Skip to content

Commit 8b2d509

Browse files
author
OpenShift Bot
committed
bump(github.com/openshift/origin-web-console): e30aa32263beacd860469cc1bd825a16fe41060b
1 parent c4172dd commit 8b2d509

File tree

1 file changed

+57
-53
lines changed

1 file changed

+57
-53
lines changed

pkg/assets/bindata.go

Lines changed: 57 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -7222,7 +7222,9 @@ link:"project/" + c.projectName + "/browse/secrets"
72227222
title:"Create Secret"
72237223
} ], i.get(b.project).then(_.spread(function(b, d) {
72247224
c.project = b, c.context = d, c.breadcrumbs[0].title = a("displayName")(b), c.postCreateAction = function(a, b) {
7225-
e.addAlert(b), h.toResourceList("secrets", c.projectName);
7225+
_.each(b, function(a) {
7226+
e.addAlert(a);
7227+
}), h.toResourceList("secrets", c.projectName);
72267228
}, c.cancel = function() {
72277229
h.toResourceList("secrets", c.projectName);
72287230
};
@@ -9077,7 +9079,9 @@ n("An error occurred attaching the persistent volume claim to the " + a("humaniz
90779079
}));
90789080
} ]), angular.module("openshiftConsole").controller("CreateSecretModalController", [ "$scope", "$uibModalInstance", function(a, b) {
90799081
a.postCreateAction = function(c, d) {
9080-
b.close(c), a.alerts[d.name] = d.data;
9082+
b.close(c), _.each(d, function(b) {
9083+
a.alerts[b.name] = b.data;
9084+
});
90819085
}, a.cancel = function() {
90829086
b.dismiss("cancel");
90839087
};
@@ -9213,7 +9217,7 @@ a.hideBuild = c(b);
92139217
},
92149218
templateUrl:"views/directives/_build-close.html"
92159219
};
9216-
} ]), angular.module("openshiftConsole").directive("createSecret", [ "DataService", "AuthorizationService", function(a, b) {
9220+
} ]), angular.module("openshiftConsole").directive("createSecret", [ "DataService", "AuthorizationService", "$filter", function(a, b, c) {
92179221
return {
92189222
restrict:"E",
92199223
scope:{
@@ -9224,8 +9228,8 @@ postCreateAction:"&",
92249228
cancel:"&"
92259229
},
92269230
templateUrl:"views/directives/create-secret.html",
9227-
link:function(c, d) {
9228-
c.alerts = {}, c.secretAuthTypeMap = {
9231+
link:function(d) {
9232+
d.alerts = {}, d.secretAuthTypeMap = {
92299233
image:{
92309234
label:"Image Secret",
92319235
authTypes:[ {
@@ -9246,50 +9250,50 @@ id:"kubernetes.io/ssh-auth",
92469250
label:"SSH Key"
92479251
} ]
92489252
}
9249-
}, c.secretTypes = _.keys(c.secretAuthTypeMap), c.type ? c.newSecret = {
9250-
type:c.type,
9251-
authType:c.secretAuthTypeMap[c.type].authTypes[0].id,
9253+
}, d.secretTypes = _.keys(d.secretAuthTypeMap), d.type ? d.newSecret = {
9254+
type:d.type,
9255+
authType:d.secretAuthTypeMap[d.type].authTypes[0].id,
92529256
data:{},
9253-
linkSecret:!_.isEmpty(c.serviceAccountToLink),
9254-
pickedServiceAccountToLink:c.serviceAccountToLink || ""
9255-
} :c.newSecret = {
9257+
linkSecret:!_.isEmpty(d.serviceAccountToLink),
9258+
pickedServiceAccountToLink:d.serviceAccountToLink || ""
9259+
} :d.newSecret = {
92569260
type:"source",
92579261
authType:"kubernetes.io/basic-auth",
92589262
data:{},
92599263
linkSecret:!1,
92609264
pickedServiceAccountToLink:""
9261-
}, c.add = {
9265+
}, d.add = {
92629266
gitconfig:!1,
92639267
cacert:!1
9264-
}, !c.serviceAccountToLink && b.canI("serviceaccounts", "list") && b.canI("serviceaccounts", "update") && a.list("serviceaccounts", c, function(a) {
9265-
c.serviceAccounts = a.by("metadata.name"), c.serviceAccountsNames = _.keys(c.serviceAccounts);
9268+
}, b.canI("serviceaccounts", "list") && b.canI("serviceaccounts", "update") && a.list("serviceaccounts", d, function(a) {
9269+
d.serviceAccounts = a.by("metadata.name"), d.serviceAccountsNames = _.keys(d.serviceAccounts);
92669270
});
92679271
var e = function(a, b) {
9268-
var d = {
9272+
var c = {
92699273
apiVersion:"v1",
92709274
kind:"Secret",
92719275
metadata:{
9272-
name:c.newSecret.data.secretName
9276+
name:d.newSecret.data.secretName
92739277
},
92749278
type:b,
92759279
data:{}
92769280
};
92779281
switch (b) {
92789282
case "kubernetes.io/basic-auth":
9279-
a.passwordToken ? d.data = {
9283+
a.passwordToken ? c.data = {
92809284
password:window.btoa(a.passwordToken)
9281-
} :d.type = "Opaque", a.username && (d.data.username = window.btoa(a.username)), a.gitconfig && (d.data[".gitconfig"] = window.btoa(a.gitconfig)), a.cacert && (d.data["ca.crt"] = window.btoa(a.cacert));
9285+
} :c.type = "Opaque", a.username && (c.data.username = window.btoa(a.username)), a.gitconfig && (c.data[".gitconfig"] = window.btoa(a.gitconfig)), a.cacert && (c.data["ca.crt"] = window.btoa(a.cacert));
92829286
break;
92839287

92849288
case "kubernetes.io/ssh-auth":
9285-
d.data = {
9289+
c.data = {
92869290
"ssh-privatekey":window.btoa(a.privateKey)
9287-
}, a.gitconfig && (d.data[".gitconfig"] = window.btoa(a.gitconfig));
9291+
}, a.gitconfig && (c.data[".gitconfig"] = window.btoa(a.gitconfig));
92889292
break;
92899293

92909294
case "kubernetes.io/dockerconfigjson":
92919295
var e = window.btoa(a.dockerConfig);
9292-
JSON.parse(a.dockerConfig).auths ? d.data[".dockerconfigjson"] = e :(d.type = "kubernetes.io/dockercfg", d.data[".dockercfg"] = e);
9296+
JSON.parse(a.dockerConfig).auths ? c.data[".dockerconfigjson"] = e :(c.type = "kubernetes.io/dockercfg", c.data[".dockercfg"] = e);
92939297
break;
92949298

92959299
case "kubernetes.io/dockercfg":
@@ -9299,80 +9303,80 @@ username:a.dockerUsername,
92999303
password:a.dockerPassword,
93009304
email:a.dockerMail,
93019305
auth:f
9302-
}, d.data[".dockercfg"] = window.btoa(JSON.stringify(g));
9306+
}, c.data[".dockercfg"] = window.btoa(JSON.stringify(g));
93039307
}
9304-
return d;
9305-
}, f = function(b) {
9306-
var e = angular.copy(c.serviceAccounts[c.newSecret.pickedServiceAccountToLink]);
9307-
switch (c.newSecret.type) {
9308+
return c;
9309+
}, f = function(b, e) {
9310+
var f = angular.copy(d.serviceAccounts[d.newSecret.pickedServiceAccountToLink]);
9311+
switch (d.newSecret.type) {
93089312
case "source":
9309-
e.secrets.push({
9313+
f.secrets.push({
93109314
name:b.metadata.name
93119315
});
93129316
break;
93139317

93149318
case "image":
9315-
e.imagePullSecrets.push({
9319+
f.imagePullSecrets.push({
93169320
name:b.metadata.name
93179321
});
93189322
}
9319-
var f = c.serviceAccountToLink ? {
9323+
var g = d.serviceAccountToLink ? {
93209324
errorNotification:!1
93219325
} :{};
9322-
a.update("serviceaccounts", c.newSecret.pickedServiceAccountToLink, e, c, f).then(function(a) {
9323-
var d = {
9324-
name:"createAndLink",
9326+
a.update("serviceaccounts", d.newSecret.pickedServiceAccountToLink, f, d, g).then(function(a) {
9327+
e.push({
9328+
name:"create",
93259329
data:{
93269330
type:"success",
93279331
message:"Secret " + b.metadata.name + " was created and linked with service account " + a.metadata.name + "."
93289332
}
9329-
};
9330-
c.postCreateAction({
9333+
}), d.postCreateAction({
93319334
newSecret:b,
9332-
creationAlert:d
9335+
creationAlert:e
93339336
});
93349337
}, function(a) {
9335-
c.alerts = {
9338+
e.push({
93369339
name:"createAndLink",
93379340
data:{
93389341
type:"error",
9339-
message:"An error occurred while linking the secret with service account.",
9340-
details:d("getErrorDetails")(a)
9342+
message:"An error occurred while linking the secret with service account " + d.newSecret.pickedServiceAccountToLink + ".",
9343+
details:c("getErrorDetails")(a)
93419344
}
9342-
};
9345+
}), d.postCreateAction({
9346+
newSecret:b,
9347+
creationAlert:e
9348+
});
93439349
});
93449350
}, g = _.debounce(function() {
93459351
try {
9346-
JSON.parse(c.newSecret.data.dockerConfig), c.invalidConfigFormat = !1;
9352+
JSON.parse(d.newSecret.data.dockerConfig), d.invalidConfigFormat = !1;
93479353
} catch (a) {
9348-
c.invalidConfigFormat = !0;
9354+
d.invalidConfigFormat = !0;
93499355
}
93509356
}, 300, {
93519357
leading:!0
93529358
});
9353-
c.aceChanged = g, c.create = function() {
9354-
c.alerts = {};
9355-
var g = e(c.newSecret.data, c.newSecret.authType);
9356-
a.create("secrets", null, g, c).then(function(a) {
9357-
if (c.newSecret.linkSecret && c.newSecret.pickedServiceAccountToLink && b.canI("serviceaccounts", "update")) f(a); else {
9358-
var d = {
9359+
d.aceChanged = g, d.create = function() {
9360+
d.alerts = {};
9361+
var g = e(d.newSecret.data, d.newSecret.authType);
9362+
a.create("secrets", null, g, d).then(function(a) {
9363+
var c = [ {
93599364
name:"create",
93609365
data:{
93619366
type:"success",
93629367
message:"Secret " + g.metadata.name + " was created."
93639368
}
9364-
};
9365-
c.postCreateAction({
9369+
} ];
9370+
d.newSecret.linkSecret && d.serviceAccountsNames.contains(d.newSecret.pickedServiceAccountToLink) && b.canI("serviceaccounts", "update") ? f(a, c) :d.postCreateAction({
93669371
newSecret:a,
9367-
creationAlert:d
9372+
creationAlert:c
93689373
});
9369-
}
93709374
}, function(a) {
93719375
var b = a.data || {};
9372-
return "AlreadyExists" === b.reason ? void (c.nameTaken = !0) :void (c.alerts.create = {
9376+
return "AlreadyExists" === b.reason ? void (d.nameTaken = !0) :void (d.alerts.create = {
93739377
type:"error",
93749378
message:"An error occurred while creating the secret.",
9375-
details:d("getErrorDetails")(a)
9379+
details:c("getErrorDetails")(a)
93769380
});
93779381
});
93789382
};

0 commit comments

Comments
 (0)