forked from openshift/client-go
-
Notifications
You must be signed in to change notification settings - Fork 0
/
fake_sharedsecret.go
163 lines (144 loc) · 6.77 KB
/
fake_sharedsecret.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
// Code generated by client-gen. DO NOT EDIT.
package fake
import (
"context"
json "encoding/json"
"fmt"
v1alpha1 "github.com/openshift/api/sharedresource/v1alpha1"
sharedresourcev1alpha1 "github.com/openshift/client-go/sharedresource/applyconfigurations/sharedresource/v1alpha1"
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
labels "k8s.io/apimachinery/pkg/labels"
schema "k8s.io/apimachinery/pkg/runtime/schema"
types "k8s.io/apimachinery/pkg/types"
watch "k8s.io/apimachinery/pkg/watch"
testing "k8s.io/client-go/testing"
)
// FakeSharedSecrets implements SharedSecretInterface
type FakeSharedSecrets struct {
Fake *FakeSharedresourceV1alpha1
}
var sharedsecretsResource = schema.GroupVersionResource{Group: "sharedresource.openshift.io", Version: "v1alpha1", Resource: "sharedsecrets"}
var sharedsecretsKind = schema.GroupVersionKind{Group: "sharedresource.openshift.io", Version: "v1alpha1", Kind: "SharedSecret"}
// Get takes name of the sharedSecret, and returns the corresponding sharedSecret object, and an error if there is any.
func (c *FakeSharedSecrets) Get(ctx context.Context, name string, options v1.GetOptions) (result *v1alpha1.SharedSecret, err error) {
obj, err := c.Fake.
Invokes(testing.NewRootGetAction(sharedsecretsResource, name), &v1alpha1.SharedSecret{})
if obj == nil {
return nil, err
}
return obj.(*v1alpha1.SharedSecret), err
}
// List takes label and field selectors, and returns the list of SharedSecrets that match those selectors.
func (c *FakeSharedSecrets) List(ctx context.Context, opts v1.ListOptions) (result *v1alpha1.SharedSecretList, err error) {
obj, err := c.Fake.
Invokes(testing.NewRootListAction(sharedsecretsResource, sharedsecretsKind, opts), &v1alpha1.SharedSecretList{})
if obj == nil {
return nil, err
}
label, _, _ := testing.ExtractFromListOptions(opts)
if label == nil {
label = labels.Everything()
}
list := &v1alpha1.SharedSecretList{ListMeta: obj.(*v1alpha1.SharedSecretList).ListMeta}
for _, item := range obj.(*v1alpha1.SharedSecretList).Items {
if label.Matches(labels.Set(item.Labels)) {
list.Items = append(list.Items, item)
}
}
return list, err
}
// Watch returns a watch.Interface that watches the requested sharedSecrets.
func (c *FakeSharedSecrets) Watch(ctx context.Context, opts v1.ListOptions) (watch.Interface, error) {
return c.Fake.
InvokesWatch(testing.NewRootWatchAction(sharedsecretsResource, opts))
}
// Create takes the representation of a sharedSecret and creates it. Returns the server's representation of the sharedSecret, and an error, if there is any.
func (c *FakeSharedSecrets) Create(ctx context.Context, sharedSecret *v1alpha1.SharedSecret, opts v1.CreateOptions) (result *v1alpha1.SharedSecret, err error) {
obj, err := c.Fake.
Invokes(testing.NewRootCreateAction(sharedsecretsResource, sharedSecret), &v1alpha1.SharedSecret{})
if obj == nil {
return nil, err
}
return obj.(*v1alpha1.SharedSecret), err
}
// Update takes the representation of a sharedSecret and updates it. Returns the server's representation of the sharedSecret, and an error, if there is any.
func (c *FakeSharedSecrets) Update(ctx context.Context, sharedSecret *v1alpha1.SharedSecret, opts v1.UpdateOptions) (result *v1alpha1.SharedSecret, err error) {
obj, err := c.Fake.
Invokes(testing.NewRootUpdateAction(sharedsecretsResource, sharedSecret), &v1alpha1.SharedSecret{})
if obj == nil {
return nil, err
}
return obj.(*v1alpha1.SharedSecret), err
}
// UpdateStatus was generated because the type contains a Status member.
// Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
func (c *FakeSharedSecrets) UpdateStatus(ctx context.Context, sharedSecret *v1alpha1.SharedSecret, opts v1.UpdateOptions) (*v1alpha1.SharedSecret, error) {
obj, err := c.Fake.
Invokes(testing.NewRootUpdateSubresourceAction(sharedsecretsResource, "status", sharedSecret), &v1alpha1.SharedSecret{})
if obj == nil {
return nil, err
}
return obj.(*v1alpha1.SharedSecret), err
}
// Delete takes name of the sharedSecret and deletes it. Returns an error if one occurs.
func (c *FakeSharedSecrets) Delete(ctx context.Context, name string, opts v1.DeleteOptions) error {
_, err := c.Fake.
Invokes(testing.NewRootDeleteActionWithOptions(sharedsecretsResource, name, opts), &v1alpha1.SharedSecret{})
return err
}
// DeleteCollection deletes a collection of objects.
func (c *FakeSharedSecrets) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {
action := testing.NewRootDeleteCollectionAction(sharedsecretsResource, listOpts)
_, err := c.Fake.Invokes(action, &v1alpha1.SharedSecretList{})
return err
}
// Patch applies the patch and returns the patched sharedSecret.
func (c *FakeSharedSecrets) Patch(ctx context.Context, name string, pt types.PatchType, data []byte, opts v1.PatchOptions, subresources ...string) (result *v1alpha1.SharedSecret, err error) {
obj, err := c.Fake.
Invokes(testing.NewRootPatchSubresourceAction(sharedsecretsResource, name, pt, data, subresources...), &v1alpha1.SharedSecret{})
if obj == nil {
return nil, err
}
return obj.(*v1alpha1.SharedSecret), err
}
// Apply takes the given apply declarative configuration, applies it and returns the applied sharedSecret.
func (c *FakeSharedSecrets) Apply(ctx context.Context, sharedSecret *sharedresourcev1alpha1.SharedSecretApplyConfiguration, opts v1.ApplyOptions) (result *v1alpha1.SharedSecret, err error) {
if sharedSecret == nil {
return nil, fmt.Errorf("sharedSecret provided to Apply must not be nil")
}
data, err := json.Marshal(sharedSecret)
if err != nil {
return nil, err
}
name := sharedSecret.Name
if name == nil {
return nil, fmt.Errorf("sharedSecret.Name must be provided to Apply")
}
obj, err := c.Fake.
Invokes(testing.NewRootPatchSubresourceAction(sharedsecretsResource, *name, types.ApplyPatchType, data), &v1alpha1.SharedSecret{})
if obj == nil {
return nil, err
}
return obj.(*v1alpha1.SharedSecret), err
}
// ApplyStatus was generated because the type contains a Status member.
// Add a +genclient:noStatus comment above the type to avoid generating ApplyStatus().
func (c *FakeSharedSecrets) ApplyStatus(ctx context.Context, sharedSecret *sharedresourcev1alpha1.SharedSecretApplyConfiguration, opts v1.ApplyOptions) (result *v1alpha1.SharedSecret, err error) {
if sharedSecret == nil {
return nil, fmt.Errorf("sharedSecret provided to Apply must not be nil")
}
data, err := json.Marshal(sharedSecret)
if err != nil {
return nil, err
}
name := sharedSecret.Name
if name == nil {
return nil, fmt.Errorf("sharedSecret.Name must be provided to Apply")
}
obj, err := c.Fake.
Invokes(testing.NewRootPatchSubresourceAction(sharedsecretsResource, *name, types.ApplyPatchType, data, "status"), &v1alpha1.SharedSecret{})
if obj == nil {
return nil, err
}
return obj.(*v1alpha1.SharedSecret), err
}