@@ -118,10 +118,10 @@ func OpenShiftKubeAPIServerConfigPatch(genericConfig *genericapiserver.Config, k
118
118
go openshiftAPIServiceReachabilityCheck .checkForConnection (context )
119
119
return nil
120
120
})
121
- // TODO: Should we skip this post start hook when external OIDC is enabled?
122
- // it seems like the worst case scenario is that this logs an error if a connection
123
- // is not able to happen and returns true. In theory could wrap the connection check with a pre-check
124
- // that just returns true if authentication type is OIDC.
121
+ // TODO: Should we skip this post start hook when external OIDC is enabled?
122
+ // it seems like the worst case scenario is that this logs an error if a connection
123
+ // is not able to happen and returns true. In theory could wrap the connection check with a pre-check
124
+ // that just returns true if authentication type is OIDC.
125
125
genericConfig .AddPostStartHookOrDie ("openshift.io-oauth-apiserver-reachable" , func (context genericapiserver.PostStartHookContext ) error {
126
126
go oauthAPIServiceReachabilityCheck .checkForConnection (context )
127
127
return nil
@@ -192,12 +192,15 @@ type kubeAPIServerInformers struct {
192
192
func (i * kubeAPIServerInformers ) getOpenshiftQuotaInformers () quotainformer.SharedInformerFactory {
193
193
return i .OpenshiftQuotaInformers
194
194
}
195
+
195
196
func (i * kubeAPIServerInformers ) getOpenshiftSecurityInformers () securityv1informer.SharedInformerFactory {
196
197
return i .OpenshiftSecurityInformers
197
198
}
199
+
198
200
func (i * kubeAPIServerInformers ) getOpenshiftUserInformers () userinformer.SharedInformerFactory {
199
201
return i .OpenshiftUserInformers
200
202
}
203
+
201
204
func (i * kubeAPIServerInformers ) getOpenshiftInfraInformers () configv1informer.SharedInformerFactory {
202
205
return i .OpenshiftConfigInformers
203
206
}
0 commit comments