kubernetes/staging/src/k8s.io/client-go/plugin/pkg/client/auth/exec/exec.go

const execInfoEnv

const installHintVerboseHelp

var scheme

var codecs

func init() {}

var globalCache

var apiVersions

func newCache() *cache {}

func cacheKey(conf *api.ExecConfig, cluster *clientauthentication.Cluster) string {}

type cache

func (c *cache) get(s string) (*Authenticator, bool) {}

// put inserts an authenticator into the cache. If an authenticator is already
// associated with the key, the first one is returned instead.
func (c *cache) put(s string, a *Authenticator) *Authenticator {}

type sometimes

func (s *sometimes) Do(f func()) {}

// GetAuthenticator returns an exec-based plugin for providing client credentials.
func GetAuthenticator(config *api.ExecConfig, cluster *clientauthentication.Cluster) (*Authenticator, error) {}

func newAuthenticator(c *cache, isTerminalFunc func(int) bool, config *api.ExecConfig, cluster *clientauthentication.Cluster) (*Authenticator, error) {}

func isInteractive(isTerminalFunc func(int) bool, config *api.ExecConfig) (bool, error) {}

type Authenticator

type credentials

// UpdateTransportConfig updates the transport.Config to use credentials
// returned by the plugin.
func (a *Authenticator) UpdateTransportConfig(c *transport.Config) error {}

var _

type roundTripper

func (r *roundTripper) WrappedRoundTripper() http.RoundTripper {}

func (r *roundTripper) RoundTrip(req *http.Request) (*http.Response, error) {}

func (a *Authenticator) credsExpired() bool {}

func (a *Authenticator) cert() (*tls.Certificate, error) {}

func (a *Authenticator) getCreds() (*credentials, error) {}

// maybeRefreshCreds executes the plugin to force a rotation of the
// credentials, unless they were rotated already.
func (a *Authenticator) maybeRefreshCreds(creds *credentials) error {}

// refreshCredsLocked executes the plugin and reads the credentials from
// stdout. It must be called while holding the Authenticator's mutex.
func (a *Authenticator) refreshCredsLocked() error {}

// wrapCmdRunErrorLocked pulls out the code to construct a helpful error message
// for when the exec plugin's binary fails to Run().
//
// It must be called while holding the Authenticator's mutex.
func (a *Authenticator) wrapCmdRunErrorLocked(err error) error {}