@@ -21,7 +21,6 @@ import (
21
21
genericroutes "k8s.io/apiserver/pkg/server/routes"
22
22
authzwebhook "k8s.io/apiserver/plugin/pkg/authorizer/webhook"
23
23
clientgoclientset "k8s.io/client-go/kubernetes"
24
- kclientsetinternal "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
25
24
kubeapiserver "k8s.io/kubernetes/pkg/master"
26
25
kcorestorage "k8s.io/kubernetes/pkg/registry/core/rest"
27
26
@@ -262,7 +261,7 @@ func (c *MasterConfig) buildHandlerChain(assetConfig *AssetConfig) (func(http.Ha
262
261
}
263
262
264
263
// TODO refactor this out of this package and split apiserver and controllers for good!
265
- func RunControllerServer (servingInfo configapi.HTTPServingInfo , kubeInternal kclientsetinternal .Interface ) error {
264
+ func RunControllerServer (servingInfo configapi.HTTPServingInfo , kubeExternal clientgoclientset .Interface ) error {
266
265
clientCAs , err := getClientCertCAPool (servingInfo )
267
266
if err != nil {
268
267
return err
@@ -276,12 +275,12 @@ func RunControllerServer(servingInfo configapi.HTTPServingInfo, kubeInternal kcl
276
275
genericroutes.MetricsWithReset {}.Install (mux )
277
276
278
277
// TODO: replace me with a service account for controller manager
279
- tokenReview := clientgoclientset . New ( kubeInternal . Authentication (). RESTClient ()) .AuthenticationV1beta1 ().TokenReviews ()
278
+ tokenReview := kubeExternal .AuthenticationV1beta1 ().TokenReviews ()
280
279
authn , err := serverauthenticator .NewRemoteAuthenticator (tokenReview , clientCAs , 5 * time .Minute )
281
280
if err != nil {
282
281
return err
283
282
}
284
- sarClient := clientgoclientset . New ( kubeInternal . Authorization (). RESTClient ()) .AuthorizationV1beta1 ().SubjectAccessReviews ()
283
+ sarClient := kubeExternal .AuthorizationV1beta1 ().SubjectAccessReviews ()
285
284
remoteAuthz , err := authzwebhook .NewFromInterface (sarClient , 5 * time .Minute , 5 * time .Minute )
286
285
if err != nil {
287
286
return err
0 commit comments