@@ -23,7 +23,7 @@ import (
23
23
userinformer "github.com/openshift/client-go/user/informers/externalversions"
24
24
"github.com/openshift/library-go/pkg/apiserver/admission/admissionrestconfig"
25
25
"github.com/openshift/library-go/pkg/config/helpers"
26
- "k8s.io/kubernetes/openshift-kube-apiserver/admission/authorization/apis/restrictusers/v1alpha1"
26
+ restrictusersv1alpha1 "k8s.io/kubernetes/openshift-kube-apiserver/admission/authorization/apis/restrictusers/v1alpha1"
27
27
"k8s.io/kubernetes/openshift-kube-apiserver/admission/authorization/restrictusers/usercache"
28
28
)
29
29
@@ -39,30 +39,30 @@ func pluginForConfig(config io.Reader) (admission.Interface, error) {
39
39
return nil , err
40
40
}
41
41
42
- if cfg != nil && cfg .OpenShiftOAuthDesiredState == v1alpha1 .OpenShiftOAuthStateNotDesired {
42
+ if cfg != nil && cfg .OpenShiftOAuthDesiredState == restrictusersv1alpha1 .OpenShiftOAuthStateNotDesired {
43
43
klog .Infof ("Admission plugin %q configured to expect the OpenShift oauth-apiserver as not being available. This is effectively the same as disabling the plugin, so it will be disabled." , RestrictSubjectBindingsPluginName )
44
44
return nil , nil
45
45
}
46
46
47
47
return NewRestrictUsersAdmission ()
48
48
}
49
49
50
- func readConfig (reader io.Reader ) (* v1alpha1 .RestrictSubjectBindingsAdmissionConfig , error ) {
51
- obj , err := helpers .ReadYAMLToInternal (reader , v1alpha1 .Install )
50
+ func readConfig (reader io.Reader ) (* restrictusersv1alpha1 .RestrictSubjectBindingsAdmissionConfig , error ) {
51
+ obj , err := helpers .ReadYAMLToInternal (reader , restrictusersv1alpha1 .Install )
52
52
if err != nil {
53
53
return nil , err
54
54
}
55
55
if obj == nil {
56
56
return nil , nil
57
57
}
58
- config , ok := obj .(* v1alpha1 .RestrictSubjectBindingsAdmissionConfig )
58
+ config , ok := obj .(* restrictusersv1alpha1 .RestrictSubjectBindingsAdmissionConfig )
59
59
if ! ok {
60
60
return nil , fmt .Errorf ("unexpected config object: %#v" , obj )
61
61
}
62
62
63
63
// validate config
64
64
switch config .OpenShiftOAuthDesiredState {
65
- case v1alpha1 .OpenShiftOAuthStateDesired , v1alpha1 .OpenShiftOAuthStateNotDesired :
65
+ case restrictusersv1alpha1 .OpenShiftOAuthStateDesired , restrictusersv1alpha1 .OpenShiftOAuthStateNotDesired :
66
66
// valid, do nothing
67
67
default :
68
68
return nil , fmt .Errorf ("config is invalid, openshiftOAuthDesiredState must be one of Desired,NotDesired but was %s" , config .OpenShiftOAuthDesiredState )
97
97
98
98
// NewRestrictUsersAdmission configures an admission plugin that enforces
99
99
// restrictions on adding role bindings in a project.
100
- func NewRestrictUsersAdmission () (admission.Interface , error ) {
101
- return & restrictUsersAdmission {
102
- Handler : admission .NewHandler (admission .Create , admission .Update ),
103
- }, nil
104
- }
105
-
100
+ func NewRestrictUsersAdmission () (admission.Interface , error )
106
101
func (q * restrictUsersAdmission ) SetExternalKubeClientSet (c kubernetes.Interface ) {
107
102
q .kubeClient = c
108
103
}
0 commit comments