@@ -40,13 +40,13 @@ func DefaultTemplate() *templateapi.Template {
40
40
oapi .OpenShiftDisplayName : "${" + ProjectDisplayNameParam + "}" ,
41
41
projectapi .ProjectRequester : "${" + ProjectRequesterParam + "}" ,
42
42
}
43
- if err := templateapi .AddObjectsToTemplate (ret , []runtime.Object {project }, projectapiv1 .SchemeGroupVersion ); err != nil {
43
+ if err := templateapi .AddObjectsToTemplate (ret , []runtime.Object {project }, projectapiv1 .LegacySchemeGroupVersion ); err != nil {
44
44
panic (err )
45
45
}
46
46
47
47
serviceAccountRoleBindings := bootstrappolicy .GetBootstrapServiceAccountProjectRoleBindings (ns )
48
48
for i := range serviceAccountRoleBindings {
49
- if err := templateapi .AddObjectsToTemplate (ret , []runtime.Object {& serviceAccountRoleBindings [i ]}, authorizationapiv1 .SchemeGroupVersion ); err != nil {
49
+ if err := templateapi .AddObjectsToTemplate (ret , []runtime.Object {& serviceAccountRoleBindings [i ]}, authorizationapiv1 .LegacySchemeGroupVersion ); err != nil {
50
50
panic (err )
51
51
}
52
52
}
@@ -56,7 +56,7 @@ func DefaultTemplate() *templateapi.Template {
56
56
binding .Namespace = ns
57
57
binding .Subjects = []kapi.ObjectReference {{Kind : authorizationapi .UserKind , Name : "${" + ProjectAdminUserParam + "}" }}
58
58
binding .RoleRef .Name = bootstrappolicy .AdminRoleName
59
- if err := templateapi .AddObjectsToTemplate (ret , []runtime.Object {binding }, authorizationapiv1 .SchemeGroupVersion ); err != nil {
59
+ if err := templateapi .AddObjectsToTemplate (ret , []runtime.Object {binding }, authorizationapiv1 .LegacySchemeGroupVersion ); err != nil {
60
60
// this should never happen because we're tightly controlling what goes in.
61
61
panic (err )
62
62
}
0 commit comments