use dep as denpendency managment tool
This commit is contained in:
@@ -245,7 +245,7 @@ func CreateKubeConfig(user string) error {
|
||||
}
|
||||
|
||||
data := map[string]string{"config": string(config)}
|
||||
var configmap = v1.ConfigMap{metav1.TypeMeta{Kind: "Configmap", APIVersion: "v1"}, metav1.ObjectMeta{Name: user}, data}
|
||||
var configmap = v1.ConfigMap{TypeMeta: metav1.TypeMeta{Kind: "Configmap", APIVersion: "v1"}, ObjectMeta: metav1.ObjectMeta{Name: user}, Data: data}
|
||||
_, err = k8sClient.CoreV1().ConfigMaps(kubectlNamespace).Create(&configmap)
|
||||
if err != nil {
|
||||
glog.Errorln(err)
|
||||
|
||||
@@ -139,7 +139,7 @@ func GetRoles(username string) ([]v1.Role, error) {
|
||||
if roleBinding.RoleRef.Kind == ClusterRoleKind {
|
||||
clusterRole, err := k8s.RbacV1().ClusterRoles().Get(roleBinding.RoleRef.Name, meta_v1.GetOptions{})
|
||||
if err == nil {
|
||||
var role = v1.Role(*clusterRole)
|
||||
var role = v1.Role{TypeMeta: (*clusterRole).TypeMeta, ObjectMeta: (*clusterRole).ObjectMeta, Rules: (*clusterRole).Rules}
|
||||
role.Namespace = roleBinding.Namespace
|
||||
roles = append(roles, role)
|
||||
break
|
||||
|
||||
Reference in New Issue
Block a user