diff options
author | OpenShift Merge Robot <openshift-merge-robot@users.noreply.github.com> | 2017-11-16 02:59:34 -0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-11-16 02:59:34 -0800 |
commit | d8f0bac2523ed80dc4251901c437e902c08cbbab (patch) | |
tree | 1bb17727d2e559f04193eaaf6bedafdbf6d0ce63 /roles/lib_openshift/src/class | |
parent | c27a19e61a164969752445f436eadff990de5092 (diff) | |
parent | 4526f5457d012bc14c16b844bebc3eaeaa8ff191 (diff) | |
download | openshift-d8f0bac2523ed80dc4251901c437e902c08cbbab.tar.gz openshift-d8f0bac2523ed80dc4251901c437e902c08cbbab.tar.bz2 openshift-d8f0bac2523ed80dc4251901c437e902c08cbbab.tar.xz openshift-d8f0bac2523ed80dc4251901c437e902c08cbbab.zip |
Merge pull request #5729 from kwoodson/cluster_autoscaler
Automatic merge from submit-queue.
Adding support for cluster-autoscaler.
This is the kubernetes cluster-autoscaler role.
Features:
- Updated lib_openshift to handle --role-namespace when modifying/creating rolebindings for specific namespaced role objects
- openshift_cluster_autoscaler role to deploy the autoscaler
Diffstat (limited to 'roles/lib_openshift/src/class')
-rw-r--r-- | roles/lib_openshift/src/class/oc_adm_policy_user.py | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/roles/lib_openshift/src/class/oc_adm_policy_user.py b/roles/lib_openshift/src/class/oc_adm_policy_user.py index 6fc8145c8..481564c2d 100644 --- a/roles/lib_openshift/src/class/oc_adm_policy_user.py +++ b/roles/lib_openshift/src/class/oc_adm_policy_user.py @@ -148,6 +148,9 @@ class PolicyUser(OpenShiftCLI): self.config.config_options['name']['value'], self.config.config_options['user']['value']] + if self.config.config_options['role_namespace']['value'] is not None: + cmd.extend(['--role-namespace', self.config.config_options['role_namespace']['value']]) + return self.openshift_cmd(cmd, oadm=True) @staticmethod @@ -168,6 +171,7 @@ class PolicyUser(OpenShiftCLI): 'user': {'value': params['user'], 'include': False}, 'resource_kind': {'value': params['resource_kind'], 'include': False}, 'name': {'value': params['resource_name'], 'include': False}, + 'role_namespace': {'value': params['role_namespace'], 'include': False}, }) policyuser = PolicyUser(nconfig, params['debug']) |