@@ -34,7 +34,6 @@ def create_openshift_oauth_objects(cluster_name, namespace):
34
34
35
35
36
36
def _create_or_replace_oauth_sa (namespace , oauth_sa_name , host ):
37
- api_client = api_config_handler ()
38
37
oauth_sa = client .V1ServiceAccount (
39
38
api_version = "v1" ,
40
39
kind = "ServiceAccount" ,
@@ -47,12 +46,12 @@ def _create_or_replace_oauth_sa(namespace, oauth_sa_name, host):
47
46
),
48
47
)
49
48
try :
50
- client .CoreV1Api (api_client ).create_namespaced_service_account (
49
+ client .CoreV1Api (api_config_handler () ).create_namespaced_service_account (
51
50
namespace = namespace , body = oauth_sa
52
51
)
53
52
except client .ApiException as e :
54
53
if e .reason == "Conflict" :
55
- client .CoreV1Api (api_client ).replace_namespaced_service_account (
54
+ client .CoreV1Api (api_config_handler () ).replace_namespaced_service_account (
56
55
namespace = namespace ,
57
56
body = oauth_sa ,
58
57
name = oauth_sa_name ,
@@ -62,7 +61,6 @@ def _create_or_replace_oauth_sa(namespace, oauth_sa_name, host):
62
61
63
62
64
63
def _create_or_replace_oauth_rb (cluster_name , namespace , oauth_sa_name ):
65
- api_client = api_config_handler ()
66
64
oauth_crb = client .V1ClusterRoleBinding (
67
65
api_version = "rbac.authorization.k8s.io/v1" ,
68
66
kind = "ClusterRoleBinding" ,
@@ -79,14 +77,14 @@ def _create_or_replace_oauth_rb(cluster_name, namespace, oauth_sa_name):
79
77
],
80
78
)
81
79
try :
82
- client .RbacAuthorizationV1Api (api_client ).create_cluster_role_binding (
80
+ client .RbacAuthorizationV1Api (api_config_handler () ).create_cluster_role_binding (
83
81
body = oauth_crb
84
82
)
85
83
except client .ApiException as e :
86
84
if e .reason == "Conflict" :
87
- client .RbacAuthorizationV1Api (api_client ). replace_cluster_role_binding (
88
- body = oauth_crb , name = f" { cluster_name } -rb"
89
- )
85
+ client .RbacAuthorizationV1Api (
86
+ api_config_handler ()
87
+ ). replace_cluster_role_binding ( body = oauth_crb , name = f" { cluster_name } -rb" )
90
88
else :
91
89
raise e
92
90
@@ -98,19 +96,18 @@ def _gen_tls_secret_name(cluster_name):
98
96
def delete_openshift_oauth_objects (cluster_name , namespace ):
99
97
# NOTE: it might be worth adding error handling here, but shouldn't be necessary because cluster.down(...) checks
100
98
# for an existing cluster before calling this => the objects should never be deleted twice
101
- api_client = api_config_handler ()
102
99
oauth_sa_name = f"{ cluster_name } -oauth-proxy"
103
100
service_name = f"{ cluster_name } -oauth"
104
- client .CoreV1Api (api_client ).delete_namespaced_service_account (
101
+ client .CoreV1Api (api_config_handler () ).delete_namespaced_service_account (
105
102
name = oauth_sa_name , namespace = namespace
106
103
)
107
- client .CoreV1Api (api_client ).delete_namespaced_service (
104
+ client .CoreV1Api (api_config_handler () ).delete_namespaced_service (
108
105
name = service_name , namespace = namespace
109
106
)
110
- client .NetworkingV1Api (api_client ).delete_namespaced_ingress (
107
+ client .NetworkingV1Api (api_config_handler () ).delete_namespaced_ingress (
111
108
name = f"{ cluster_name } -ingress" , namespace = namespace
112
109
)
113
- client .RbacAuthorizationV1Api (api_client ).delete_cluster_role_binding (
110
+ client .RbacAuthorizationV1Api (api_config_handler () ).delete_cluster_role_binding (
114
111
name = f"{ cluster_name } -rb"
115
112
)
116
113
@@ -123,7 +120,6 @@ def _create_or_replace_oauth_service_obj(
123
120
service_name : str ,
124
121
port_name : str ,
125
122
) -> client .V1Service :
126
- api_client = api_config_handler ()
127
123
oauth_service = client .V1Service (
128
124
api_version = "v1" ,
129
125
kind = "Service" ,
@@ -153,12 +149,12 @@ def _create_or_replace_oauth_service_obj(
153
149
),
154
150
)
155
151
try :
156
- client .CoreV1Api (api_client ).create_namespaced_service (
152
+ client .CoreV1Api (api_config_handler () ).create_namespaced_service (
157
153
namespace = namespace , body = oauth_service
158
154
)
159
155
except client .ApiException as e :
160
156
if e .reason == "Conflict" :
161
- client .CoreV1Api (api_client ).replace_namespaced_service (
157
+ client .CoreV1Api (api_config_handler () ).replace_namespaced_service (
162
158
namespace = namespace , body = oauth_service , name = service_name
163
159
)
164
160
else :
@@ -172,7 +168,6 @@ def _create_or_replace_oauth_ingress_object(
172
168
port_name : str ,
173
169
host : str ,
174
170
) -> client .V1Ingress :
175
- api_client = api_config_handler ()
176
171
ingress = client .V1Ingress (
177
172
api_version = "networking.k8s.io/v1" ,
178
173
kind = "Ingress" ,
@@ -205,12 +200,12 @@ def _create_or_replace_oauth_ingress_object(
205
200
),
206
201
)
207
202
try :
208
- client .NetworkingV1Api (api_client ).create_namespaced_ingress (
203
+ client .NetworkingV1Api (api_config_handler () ).create_namespaced_ingress (
209
204
namespace = namespace , body = ingress
210
205
)
211
206
except client .ApiException as e :
212
207
if e .reason == "Conflict" :
213
- client .NetworkingV1Api (api_client ).replace_namespaced_ingress (
208
+ client .NetworkingV1Api (api_config_handler () ).replace_namespaced_ingress (
214
209
namespace = namespace , body = ingress , name = f"{ cluster_name } -ingress"
215
210
)
216
211
else :
0 commit comments