Skip to content

Commit 1fef218

Browse files
Merge pull request #18377 from deads2k/cli-18-priority
Automatic merge from submit-queue (batch tested with PRs 18390, 18389, 18290, 18377, 18385). UPSTREAM: <carry>: hack out the oapi for restmapping resources when m… …ore than one is present If there is more than one kind or resource for a value (the CLI uses this for deciding what to do about deploymentconfigs as a for instance), anything in that list that is an openshift resource (I've only listed one to prove the concept), will be removed. I think that referencing names from a file will still work since that should come back with one match. @juanvallejo can you see if files containing oapi resources still work. @soltysh @mfojtik @smarterclayton is this a thing we can live with? It will finally make the groupified resources have priority on the CLI. @DirectXMan12 I really wish this had not worked.
2 parents 84cbae1 + 422b026 commit 1fef218

File tree

5 files changed

+123
-4
lines changed

5 files changed

+123
-4
lines changed

pkg/oc/cli/describe/describer.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ func describerMap(clientConfig *rest.Config, kclient kclientset.Interface, host
127127
authorizationapi.Kind("ClusterRole"): &ClusterRoleDescriber{oauthorizationClient},
128128
authorizationapi.Kind("RoleBindingRestriction"): &RoleBindingRestrictionDescriber{oauthorizationClient},
129129
oauthapi.Kind("OAuthAccessToken"): &OAuthAccessTokenDescriber{oauthClient},
130-
authorizationapi.Kind("Identity"): &IdentityDescriber{userClient},
130+
userapi.Kind("Identity"): &IdentityDescriber{userClient},
131131
userapi.Kind("User"): &UserDescriber{userClient},
132132
userapi.Kind("Group"): &GroupDescriber{userClient},
133133
userapi.Kind("UserIdentityMapping"): &UserIdentityMappingDescriber{userClient},

test/cmd/admin.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ os::test::junit::declare_suite_start "cmd/admin/groups"
120120
os::cmd::expect_success_and_text 'oc adm groups new shortoutputgroup -o name' 'groups/shortoutputgroup'
121121
os::cmd::expect_failure_and_text 'oc adm groups new shortoutputgroup' 'groups.user.openshift.io "shortoutputgroup" already exists'
122122
os::cmd::expect_failure_and_text 'oc adm groups new errorgroup -o blah' 'error: output format "blah" not recognized'
123-
os::cmd::expect_failure_and_text 'oc get groups/errorgroup' 'groups "errorgroup" not found'
123+
os::cmd::expect_failure_and_text 'oc get groups/errorgroup' 'groups.user.openshift.io "errorgroup" not found'
124124
os::cmd::expect_success_and_text 'oc adm groups new group1 foo bar' 'group1.*foo, bar'
125125
os::cmd::expect_success_and_text 'oc get groups/group1 --no-headers' 'foo, bar'
126126
os::cmd::expect_success 'oc adm groups add-users group1 baz'

test/cmd/authentication.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,14 @@ listprojecttoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scope
5353
# this token doesn't have rights to see any projects even though it can hit the list endpoint, so an empty list is correct
5454
# we'll add another scope that allows listing all known projects even if this token has no other powers in them.
5555
os::cmd::expect_success_and_not_text "oc get projects --token='${listprojecttoken}'" "${project}"
56-
os::cmd::expect_failure_and_text "oc get user/~ --token='${listprojecttoken}'" 'prevent this action; User "scoped-user" cannot get users at the cluster scope'
56+
os::cmd::expect_failure_and_text "oc get user/~ --token='${listprojecttoken}'" 'prevent this action; User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
5757
os::cmd::expect_failure_and_text "oc get pods --token='${listprojecttoken}' -n '${project}'" "prevent this action; User \"scoped-user\" cannot list pods in project \"${project}\""
5858

5959
listprojecttoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=listallprojects SCOPE=user:list-projects USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')"
6060
os::cmd::expect_success_and_text "oc get projects --token='${listprojecttoken}'" "${project}"
6161

6262
adminnonescalatingpowerstoken="$(oc process -f "${OS_ROOT}/test/testdata/authentication/scoped-token-template.yaml" TOKEN_PREFIX=admin SCOPE=role:admin:* USER_NAME="${username}" USER_UID="${useruid}" | oc create -f - -o name | awk -F/ '{print $2}')"
63-
os::cmd::expect_failure_and_text "oc get user/~ --token='${adminnonescalatingpowerstoken}'" 'prevent this action; User "scoped-user" cannot get users at the cluster scope'
63+
os::cmd::expect_failure_and_text "oc get user/~ --token='${adminnonescalatingpowerstoken}'" 'prevent this action; User "scoped-user" cannot get users.user.openshift.io at the cluster scope'
6464
os::cmd::expect_failure_and_text "oc get secrets --token='${adminnonescalatingpowerstoken}' -n '${project}'" "prevent this action; User \"scoped-user\" cannot list secrets in project \"${project}\""
6565
os::cmd::expect_success_and_text "oc get 'projects/${project}' --token='${adminnonescalatingpowerstoken}' -n '${project}'" "${project}"
6666

vendor/k8s.io/kubernetes/staging/src/k8s.io/apimachinery/pkg/api/meta/patch_priority.go

+93
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

vendor/k8s.io/kubernetes/staging/src/k8s.io/apimachinery/pkg/api/meta/priority.go

+26
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)