mirror of
https://gitea.com/Lydanne/buildx.git
synced 2025-07-09 21:17:09 +08:00
vendor: bump k8s dependencies to v0.29.2
Signed-off-by: CrazyMax <1951866+crazy-max@users.noreply.github.com>
This commit is contained in:
2
vendor/k8s.io/api/rbac/v1/generated.proto
generated
vendored
2
vendor/k8s.io/api/rbac/v1/generated.proto
generated
vendored
@ -66,6 +66,7 @@ message ClusterRoleBinding {
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
// If the RoleRef cannot be resolved, the Authorizer must return an error.
|
||||
// This field is immutable.
|
||||
optional RoleRef roleRef = 3;
|
||||
}
|
||||
|
||||
@ -140,6 +141,7 @@ message RoleBinding {
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
// If the RoleRef cannot be resolved, the Authorizer must return an error.
|
||||
// This field is immutable.
|
||||
optional RoleRef roleRef = 3;
|
||||
}
|
||||
|
||||
|
2
vendor/k8s.io/api/rbac/v1/types.go
generated
vendored
2
vendor/k8s.io/api/rbac/v1/types.go
generated
vendored
@ -132,6 +132,7 @@ type RoleBinding struct {
|
||||
|
||||
// RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace.
|
||||
// If the RoleRef cannot be resolved, the Authorizer must return an error.
|
||||
// This field is immutable.
|
||||
RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
|
||||
}
|
||||
|
||||
@ -209,6 +210,7 @@ type ClusterRoleBinding struct {
|
||||
|
||||
// RoleRef can only reference a ClusterRole in the global namespace.
|
||||
// If the RoleRef cannot be resolved, the Authorizer must return an error.
|
||||
// This field is immutable.
|
||||
RoleRef RoleRef `json:"roleRef" protobuf:"bytes,3,opt,name=roleRef"`
|
||||
}
|
||||
|
||||
|
6
vendor/k8s.io/api/rbac/v1/types_swagger_doc_generated.go
generated
vendored
6
vendor/k8s.io/api/rbac/v1/types_swagger_doc_generated.go
generated
vendored
@ -24,7 +24,7 @@ package v1
|
||||
// they are on one line! For multiple line or blocks that you want to ignore use ---.
|
||||
// Any context after a --- is ignored.
|
||||
//
|
||||
// Those methods can be generated by using hack/update-generated-swagger-docs.sh
|
||||
// Those methods can be generated by using hack/update-codegen.sh
|
||||
|
||||
// AUTO-GENERATED FUNCTIONS START HERE. DO NOT EDIT.
|
||||
var map_AggregationRule = map[string]string{
|
||||
@ -51,7 +51,7 @@ var map_ClusterRoleBinding = map[string]string{
|
||||
"": "ClusterRoleBinding references a ClusterRole, but not contain it. It can reference a ClusterRole in the global namespace, and adds who information via Subject.",
|
||||
"metadata": "Standard object's metadata.",
|
||||
"subjects": "Subjects holds references to the objects the role applies to.",
|
||||
"roleRef": "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.",
|
||||
"roleRef": "RoleRef can only reference a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.",
|
||||
}
|
||||
|
||||
func (ClusterRoleBinding) SwaggerDoc() map[string]string {
|
||||
@ -105,7 +105,7 @@ var map_RoleBinding = map[string]string{
|
||||
"": "RoleBinding references a role, but does not contain it. It can reference a Role in the same namespace or a ClusterRole in the global namespace. It adds who information via Subjects and namespace information by which namespace it exists in. RoleBindings in a given namespace only have effect in that namespace.",
|
||||
"metadata": "Standard object's metadata.",
|
||||
"subjects": "Subjects holds references to the objects the role applies to.",
|
||||
"roleRef": "RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error.",
|
||||
"roleRef": "RoleRef can reference a Role in the current namespace or a ClusterRole in the global namespace. If the RoleRef cannot be resolved, the Authorizer must return an error. This field is immutable.",
|
||||
}
|
||||
|
||||
func (RoleBinding) SwaggerDoc() map[string]string {
|
||||
|
2
vendor/k8s.io/api/rbac/v1alpha1/types_swagger_doc_generated.go
generated
vendored
2
vendor/k8s.io/api/rbac/v1alpha1/types_swagger_doc_generated.go
generated
vendored
@ -24,7 +24,7 @@ package v1alpha1
|
||||
// they are on one line! For multiple line or blocks that you want to ignore use ---.
|
||||
// Any context after a --- is ignored.
|
||||
//
|
||||
// Those methods can be generated by using hack/update-generated-swagger-docs.sh
|
||||
// Those methods can be generated by using hack/update-codegen.sh
|
||||
|
||||
// AUTO-GENERATED FUNCTIONS START HERE. DO NOT EDIT.
|
||||
var map_AggregationRule = map[string]string{
|
||||
|
2
vendor/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go
generated
vendored
2
vendor/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go
generated
vendored
@ -24,7 +24,7 @@ package v1beta1
|
||||
// they are on one line! For multiple line or blocks that you want to ignore use ---.
|
||||
// Any context after a --- is ignored.
|
||||
//
|
||||
// Those methods can be generated by using hack/update-generated-swagger-docs.sh
|
||||
// Those methods can be generated by using hack/update-codegen.sh
|
||||
|
||||
// AUTO-GENERATED FUNCTIONS START HERE. DO NOT EDIT.
|
||||
var map_AggregationRule = map[string]string{
|
||||
|
Reference in New Issue
Block a user