mirror of
https://gitea.com/Lydanne/buildx.git
synced 2025-07-10 13:37:08 +08:00
Bump buildkit to master and fix versions incompatible with go mod 1.13
Bump github.com/gogo/googleapis to v1.3.2 Bump github.com/docker/cli to master Signed-off-by: Silvin Lubecki <silvin.lubecki@docker.com>
This commit is contained in:
2
vendor/k8s.io/api/rbac/v1beta1/doc.go
generated
vendored
2
vendor/k8s.io/api/rbac/v1beta1/doc.go
generated
vendored
@ -15,7 +15,9 @@ limitations under the License.
|
||||
*/
|
||||
|
||||
// +k8s:deepcopy-gen=package
|
||||
// +k8s:protobuf-gen=package
|
||||
// +k8s:openapi-gen=true
|
||||
|
||||
// +groupName=rbac.authorization.k8s.io
|
||||
|
||||
package v1beta1 // import "k8s.io/api/rbac/v1beta1"
|
||||
|
1540
vendor/k8s.io/api/rbac/v1beta1/generated.pb.go
generated
vendored
1540
vendor/k8s.io/api/rbac/v1beta1/generated.pb.go
generated
vendored
File diff suppressed because it is too large
Load Diff
4
vendor/k8s.io/api/rbac/v1beta1/generated.proto
generated
vendored
4
vendor/k8s.io/api/rbac/v1beta1/generated.proto
generated
vendored
@ -21,11 +21,9 @@ syntax = 'proto2';
|
||||
|
||||
package k8s.io.api.rbac.v1beta1;
|
||||
|
||||
import "k8s.io/api/rbac/v1alpha1/generated.proto";
|
||||
import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto";
|
||||
import "k8s.io/apimachinery/pkg/runtime/generated.proto";
|
||||
import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto";
|
||||
import "k8s.io/apimachinery/pkg/util/intstr/generated.proto";
|
||||
|
||||
// Package-wide variables from generator "generated".
|
||||
option go_package = "v1beta1";
|
||||
@ -45,6 +43,7 @@ message ClusterRole {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
repeated PolicyRule rules = 2;
|
||||
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
@ -124,6 +123,7 @@ message Role {
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
repeated PolicyRule rules = 2;
|
||||
}
|
||||
|
||||
|
2
vendor/k8s.io/api/rbac/v1beta1/types.go
generated
vendored
2
vendor/k8s.io/api/rbac/v1beta1/types.go
generated
vendored
@ -109,6 +109,7 @@ type Role struct {
|
||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// Rules holds all the PolicyRules for this Role
|
||||
// +optional
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
}
|
||||
|
||||
@ -171,6 +172,7 @@ type ClusterRole struct {
|
||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// Rules holds all the PolicyRules for this ClusterRole
|
||||
// +optional
|
||||
Rules []PolicyRule `json:"rules" protobuf:"bytes,2,rep,name=rules"`
|
||||
// AggregationRule is an optional field that describes how to build the Rules for this ClusterRole.
|
||||
// If AggregationRule is set, then the Rules are controller managed and direct changes to Rules will be
|
||||
|
2
vendor/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go
generated
vendored
2
vendor/k8s.io/api/rbac/v1beta1/types_swagger_doc_generated.go
generated
vendored
@ -28,7 +28,7 @@ package v1beta1
|
||||
|
||||
// AUTO-GENERATED FUNCTIONS START HERE. DO NOT EDIT.
|
||||
var map_AggregationRule = map[string]string{
|
||||
"": "AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole",
|
||||
"": "AggregationRule describes how to locate ClusterRoles to aggregate into the ClusterRole",
|
||||
"clusterRoleSelectors": "ClusterRoleSelectors holds a list of selectors which will be used to find ClusterRoles and create the rules. If any of the selectors match, then the ClusterRole's permissions will be added",
|
||||
}
|
||||
|
||||
|
16
vendor/k8s.io/api/rbac/v1beta1/zz_generated.deepcopy.go
generated
vendored
16
vendor/k8s.io/api/rbac/v1beta1/zz_generated.deepcopy.go
generated
vendored
@ -62,12 +62,8 @@ func (in *ClusterRole) DeepCopyInto(out *ClusterRole) {
|
||||
}
|
||||
if in.AggregationRule != nil {
|
||||
in, out := &in.AggregationRule, &out.AggregationRule
|
||||
if *in == nil {
|
||||
*out = nil
|
||||
} else {
|
||||
*out = new(AggregationRule)
|
||||
(*in).DeepCopyInto(*out)
|
||||
}
|
||||
*out = new(AggregationRule)
|
||||
(*in).DeepCopyInto(*out)
|
||||
}
|
||||
return
|
||||
}
|
||||
@ -126,7 +122,7 @@ func (in *ClusterRoleBinding) DeepCopyObject() runtime.Object {
|
||||
func (in *ClusterRoleBindingList) DeepCopyInto(out *ClusterRoleBindingList) {
|
||||
*out = *in
|
||||
out.TypeMeta = in.TypeMeta
|
||||
out.ListMeta = in.ListMeta
|
||||
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||
if in.Items != nil {
|
||||
in, out := &in.Items, &out.Items
|
||||
*out = make([]ClusterRoleBinding, len(*in))
|
||||
@ -159,7 +155,7 @@ func (in *ClusterRoleBindingList) DeepCopyObject() runtime.Object {
|
||||
func (in *ClusterRoleList) DeepCopyInto(out *ClusterRoleList) {
|
||||
*out = *in
|
||||
out.TypeMeta = in.TypeMeta
|
||||
out.ListMeta = in.ListMeta
|
||||
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||
if in.Items != nil {
|
||||
in, out := &in.Items, &out.Items
|
||||
*out = make([]ClusterRole, len(*in))
|
||||
@ -298,7 +294,7 @@ func (in *RoleBinding) DeepCopyObject() runtime.Object {
|
||||
func (in *RoleBindingList) DeepCopyInto(out *RoleBindingList) {
|
||||
*out = *in
|
||||
out.TypeMeta = in.TypeMeta
|
||||
out.ListMeta = in.ListMeta
|
||||
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||
if in.Items != nil {
|
||||
in, out := &in.Items, &out.Items
|
||||
*out = make([]RoleBinding, len(*in))
|
||||
@ -331,7 +327,7 @@ func (in *RoleBindingList) DeepCopyObject() runtime.Object {
|
||||
func (in *RoleList) DeepCopyInto(out *RoleList) {
|
||||
*out = *in
|
||||
out.TypeMeta = in.TypeMeta
|
||||
out.ListMeta = in.ListMeta
|
||||
in.ListMeta.DeepCopyInto(&out.ListMeta)
|
||||
if in.Items != nil {
|
||||
in, out := &in.Items, &out.Items
|
||||
*out = make([]Role, len(*in))
|
||||
|
Reference in New Issue
Block a user