@@ -10,8 +10,8 @@ import (
10
10
kclientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
11
11
12
12
authorizationapi "github.com/openshift/origin/pkg/authorization/apis/authorization/v1"
13
- userapi "github.com/openshift/origin/pkg/user/apis/user"
14
- userclient "github.com/openshift/origin/pkg/user/generated/internalclientset /typed/user/internalversion "
13
+ userapi "github.com/openshift/origin/pkg/user/apis/user/v1 "
14
+ userclient "github.com/openshift/origin/pkg/user/generated/clientset /typed/user/v1 "
15
15
)
16
16
17
17
// SubjectChecker determines whether rolebindings on a subject (user, group, or
@@ -47,7 +47,7 @@ func (checkers UnionSubjectChecker) Allowed(subject rbac.Subject, ctx *RoleBindi
47
47
// RoleBindingRestrictionContext holds context that is used when determining
48
48
// whether a RoleBindingRestriction allows rolebindings on a particular subject.
49
49
type RoleBindingRestrictionContext struct {
50
- userClient userclient.UserInterface
50
+ userClient userclient.UserV1Interface
51
51
kclient kclientset.Interface
52
52
53
53
// groupCache maps user name to groups.
@@ -66,7 +66,7 @@ type RoleBindingRestrictionContext struct {
66
66
67
67
// NewRoleBindingRestrictionContext returns a new RoleBindingRestrictionContext
68
68
// object.
69
- func NewRoleBindingRestrictionContext (ns string , kc kclientset.Interface , userClient userclient.UserInterface , groupCache GroupCache ) (* RoleBindingRestrictionContext , error ) {
69
+ func NewRoleBindingRestrictionContext (ns string , kc kclientset.Interface , userClient userclient.UserV1Interface , groupCache GroupCache ) (* RoleBindingRestrictionContext , error ) {
70
70
return & RoleBindingRestrictionContext {
71
71
namespace : ns ,
72
72
kclient : kc ,
0 commit comments