Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rebase 1.9.0 beta.1 #17576

Merged
merged 78 commits into from
Dec 13, 2017
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
78 commits
Select commit Hold shift + click to select a range
f0bb2b6
update glide.yaml
deads2k Dec 1, 2017
c671103
update glide.yaml for networking
deads2k Dec 7, 2017
07c6b99
glide.yaml: update ours dependencies
deads2k Dec 8, 2017
710998e
bump(*)
deads2k Dec 4, 2017
c8626b7
UPSTREAM: 57148: expose special storage locations
deads2k Dec 5, 2017
f3769c7
UPSTREAM: 57149: make quota reusable
deads2k Dec 5, 2017
123246b
UPSTREAM: <carry>: exclude some origin resources from quota
deads2k Dec 7, 2017
534c679
UPSTREAM: <drop>: add back PrintSuccess. remove when printing is fixed
deads2k Dec 6, 2017
ca1b85f
UPSTREAM: <drop>: skip controller metric error, drop once we run in a…
deads2k Dec 7, 2017
9ff7f3f
UPSTREAM: <drop>: skip scheduler configz error, drop once we run in a…
deads2k Dec 7, 2017
d34b354
UPSTREAM: <carry>: patch scheduler to apply defaults. drop once we r…
deads2k Dec 7, 2017
df449cc
UPSTREAM: <carry>: make wiring in kubeproxy easy until we sort out co…
deads2k Dec 8, 2017
f046a0b
UPSTREAM: 49312: allow the /version endpoint to pass through
deads2k Jul 20, 2017
3c7a135
UPSTREAM: openshift/api: 17: Rbac fix
deads2k Dec 8, 2017
3f45cdc
UPSTREAM: <drop>: remove usage of bad transport since only GKE routes
deads2k Dec 11, 2017
ee0f726
UPSTREAM: <carry>: keep set working on internal types
deads2k Dec 11, 2017
de36874
UPSTREAM: <drop>: enable beta APIs by default. fixed by several pulls…
deads2k Dec 11, 2017
64974bc
UPSTREAM: 56687: kube-apiserver: enable admissionregistration v1beta1…
deads2k Dec 11, 2017
bf64f2c
UPSTREAM: 57150: allow convert to default on a per object basis
juanvallejo Dec 8, 2017
cf235c2
UPSTREAM: <carry>: switch apply to use the legacyscheme so our types …
deads2k Dec 12, 2017
4bc612e
boring changes
deads2k Dec 4, 2017
66d94ff
skuznets: switch to golang 1.9
deads2k Dec 7, 2017
fc9b4e2
DISABLE ROUTER e2e tests! hopefully fix golang 1.9 before we merge a…
deads2k Dec 11, 2017
5b3859b
update generators
deads2k Dec 4, 2017
d1b5fe8
add secret reference
deads2k Dec 4, 2017
42a1e2c
update image type generation flags
deads2k Dec 4, 2017
d49083e
CreatedByAnnotation is gone, idling probably broke again
deads2k Dec 5, 2017
07e5313
image limit ranger plugin
deads2k Dec 5, 2017
ab033d4
explicitly stop running admission on some resources
deads2k Dec 5, 2017
32a0c9a
add admission validation for *some* special resources
deads2k Dec 5, 2017
27ad23a
NEEDS REVIEW: boring: docker client update
deads2k Dec 5, 2017
f490d38
update internal scale type for dc
deads2k Dec 5, 2017
2f11419
interesting: update the dc/scale integration test to use the generic …
deads2k Dec 7, 2017
b3fa18d
minimal lease reconciler change
deads2k Dec 5, 2017
22f0b91
remove deprecated dc rollback generator
deads2k Dec 5, 2017
0aedd29
QUOTA: refactor our use of quota
deads2k Dec 5, 2017
7f86e08
SEPARATE: needs picking to webconsole server when they rebase
deads2k Dec 5, 2017
99c59c6
interesting: use listener instead of bindport
deads2k Dec 5, 2017
afdcb87
jvallejo: printing debt to fix
deads2k Dec 6, 2017
2abedd5
SROSS: hack new start for hpa controller for https support
deads2k Dec 6, 2017
5d40a0f
weird: clusterresourceoverride admission with a fake limit ranger
deads2k Dec 6, 2017
4383cd7
admission wiring changes
deads2k Dec 6, 2017
7ffc267
SJENNING: node wiring changes
deads2k Dec 6, 2017
244afd3
DANW: update networking related code for rebase
deads2k Dec 4, 2017
30fe89a
update deletion strategies
deads2k Dec 11, 2017
de21f14
authorization changes
deads2k Dec 5, 2017
80cef2d
authorization: updates to bootstrap roles
deads2k Dec 11, 2017
a92560d
add roundtripping for aggregation rules
deads2k Dec 8, 2017
a1cef1f
apiserver default changes
deads2k Dec 8, 2017
8454d7d
etcd storage test updates
deads2k Dec 11, 2017
9344e48
BPAREES: simplify concurrent controller test
deads2k Dec 8, 2017
062ffb1
BPAREES: crio values seem half changed
deads2k Dec 11, 2017
93bd84a
router/f5: move test types into testing sub-pkg
sttts Dec 12, 2017
0089bbb
oc: simple
deads2k Dec 6, 2017
ad7d2fc
oc: interesting: handle switch to external types in printers and set
deads2k Dec 6, 2017
60d3fa9
oc: make printers work again - sortof
deads2k Dec 6, 2017
b15c3b6
oc: builder updates
deads2k Dec 6, 2017
1d18e82
oc: cluster up dockername parsing
deads2k Dec 7, 2017
31f33b0
oc: first round of fixes for test-cmd
juanvallejo Dec 7, 2017
2cf15a3
oc: break oc explain
deads2k Dec 11, 2017
ee8266b
oc: adm migrate isn't getting a full scheme. add missing types
deads2k Dec 12, 2017
bb2ecf0
oc: stop testing upstream shortcuts, we no longer statically include …
deads2k Dec 8, 2017
2db374f
oc: CLAYTON: using internal gives me external types
deads2k Dec 11, 2017
a4d2794
needs review: boring: change e2e status check
deads2k Dec 7, 2017
ebc468c
needs review: boring: ignore pod dns config for deployer pods
deads2k Dec 11, 2017
7256949
boring: needs review: update deletion so it never waits. Something c…
deads2k Dec 12, 2017
6c58566
boring: test updates
deads2k Dec 7, 2017
d4ee63c
generated
deads2k Dec 4, 2017
9e3ca9a
DANW: comments
deads2k Dec 12, 2017
6b39f30
separate kube controller informers in advance of splitting process
deads2k Dec 12, 2017
2fa3a79
BPAREES: don't pass unused streams to streamoptions because it hangs
deads2k Dec 12, 2017
d826d91
make migration printing work again
deads2k Dec 12, 2017
a783419
UPSTREAM: 57107: Check ns setup error during e2e
deads2k Dec 12, 2017
5c42201
make cluster quota admission wait for namespace to be present
deads2k Dec 12, 2017
b80c0d2
boring: update tsb e2e to exclude new events group
deads2k Dec 12, 2017
088b81d
update bootstrap role for router
deads2k Dec 12, 2017
cdc12ca
skip some networking tests that fail in the rebase
deads2k Dec 13, 2017
b374cbd
increase DC hook timeouts. indicates pod start latency problem and f…
deads2k Dec 13, 2017
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions pkg/authorization/registry/clusterrole/proxy.go
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ func (s *REST) Delete(ctx apirequest.Context, name string, options *metav1.Delet
return &metav1.Status{Status: metav1.StatusSuccess}, true, nil
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

clarify in commit title/description which resources we're not running admission on and why

}

func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, err
Expand All @@ -117,7 +117,7 @@ func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
return role, nil
}

func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo, _ rest.ValidateObjectFunc, _ rest.ValidateObjectUpdateFunc) (runtime.Object, bool, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, false, err
Expand Down
4 changes: 2 additions & 2 deletions pkg/authorization/registry/clusterrolebinding/proxy.go
Original file line number Diff line number Diff line change
Expand Up @@ -94,7 +94,7 @@ func (s *REST) Delete(ctx apirequest.Context, name string, options *metav1.Delet
return &metav1.Status{Status: metav1.StatusSuccess}, true, nil
}

func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, err
Expand All @@ -117,7 +117,7 @@ func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
return binding, nil
}

func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo, _ rest.ValidateObjectFunc, _ rest.ValidateObjectUpdateFunc) (runtime.Object, bool, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, false, err
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ func (r *REST) New() runtime.Object {

// Create transforms a LocalRAR into an ClusterRAR that is requesting a namespace. That collapses the code paths.
// LocalResourceAccessReview exists to allow clean expression of policy.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
localRAR, ok := obj.(*authorizationapi.LocalResourceAccessReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a localResourceAccessReview: %#v", obj))
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ func (r *REST) New() runtime.Object {

// Create transforms a LocalSAR into an ClusterSAR that is requesting a namespace. That collapses the code paths.
// LocalSubjectAccessReview exists to allow clean expression of policy.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
localSAR, ok := obj.(*authorizationapi.LocalSubjectAccessReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a localSubjectAccessReview: %#v", obj))
Expand Down
5 changes: 3 additions & 2 deletions pkg/authorization/registry/resourceaccessreview/registry.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,14 +4,15 @@ import (
api "github.com/openshift/origin/pkg/authorization/apis/authorization"
"k8s.io/apimachinery/pkg/runtime"
apirequest "k8s.io/apiserver/pkg/endpoints/request"
"k8s.io/apiserver/pkg/registry/rest"
)

type Registry interface {
CreateResourceAccessReview(ctx apirequest.Context, resourceAccessReview *api.ResourceAccessReview) (*api.ResourceAccessReviewResponse, error)
}

type Storage interface {
Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error)
Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error)
}

type storage struct {
Expand All @@ -23,7 +24,7 @@ func NewRegistry(s Storage) Registry {
}

func (s *storage) CreateResourceAccessReview(ctx apirequest.Context, resourceAccessReview *api.ResourceAccessReview) (*api.ResourceAccessReviewResponse, error) {
obj, err := s.Create(ctx, resourceAccessReview, false)
obj, err := s.Create(ctx, resourceAccessReview, nil, false)
if err != nil {
return nil, err
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/authorization/registry/resourceaccessreview/rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ func (r *REST) New() runtime.Object {
}

// Create registers a given new ResourceAccessReview instance to r.registry.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
resourceAccessReview, ok := obj.(*authorizationapi.ResourceAccessReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a resourceAccessReview: %#v", obj))
Expand Down
4 changes: 2 additions & 2 deletions pkg/authorization/registry/role/proxy.go
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ func (s *REST) Delete(ctx apirequest.Context, name string, options *metav1.Delet
return &metav1.Status{Status: metav1.StatusSuccess}, true, nil
}

func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, err
Expand All @@ -118,7 +118,7 @@ func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
return role, nil
}

func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo, _ rest.ValidateObjectFunc, _ rest.ValidateObjectUpdateFunc) (runtime.Object, bool, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, false, err
Expand Down
4 changes: 2 additions & 2 deletions pkg/authorization/registry/rolebinding/proxy.go
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ func (s *REST) Delete(ctx apirequest.Context, name string, options *metav1.Delet
return &metav1.Status{Status: metav1.StatusSuccess}, true, nil
}

func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, err
Expand Down Expand Up @@ -128,7 +128,7 @@ func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
return binding, nil
}

func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo, _ rest.ValidateObjectFunc, _ rest.ValidateObjectUpdateFunc) (runtime.Object, bool, error) {
client, err := s.getImpersonatingClient(ctx)
if err != nil {
return nil, false, err
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ func (r *REST) New() runtime.Object {
}

// Create registers a given new ResourceAccessReview instance to r.registry.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
rulesReview, ok := obj.(*authorizationapi.SelfSubjectRulesReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a SelfSubjectRulesReview: %#v", obj))
Expand Down
5 changes: 3 additions & 2 deletions pkg/authorization/registry/subjectaccessreview/registry.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,14 +4,15 @@ import (
api "github.com/openshift/origin/pkg/authorization/apis/authorization"
"k8s.io/apimachinery/pkg/runtime"
apirequest "k8s.io/apiserver/pkg/endpoints/request"
"k8s.io/apiserver/pkg/registry/rest"
)

type Registry interface {
CreateSubjectAccessReview(ctx apirequest.Context, subjectAccessReview *api.SubjectAccessReview) (*api.SubjectAccessReviewResponse, error)
}

type Storage interface {
Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error)
Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error)
}

type storage struct {
Expand All @@ -23,7 +24,7 @@ func NewRegistry(s Storage) Registry {
}

func (s *storage) CreateSubjectAccessReview(ctx apirequest.Context, subjectAccessReview *api.SubjectAccessReview) (*api.SubjectAccessReviewResponse, error) {
obj, err := s.Create(ctx, subjectAccessReview, false)
obj, err := s.Create(ctx, subjectAccessReview, nil, false)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Didn't I add some DenyAlways funcs in upstream? Would make it more explicit.

if err != nil {
return nil, err
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/authorization/registry/subjectaccessreview/rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ func (r *REST) New() runtime.Object {
}

// Create registers a given new ResourceAccessReview instance to r.registry.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
subjectAccessReview, ok := obj.(*authorizationapi.SubjectAccessReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a subjectAccessReview: %#v", obj))
Expand Down
2 changes: 1 addition & 1 deletion pkg/authorization/registry/subjectrulesreview/storage.go
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ func (r *REST) New() runtime.Object {
}

// Create registers a given new ResourceAccessReview instance to r.registry.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
rulesReview, ok := obj.(*authorizationapi.SubjectRulesReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a SubjectRulesReview: %#v", obj))
Expand Down
4 changes: 2 additions & 2 deletions pkg/image/registry/image/registry.go
Original file line number Diff line number Diff line change
Expand Up @@ -66,12 +66,12 @@ func (s *storage) GetImage(ctx apirequest.Context, imageID string, options *meta
}

func (s *storage) CreateImage(ctx apirequest.Context, image *imageapi.Image) error {
_, err := s.Create(ctx, image, false)
_, err := s.Create(ctx, image, rest.ValidateAllObjectFunc, false)
return err
}

func (s *storage) UpdateImage(ctx apirequest.Context, image *imageapi.Image) (*imageapi.Image, error) {
obj, _, err := s.Update(ctx, image.Name, rest.DefaultUpdatedObjectInfo(image))
obj, _, err := s.Update(ctx, image.Name, rest.DefaultUpdatedObjectInfo(image), rest.ValidateAllObjectFunc, rest.ValidateAllObjectUpdateFunc)
if err != nil {
return nil, err
}
Expand Down
8 changes: 4 additions & 4 deletions pkg/image/registry/imagestream/registry.go
Original file line number Diff line number Diff line change
Expand Up @@ -72,31 +72,31 @@ func (s *storage) GetImageStream(ctx apirequest.Context, imageStreamID string, o
}

func (s *storage) CreateImageStream(ctx apirequest.Context, imageStream *imageapi.ImageStream) (*imageapi.ImageStream, error) {
obj, err := s.Create(ctx, imageStream, false)
obj, err := s.Create(ctx, imageStream, rest.ValidateAllObjectFunc, false)
if err != nil {
return nil, err
}
return obj.(*imageapi.ImageStream), nil
}

func (s *storage) UpdateImageStream(ctx apirequest.Context, imageStream *imageapi.ImageStream) (*imageapi.ImageStream, error) {
obj, _, err := s.internal.Update(ctx, imageStream.Name, rest.DefaultUpdatedObjectInfo(imageStream))
obj, _, err := s.internal.Update(ctx, imageStream.Name, rest.DefaultUpdatedObjectInfo(imageStream), rest.ValidateAllObjectFunc, rest.ValidateAllObjectUpdateFunc)
if err != nil {
return nil, err
}
return obj.(*imageapi.ImageStream), nil
}

func (s *storage) UpdateImageStreamSpec(ctx apirequest.Context, imageStream *imageapi.ImageStream) (*imageapi.ImageStream, error) {
obj, _, err := s.Update(ctx, imageStream.Name, rest.DefaultUpdatedObjectInfo(imageStream))
obj, _, err := s.Update(ctx, imageStream.Name, rest.DefaultUpdatedObjectInfo(imageStream), rest.ValidateAllObjectFunc, rest.ValidateAllObjectUpdateFunc)
if err != nil {
return nil, err
}
return obj.(*imageapi.ImageStream), nil
}

func (s *storage) UpdateImageStreamStatus(ctx apirequest.Context, imageStream *imageapi.ImageStream) (*imageapi.ImageStream, error) {
obj, _, err := s.status.Update(ctx, imageStream.Name, rest.DefaultUpdatedObjectInfo(imageStream))
obj, _, err := s.status.Update(ctx, imageStream.Name, rest.DefaultUpdatedObjectInfo(imageStream), rest.ValidateAllObjectFunc, rest.ValidateAllObjectUpdateFunc)
if err != nil {
return nil, err
}
Expand Down
8 changes: 4 additions & 4 deletions pkg/image/registry/imagestreamimport/rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -324,7 +324,7 @@ func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
if create {
stream.Annotations[imageapi.DockerImageRepositoryCheckAnnotation] = now.UTC().Format(time.RFC3339)
glog.V(4).Infof("create new stream: %#v", stream)
obj, err = r.internalStreams.Create(ctx, stream, false)
obj, err = r.internalStreams.Create(ctx, stream, rest.ValidateAllObjectFunc, false)
} else {
if hasAnnotation && !hasChanges {
glog.V(4).Infof("stream did not change: %#v", stream)
Expand All @@ -334,7 +334,7 @@ func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
glog.V(4).Infof("updating stream %s", diff.ObjectDiff(original, stream))
}
stream.Annotations[imageapi.DockerImageRepositoryCheckAnnotation] = now.UTC().Format(time.RFC3339)
obj, _, err = r.internalStreams.Update(ctx, stream.Name, rest.DefaultUpdatedObjectInfo(stream))
obj, _, err = r.internalStreams.Update(ctx, stream.Name, rest.DefaultUpdatedObjectInfo(stream), rest.ValidateAllObjectFunc, rest.ValidateAllObjectUpdateFunc)
}
}

Expand All @@ -345,7 +345,7 @@ func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
originalStream := original
recordLimitExceededStatus(originalStream, stream, err, now, nextGeneration)
var limitErr error
obj, _, limitErr = r.internalStreams.Update(ctx, stream.Name, rest.DefaultUpdatedObjectInfo(originalStream))
obj, _, limitErr = r.internalStreams.Update(ctx, stream.Name, rest.DefaultUpdatedObjectInfo(originalStream), rest.ValidateAllObjectFunc, rest.ValidateAllObjectUpdateFunc)
if limitErr != nil {
utilruntime.HandleError(fmt.Errorf("failed to record limit exceeded status in image stream %s/%s: %v", stream.Namespace, stream.Name, limitErr))
}
Expand Down Expand Up @@ -480,7 +480,7 @@ func (r *REST) importSuccessful(
return nil, false
}

updated, err := r.images.Create(ctx, image, false)
updated, err := r.images.Create(ctx, image, rest.ValidateAllObjectFunc, false)
switch {
case kapierrors.IsAlreadyExists(err):
if err := util.ImageWithMetadata(image); err != nil {
Expand Down
2 changes: 1 addition & 1 deletion pkg/security/registry/podsecuritypolicyreview/rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ func (r *REST) New() runtime.Object {
}

// Create registers a given new PodSecurityPolicyReview instance to r.registry.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
pspr, ok := obj.(*securityapi.PodSecurityPolicyReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a PodSecurityPolicyReview: %#v", obj))
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ func (r *REST) New() runtime.Object {
}

// Create registers a given new pspssr instance to r.registry.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
pspssr, ok := obj.(*securityapi.PodSecurityPolicySelfSubjectReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a PodSecurityPolicySelfSubjectReview: %#v", obj))
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ func (r *REST) New() runtime.Object {
}

// Create registers a given new PodSecurityPolicySubjectReview instance to r.registry.
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (r *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
pspsr, ok := obj.(*securityapi.PodSecurityPolicySubjectReview)
if !ok {
return nil, kapierrors.NewBadRequest(fmt.Sprintf("not a PodSecurityPolicySubjectReview: %#v", obj))
Expand Down
2 changes: 1 addition & 1 deletion pkg/template/registry/template/rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ func (s *REST) New() runtime.Object {
}

// Create processes a Template and creates a new list of objects
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
tpl, ok := obj.(*templateapi.Template)
if !ok {
return nil, errors.NewBadRequest("not a template")
Expand Down
4 changes: 2 additions & 2 deletions pkg/user/registry/useridentitymapping/rest.go
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ func (s *REST) Get(ctx apirequest.Context, name string, options *metav1.GetOptio
}

// CreateUser associates a user and identity if they both exist, and the identity is not already mapped to a user
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runtime.Object, error) {
func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ rest.ValidateObjectFunc, _ bool) (runtime.Object, error) {
mapping, ok := obj.(*userapi.UserIdentityMapping)
if !ok {
return nil, kerrs.NewBadRequest("invalid type")
Expand All @@ -59,7 +59,7 @@ func (s *REST) Create(ctx apirequest.Context, obj runtime.Object, _ bool) (runti
// UpdateUser associates an identity with a user.
// Both the identity and user must already exist.
// If the identity is associated with another user already, it is disassociated.
func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo) (runtime.Object, bool, error) {
func (s *REST) Update(ctx apirequest.Context, name string, objInfo rest.UpdatedObjectInfo, _ rest.ValidateObjectFunc, _ rest.ValidateObjectUpdateFunc) (runtime.Object, bool, error) {
obj, err := objInfo.UpdatedObject(ctx, nil)
if err != nil {
return nil, false, err
Expand Down