Skip to content

Commit 8d4bcf4

Browse files
committed
fix: change --all-principals to --all-accounts
1 parent 610ec81 commit 8d4bcf4

File tree

5 files changed

+29
-29
lines changed

5 files changed

+29
-29
lines changed

.cases/kafka-acl-grant-permissions.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ rhoas kafka acl grant-access --producer --user test_user --topic-prefix test_
4444

4545
rhoas kafka acl grant-access --producer --user test_user --topic test_topic
4646

47-
rhoas kafka acl grant-access --producer --all-principals --topic all
47+
rhoas kafka acl grant-access --producer --all-accounts --topic all
4848

4949
rhoas kafka acl grant-access --consumer --service-account test_prefix --topic-prefix test_
5050

docs/commands/rhoas_kafka_acl_grant-access.adoc

Lines changed: 3 additions & 3 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pkg/cmd/kafka/acl/grant/grant.go

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -33,17 +33,17 @@ type options struct {
3333
localizer localize.Localizer
3434
Context context.Context
3535

36-
kafkaID string
37-
topic string
38-
user string
39-
svcAccount string
40-
group string
41-
producer bool
42-
consumer bool
43-
topicPrefix string
44-
groupPrefix string
45-
force bool
46-
allPrincipals bool
36+
kafkaID string
37+
topic string
38+
user string
39+
svcAccount string
40+
group string
41+
producer bool
42+
consumer bool
43+
topicPrefix string
44+
groupPrefix string
45+
force bool
46+
allAccounts bool
4747
}
4848

4949
// NewGrantPermissionsACLCommand creates a series of ACL rules
@@ -97,9 +97,9 @@ func NewGrantPermissionsACLCommand(f *factory.Factory) *cobra.Command {
9797
cmd.Flags().BoolVar(&opts.producer, "producer", false, opts.localizer.MustLocalize("kafka.acl.grantPermissions.flag.producer.description"))
9898
cmd.Flags().StringVar(&opts.topicPrefix, "topic-prefix", "", opts.localizer.MustLocalize("kafka.acl.common.flag.topicPrefix.description"))
9999
cmd.Flags().StringVar(&opts.groupPrefix, "group-prefix", "", opts.localizer.MustLocalize("kafka.acl.common.flag.groupPrefix.description"))
100-
cmd.Flags().StringVar(&opts.kafkaID, "instance-id", "", opts.localizer.MustLocalize("kafka.acl.common.flag.instance.id"))
101-
cmd.Flags().BoolVar(&opts.allPrincipals, "all-principals", false, opts.localizer.MustLocalize("kafka.acl.common.flag.allPrincipals"))
102-
cmd.Flags().BoolVarP(&opts.force, "yes", "y", false, opts.localizer.MustLocalize("kafka.acl.grantPermissions.flag.yes"))
100+
cmd.Flags().StringVar(&opts.kafkaID, "instance-id", "", opts.localizer.MustLocalize("kafka.acl.common.flag.instance.id.description"))
101+
cmd.Flags().BoolVar(&opts.allAccounts, "all-accounts", false, opts.localizer.MustLocalize("kafka.acl.common.flag.allAccounts.description"))
102+
cmd.Flags().BoolVarP(&opts.force, "yes", "y", false, opts.localizer.MustLocalize("kafka.acl.grantPermissions.flag.yes.description"))
103103

104104
return cmd
105105
}
@@ -151,7 +151,7 @@ func runGrantPermissions(opts *options) (err error) {
151151
userArg = buildPrincipal(opts.user)
152152
}
153153

154-
if opts.allPrincipals {
154+
if opts.allAccounts {
155155
userArg = buildPrincipal(acl.Wildcard)
156156
}
157157

@@ -316,7 +316,7 @@ func validateFlagInputCombination(opts *options) error {
316316
}
317317

318318
// check if priincipal is provided
319-
if opts.user == "" && opts.svcAccount == "" && !opts.allPrincipals {
319+
if opts.user == "" && opts.svcAccount == "" && !opts.allAccounts {
320320
return opts.localizer.MustLocalizeError("kafka.acl.grantPermissions.error.noPrincipalsSelected")
321321
}
322322

@@ -325,8 +325,8 @@ func validateFlagInputCombination(opts *options) error {
325325
return opts.localizer.MustLocalizeError("kafka.acl.grantPermissions.error.bothPrincipalsSelected")
326326
}
327327

328-
// user and service account can't be along with "--all-principals" flag
329-
if opts.allPrincipals && (opts.svcAccount != "" || opts.user != "") {
328+
// user and service account can't be along with "--all-accounts" flag
329+
if opts.allAccounts && (opts.svcAccount != "" || opts.user != "") {
330330
return opts.localizer.MustLocalizeError("kafka.acl.grantPermissions.allPrinciapls.error.notAllowed")
331331
}
332332

pkg/cmd/kafka/acl/list/list.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ func NewListACLCommand(f *factory.Factory) *cobra.Command {
7474
cmd.Flags().Int32Var(&opts.page, "page", cmdutil.ConvertPageValueToInt32(build.DefaultPageNumber), opts.localizer.MustLocalize("kafka.acl.list.flag.page.description"))
7575
cmd.Flags().Int32Var(&opts.size, "size", cmdutil.ConvertSizeValueToInt32(build.DefaultPageSize), opts.localizer.MustLocalize("kafka.acl.list.flag.size.description"))
7676
cmd.Flags().StringVarP(&opts.output, "output", "o", dump.EmptyFormat, opts.localizer.MustLocalize("kafka.acl.list.flag.output.description"))
77-
cmd.Flags().StringVar(&opts.kafkaID, "instance-id", "", opts.localizer.MustLocalize("kafka.acl.common.flag.instance.id"))
77+
cmd.Flags().StringVar(&opts.kafkaID, "instance-id", "", opts.localizer.MustLocalize("kafka.acl.common.flag.instance.id.description"))
7878

7979
flagutil.EnableOutputFlagCompletion(cmd)
8080

pkg/localize/locales/en/cmd/acl.en.toml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,10 @@ $ rhoas kafka acl grant-access --consumer --user user_name --topic-prefix "abc"
5959
$ rhoas kafka acl grant-access --producer --user user_name --topic-prefix "abc"
6060
6161
# Grant access to all users for consuming messages from topic "my-topic"
62-
$ rhoas kafka acl grant-access --consumer --all-principals --topic my-topic --group my-group
62+
$ rhoas kafka acl grant-access --consumer --all-accounts --topic my-topic --group my-group
6363
6464
# Grant access to all users for producing messages to topic "my-topic"
65-
$ rhoas kafka acl grant-access --producer --all-principals --topic my-topic
65+
$ rhoas kafka acl grant-access --producer --all-accounts --topic my-topic
6666
6767
# Grant access to principal for produce and consume messages from all topics
6868
$ rhoas kafka acl grant-access --producer --consumer --user user_name --topic all --group all
@@ -72,7 +72,7 @@ $ rhoas kafka acl grant-access --producer --consumer --user user_name --topic al
7272
one = 'flags "--user" and "--service-account" can not be provided simultaneously'
7373

7474
[kafka.acl.grantPermissions.allPrinciapls.error.notAllowed]
75-
one = 'flags "--user" and "--service-account" can not be provided along with "--all-principals"'
75+
one = 'flags "--user" and "--service-account" can not be provided along with "--all-accounts"'
7676

7777
[kafka.acl.grantPermissions.error.noPrincipalsSelected]
7878
one = 'principal is missing, provide "--user" or "--service-account" flag'
@@ -101,10 +101,10 @@ one = 'Prefix name for topics to be selected'
101101
[kafka.acl.common.flag.groupPrefix.description]
102102
one = 'Prefix name for groups to be selected'
103103

104-
[kafka.acl.common.flag.allPrincipals]
104+
[kafka.acl.common.flag.allAccounts.description]
105105
one = 'Select all users and service accounts as principal'
106106

107-
[kafka.acl.common.flag.instance.id]
107+
[kafka.acl.common.flag.instance.id.description]
108108
one = 'ID of the Kafka instance to be used. By default, uses the currently selected instance'
109109

110110
[kafka.acl.grantPermissions.flag.producer.description]
@@ -113,7 +113,7 @@ one = 'Add ACL rules that grant the specified principal access to produce messag
113113
[kafka.acl.grantPermissions.flag.consumer.description]
114114
one = 'Add ACL rules that grant the specified principal access to consume messages from topics'
115115

116-
[kafka.acl.grantPermissions.flag.yes]
116+
[kafka.acl.grantPermissions.flag.yes.description]
117117
one = 'Skip confirmation to add ACL rules'
118118

119119

0 commit comments

Comments
 (0)