Handle errors
Kubernetes-commit: 5cab7f9a57dbbd6e2a181018aae523235843f77d
This commit is contained in:
parent
361587e353
commit
0ba502e8f9
|
@ -170,8 +170,8 @@ func newFakeScheme(t *testing.T) *runtime.Scheme {
|
||||||
require.NoError(t, apiv1.AddToScheme(ret))
|
require.NoError(t, apiv1.AddToScheme(ret))
|
||||||
require.NoError(t, extensionsapiv1beta1.AddToScheme(ret))
|
require.NoError(t, extensionsapiv1beta1.AddToScheme(ret))
|
||||||
|
|
||||||
ret.SetVersionPriority(apiv1.SchemeGroupVersion)
|
require.NoError(t, ret.SetVersionPriority(apiv1.SchemeGroupVersion))
|
||||||
ret.SetVersionPriority(extensionsapiv1beta1.SchemeGroupVersion)
|
require.NoError(t, ret.SetVersionPriority(extensionsapiv1beta1.SchemeGroupVersion))
|
||||||
|
|
||||||
return ret
|
return ret
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,7 +26,6 @@ import (
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
"k8s.io/apimachinery/pkg/util/cache"
|
"k8s.io/apimachinery/pkg/util/cache"
|
||||||
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
||||||
"k8s.io/apiserver/pkg/authentication/authenticator"
|
"k8s.io/apiserver/pkg/authentication/authenticator"
|
||||||
"k8s.io/apiserver/pkg/authentication/user"
|
"k8s.io/apiserver/pkg/authentication/user"
|
||||||
"k8s.io/apiserver/pkg/util/webhook"
|
"k8s.io/apiserver/pkg/util/webhook"
|
||||||
|
@ -118,8 +117,12 @@ func (w *WebhookTokenAuthenticator) AuthenticateToken(token string) (user.Info,
|
||||||
// requests to the exact path specified in the kubeconfig file, so arbitrary non-API servers can be targeted.
|
// requests to the exact path specified in the kubeconfig file, so arbitrary non-API servers can be targeted.
|
||||||
func tokenReviewInterfaceFromKubeconfig(kubeConfigFile string) (authenticationclient.TokenReviewInterface, error) {
|
func tokenReviewInterfaceFromKubeconfig(kubeConfigFile string) (authenticationclient.TokenReviewInterface, error) {
|
||||||
localScheme := runtime.NewScheme()
|
localScheme := runtime.NewScheme()
|
||||||
scheme.AddToScheme(localScheme)
|
if err := scheme.AddToScheme(localScheme); err != nil {
|
||||||
utilruntime.Must(localScheme.SetVersionPriority(groupVersions...))
|
return nil, err
|
||||||
|
}
|
||||||
|
if err := localScheme.SetVersionPriority(groupVersions...); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
gw, err := webhook.NewGenericWebhook(localScheme, scheme.Codecs, kubeConfigFile, groupVersions, 0)
|
gw, err := webhook.NewGenericWebhook(localScheme, scheme.Codecs, kubeConfigFile, groupVersions, 0)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -239,8 +239,12 @@ func convertToSARExtra(extra map[string][]string) map[string]authorization.Extra
|
||||||
// requests to the exact path specified in the kubeconfig file, so arbitrary non-API servers can be targeted.
|
// requests to the exact path specified in the kubeconfig file, so arbitrary non-API servers can be targeted.
|
||||||
func subjectAccessReviewInterfaceFromKubeconfig(kubeConfigFile string) (authorizationclient.SubjectAccessReviewInterface, error) {
|
func subjectAccessReviewInterfaceFromKubeconfig(kubeConfigFile string) (authorizationclient.SubjectAccessReviewInterface, error) {
|
||||||
localScheme := runtime.NewScheme()
|
localScheme := runtime.NewScheme()
|
||||||
scheme.AddToScheme(localScheme)
|
if err := scheme.AddToScheme(localScheme); err != nil {
|
||||||
localScheme.SetVersionPriority(groupVersions...)
|
return nil, err
|
||||||
|
}
|
||||||
|
if err := localScheme.SetVersionPriority(groupVersions...); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
gw, err := webhook.NewGenericWebhook(localScheme, scheme.Codecs, kubeConfigFile, groupVersions, 0)
|
gw, err := webhook.NewGenericWebhook(localScheme, scheme.Codecs, kubeConfigFile, groupVersions, 0)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
Loading…
Reference in New Issue