// NewREST returns a RESTStorage object that will work against authorize tokens func NewREST(optsGetter restoptions.Getter, clientGetter oauthclient.Getter) (*REST, error) { strategy := oauthauthorizetoken.NewStrategy(clientGetter) store := ®istry.Store{ NewFunc: func() runtime.Object { return &api.OAuthAuthorizeToken{} }, NewListFunc: func() runtime.Object { return &api.OAuthAuthorizeTokenList{} }, ObjectNameFunc: func(obj runtime.Object) (string, error) { return obj.(*api.OAuthAuthorizeToken).Name, nil }, PredicateFunc: func(label labels.Selector, field fields.Selector) *generic.SelectionPredicate { return oauthauthorizetoken.Matcher(label, field) }, TTLFunc: func(obj runtime.Object, existing uint64, update bool) (uint64, error) { token := obj.(*api.OAuthAuthorizeToken) expires := uint64(token.ExpiresIn) return expires, nil }, QualifiedResource: api.Resource("oauthauthorizetokens"), CreateStrategy: strategy, UpdateStrategy: strategy, } if err := restoptions.ApplyOptions(optsGetter, store, false, storage.NoTriggerPublisher); err != nil { return nil, err } return &REST{store}, nil }
// NewREST returns a RESTStorage object that will work against authorize tokens func NewREST(optsGetter restoptions.Getter, clientGetter oauthclient.Getter, backends ...storage.Interface) (*REST, error) { strategy := oauthauthorizetoken.NewStrategy(clientGetter) store := ®istry.Store{ NewFunc: func() runtime.Object { return &api.OAuthAuthorizeToken{} }, NewListFunc: func() runtime.Object { return &api.OAuthAuthorizeTokenList{} }, KeyRootFunc: func(ctx kapi.Context) string { return EtcdPrefix }, KeyFunc: func(ctx kapi.Context, name string) (string, error) { return util.NoNamespaceKeyFunc(ctx, EtcdPrefix, name) }, ObjectNameFunc: func(obj runtime.Object) (string, error) { return obj.(*api.OAuthAuthorizeToken).Name, nil }, PredicateFunc: func(label labels.Selector, field fields.Selector) generic.Matcher { return oauthauthorizetoken.Matcher(label, field) }, TTLFunc: func(obj runtime.Object, existing uint64, update bool) (uint64, error) { token := obj.(*api.OAuthAuthorizeToken) expires := uint64(token.ExpiresIn) return expires, nil }, QualifiedResource: api.Resource("oauthauthorizetokens"), CreateStrategy: strategy, UpdateStrategy: strategy, } if err := restoptions.ApplyOptions(optsGetter, store, EtcdPrefix); err != nil { return nil, err } if len(backends) > 0 { // Build identical stores that talk to a single etcd, so we can verify the token is distributed after creation watchers := []rest.Watcher{} for i := range backends { watcher := *store watcher.Storage = backends[i] watchers = append(watchers, &watcher) } // Observe the cluster for the particular resource version, requiring at least one backend to succeed observer := observe.NewClusterObserver(store.Storage.Versioner(), watchers, 1) // After creation, wait for the new token to propagate store.AfterCreate = func(obj runtime.Object) error { return observer.ObserveResourceVersion(obj.(*api.OAuthAuthorizeToken).ResourceVersion, 5*time.Second) } } return &REST{store}, nil }