k8s_openapi/v1_34/api/rbac/v1/
role_binding.rs1#[derive(Clone, Debug, Default, PartialEq)]
5pub struct RoleBinding {
6 pub metadata: crate::apimachinery::pkg::apis::meta::v1::ObjectMeta,
8
9 pub role_ref: crate::api::rbac::v1::RoleRef,
11
12 pub subjects: Option<std::vec::Vec<crate::api::rbac::v1::Subject>>,
14}
15
16impl crate::Resource for RoleBinding {
17 const API_VERSION: &'static str = "rbac.authorization.k8s.io/v1";
18 const GROUP: &'static str = "rbac.authorization.k8s.io";
19 const KIND: &'static str = "RoleBinding";
20 const VERSION: &'static str = "v1";
21 const URL_PATH_SEGMENT: &'static str = "rolebindings";
22 type Scope = crate::NamespaceResourceScope;
23}
24
25impl crate::ListableResource for RoleBinding {
26 const LIST_KIND: &'static str = "RoleBindingList";
27}
28
29impl crate::Metadata for RoleBinding {
30 type Ty = crate::apimachinery::pkg::apis::meta::v1::ObjectMeta;
31
32 fn metadata(&self) -> &<Self as crate::Metadata>::Ty {
33 &self.metadata
34 }
35
36 fn metadata_mut(&mut self) -> &mut<Self as crate::Metadata>::Ty {
37 &mut self.metadata
38 }
39}
40
41impl crate::DeepMerge for RoleBinding {
42 fn merge_from(&mut self, other: Self) {
43 crate::DeepMerge::merge_from(&mut self.metadata, other.metadata);
44 crate::DeepMerge::merge_from(&mut self.role_ref, other.role_ref);
45 crate::merge_strategies::list::atomic(&mut self.subjects, other.subjects);
46 }
47}
48
49impl<'de> crate::serde::Deserialize<'de> for RoleBinding {
50 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
51 #[allow(non_camel_case_types)]
52 enum Field {
53 Key_api_version,
54 Key_kind,
55 Key_metadata,
56 Key_role_ref,
57 Key_subjects,
58 Other,
59 }
60
61 impl<'de> crate::serde::Deserialize<'de> for Field {
62 fn deserialize<D>(deserializer: D) -> Result<Self, D::Error> where D: crate::serde::Deserializer<'de> {
63 struct Visitor;
64
65 impl crate::serde::de::Visitor<'_> for Visitor {
66 type Value = Field;
67
68 fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
69 f.write_str("field identifier")
70 }
71
72 fn visit_str<E>(self, v: &str) -> Result<Self::Value, E> where E: crate::serde::de::Error {
73 Ok(match v {
74 "apiVersion" => Field::Key_api_version,
75 "kind" => Field::Key_kind,
76 "metadata" => Field::Key_metadata,
77 "roleRef" => Field::Key_role_ref,
78 "subjects" => Field::Key_subjects,
79 _ => Field::Other,
80 })
81 }
82 }
83
84 deserializer.deserialize_identifier(Visitor)
85 }
86 }
87
88 struct Visitor;
89
90 impl<'de> crate::serde::de::Visitor<'de> for Visitor {
91 type Value = RoleBinding;
92
93 fn expecting(&self, f: &mut core::fmt::Formatter<'_>) -> core::fmt::Result {
94 f.write_str(<Self::Value as crate::Resource>::KIND)
95 }
96
97 fn visit_map<A>(self, mut map: A) -> Result<Self::Value, A::Error> where A: crate::serde::de::MapAccess<'de> {
98 let mut value_metadata: Option<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta> = None;
99 let mut value_role_ref: Option<crate::api::rbac::v1::RoleRef> = None;
100 let mut value_subjects: Option<std::vec::Vec<crate::api::rbac::v1::Subject>> = None;
101
102 while let Some(key) = crate::serde::de::MapAccess::next_key::<Field>(&mut map)? {
103 match key {
104 Field::Key_api_version => {
105 let value_api_version: std::string::String = crate::serde::de::MapAccess::next_value(&mut map)?;
106 if value_api_version != <Self::Value as crate::Resource>::API_VERSION {
107 return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_api_version), &<Self::Value as crate::Resource>::API_VERSION));
108 }
109 },
110 Field::Key_kind => {
111 let value_kind: std::string::String = crate::serde::de::MapAccess::next_value(&mut map)?;
112 if value_kind != <Self::Value as crate::Resource>::KIND {
113 return Err(crate::serde::de::Error::invalid_value(crate::serde::de::Unexpected::Str(&value_kind), &<Self::Value as crate::Resource>::KIND));
114 }
115 },
116 Field::Key_metadata => value_metadata = crate::serde::de::MapAccess::next_value(&mut map)?,
117 Field::Key_role_ref => value_role_ref = crate::serde::de::MapAccess::next_value(&mut map)?,
118 Field::Key_subjects => value_subjects = crate::serde::de::MapAccess::next_value(&mut map)?,
119 Field::Other => { let _: crate::serde::de::IgnoredAny = crate::serde::de::MapAccess::next_value(&mut map)?; },
120 }
121 }
122
123 Ok(RoleBinding {
124 metadata: value_metadata.unwrap_or_default(),
125 role_ref: value_role_ref.unwrap_or_default(),
126 subjects: value_subjects,
127 })
128 }
129 }
130
131 deserializer.deserialize_struct(
132 <Self as crate::Resource>::KIND,
133 &[
134 "apiVersion",
135 "kind",
136 "metadata",
137 "roleRef",
138 "subjects",
139 ],
140 Visitor,
141 )
142 }
143}
144
145impl crate::serde::Serialize for RoleBinding {
146 fn serialize<S>(&self, serializer: S) -> Result<S::Ok, S::Error> where S: crate::serde::Serializer {
147 let mut state = serializer.serialize_struct(
148 <Self as crate::Resource>::KIND,
149 4 +
150 self.subjects.as_ref().map_or(0, |_| 1),
151 )?;
152 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "apiVersion", <Self as crate::Resource>::API_VERSION)?;
153 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "kind", <Self as crate::Resource>::KIND)?;
154 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "metadata", &self.metadata)?;
155 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "roleRef", &self.role_ref)?;
156 if let Some(value) = &self.subjects {
157 crate::serde::ser::SerializeStruct::serialize_field(&mut state, "subjects", value)?;
158 }
159 crate::serde::ser::SerializeStruct::end(state)
160 }
161}
162
163#[cfg(feature = "schemars")]
164impl crate::schemars::JsonSchema for RoleBinding {
165 fn schema_name() -> std::borrow::Cow<'static, str> {
166 "io.k8s.api.rbac.v1.RoleBinding".into()
167 }
168
169 fn json_schema(__gen: &mut crate::schemars::SchemaGenerator) -> crate::schemars::Schema {
170 crate::schemars::json_schema!({
171 "description": "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.",
172 "type": "object",
173 "properties": {
174 "apiVersion": {
175 "description": "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources",
176 "type": "string",
177 },
178 "kind": {
179 "description": "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds",
180 "type": "string",
181 },
182 "metadata": ({
183 let mut schema_obj = __gen.subschema_for::<crate::apimachinery::pkg::apis::meta::v1::ObjectMeta>();
184 schema_obj.ensure_object().insert("description".into(), "Standard object's metadata.".into());
185 schema_obj
186 }),
187 "roleRef": ({
188 let mut schema_obj = __gen.subschema_for::<crate::api::rbac::v1::RoleRef>();
189 schema_obj.ensure_object().insert("description".into(), "RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.".into());
190 schema_obj
191 }),
192 "subjects": {
193 "description": "Subjects holds references to the objects the role applies to.",
194 "type": "array",
195 "items": (__gen.subschema_for::<crate::api::rbac::v1::Subject>()),
196 },
197 },
198 "required": [
199 "metadata",
200 "roleRef",
201 ],
202 })
203 }
204}