Skip to content

Commit 517bb93

Browse files
committed
add affirmative output to oc policy / oadm policy
This patch adds affirmative output to commands that modify cluster and local roles for users and groups. **Examples** ``` $ oadm policy remove-cluster-role-from-group self-provisioner system:authenticated:oauth system:authenticated Successfully removed the "self-provisioner" cluster role from groups ["system:authenticated:oauth" "system:authenticated"]. $ oadm policy add-cluster-role-to-group self-provisioner system:authenticated:oauth Successfully added the "self-provisioner" cluster role to group "system:authenticated:oauth". $ oc policy add-role-to-user cluster-admin testuser Successfully added the "cluster-admin" role to user "testuser". $ oc policy remove-role-from-user cluster-admin testuser Successfully removed the "cluster-admin" role from user "testuser". ```
1 parent 1180f16 commit 517bb93

File tree

2 files changed

+54
-11
lines changed

2 files changed

+54
-11
lines changed

pkg/cmd/admin/policy/modify_roles.go

+43
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ type RoleModificationOptions struct {
4343
RoleName string
4444
RoleBindingAccessor RoleBindingAccessor
4545

46+
Targets []string
4647
Users []string
4748
Groups []string
4849
Subjects []kapi.ObjectReference
@@ -63,7 +64,10 @@ func NewCmdAddRoleToGroup(name, fullName string, f *clientcmd.Factory, out io.Wr
6364

6465
if err := options.AddRole(); err != nil {
6566
kcmdutil.CheckErr(err)
67+
return
6668
}
69+
printSuccessForCommand(options.RoleName, true, "group", options.Targets, true, out)
70+
6771
},
6872
}
6973

@@ -89,7 +93,9 @@ func NewCmdAddRoleToUser(name, fullName string, f *clientcmd.Factory, out io.Wri
8993

9094
if err := options.AddRole(); err != nil {
9195
kcmdutil.CheckErr(err)
96+
return
9297
}
98+
printSuccessForCommand(options.RoleName, true, "user", options.Targets, true, out)
9399
},
94100
}
95101

@@ -114,7 +120,9 @@ func NewCmdRemoveRoleFromGroup(name, fullName string, f *clientcmd.Factory, out
114120

115121
if err := options.RemoveRole(); err != nil {
116122
kcmdutil.CheckErr(err)
123+
return
117124
}
125+
printSuccessForCommand(options.RoleName, false, "group", options.Targets, true, out)
118126
},
119127
}
120128

@@ -139,7 +147,9 @@ func NewCmdRemoveRoleFromUser(name, fullName string, f *clientcmd.Factory, out i
139147

140148
if err := options.RemoveRole(); err != nil {
141149
kcmdutil.CheckErr(err)
150+
return
142151
}
152+
printSuccessForCommand(options.RoleName, false, "user", options.Targets, true, out)
143153
},
144154
}
145155

@@ -164,7 +174,9 @@ func NewCmdAddClusterRoleToGroup(name, fullName string, f *clientcmd.Factory, ou
164174

165175
if err := options.AddRole(); err != nil {
166176
kcmdutil.CheckErr(err)
177+
return
167178
}
179+
printSuccessForCommand(options.RoleName, true, "group", options.Targets, false, out)
168180
},
169181
}
170182

@@ -186,7 +198,9 @@ func NewCmdAddClusterRoleToUser(name, fullName string, f *clientcmd.Factory, out
186198

187199
if err := options.AddRole(); err != nil {
188200
kcmdutil.CheckErr(err)
201+
return
189202
}
203+
printSuccessForCommand(options.RoleName, true, "user", options.Targets, false, out)
190204
},
191205
}
192206

@@ -208,7 +222,9 @@ func NewCmdRemoveClusterRoleFromGroup(name, fullName string, f *clientcmd.Factor
208222

209223
if err := options.RemoveRole(); err != nil {
210224
kcmdutil.CheckErr(err)
225+
return
211226
}
227+
printSuccessForCommand(options.RoleName, false, "group", options.Targets, false, out)
212228
},
213229
}
214230

@@ -230,7 +246,9 @@ func NewCmdRemoveClusterRoleFromUser(name, fullName string, f *clientcmd.Factory
230246

231247
if err := options.RemoveRole(); err != nil {
232248
kcmdutil.CheckErr(err)
249+
return
233250
}
251+
printSuccessForCommand(options.RoleName, false, "user", options.Targets, false, out)
234252
},
235253
}
236254

@@ -247,6 +265,8 @@ func (o *RoleModificationOptions) CompleteUserWithSA(f *clientcmd.Factory, args
247265
o.Users = append(o.Users, args[1:]...)
248266
}
249267

268+
o.Targets = o.Users
269+
250270
if (len(o.Users) == 0) && (len(saNames) == 0) {
251271
return errors.New("you must specify at least one user or service account")
252272
}
@@ -263,6 +283,7 @@ func (o *RoleModificationOptions) CompleteUserWithSA(f *clientcmd.Factory, args
263283
o.RoleBindingAccessor = NewLocalRoleBindingAccessor(roleBindingNamespace, osClient)
264284

265285
for _, sa := range saNames {
286+
o.Targets = append(o.Targets, sa)
266287
o.Subjects = append(o.Subjects, kapi.ObjectReference{Namespace: roleBindingNamespace, Name: sa, Kind: "ServiceAccount"})
267288
}
268289

@@ -277,6 +298,8 @@ func (o *RoleModificationOptions) Complete(f *clientcmd.Factory, args []string,
277298
o.RoleName = args[0]
278299
*target = append(*target, args[1:]...)
279300

301+
o.Targets = *target
302+
280303
osClient, _, _, err := f.Clients()
281304
if err != nil {
282305
return err
@@ -396,3 +419,23 @@ existingLoop:
396419

397420
return newSubjects
398421
}
422+
423+
// prints affirmative output for role modification commands
424+
func printSuccessForCommand(role string, didAdd bool, targetName string, targets []string, isNamespaced bool, out io.Writer) {
425+
verb := "removed"
426+
clusterScope := "cluster "
427+
allTargets := fmt.Sprintf("%q", targets)
428+
if isNamespaced {
429+
clusterScope = ""
430+
}
431+
if len(targets) > 1 {
432+
targetName = fmt.Sprintf("%ss", targetName)
433+
} else if len(targets) == 1 {
434+
allTargets = fmt.Sprintf("%q", targets[0])
435+
}
436+
if didAdd {
437+
verb = "added"
438+
}
439+
440+
fmt.Fprintf(out, "%srole %q %s: %s\n", clusterScope, role, verb, allTargets)
441+
}

test/cmd/policy.sh

+11-11
Original file line numberDiff line numberDiff line change
@@ -30,28 +30,28 @@ os::cmd::expect_failure_and_text 'oc policy add-role-to-user' 'you must specify
3030
os::cmd::expect_failure_and_text 'oc policy add-role-to-user -z NamespaceWithoutRole' 'you must specify a role'
3131
os::cmd::expect_failure_and_text 'oc policy add-role-to-user view' 'you must specify at least one user or service account'
3232

33-
os::cmd::expect_success 'oc policy add-role-to-group cluster-admin system:unauthenticated'
34-
os::cmd::expect_success 'oc policy add-role-to-user cluster-admin system:no-user'
33+
os::cmd::expect_success_and_text 'oc policy add-role-to-group cluster-admin system:unauthenticated' 'role "cluster-admin" added: "system:unauthenticated"'
34+
os::cmd::expect_success_and_text 'oc policy add-role-to-user cluster-admin system:no-user' 'role "cluster-admin" added: "system:no-user"'
3535
os::cmd::expect_success 'oc get rolebinding/cluster-admin --no-headers'
3636
os::cmd::expect_success_and_text 'oc get rolebinding/cluster-admin --no-headers' 'system:no-user'
3737

38-
os::cmd::expect_success 'oc policy add-role-to-user cluster-admin -z=one,two --serviceaccount=three,four'
38+
os::cmd::expect_success_and_text 'oc policy add-role-to-user cluster-admin -z=one,two --serviceaccount=three,four' 'role "cluster-admin" added: \["one" "two" "three" "four"\]'
3939
os::cmd::expect_success 'oc get rolebinding/cluster-admin --no-headers'
4040
os::cmd::expect_success_and_text 'oc get rolebinding/cluster-admin --no-headers' 'one'
4141
os::cmd::expect_success_and_text 'oc get rolebinding/cluster-admin --no-headers' 'four'
4242

43-
os::cmd::expect_success 'oc policy remove-role-from-group cluster-admin system:unauthenticated'
43+
os::cmd::expect_success_and_text 'oc policy remove-role-from-group cluster-admin system:unauthenticated' 'role "cluster-admin" removed: "system:unauthenticated"'
4444

45-
os::cmd::expect_success 'oc policy remove-role-from-user cluster-admin system:no-user'
46-
os::cmd::expect_success 'oc policy remove-role-from-user cluster-admin -z=one,two --serviceaccount=three,four'
45+
os::cmd::expect_success_and_text 'oc policy remove-role-from-user cluster-admin system:no-user' 'role "cluster-admin" removed: "system:no-user"'
46+
os::cmd::expect_success_and_text 'oc policy remove-role-from-user cluster-admin -z=one,two --serviceaccount=three,four' 'role "cluster-admin" removed: \["one" "two" "three" "four"\]'
4747
os::cmd::expect_success 'oc get rolebinding/cluster-admin --no-headers'
4848
os::cmd::expect_success_and_not_text 'oc get rolebinding/cluster-admin --no-headers' 'four'
4949

5050
os::cmd::expect_success 'oc policy remove-group system:unauthenticated'
5151
os::cmd::expect_success 'oc policy remove-user system:no-user'
5252

5353

54-
os::cmd::expect_success 'oc policy add-role-to-user admin namespaced-user'
54+
os::cmd::expect_success_and_text 'oc policy add-role-to-user admin namespaced-user' 'role "admin" added: "namespaced-user"'
5555
# Ensure the user has create permissions on builds, but that build strategy permissions are granted through the authenticated users group
5656
os::cmd::try_until_text 'oadm policy who-can create builds' 'namespaced-user'
5757
os::cmd::expect_success_and_not_text 'oadm policy who-can create builds/docker' 'namespaced-user'
@@ -62,9 +62,9 @@ os::cmd::expect_success_and_text 'oadm policy who-can create builds/docker'
6262
os::cmd::expect_success_and_text 'oadm policy who-can create builds/source' 'system:authenticated'
6363
os::cmd::expect_success_and_text 'oadm policy who-can create builds/jenkinspipeline' 'system:authenticated'
6464
# if this method for removing access to docker/custom/source/jenkinspipeline builds changes, docs need to be updated as well
65-
os::cmd::expect_success 'oadm policy remove-cluster-role-from-group system:build-strategy-docker system:authenticated'
66-
os::cmd::expect_success 'oadm policy remove-cluster-role-from-group system:build-strategy-source system:authenticated'
67-
os::cmd::expect_success 'oadm policy remove-cluster-role-from-group system:build-strategy-jenkinspipeline system:authenticated'
65+
os::cmd::expect_success_and_text 'oadm policy remove-cluster-role-from-group system:build-strategy-docker system:authenticated' 'cluster role "system:build-strategy-docker" removed: "system:authenticated"'
66+
os::cmd::expect_success_and_text 'oadm policy remove-cluster-role-from-group system:build-strategy-source system:authenticated' 'cluster role "system:build-strategy-source" removed: "system:authenticated"'
67+
os::cmd::expect_success_and_text 'oadm policy remove-cluster-role-from-group system:build-strategy-jenkinspipeline system:authenticated' 'cluster role "system:build-strategy-jenkinspipeline" removed: "system:authenticated"'
6868
# ensure build strategy permissions no longer exist
6969
os::cmd::try_until_failure 'oadm policy who-can create builds/source | grep system:authenticated'
7070
os::cmd::expect_success_and_not_text 'oadm policy who-can create builds/docker' 'system:authenticated'
@@ -73,7 +73,7 @@ os::cmd::expect_success_and_not_text 'oadm policy who-can create builds/jenkinsp
7373

7474
# ensure system:authenticated users can not create custom builds by default, but can if explicitly granted access
7575
os::cmd::expect_success_and_not_text 'oadm policy who-can create builds/custom' 'system:authenticated'
76-
os::cmd::expect_success 'oadm policy add-cluster-role-to-group system:build-strategy-custom system:authenticated'
76+
os::cmd::expect_success_and_text 'oadm policy add-cluster-role-to-group system:build-strategy-custom system:authenticated' 'cluster role "system:build-strategy-custom" added: "system:authenticated"'
7777
os::cmd::expect_success_and_text 'oadm policy who-can create builds/custom' 'system:authenticated'
7878

7979
os::cmd::expect_success 'oadm policy reconcile-cluster-role-bindings --confirm'

0 commit comments

Comments
 (0)