add import-alias for k8s.io/api/rbac/v1

This commit is contained in:
Aaron Crickenberger 2019-06-20 11:40:39 -07:00
parent 1d0d98dbc5
commit 32f8aef97b
4 changed files with 24 additions and 23 deletions

View File

@ -23,5 +23,6 @@
"k8s.io/api/networking/v1beta1": "networkingv1beta1", "k8s.io/api/networking/v1beta1": "networkingv1beta1",
"k8s.io/api/node/v1alpha1": "nodev1alpha1", "k8s.io/api/node/v1alpha1": "nodev1alpha1",
"k8s.io/api/node/v1beta1": "nodev1beta1", "k8s.io/api/node/v1beta1": "nodev1beta1",
"k8s.io/api/policy/v1beta1": "policyv1beta1" "k8s.io/api/policy/v1beta1": "policyv1beta1",
"k8s.io/api/rbac/v1": "rbacv1"
} }

View File

@ -25,7 +25,7 @@ import (
appsv1 "k8s.io/api/apps/v1" appsv1 "k8s.io/api/apps/v1"
"k8s.io/api/core/v1" "k8s.io/api/core/v1"
rbac "k8s.io/api/rbac/v1" rbacv1 "k8s.io/api/rbac/v1"
storage "k8s.io/api/storage/v1" storage "k8s.io/api/storage/v1"
apierrs "k8s.io/apimachinery/pkg/api/errors" apierrs "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@ -307,9 +307,9 @@ func (f *Framework) PatchNamespace(item *string) {
func (f *Framework) patchItemRecursively(item interface{}) error { func (f *Framework) patchItemRecursively(item interface{}) error {
switch item := item.(type) { switch item := item.(type) {
case *rbac.Subject: case *rbacv1.Subject:
f.PatchNamespace(&item.Namespace) f.PatchNamespace(&item.Namespace)
case *rbac.RoleRef: case *rbacv1.RoleRef:
// TODO: avoid hard-coding this special name. Perhaps add a Framework.PredefinedRoles // TODO: avoid hard-coding this special name. Perhaps add a Framework.PredefinedRoles
// which contains all role names that are defined cluster-wide before the test starts? // which contains all role names that are defined cluster-wide before the test starts?
// All those names are excempt from renaming. That list could be populated by querying // All those names are excempt from renaming. That list could be populated by querying
@ -317,9 +317,9 @@ func (f *Framework) patchItemRecursively(item interface{}) error {
if item.Name != "e2e-test-privileged-psp" { if item.Name != "e2e-test-privileged-psp" {
f.PatchName(&item.Name) f.PatchName(&item.Name)
} }
case *rbac.ClusterRole: case *rbacv1.ClusterRole:
f.PatchName(&item.Name) f.PatchName(&item.Name)
case *rbac.Role: case *rbacv1.Role:
f.PatchNamespace(&item.Namespace) f.PatchNamespace(&item.Namespace)
// Roles are namespaced, but because for RoleRef above we don't // Roles are namespaced, but because for RoleRef above we don't
// know whether the referenced role is a ClusterRole or Role // know whether the referenced role is a ClusterRole or Role
@ -331,7 +331,7 @@ func (f *Framework) patchItemRecursively(item interface{}) error {
f.PatchNamespace(&item.ObjectMeta.Namespace) f.PatchNamespace(&item.ObjectMeta.Namespace)
case *v1.Secret: case *v1.Secret:
f.PatchNamespace(&item.ObjectMeta.Namespace) f.PatchNamespace(&item.ObjectMeta.Namespace)
case *rbac.ClusterRoleBinding: case *rbacv1.ClusterRoleBinding:
f.PatchName(&item.Name) f.PatchName(&item.Name)
for i := range item.Subjects { for i := range item.Subjects {
if err := f.patchItemRecursively(&item.Subjects[i]); err != nil { if err := f.patchItemRecursively(&item.Subjects[i]); err != nil {
@ -341,7 +341,7 @@ func (f *Framework) patchItemRecursively(item interface{}) error {
if err := f.patchItemRecursively(&item.RoleRef); err != nil { if err := f.patchItemRecursively(&item.RoleRef); err != nil {
return errors.Wrapf(err, "%T", f) return errors.Wrapf(err, "%T", f)
} }
case *rbac.RoleBinding: case *rbacv1.RoleBinding:
f.PatchNamespace(&item.Namespace) f.PatchNamespace(&item.Namespace)
for i := range item.Subjects { for i := range item.Subjects {
if err := f.patchItemRecursively(&item.Subjects[i]); err != nil { if err := f.patchItemRecursively(&item.Subjects[i]); err != nil {
@ -391,11 +391,11 @@ func (*serviceAccountFactory) Create(f *Framework, i interface{}) (func() error,
type clusterRoleFactory struct{} type clusterRoleFactory struct{}
func (f *clusterRoleFactory) New() runtime.Object { func (f *clusterRoleFactory) New() runtime.Object {
return &rbac.ClusterRole{} return &rbacv1.ClusterRole{}
} }
func (*clusterRoleFactory) Create(f *Framework, i interface{}) (func() error, error) { func (*clusterRoleFactory) Create(f *Framework, i interface{}) (func() error, error) {
item, ok := i.(*rbac.ClusterRole) item, ok := i.(*rbacv1.ClusterRole)
if !ok { if !ok {
return nil, errorItemNotSupported return nil, errorItemNotSupported
} }
@ -413,11 +413,11 @@ func (*clusterRoleFactory) Create(f *Framework, i interface{}) (func() error, er
type clusterRoleBindingFactory struct{} type clusterRoleBindingFactory struct{}
func (f *clusterRoleBindingFactory) New() runtime.Object { func (f *clusterRoleBindingFactory) New() runtime.Object {
return &rbac.ClusterRoleBinding{} return &rbacv1.ClusterRoleBinding{}
} }
func (*clusterRoleBindingFactory) Create(f *Framework, i interface{}) (func() error, error) { func (*clusterRoleBindingFactory) Create(f *Framework, i interface{}) (func() error, error) {
item, ok := i.(*rbac.ClusterRoleBinding) item, ok := i.(*rbacv1.ClusterRoleBinding)
if !ok { if !ok {
return nil, errorItemNotSupported return nil, errorItemNotSupported
} }
@ -434,11 +434,11 @@ func (*clusterRoleBindingFactory) Create(f *Framework, i interface{}) (func() er
type roleFactory struct{} type roleFactory struct{}
func (f *roleFactory) New() runtime.Object { func (f *roleFactory) New() runtime.Object {
return &rbac.Role{} return &rbacv1.Role{}
} }
func (*roleFactory) Create(f *Framework, i interface{}) (func() error, error) { func (*roleFactory) Create(f *Framework, i interface{}) (func() error, error) {
item, ok := i.(*rbac.Role) item, ok := i.(*rbacv1.Role)
if !ok { if !ok {
return nil, errorItemNotSupported return nil, errorItemNotSupported
} }
@ -455,11 +455,11 @@ func (*roleFactory) Create(f *Framework, i interface{}) (func() error, error) {
type roleBindingFactory struct{} type roleBindingFactory struct{}
func (f *roleBindingFactory) New() runtime.Object { func (f *roleBindingFactory) New() runtime.Object {
return &rbac.RoleBinding{} return &rbacv1.RoleBinding{}
} }
func (*roleBindingFactory) Create(f *Framework, i interface{}) (func() error, error) { func (*roleBindingFactory) Create(f *Framework, i interface{}) (func() error, error) {
item, ok := i.(*rbac.RoleBinding) item, ok := i.(*rbacv1.RoleBinding)
if !ok { if !ok {
return nil, errorItemNotSupported return nil, errorItemNotSupported
} }

View File

@ -24,7 +24,7 @@ import (
gcm "google.golang.org/api/monitoring/v3" gcm "google.golang.org/api/monitoring/v3"
appsv1 "k8s.io/api/apps/v1" appsv1 "k8s.io/api/apps/v1"
v1 "k8s.io/api/core/v1" v1 "k8s.io/api/core/v1"
rbac "k8s.io/api/rbac/v1" rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/kubernetes/test/e2e/framework" "k8s.io/kubernetes/test/e2e/framework"
e2elog "k8s.io/kubernetes/test/e2e/framework/log" e2elog "k8s.io/kubernetes/test/e2e/framework/log"
@ -44,16 +44,16 @@ var (
StackdriverExporter = "stackdriver-exporter" StackdriverExporter = "stackdriver-exporter"
// HPAPermissions is a ClusterRoleBinding that grants unauthenticated user permissions granted for // HPAPermissions is a ClusterRoleBinding that grants unauthenticated user permissions granted for
// HPA for testing purposes, i.e. it should grant permission to read custom metrics. // HPA for testing purposes, i.e. it should grant permission to read custom metrics.
HPAPermissions = &rbac.ClusterRoleBinding{ HPAPermissions = &rbacv1.ClusterRoleBinding{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "custom-metrics-reader", Name: "custom-metrics-reader",
}, },
RoleRef: rbac.RoleRef{ RoleRef: rbacv1.RoleRef{
APIGroup: "rbac.authorization.k8s.io", APIGroup: "rbac.authorization.k8s.io",
Kind: "ClusterRole", Kind: "ClusterRole",
Name: "system:controller:horizontal-pod-autoscaler", Name: "system:controller:horizontal-pod-autoscaler",
}, },
Subjects: []rbac.Subject{ Subjects: []rbacv1.Subject{
{ {
APIGroup: "rbac.authorization.k8s.io", APIGroup: "rbac.authorization.k8s.io",
Kind: "Group", Kind: "Group",

View File

@ -23,7 +23,7 @@ import (
appsv1 "k8s.io/api/apps/v1" appsv1 "k8s.io/api/apps/v1"
"k8s.io/api/core/v1" "k8s.io/api/core/v1"
networkingv1beta1 "k8s.io/api/networking/v1beta1" networkingv1beta1 "k8s.io/api/networking/v1beta1"
rbac "k8s.io/api/rbac/v1" rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime" "k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema" "k8s.io/apimachinery/pkg/runtime/schema"
@ -163,8 +163,8 @@ func DaemonSetFromManifest(fileName, ns string) (*appsv1.DaemonSet, error) {
} }
// RoleFromManifest returns a Role from a manifest stored in fileName in the Namespace indicated by ns. // RoleFromManifest returns a Role from a manifest stored in fileName in the Namespace indicated by ns.
func RoleFromManifest(fileName, ns string) (*rbac.Role, error) { func RoleFromManifest(fileName, ns string) (*rbacv1.Role, error) {
var role rbac.Role var role rbacv1.Role
data, err := testfiles.Read(fileName) data, err := testfiles.Read(fileName)
json, err := utilyaml.ToJSON(data) json, err := utilyaml.ToJSON(data)