of the keys in two sets (not the resources themselves)
	Equal(roleSet RoleSet) bool
	// Check if the set contains a key matching the resource (not the resource itself)
	Has(role ezkube.ResourceId) bool
	// Delete the key matching the resource
	Delete(role ezkube.ResourceId)
	// Return the union with the provided set
	Union(set RoleSet) RoleSet
	// Return the difference with the provided set
	Difference(set RoleSet) RoleSet
	// Return the intersection with the provided set
	Intersection(set RoleSet) RoleSet
	// Find the resource with the given ID
	Find(id ezkube.ResourceId) (*rbac_authorization_k8s_io_v1.Role, error)
	// Get the length of the set
	Length() int
	// returns the generic implementation of the set
	Generic() sksets.ResourceSet
	// returns the delta between this and and another RoleSet
	Delta(newSet RoleSet) sksets.ResourceDelta
	// Create a deep copy of the current RoleSet
	Clone() RoleSet
}

func NewRoleSet

func NewRoleSet(roleList ...*rbac_authorization_k8s_io_v1.Role) RoleSet

func NewRoleSetFromList

func NewRoleSetFromList(roleList *rbac_authorization_k8s_io_v1.RoleList) RoleSet

Directories

Path Synopsis
Package mock_v1sets is a generated GoMock package.
Package mock_v1sets is a generated GoMock package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL