|
9 | 9 |
|
10 | 10 | authorizationapi "github.com/openshift/origin/pkg/authorization/apis/authorization"
|
11 | 11 | fakeauthorizationclient "github.com/openshift/origin/pkg/authorization/generated/internalclientset/fake"
|
12 |
| - "github.com/openshift/origin/pkg/oc/admin/policy" |
13 | 12 | )
|
14 | 13 |
|
15 | 14 | func TestModifyNamedClusterRoleBinding(t *testing.T) {
|
@@ -126,11 +125,11 @@ func TestModifyNamedClusterRoleBinding(t *testing.T) {
|
126 | 125 | }
|
127 | 126 | for tcName, tc := range tests {
|
128 | 127 | // Set up modifier options and run AddRole()
|
129 |
| - o := &policy.RoleModificationOptions{ |
| 128 | + o := &RoleModificationOptions{ |
130 | 129 | RoleName: tc.inputRole,
|
131 | 130 | RoleBindingName: tc.inputRoleBindingName,
|
132 | 131 | Users: tc.inputSubjects,
|
133 |
| - RoleBindingAccessor: policy.NewClusterRoleBindingAccessor(fakeauthorizationclient.NewSimpleClientset(tc.existingClusterRoleBindings).Authorization()), |
| 132 | + RoleBindingAccessor: NewClusterRoleBindingAccessor(fakeauthorizationclient.NewSimpleClientset(tc.existingClusterRoleBindings).Authorization()), |
134 | 133 | }
|
135 | 134 |
|
136 | 135 | addRoleAndCheck(t, o, tcName, tc.expectedRoleBindingName, tc.expectedSubjects)
|
@@ -259,19 +258,19 @@ func TestModifyNamedLocalRoleBinding(t *testing.T) {
|
259 | 258 | }
|
260 | 259 | for tcName, tc := range tests {
|
261 | 260 | // Set up modifier options and run AddRole()
|
262 |
| - o := &policy.RoleModificationOptions{ |
| 261 | + o := &RoleModificationOptions{ |
263 | 262 | RoleName: tc.inputRole,
|
264 | 263 | RoleBindingName: tc.inputRoleBindingName,
|
265 | 264 | Users: tc.inputSubjects,
|
266 | 265 | RoleNamespace: metav1.NamespaceDefault,
|
267 |
| - RoleBindingAccessor: policy.NewLocalRoleBindingAccessor(metav1.NamespaceDefault, fakeauthorizationclient.NewSimpleClientset(tc.existingRoleBindings).Authorization()), |
| 266 | + RoleBindingAccessor: NewLocalRoleBindingAccessor(metav1.NamespaceDefault, fakeauthorizationclient.NewSimpleClientset(tc.existingRoleBindings).Authorization()), |
268 | 267 | }
|
269 | 268 |
|
270 | 269 | addRoleAndCheck(t, o, tcName, tc.expectedRoleBindingName, tc.expectedSubjects)
|
271 | 270 | }
|
272 | 271 | }
|
273 | 272 |
|
274 |
| -func addRoleAndCheck(t *testing.T, o *policy.RoleModificationOptions, tcName, expectedName string, expectedSubjects []string) { |
| 273 | +func addRoleAndCheck(t *testing.T, o *RoleModificationOptions, tcName, expectedName string, expectedSubjects []string) { |
275 | 274 | err := o.AddRole()
|
276 | 275 | if err != nil {
|
277 | 276 | t.Errorf("%s: unexpected err %v", tcName, err)
|
|
0 commit comments