forked from openshift/origin
-
Notifications
You must be signed in to change notification settings - Fork 0
/
register.go
61 lines (49 loc) · 1.7 KB
/
register.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
package config
import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apimachinery/pkg/runtime/serializer"
)
var Scheme = runtime.NewScheme()
var Codecs = serializer.NewCodecFactory(Scheme)
const GroupName = ""
// SchemeGroupVersion is group version used to register these objects
var SchemeGroupVersion = schema.GroupVersion{Group: GroupName, Version: runtime.APIVersionInternal}
// Kind takes an unqualified kind and returns back a Group qualified GroupKind
func Kind(kind string) schema.GroupKind {
return SchemeGroupVersion.WithKind(kind).GroupKind()
}
// Resource takes an unqualified resource and returns back a Group qualified GroupResource
func Resource(resource string) schema.GroupResource {
return SchemeGroupVersion.WithResource(resource).GroupResource()
}
var (
SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes)
AddToScheme = SchemeBuilder.AddToScheme
)
// Adds the list of known types to api.Scheme.
func addKnownTypes(scheme *runtime.Scheme) error {
if err := scheme.AddIgnoredConversionType(&metav1.TypeMeta{}, &metav1.TypeMeta{}); err != nil {
return err
}
scheme.AddKnownTypes(SchemeGroupVersion,
&MasterConfig{},
&NodeConfig{},
&SessionSecrets{},
&BasicAuthPasswordIdentityProvider{},
&AllowAllPasswordIdentityProvider{},
&DenyAllPasswordIdentityProvider{},
&HTPasswdPasswordIdentityProvider{},
&LDAPPasswordIdentityProvider{},
&KeystonePasswordIdentityProvider{},
&RequestHeaderIdentityProvider{},
&GitHubIdentityProvider{},
&GitLabIdentityProvider{},
&GoogleIdentityProvider{},
&OpenIDIdentityProvider{},
&LDAPSyncConfig{},
&DefaultAdmissionConfig{},
)
return nil
}