@@ -25,9 +25,7 @@ import (
25
25
26
26
"google.golang.org/grpc"
27
27
"google.golang.org/grpc/credentials/insecure"
28
- "k8s.io/client-go/kubernetes"
29
28
"sigs.k8s.io/controller-runtime/pkg/client"
30
- "sigs.k8s.io/controller-runtime/pkg/client/config"
31
29
32
30
experimentv1beta1 "github.com/kubeflow/katib/pkg/apis/controller/experiments/v1beta1"
33
31
api_pb_v1beta1 "github.com/kubeflow/katib/pkg/apis/manager/v1beta1"
@@ -40,20 +38,11 @@ func NewKatibUIHandler(dbManagerAddr string) *KatibUIHandler {
40
38
log .Printf ("NewClient for Katib failed: %v" , err )
41
39
panic (err )
42
40
}
43
- // create a new client for manipulating SAR objects.
44
- conf , err := config .GetConfig ()
45
- if err != nil {
46
- log .Printf ("Failed to create k8s rest config: %v" , err )
47
- panic (err )
48
- }
49
- sarclient , err := kubernetes .NewForConfig (conf )
50
- if err != nil {
51
- log .Printf ("SarClient for Katib failes: %v" , err )
52
- panic (err )
53
- }
41
+ sarclient := kclient .GetClient ()
42
+
54
43
return & KatibUIHandler {
55
44
katibClient : kclient ,
56
- sarClient : * sarclient ,
45
+ sarClient : sarclient ,
57
46
dbManagerAddr : dbManagerAddr ,
58
47
}
59
48
}
@@ -123,9 +112,9 @@ func (k *KatibUIHandler) CreateExperiment(w http.ResponseWriter, r *http.Request
123
112
namespace := job .ObjectMeta .Namespace
124
113
expName := job .ObjectMeta .Name
125
114
126
- err = IsAuthorized (user , "create" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , "" , & k .sarClient )
115
+ err = IsAuthorized (user , "create" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , "" , k .sarClient )
127
116
if err != nil {
128
- log .Printf ("The user: %s is not authorized to create experiment: %s from namespace: %s \n " , user , expName , namespace )
117
+ log .Printf ("The user: %s is not authorized to create experiment: %s in namespace: %s \n " , user , expName , namespace )
129
118
http .Error (w , err .Error (), http .StatusForbidden )
130
119
return
131
120
}
@@ -158,9 +147,9 @@ func (k *KatibUIHandler) FetchNamespacedExperiments(w http.ResponseWriter, r *ht
158
147
159
148
namespace := namespaces [0 ]
160
149
161
- err = IsAuthorized (user , "list" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , "" , & k .sarClient )
150
+ err = IsAuthorized (user , "list" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , "" , k .sarClient )
162
151
if err != nil {
163
- log .Printf ("The user: %s is not authorized to list experiments from namespace: %s \n " , user , namespace )
152
+ log .Printf ("The user: %s is not authorized to list experiments in namespace: %s \n " , user , namespace )
164
153
http .Error (w , err .Error (), http .StatusForbidden )
165
154
return
166
155
}
@@ -236,9 +225,9 @@ func (k *KatibUIHandler) DeleteExperiment(w http.ResponseWriter, r *http.Request
236
225
experimentName := experimentNames [0 ]
237
226
namespace := namespaces [0 ]
238
227
239
- err = IsAuthorized (user , "delete" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , experimentName , & k .sarClient )
228
+ err = IsAuthorized (user , "delete" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , "" , k .sarClient )
240
229
if err != nil {
241
- log .Printf ("The user: %s is not authorized to delete experiment: %s from namespace: %s \n " , user , experimentName , namespace )
230
+ log .Printf ("The user: %s is not authorized to delete experiment: %s in namespace: %s \n " , user , experimentName , namespace )
242
231
http .Error (w , err .Error (), http .StatusForbidden )
243
232
return
244
233
}
@@ -353,9 +342,9 @@ func (k *KatibUIHandler) AddTemplate(w http.ResponseWriter, r *http.Request) {
353
342
updatedConfigMapPath := data ["updatedConfigMapPath" ].(string )
354
343
updatedTemplateYaml := data ["updatedTemplateYaml" ].(string )
355
344
356
- err = IsAuthorized (user , "create" , updatedConfigMapNamespace , "" , "v1" , "configmaps" , "" , updatedConfigMapName , & k .sarClient )
345
+ err = IsAuthorized (user , "create" , updatedConfigMapNamespace , "" , "v1" , "configmaps" , "" , updatedConfigMapName , k .sarClient )
357
346
if err != nil {
358
- log .Printf ("The user: %s is not authorized to add configmap: %s from namespace: %s \n " , user , updatedConfigMapName , updatedConfigMapNamespace )
347
+ log .Printf ("The user: %s is not authorized to add configmap: %s in namespace: %s \n " , user , updatedConfigMapName , updatedConfigMapNamespace )
359
348
http .Error (w , err .Error (), http .StatusForbidden )
360
349
return
361
350
}
@@ -408,9 +397,9 @@ func (k *KatibUIHandler) EditTemplate(w http.ResponseWriter, r *http.Request) {
408
397
updatedConfigMapPath := data ["updatedConfigMapPath" ].(string )
409
398
updatedTemplateYaml := data ["updatedTemplateYaml" ].(string )
410
399
411
- err = IsAuthorized (user , "update" , updatedConfigMapNamespace , "" , "v1" , "configmaps" , "" , updatedConfigMapName , & k .sarClient )
400
+ err = IsAuthorized (user , "update" , updatedConfigMapNamespace , "" , "v1" , "configmaps" , "" , updatedConfigMapName , k .sarClient )
412
401
if err != nil {
413
- log .Printf ("The user: %s is not authorized to edit configmap: %s from namespace: %s \n " , user , updatedConfigMapName , updatedConfigMapNamespace )
402
+ log .Printf ("The user: %s is not authorized to edit configmap: %s in namespace: %s \n " , user , updatedConfigMapName , updatedConfigMapNamespace )
414
403
http .Error (w , err .Error (), http .StatusForbidden )
415
404
return
416
405
}
@@ -460,9 +449,9 @@ func (k *KatibUIHandler) DeleteTemplate(w http.ResponseWriter, r *http.Request)
460
449
updatedConfigMapName := data ["updatedConfigMapName" ].(string )
461
450
updatedConfigMapPath := data ["updatedConfigMapPath" ].(string )
462
451
463
- err = IsAuthorized (user , "delete" , updatedConfigMapNamespace , "" , "v1" , "configmaps" , "" , updatedConfigMapName , & k .sarClient )
452
+ err = IsAuthorized (user , "delete" , updatedConfigMapNamespace , "" , "v1" , "configmaps" , "" , updatedConfigMapName , k .sarClient )
464
453
if err != nil {
465
- log .Printf ("The user: %s is not authorized to delete configmap: %s from namespace: %s \n " , user , updatedConfigMapName , updatedConfigMapNamespace )
454
+ log .Printf ("The user: %s is not authorized to delete configmap: %s in namespace: %s \n " , user , updatedConfigMapName , updatedConfigMapNamespace )
466
455
http .Error (w , err .Error (), http .StatusForbidden )
467
456
return
468
457
}
@@ -541,9 +530,9 @@ func (k *KatibUIHandler) FetchExperiment(w http.ResponseWriter, r *http.Request)
541
530
experimentName := experimentNames [0 ]
542
531
namespace := namespaces [0 ]
543
532
544
- err = IsAuthorized (user , "get" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , experimentName , & k .sarClient )
533
+ err = IsAuthorized (user , "get" , namespace , "kubeflow.org" , "v1beta1" , "experiments" , "" , experimentName , k .sarClient )
545
534
if err != nil {
546
- log .Printf ("The user: %s is not authorized to get experiment: %s from namespace: %s \n " , user , experimentName , namespace )
535
+ log .Printf ("The user: %s is not authorized to get experiment: %s in namespace: %s \n " , user , experimentName , namespace )
547
536
http .Error (w , err .Error (), http .StatusForbidden )
548
537
return
549
538
}
@@ -594,9 +583,9 @@ func (k *KatibUIHandler) FetchSuggestion(w http.ResponseWriter, r *http.Request)
594
583
suggestionName := suggestionNames [0 ]
595
584
namespace := namespaces [0 ]
596
585
597
- err = IsAuthorized (user , "get" , namespace , "kubeflow.org" , "v1beta1" , "suggestions" , "" , suggestionName , & k .sarClient )
586
+ err = IsAuthorized (user , "get" , namespace , "kubeflow.org" , "v1beta1" , "suggestions" , "" , suggestionName , k .sarClient )
598
587
if err != nil {
599
- log .Printf ("The user: %s is not authorized to get suggestion: %s from namespace: %s \n " , user , suggestionName , namespace )
588
+ log .Printf ("The user: %s is not authorized to get suggestion: %s in namespace: %s \n " , user , suggestionName , namespace )
600
589
http .Error (w , err .Error (), http .StatusForbidden )
601
590
return
602
591
}
0 commit comments