k8s_openapi/v1_34/api/rbac/v1/
cluster_role_binding.rs

1// Generated from definition io.k8s.api.rbac.v1.ClusterRoleBinding
2
3/// ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.
4#[derive(Clone, Debug, Default, PartialEq)]
5pub struct ClusterRoleBinding {
6    /// Standard object's metadata.
7    pub metadata: crate::apimachinery::pkg::apis::meta::v1::ObjectMeta,
8
9    /// RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.
10    pub role_ref: crate::api::rbac::v1::RoleRef,
11
12    /// Subjects holds references to the objects the role applies to.
13    pub subjects: Option<std::vec::Vec<crate::api::rbac::v1::Subject>>,
14}
15
16impl crate::Resource for ClusterRoleBinding {
17    const API_VERSION: &'static str = "rbac.authorization.k8s.io/v1";
18    const GROUP: &'static str = "rbac.authorization.k8s.io";
19    const KIND: &'static str = "ClusterRoleBinding";
20    const VERSION: &'static str = "v1";
21    const URL_PATH_SEGMENT: &'static str = "clusterrolebindings";
22    type Scope = crate::ClusterResourceScope;
23}
24
25impl crate::ListableResource for ClusterRoleBinding {
26    const LIST_KIND: &'static str = "ClusterRoleBindingList";
27}
28
29impl crate::Metadata for ClusterRoleBinding {
30    type Ty = crate::apimachinery::pkg::apis::meta::v1::ObjectMeta;
31
32    fn metadata(&self) -> &<Self as crate::Metadata>::Ty {
33        &self.metadata
34    }
35
36    fn metadata_mut(&mut self) -> &mut<Self as crate::Metadata>::Ty {
37        &mut self.metadata
38    }
39}
40
41impl crate::DeepMerge for ClusterRoleBinding {
42    fn merge_from(&mut self, other: Self) {
43        crate::DeepMerge::merge_from(&mut self.metadata, other.metadata);
44        crate::DeepMerge::merge_from(&mut self.role_ref, other.role_ref);
45        crate::merge_strategies::list::atomic(&mut self.subjects, other.subjects);
46    }
47}
48
49impl<'de> crate::serde::Deserialize<'de> for ClusterRoleBinding {
50    fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
51        #[allow(non_camel_case_types)]
52        enum Field {
53            Key_api_version,
54            Key_kind,
55            Key_metadata,
56            Key_role_ref,
57            Key_subjects,
58            Other,
59        }
60
61        impl<'de> crate::serde::Deserialize<'de> for Field {
62            fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
63                struct Visitor;
64
65                impl crate::serde::de::Visitor<'_> for Visitor {
66                    type Value = Field;
67
68                    fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
69                        f.write_str("field identifier")
70                    }
71
72                    fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
73                        Ok(match v {
74                            "apiVersion" => Field::Key_api_version,
75                            "kind" => Field::Key_kind,
76                            "metadata" => Field::Key_metadata,
77                            "roleRef" => Field::Key_role_ref,
78                            "subjects" => Field::Key_subjects,
79                            _ => Field::Other,
80                        })
81                    }
82                }
83
84                deserializer.deserialize_identifier(Visitor)
85            }
86        }
87
88        struct Visitor;
89
90        impl<'de> crate::serde::de::Visitor<'de> for Visitor {
91            type Value = ClusterRoleBinding;
92
93            fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
94                f.write_str(<Self::Value as crate::Resource>::KIND)
95            }
96
97            fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
98                let mut value_metadata: Option<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta> = None;
99                let mut value_role_ref: Option<crate::api::rbac::v1::RoleRef> = None;
100                let mut value_subjects: Option<std::vec::Vec<crate::api::rbac::v1::Subject>> = None;
101
102                while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
103                    match key {
104                        Field::Key_api_version => {
105                            let value_api_version: std::string::String = crate::serde::de::MapAccess::next_value(&mut map)?;
106                            if value_api_version != <Self::Value as crate::Resource>::API_VERSION {
107                                return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_api_version), &<Self::Value as crate::Resource>::API_VERSION));
108                            }
109                        },
110                        Field::Key_kind => {
111                            let value_kind: std::string::String = crate::serde::de::MapAccess::next_value(&mut map)?;
112                            if value_kind != <Self::Value as crate::Resource>::KIND {
113                                return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_kind), &<Self::Value as crate::Resource>::KIND));
114                            }
115                        },
116                        Field::Key_metadata => value_metadata = crate::serde::de::MapAccess::next_value(&mut map)?,
117                        Field::Key_role_ref => value_role_ref = crate::serde::de::MapAccess::next_value(&mut map)?,
118                        Field::Key_subjects => value_subjects = crate::serde::de::MapAccess::next_value(&mut map)?,
119                        Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
120                    }
121                }
122
123                Ok(ClusterRoleBinding {
124                    metadata: value_metadata.unwrap_or_default(),
125                    role_ref: value_role_ref.unwrap_or_default(),
126                    subjects: value_subjects,
127                })
128            }
129        }
130
131        deserializer.deserialize_struct(
132            <Self as crate::Resource>::KIND,
133            &[
134                "apiVersion",
135                "kind",
136                "metadata",
137                "roleRef",
138                "subjects",
139            ],
140            Visitor,
141        )
142    }
143}
144
145impl crate::serde::Serialize for ClusterRoleBinding {
146    fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
147        let mut state = serializer.serialize_struct(
148            <Self as crate::Resource>::KIND,
149            4 +
150            self.subjects.as_ref().map_or(0, |_| 1),
151        )?;
152        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "apiVersion", <Self as crate::Resource>::API_VERSION)?;
153        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "kind", <Self as crate::Resource>::KIND)?;
154        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "metadata", &self.metadata)?;
155        crate::serde::ser::SerializeStruct::serialize_field(&mut state, "roleRef", &self.role_ref)?;
156        if let Some(value) = &self.subjects {
157            crate::serde::ser::SerializeStruct::serialize_field(&mut state, "subjects", value)?;
158        }
159        crate::serde::ser::SerializeStruct::end(state)
160    }
161}
162
163#[cfg(feature = "schemars")]
164impl crate::schemars::JsonSchema for ClusterRoleBinding {
165    fn schema_name() -> std::borrow::Cow<'static, str> {
166        "io.k8s.api.rbac.v1.ClusterRoleBinding".into()
167    }
168
169    fn json_schema(__gen: &mut crate::schemars::SchemaGenerator) -> crate::schemars::Schema {
170        crate::schemars::json_schema!({
171            "description": "ClusterRoleBinding references a ClusterRole, but not contain it.  It can reference a ClusterRole in the global namespace, and adds who information via Subject.",
172            "type": "object",
173            "properties": {
174                "apiVersion": {
175                    "description": "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources",
176                    "type": "string",
177                },
178                "kind": {
179                    "description": "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds",
180                    "type": "string",
181                },
182                "metadata": ({
183                    let mut schema_obj = __gen.subschema_for::<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta>();
184                    schema_obj.ensure_object().insert("description".into(), "Standard object's metadata.".into());
185                    schema_obj
186                }),
187                "roleRef": ({
188                    let mut schema_obj = __gen.subschema_for::<crate::api::rbac::v1::RoleRef>();
189                    schema_obj.ensure_object().insert("description".into(), "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.".into());
190                    schema_obj
191                }),
192                "subjects": {
193                    "description": "Subjects holds references to the objects the role applies to.",
194                    "type": "array",
195                    "items": (__gen.subschema_for::<crate::api::rbac::v1::Subject>()),
196                },
197            },
198            "required": [
199                "metadata",
200                "roleRef",
201            ],
202        })
203    }
204}