Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 80bdf3f

Browse files
committedApr 13, 2018
stop shimming the upstream factory inputs
1 parent c6b766f commit 80bdf3f

18 files changed

+336
-157
lines changed
 

‎pkg/oc/cli/cli.go

+4
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ import (
1212
kubecmd "k8s.io/kubernetes/pkg/kubectl/cmd"
1313
ktemplates "k8s.io/kubernetes/pkg/kubectl/cmd/templates"
1414
kcmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
15+
"k8s.io/kubernetes/pkg/kubectl/resource"
1516

1617
"github.com/openshift/origin/pkg/cmd/flagtypes"
1718
"github.com/openshift/origin/pkg/cmd/templates"
@@ -315,6 +316,9 @@ func CommandFor(basename string) *cobra.Command {
315316
case "kubectl":
316317
cmd = kubecmd.NewKubectlCommand(kcmdutil.NewFactory(nil), in, out, errout)
317318
default:
319+
// we only need this change for `oc`. `kubectl` should behave as close to `kubectl` as we can
320+
resource.OAPIToGroupified = OAPIToGroupified
321+
kcmdutil.OAPIToGroupifiedGVK = OAPIToGroupifiedGVK
318322
cmd = NewCommandCLI("oc", "oc", in, out, errout)
319323
}
320324

‎pkg/oc/cli/cmd/version.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ func (o *VersionOptions) Complete(cmd *cobra.Command, f *clientcmd.Factory, out
7575
o.Clients = f.ClientSet
7676
var err error
7777
o.ClientConfig, err = f.ClientConfig()
78-
if err != nil && !clientcmd.IsConfigurationMissing(err) {
78+
if err != nil && !kclientcmd.IsEmptyConfig(err) {
7979
return err
8080
}
8181

‎pkg/oc/cli/groupification.go

+190
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,190 @@
1+
package cli
2+
3+
import (
4+
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
5+
"k8s.io/apimachinery/pkg/runtime"
6+
"k8s.io/apimachinery/pkg/runtime/schema"
7+
8+
appsv1 "github.com/openshift/api/apps/v1"
9+
authorizationv1 "github.com/openshift/api/authorization/v1"
10+
buildv1 "github.com/openshift/api/build/v1"
11+
imagev1 "github.com/openshift/api/image/v1"
12+
networkv1 "github.com/openshift/api/network/v1"
13+
oauthv1 "github.com/openshift/api/oauth/v1"
14+
projectv1 "github.com/openshift/api/project/v1"
15+
quotav1 "github.com/openshift/api/quota/v1"
16+
routev1 "github.com/openshift/api/route/v1"
17+
securityv1 "github.com/openshift/api/security/v1"
18+
templatev1 "github.com/openshift/api/template/v1"
19+
userv1 "github.com/openshift/api/user/v1"
20+
"github.com/openshift/origin/pkg/apps/apis/apps"
21+
"github.com/openshift/origin/pkg/authorization/apis/authorization"
22+
"github.com/openshift/origin/pkg/build/apis/build"
23+
"github.com/openshift/origin/pkg/image/apis/image"
24+
"github.com/openshift/origin/pkg/network/apis/network"
25+
"github.com/openshift/origin/pkg/oauth/apis/oauth"
26+
"github.com/openshift/origin/pkg/project/apis/project"
27+
"github.com/openshift/origin/pkg/quota/apis/quota"
28+
"github.com/openshift/origin/pkg/route/apis/route"
29+
"github.com/openshift/origin/pkg/security/apis/security"
30+
"github.com/openshift/origin/pkg/template/apis/template"
31+
"github.com/openshift/origin/pkg/user/apis/user"
32+
)
33+
34+
func OAPIToGroupifiedGVK(gvk *schema.GroupVersionKind) {
35+
if len(gvk.Group) > 0 {
36+
return
37+
}
38+
39+
newGroup, ok := oapiKindsToGroup[gvk.Kind]
40+
if !ok {
41+
return
42+
}
43+
gvk.Group = newGroup
44+
}
45+
46+
func OAPIToGroupified(uncast runtime.Object, gvk *schema.GroupVersionKind) {
47+
if len(gvk.Group) > 0 {
48+
return
49+
}
50+
51+
switch obj := uncast.(type) {
52+
case *unstructured.Unstructured:
53+
newGroup := fixOAPIGroupKindInTopLevelUnstructured(obj.Object)
54+
if len(newGroup) > 0 {
55+
gvk.Group = newGroup
56+
}
57+
case *unstructured.UnstructuredList:
58+
newGroup := fixOAPIGroupKindInTopLevelUnstructured(obj.Object)
59+
if len(newGroup) > 0 {
60+
gvk.Group = newGroup
61+
}
62+
63+
case *apps.DeploymentConfig, *appsv1.DeploymentConfig, *apps.DeploymentConfigList, *appsv1.DeploymentConfigList,
64+
*apps.DeploymentConfigRollback, *appsv1.DeploymentConfigRollback:
65+
gvk.Group = apps.GroupName
66+
67+
case *authorization.ClusterRoleBinding, *authorizationv1.ClusterRoleBinding, *authorization.ClusterRoleBindingList, *authorizationv1.ClusterRoleBindingList,
68+
*authorization.ClusterRole, *authorizationv1.ClusterRole, *authorization.ClusterRoleList, *authorizationv1.ClusterRoleList,
69+
*authorization.Role, *authorizationv1.Role, *authorization.RoleList, *authorizationv1.RoleList,
70+
*authorization.RoleBinding, *authorizationv1.RoleBinding, *authorization.RoleBindingList, *authorizationv1.RoleBindingList,
71+
*authorization.RoleBindingRestriction, *authorizationv1.RoleBindingRestriction, *authorization.RoleBindingRestrictionList, *authorizationv1.RoleBindingRestrictionList:
72+
gvk.Group = authorization.GroupName
73+
74+
case *build.BuildConfig, *buildv1.BuildConfig, *build.BuildConfigList, *buildv1.BuildConfigList,
75+
*build.Build, *buildv1.Build, *build.BuildList, *buildv1.BuildList:
76+
gvk.Group = build.GroupName
77+
78+
case *image.Image, *imagev1.Image, *image.ImageList, *imagev1.ImageList,
79+
*image.ImageSignature, *imagev1.ImageSignature,
80+
*image.ImageStreamImage, *imagev1.ImageStreamImage,
81+
*image.ImageStreamImport, *imagev1.ImageStreamImport,
82+
*image.ImageStreamMapping, *imagev1.ImageStreamMapping,
83+
*image.ImageStream, *imagev1.ImageStream, *image.ImageStreamList, *imagev1.ImageStreamList,
84+
*image.ImageStreamTag, *imagev1.ImageStreamTag:
85+
gvk.Group = image.GroupName
86+
87+
case *network.ClusterNetwork, *networkv1.ClusterNetwork, *network.ClusterNetworkList, *networkv1.ClusterNetworkList,
88+
*network.NetNamespace, *networkv1.NetNamespace, *network.NetNamespaceList, *networkv1.NetNamespaceList,
89+
*network.HostSubnet, *networkv1.HostSubnet, *network.HostSubnetList, *networkv1.HostSubnetList,
90+
*network.EgressNetworkPolicy, *networkv1.EgressNetworkPolicy, *network.EgressNetworkPolicyList, *networkv1.EgressNetworkPolicyList:
91+
gvk.Group = network.GroupName
92+
93+
case *project.Project, *projectv1.Project, *project.ProjectList, *projectv1.ProjectList,
94+
*project.ProjectRequest, *projectv1.ProjectRequest:
95+
gvk.Group = project.GroupName
96+
97+
case *quota.ClusterResourceQuota, *quotav1.ClusterResourceQuota, *quota.ClusterResourceQuotaList, *quotav1.ClusterResourceQuotaList:
98+
gvk.Group = quota.GroupName
99+
100+
case *oauth.OAuthAuthorizeToken, *oauthv1.OAuthAuthorizeToken, *oauth.OAuthAuthorizeTokenList, *oauthv1.OAuthAuthorizeTokenList,
101+
*oauth.OAuthClientAuthorization, *oauthv1.OAuthClientAuthorization, *oauth.OAuthClientAuthorizationList, *oauthv1.OAuthClientAuthorizationList,
102+
*oauth.OAuthClient, *oauthv1.OAuthClient, *oauth.OAuthClientList, *oauthv1.OAuthClientList,
103+
*oauth.OAuthAccessToken, *oauthv1.OAuthAccessToken, *oauth.OAuthAccessTokenList, *oauthv1.OAuthAccessTokenList:
104+
gvk.Group = oauth.GroupName
105+
106+
case *route.Route, *routev1.Route, *route.RouteList, *routev1.RouteList:
107+
gvk.Group = route.GroupName
108+
109+
case *security.SecurityContextConstraints, *securityv1.SecurityContextConstraints, *security.SecurityContextConstraintsList, *securityv1.SecurityContextConstraintsList:
110+
gvk.Group = security.GroupName
111+
112+
case *template.Template, *templatev1.Template, *template.TemplateList, *templatev1.TemplateList:
113+
gvk.Group = template.GroupName
114+
115+
case *user.Group, *userv1.Group, *user.GroupList, *userv1.GroupList,
116+
*user.Identity, *userv1.Identity, *user.IdentityList, *userv1.IdentityList,
117+
*user.UserIdentityMapping, *userv1.UserIdentityMapping,
118+
*user.User, *userv1.User, *user.UserList, *userv1.UserList:
119+
gvk.Group = user.GroupName
120+
121+
}
122+
}
123+
124+
var oapiKindsToGroup = map[string]string{
125+
"DeploymentConfigRollback": "apps.openshift.io",
126+
"DeploymentConfig": "apps.openshift.io", "DeploymentConfigList": "apps.openshift.io",
127+
"ClusterRoleBinding": "authorization.openshift.io", "ClusterRoleBindingList": "authorization.openshift.io",
128+
"ClusterRole": "authorization.openshift.io", "ClusterRoleList": "authorization.openshift.io",
129+
"RoleBindingRestriction": "authorization.openshift.io", "RoleBindingRestrictionList": "authorization.openshift.io",
130+
"RoleBinding": "authorization.openshift.io", "RoleBindingList": "authorization.openshift.io",
131+
"Role": "authorization.openshift.io", "RoleList": "authorization.openshift.io",
132+
"BuildConfig": "build.openshift.io", "BuildConfigList": "build.openshift.io",
133+
"Build": "build.openshift.io", "BuildList": "build.openshift.io",
134+
"Image": "image.openshift.io", "ImageList": "image.openshift.io",
135+
"ImageSignature": "image.openshift.io",
136+
"ImageStreamImage": "image.openshift.io",
137+
"ImageStreamImport": "image.openshift.io",
138+
"ImageStreamMapping": "image.openshift.io",
139+
"ImageStream": "image.openshift.io", "ImageStreamList": "image.openshift.io",
140+
"ImageStreamTag": "image.openshift.io", "ImageStreamTagList": "image.openshift.io",
141+
"ClusterNetwork": "network.openshift.io", "ClusterNetworkList": "network.openshift.io",
142+
"EgressNetworkPolicy": "network.openshift.io", "EgressNetworkPolicyList": "network.openshift.io",
143+
"HostSubnet": "network.openshift.io", "HostSubnetList": "network.openshift.io",
144+
"NetNamespace": "network.openshift.io", "NetNamespaceList": "network.openshift.io",
145+
"OAuthAccessToken": "oauth.openshift.io", "OAuthAccessTokenList": "oauth.openshift.io",
146+
"OAuthAuthorizeToken": "oauth.openshift.io", "OAuthAuthorizeTokenList": "oauth.openshift.io",
147+
"OAuthClientAuthorization": "oauth.openshift.io", "OAuthClientAuthorizationList": "oauth.openshift.io",
148+
"OAuthClient": "oauth.openshift.io", "OAuthClientList": "oauth.openshift.io",
149+
"Project": "project.openshift.io", "ProjectList": "project.openshift.io",
150+
"ProjectRequest": "project.openshift.io",
151+
"ClusterResourceQuota": "quota.openshift.io", "ClusterResourceQuotaList": "quota.openshift.io",
152+
"Route": "route.openshift.io", "RouteList": "route.openshift.io",
153+
"SecurityContextConstraint": "security.openshift.io", "SecurityContextConstraintList": "security.openshift.io",
154+
"Template": "template.openshift.io", "TemplateList": "template.openshift.io",
155+
"Group": "user.openshift.io", "GroupList": "user.openshift.io",
156+
"Identity": "user.openshift.io", "IdentityList": "user.openshift.io",
157+
"UserIdentityMapping": "user.openshift.io",
158+
"User": "user.openshift.io", "UserList": "user.openshift.io",
159+
}
160+
161+
func fixOAPIGroupKindInTopLevelUnstructured(obj map[string]interface{}) string {
162+
kind, ok := obj["kind"]
163+
if !ok {
164+
return ""
165+
}
166+
kindStr, ok := kind.(string)
167+
if !ok {
168+
return ""
169+
}
170+
newGroup, ok := oapiKindsToGroup[kindStr]
171+
if !ok {
172+
return ""
173+
}
174+
175+
apiVersion, ok := obj["apiVersion"]
176+
if !ok {
177+
return newGroup
178+
}
179+
apiVersionStr, ok := apiVersion.(string)
180+
if !ok {
181+
return newGroup
182+
}
183+
184+
if apiVersionStr != "v1" {
185+
return newGroup
186+
}
187+
obj["apiVersion"] = newGroup + "/v1"
188+
189+
return newGroup
190+
}

‎pkg/oc/cli/util/clientcmd/factory_client_access.go

+6-63
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,10 @@ package clientcmd
22

33
import (
44
"errors"
5-
"net/http"
65
"path/filepath"
76
"regexp"
87
"strconv"
98
"strings"
10-
"time"
119

1210
"github.com/spf13/cobra"
1311
"github.com/spf13/pflag"
@@ -21,13 +19,11 @@ import (
2119
restclient "k8s.io/client-go/rest"
2220
kclientcmd "k8s.io/client-go/tools/clientcmd"
2321
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
24-
"k8s.io/client-go/util/homedir"
2522
kapi "k8s.io/kubernetes/pkg/apis/core"
2623
kclientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
2724
"k8s.io/kubernetes/pkg/kubectl"
2825
kcmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
2926
"k8s.io/kubernetes/pkg/kubectl/resource"
30-
"k8s.io/kubernetes/pkg/kubectl/util/transport"
3127

3228
appsapiv1 "github.com/openshift/api/apps/v1"
3329
appsapi "github.com/openshift/origin/pkg/apps/apis/apps"
@@ -37,7 +33,6 @@ import (
3733
)
3834

3935
type ring0Factory struct {
40-
clientConfig kclientcmd.ClientConfig
4136
imageResolutionOptions FlagBinder
4237
kubeClientAccessFactory kcmdutil.ClientAccessFactory
4338
}
@@ -53,70 +48,14 @@ func NewClientAccessFactory(optionalClientConfig kclientcmd.ClientConfig) Client
5348
kclientcmd.UseOpenShiftKubeConfigValues = true
5449
kclientcmd.ErrEmptyConfig = kclientcmd.NewErrConfigurationMissing()
5550

56-
flags := pflag.NewFlagSet("", pflag.ContinueOnError)
57-
clientConfig := optionalClientConfig
58-
if optionalClientConfig == nil {
59-
clientConfig = kcmdutil.DefaultClientConfig(flags)
60-
}
6151
factory := &ring0Factory{
62-
clientConfig: clientConfig,
6352
imageResolutionOptions: &imageResolutionOptions{},
6453
}
65-
factory.kubeClientAccessFactory = kcmdutil.NewClientAccessFactoryFromDiscovery(
66-
flags,
67-
clientConfig,
68-
&discoveryFactory{clientConfig: clientConfig},
69-
)
54+
factory.kubeClientAccessFactory = kcmdutil.NewClientAccessFactory(optionalClientConfig)
7055

7156
return factory
7257
}
7358

74-
type discoveryFactory struct {
75-
clientConfig kclientcmd.ClientConfig
76-
cacheDir string
77-
}
78-
79-
func (f *discoveryFactory) BindFlags(flags *pflag.FlagSet) {
80-
defaultCacheDir := filepath.Join(homedir.HomeDir(), ".kube", "http-cache")
81-
flags.StringVar(&f.cacheDir, kcmdutil.FlagHTTPCacheDir, defaultCacheDir, "Default HTTP cache directory")
82-
}
83-
84-
func (f *discoveryFactory) DiscoveryClient() (discovery.CachedDiscoveryInterface, error) {
85-
// Output using whatever version was negotiated in the client cache. The
86-
// version we decode with may not be the same as what the server requires.
87-
cfg, err := f.clientConfig.ClientConfig()
88-
if err != nil {
89-
return nil, err
90-
}
91-
// given 25 groups with one-ish version each, discovery needs to make 50 requests
92-
// double it just so we don't end up here again for a while. This config is only used for discovery.
93-
cfg.Burst = 100
94-
95-
if f.cacheDir != "" {
96-
wt := cfg.WrapTransport
97-
cfg.WrapTransport = func(rt http.RoundTripper) http.RoundTripper {
98-
if wt != nil {
99-
rt = wt(rt)
100-
}
101-
return transport.NewCacheRoundTripper(f.cacheDir, rt)
102-
}
103-
}
104-
105-
// at this point we've negotiated and can get the client
106-
kubeClient, err := kclientset.NewForConfig(cfg)
107-
if err != nil {
108-
return nil, err
109-
110-
}
111-
112-
cacheDir := computeDiscoverCacheDir(filepath.Join(homedir.HomeDir(), ".kube", "cache", "discovery"), cfg.Host)
113-
return kcmdutil.NewCachedDiscoveryClient(newLegacyDiscoveryClient(kubeClient.Discovery().RESTClient()), cacheDir, time.Duration(10*time.Minute)), nil
114-
}
115-
116-
func (f *ring0Factory) RawConfig() (clientcmdapi.Config, error) {
117-
return f.kubeClientAccessFactory.RawConfig()
118-
}
119-
12059
func (f *ring0Factory) DiscoveryClient() (discovery.CachedDiscoveryInterface, error) {
12160
return f.kubeClientAccessFactory.DiscoveryClient()
12261
}
@@ -133,8 +72,12 @@ func (f *ring0Factory) ClientConfig() (*restclient.Config, error) {
13372
return f.kubeClientAccessFactory.ClientConfig()
13473
}
13574

75+
func (f *ring0Factory) RawConfig() (clientcmdapi.Config, error) {
76+
return f.kubeClientAccessFactory.RawConfig()
77+
}
78+
13679
func (f *ring0Factory) BareClientConfig() (*restclient.Config, error) {
137-
return f.clientConfig.ClientConfig()
80+
return f.kubeClientAccessFactory.BareClientConfig()
13881
}
13982

14083
func (f *ring0Factory) RESTClient() (*restclient.RESTClient, error) {

‎pkg/oc/cli/util/clientcmd/legacy_discovery.go

-83
This file was deleted.

‎test/cmd/authentication.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -81,8 +81,8 @@ os::cmd::expect_success_and_text "curl -k -XPOST -H 'Content-Type: application/j
8181
os::cmd::expect_success_and_text "curl -k -XPOST -H 'Content-Type: application/json' -H 'Authorization: Bearer ${accesstoken}' '${API_SCHEME}://${API_HOST}:${API_PORT}/apis/authorization.openshift.io/v1/subjectaccessreviews' -d '{\"namespace\":\"${project}\",\"verb\":\"create\",\"resource\":\"pods\"}'" '"kind": "SubjectAccessReviewResponse"'
8282
os::cmd::expect_success_and_text "oc policy can-i create pods --token='${accesstoken}' -n '${project}' --ignore-scopes" 'yes'
8383
os::cmd::expect_success_and_text "oc policy can-i create pods --token='${accesstoken}' -n '${project}'" 'no'
84-
os::cmd::expect_success_and_text "oc policy can-i create subjectaccessreviews --token='${accesstoken}' -n '${project}'" 'no'
85-
os::cmd::expect_success_and_text "oc policy can-i create subjectaccessreviews --token='${accesstoken}' -n '${project}' --ignore-scopes" 'yes'
84+
os::cmd::expect_success_and_text "oc policy can-i create subjectaccessreviews.authorization.openshift.io --token='${accesstoken}' -n '${project}'" 'no'
85+
os::cmd::expect_success_and_text "oc policy can-i create subjectaccessreviews.authorization.openshift.io --token='${accesstoken}' -n '${project}' --ignore-scopes" 'yes'
8686
os::cmd::expect_success_and_text "oc policy can-i create pods --token='${accesstoken}' -n '${project}' --scopes='role:admin:*'" 'yes'
8787
os::cmd::expect_success_and_text "oc policy can-i --list --token='${accesstoken}' -n '${project}' --scopes='role:admin:*'" 'get.*pods'
8888
os::cmd::expect_success_and_not_text "oc policy can-i --list --token='${accesstoken}' -n '${project}'" 'get.*pods'

‎test/cmd/deployments.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ os::test::junit::declare_suite_start "cmd/deployments/setdeploymenthook"
159159
arg="-f test/integration/testdata/test-deployment-config.yaml"
160160
os::cmd::expect_failure_and_text "oc set deployment-hook" "error: one or more deployment configs"
161161
os::cmd::expect_failure_and_text "oc set deployment-hook ${arg}" "error: you must specify one of --pre, --mid, or --post"
162-
os::cmd::expect_failure_and_text "oc set deployment-hook ${arg} -o yaml --pre -- mycmd" 'deploymentconfigs "test-deployment-config" not found'
162+
os::cmd::expect_failure_and_text "oc set deployment-hook ${arg} -o yaml --pre -- mycmd" 'deploymentconfigs.apps.openshift.io "test-deployment-config" not found'
163163
os::cmd::expect_success_and_text "oc set deployment-hook ${arg} --local -o yaml --post -- mycmd" 'mycmd'
164164
os::cmd::expect_success_and_not_text "oc set deployment-hook ${arg} --local -o yaml --post -- mycmd | oc set deployment-hook -f - --local -o yaml --post --remove" 'mycmd'
165165
os::cmd::expect_success "oc create ${arg}"

‎test/cmd/login.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ cp "${KUBECONFIG}" "${login_kubeconfig}"
2727
unset KUBECONFIG
2828
unset KUBERNETES_MASTER
2929
# test client not configured
30-
os::cmd::expect_failure_and_text "env -u KUBERNETES_SERVICE_HOST oc get services" 'Missing or incomplete configuration info. Please login'
30+
os::cmd::expect_failure_and_text "env -u KUBERNETES_SERVICE_HOST oc get services --loglevel=8" 'Missing or incomplete configuration info. Please login'
3131
unused_port="33333"
3232
# setting env bypasses the not configured message
3333
os::cmd::expect_failure_and_text "env -u KUBERNETES_SERVICE_HOST KUBERNETES_MASTER=http://${API_HOST}:${unused_port} oc get services" 'did you specify the right host or port'

‎test/cmd/migrate.sh

+2-2
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ os::test::junit::declare_suite_end
3333

3434
os::test::junit::declare_suite_start "cmd/migrate/storage_oauthclientauthorizations"
3535
# Create valid OAuth client
36-
os::cmd::expect_success_and_text 'oc create -f test/testdata/oauth/client.yaml' 'oauthclient "test-oauth-client" created'
36+
os::cmd::expect_success_and_text 'oc create -f test/testdata/oauth/client.yaml' 'oauthclient.oauth.openshift.io "test-oauth-client" created'
3737
# Create OAuth client authorization for client
38-
os::cmd::expect_success_and_text 'oc create -f test/testdata/oauth/clientauthorization.yaml' 'oauthclientauthorization "user1:test-oauth-client" created'
38+
os::cmd::expect_success_and_text 'oc create -f test/testdata/oauth/clientauthorization.yaml' 'oauthclientauthorization.oauth.openshift.io "user1:test-oauth-client" created'
3939
# Delete client
4040
os::cmd::expect_success_and_text 'oc delete oauthclient test-oauth-client' 'oauthclient.oauth.openshift.io "test-oauth-client" deleted'
4141
# Assert that migration/update still works even though the client authorization is no longer valid

‎test/cmd/router.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ os::cmd::expect_success_and_text 'oc get dc/router -o yaml' 'readinessProbe'
7070
os::cmd::expect_success_and_text "oc delete svc/router" 'service "router" deleted'
7171
os::cmd::expect_success_and_text "oc delete dc/router" 'deploymentconfig.apps.openshift.io "router" deleted'
7272
# create a router and check for success with a warning about the existing clusterrolebinding
73-
os::cmd::expect_success_and_text "oc adm router" 'warning: clusterrolebindings "router-router-role" already exists'
73+
os::cmd::expect_success_and_text "oc adm router" 'warning: clusterrolebindings.authorization.openshift.io "router-router-role" already exists'
7474

7575
# only when using hostnetwork should we force the probes to use localhost
7676
os::cmd::expect_success_and_not_text "oc adm router -o yaml --host-network=false" 'host: localhost'

‎test/cmd/set-liveness-probe.sh

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ trap os::test::junit::reconcile_output EXIT
1212

1313
os::test::junit::declare_suite_start "cmd/set-probe-liveness"
1414
# This test setting a liveness probe, without warning about replication controllers whose deployment depends on deployment configs
15-
os::cmd::expect_success_and_text 'oc create -f pkg/oc/graph/genericgraph/test/simple-deployment.yaml' 'deploymentconfig "simple-deployment" created'
15+
os::cmd::expect_success_and_text 'oc create -f pkg/oc/graph/genericgraph/test/simple-deployment.yaml' 'deploymentconfig.apps.openshift.io "simple-deployment" created'
1616
os::cmd::expect_success_and_text 'oc status --suggest' 'dc/simple-deployment has no liveness probe'
1717

1818
# test --local flag

‎test/integration/etcd_storage_path_test.go

+6-2
Original file line numberDiff line numberDiff line change
@@ -1067,8 +1067,12 @@ func TestEtcd3StoragePath(t *testing.T) {
10671067

10681068
mapping, err := mapper.RESTMapping(gvk.GroupKind(), gvk.Version)
10691069
if err != nil {
1070-
t.Errorf("unexpected error getting mapping for %s from %s with GVK %s: %v", kind, pkgPath, gvk, err)
1071-
continue
1070+
t.Logf("unexpected error getting mapping for %s from %s with GVK %s: %v", kind, pkgPath, gvk, err)
1071+
mapping, err = legacyscheme.Registry.RESTMapper().RESTMapping(gvk.GroupKind(), gvk.Version)
1072+
if err != nil {
1073+
t.Errorf("unexpected error getting mapping for %s from %s with GVK %s: %v", kind, pkgPath, gvk, err)
1074+
continue
1075+
}
10721076
}
10731077

10741078
gvResource := gvk.GroupVersion().WithResource(mapping.Resource)

‎test/testdata/bootstrappolicy/cluster_admin_without_apigroups.yaml

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ metadata:
77
rules:
88
- apiGroups:
99
- '' # Allow mutation of Origin policy so we can proxy to RBAC
10+
- 'authorization.openshift.io' # Allow mutation of openshift authoriation groupified so we can proxy to RBAC
1011
- 'rbac.authorization.k8s.io' # Allow mutation of RBAC so we can test escalation
1112
attributeRestrictions: null
1213
resources:

‎vendor/k8s.io/kubernetes/pkg/kubectl/cmd/run.go

+1
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

‎vendor/k8s.io/kubernetes/pkg/kubectl/cmd/util/factory_client_access.go

+8
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

‎vendor/k8s.io/kubernetes/pkg/kubectl/cmd/util/patch_oapi_gvk.go

+13
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

‎vendor/k8s.io/kubernetes/staging/src/k8s.io/client-go/discovery/patch_restmapper_kind.go

+91
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

‎vendor/k8s.io/kubernetes/staging/src/k8s.io/client-go/discovery/restmapper.go

+7
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)
Please sign in to comment.