|
9 | 9 |
|
10 | 10 | authorizationapi "github.com/openshift/origin/pkg/authorization/apis/authorization" |
11 | 11 | fakeauthorizationclient "github.com/openshift/origin/pkg/authorization/generated/internalclientset/fake" |
12 | | - "github.com/openshift/origin/pkg/oc/admin/policy" |
13 | 12 | ) |
14 | 13 |
|
15 | 14 | func TestModifyNamedClusterRoleBinding(t *testing.T) { |
@@ -126,11 +125,11 @@ func TestModifyNamedClusterRoleBinding(t *testing.T) { |
126 | 125 | } |
127 | 126 | for tcName, tc := range tests { |
128 | 127 | // Set up modifier options and run AddRole() |
129 | | - o := &policy.RoleModificationOptions{ |
| 128 | + o := &RoleModificationOptions{ |
130 | 129 | RoleName: tc.inputRole, |
131 | 130 | RoleBindingName: tc.inputRoleBindingName, |
132 | 131 | Users: tc.inputSubjects, |
133 | | - RoleBindingAccessor: policy.NewClusterRoleBindingAccessor(fakeauthorizationclient.NewSimpleClientset(tc.existingClusterRoleBindings).Authorization()), |
| 132 | + RoleBindingAccessor: NewClusterRoleBindingAccessor(fakeauthorizationclient.NewSimpleClientset(tc.existingClusterRoleBindings).Authorization()), |
134 | 133 | } |
135 | 134 |
|
136 | 135 | addRoleAndCheck(t, o, tcName, tc.expectedRoleBindingName, tc.expectedSubjects) |
@@ -259,19 +258,19 @@ func TestModifyNamedLocalRoleBinding(t *testing.T) { |
259 | 258 | } |
260 | 259 | for tcName, tc := range tests { |
261 | 260 | // Set up modifier options and run AddRole() |
262 | | - o := &policy.RoleModificationOptions{ |
| 261 | + o := &RoleModificationOptions{ |
263 | 262 | RoleName: tc.inputRole, |
264 | 263 | RoleBindingName: tc.inputRoleBindingName, |
265 | 264 | Users: tc.inputSubjects, |
266 | 265 | RoleNamespace: metav1.NamespaceDefault, |
267 | | - RoleBindingAccessor: policy.NewLocalRoleBindingAccessor(metav1.NamespaceDefault, fakeauthorizationclient.NewSimpleClientset(tc.existingRoleBindings).Authorization()), |
| 266 | + RoleBindingAccessor: NewLocalRoleBindingAccessor(metav1.NamespaceDefault, fakeauthorizationclient.NewSimpleClientset(tc.existingRoleBindings).Authorization()), |
268 | 267 | } |
269 | 268 |
|
270 | 269 | addRoleAndCheck(t, o, tcName, tc.expectedRoleBindingName, tc.expectedSubjects) |
271 | 270 | } |
272 | 271 | } |
273 | 272 |
|
274 | | -func addRoleAndCheck(t *testing.T, o *policy.RoleModificationOptions, tcName, expectedName string, expectedSubjects []string) { |
| 273 | +func addRoleAndCheck(t *testing.T, o *RoleModificationOptions, tcName, expectedName string, expectedSubjects []string) { |
275 | 274 | err := o.AddRole() |
276 | 275 | if err != nil { |
277 | 276 | t.Errorf("%s: unexpected err %v", tcName, err) |
|
0 commit comments