@@ -33,6 +33,8 @@ import (
3333 "k8s.io/client-go/util/cert"
3434 "k8s.io/cluster-registry/pkg/apis/clusterregistry/v1alpha1"
3535 "k8s.io/cluster-registry/pkg/crinit/util"
36+ "k8s.io/cluster-registry/pkg/crinit/options"
37+ "k8s.io/cluster-registry/pkg/crinit/common"
3638 apiregv1beta1 "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1beta1"
3739 apiregclient "k8s.io/kube-aggregator/pkg/client/clientset_generated/clientset"
3840
@@ -97,12 +99,12 @@ var (
9799)
98100
99101type aggregatedClusterRegistryOptions struct {
100- util .SubcommandOptions
102+ options .SubcommandOptions
101103 apiServerServiceTypeString string
102104}
103105
104106func (o * aggregatedClusterRegistryOptions ) Bind (flags * pflag.FlagSet ) {
105- flags .StringVar (& o .apiServerServiceTypeString , util .APIServerServiceTypeFlag ,
107+ flags .StringVar (& o .apiServerServiceTypeString , options .APIServerServiceTypeFlag ,
106108 string (v1 .ServiceTypeNodePort ),
107109 "The type of service to create for the cluster registry. Options: 'LoadBalancer', 'NodePort'." )
108110}
@@ -299,7 +301,7 @@ func createServiceAccount(clientset client.Interface,
299301 ObjectMeta : metav1.ObjectMeta {
300302 Name : serviceAccountName ,
301303 Namespace : namespace ,
302- Labels : util .ComponentLabel ,
304+ Labels : common .ComponentLabel ,
303305 },
304306 }
305307
@@ -324,7 +326,7 @@ func createClusterRole(clientset client.Interface,
324326 cr := & rbacv1.ClusterRole {
325327 ObjectMeta : metav1.ObjectMeta {
326328 Name : clusterRoleName ,
327- Labels : util .ComponentLabel ,
329+ Labels : common .ComponentLabel ,
328330 },
329331 Rules : []rbacv1.PolicyRule {rule },
330332 }
@@ -345,7 +347,7 @@ func createClusterRoleBindings(clientset client.Interface,
345347 // cluster role.
346348 crb , err := createClusterRoleBindingObject (clientset , apiServerCRBName ,
347349 rbacv1 .ServiceAccountKind , serviceAccountName , namespace , rbacv1 .GroupName ,
348- "ClusterRole" , clusterRoleName , util .ComponentLabel , dryRun )
350+ "ClusterRole" , clusterRoleName , common .ComponentLabel , dryRun )
349351
350352 if err != nil {
351353 glog .V (4 ).Infof ("Failed to create cluster role binding %v: %v" , crb , err )
@@ -355,7 +357,7 @@ func createClusterRoleBindings(clientset client.Interface,
355357 // Create cluster role binding for the system:auth-delegator cluster role.
356358 crb , err = createClusterRoleBindingObject (clientset , authDelegatorCRBName ,
357359 rbacv1 .ServiceAccountKind , serviceAccountName , namespace , rbacv1 .GroupName ,
358- "ClusterRole" , "system:auth-delegator" , util .ComponentLabel , dryRun )
360+ "ClusterRole" , "system:auth-delegator" , common .ComponentLabel , dryRun )
359361
360362 if err != nil {
361363 glog .V (4 ).Infof ("Failed to create cluster role binding %v: %v" , crb , err )
@@ -404,7 +406,7 @@ func createExtensionAPIServerAuthenticationRoleBinding(clientset client.Interfac
404406 rb := & rbacv1.RoleBinding {
405407 ObjectMeta : metav1.ObjectMeta {
406408 Name : name ,
407- Labels : util .ComponentLabel ,
409+ Labels : common .ComponentLabel ,
408410 },
409411 Subjects : []rbacv1.Subject {
410412 {
@@ -462,7 +464,7 @@ func createAPIServiceObject(clientset apiregclient.Interface,
462464 apiSvc := & apiregv1beta1.APIService {
463465 ObjectMeta : metav1.ObjectMeta {
464466 Name : apiServiceName ,
465- Labels : util .ComponentLabel ,
467+ Labels : common .ComponentLabel ,
466468 },
467469 Spec : apiregv1beta1.APIServiceSpec {
468470 Service : & apiregv1beta1.ServiceReference {
0 commit comments