Skip to content

Commit 7ef3712

Browse files
committedOct 3, 2023
*: address review comments
Signed-off-by: Steve Kuznetsov <[email protected]>
1 parent 1d1ab6f commit 7ef3712

File tree

4 files changed

+7
-12
lines changed

4 files changed

+7
-12
lines changed
 

‎pkg/controller/install/certresources.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -504,7 +504,7 @@ func (i *StrategyDeploymentInstaller) installCertRequirementsForDeployment(deplo
504504
Name: "extension-apiserver-authentication-reader",
505505
},
506506
}
507-
authReaderRoleBinding.SetName(AuthReaderRolebindingName(service.GetName()))
507+
authReaderRoleBinding.SetName(AuthReaderRoleBindingName(service.GetName()))
508508
authReaderRoleBinding.SetNamespace(KubeSystem)
509509
authReaderRoleBinding.SetLabels(map[string]string{OLMManagedLabelKey: OLMManagedLabelValue})
510510

@@ -547,7 +547,7 @@ func AuthDelegatorClusterRoleBindingName(serviceName string) string {
547547
return serviceName + "-system:auth-delegator"
548548
}
549549

550-
func AuthReaderRolebindingName(serviceName string) string {
550+
func AuthReaderRoleBindingName(serviceName string) string {
551551
return serviceName + "-auth-reader"
552552
}
553553

‎pkg/controller/operators/olm/apiservices.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -180,8 +180,8 @@ func (a *Operator) checkAPIServiceResources(csv *v1alpha1.ClusterServiceVersion,
180180
logger.WithError(err).Warnf("could not retrieve auth delegator cluster role binding %s", install.AuthDelegatorClusterRoleBindingName(service.GetName()))
181181
errs = append(errs, err)
182182
}
183-
if _, err := a.lister.RbacV1().RoleBindingLister().RoleBindings(install.KubeSystem).Get(install.AuthReaderRolebindingName(service.GetName())); err != nil {
184-
logger.WithError(err).Warnf("could not retrieve role binding %s/%s", install.KubeSystem, install.AuthReaderRolebindingName(service.GetName()))
183+
if _, err := a.lister.RbacV1().RoleBindingLister().RoleBindings(install.KubeSystem).Get(install.AuthReaderRoleBindingName(service.GetName())); err != nil {
184+
logger.WithError(err).Warnf("could not retrieve role binding %s/%s", install.KubeSystem, install.AuthReaderRoleBindingName(service.GetName()))
185185
errs = append(errs, err)
186186
}
187187
}

‎pkg/controller/operators/olm/operator.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ type Operator struct {
106106
informersFiltered bool
107107

108108
ruleChecker func(*v1alpha1.ClusterServiceVersion) *install.CSVRuleChecker
109-
ruleCheckerLock *sync.RWMutex
109+
ruleCheckerLock sync.RWMutex
110110
resyncPeriod func() time.Duration
111111
ctx context.Context
112112
}
@@ -218,7 +218,7 @@ func newOperatorWithConfig(ctx context.Context, config *operatorConfig) (*Operat
218218
clientFactory: clients.NewFactory(config.restConfig),
219219
protectedCopiedCSVNamespaces: config.protectedCopiedCSVNamespaces,
220220
resyncPeriod: config.resyncPeriod,
221-
ruleCheckerLock: &sync.RWMutex{},
221+
ruleCheckerLock: sync.RWMutex{},
222222
ctx: ctx,
223223
informersFiltered: canFilter,
224224
}

‎pkg/controller/operators/olm/requirements.go

+1-6
Original file line numberDiff line numberDiff line change
@@ -424,12 +424,7 @@ func permissionsPreviouslyCreated[T, U metav1.Object](
424424
}
425425
roleSelectorMap := ownerutil.OwnerLabel(csv, v1alpha1.ClusterServiceVersionKind)
426426
roleSelectorMap[resolver.ContentHashLabelKey] = ruleHash
427-
roleSelectorSet := labels.Set{}
428-
for key, value := range roleSelectorMap {
429-
roleSelectorSet[key] = value
430-
}
431-
roleSelector := labels.SelectorFromSet(roleSelectorSet)
432-
roles, err := listRoles(roleSelector)
427+
roles, err := listRoles(labels.SelectorFromSet(roleSelectorMap))
433428
if err != nil {
434429
return false, err
435430
}

0 commit comments

Comments
 (0)
Please sign in to comment.