Skip to content

Commit be35cb8

Browse files
authored
stop using old verb (#232)
Signed-off-by: Allen Li <[email protected]>
1 parent 294c1f5 commit be35cb8

File tree

2 files changed

+17
-25
lines changed

2 files changed

+17
-25
lines changed

common/config/.golangci.yml

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,27 +27,29 @@ linters:
2727
# inverted configuration with `enable-all` and `disable` is not scalable during updates of golangci-lint
2828
disable-all: true
2929
enable:
30-
- deadcode
30+
- revive
3131
- errcheck
3232
- gocyclo
3333
- gofmt
3434
- goimports
35-
- golint
3635
- gosec
3736
- gosimple
3837
- govet
39-
# - ineffassign
40-
- interfacer
4138
- lll
4239
- misspell
4340
- staticcheck
44-
- structcheck
4541
- typecheck
4642
- unconvert
4743
- unparam
4844
- unused
49-
- varcheck
45+
5046
# don't enable:
47+
# - deadcode
48+
# - golint
49+
# - ineffassign
50+
# - interfacer
51+
# - varcheck
52+
# - structcheck
5153
# - gocritic
5254
# - bodyclose
5355
# - depguard
@@ -210,4 +212,4 @@ issues:
210212
max-per-linter: 0
211213

212214
# Maximum count of issues with the same text. Set to 0 to disable. Default is 3.
213-
max-same-issues: 0
215+
max-same-issues: 0

controllers/namespacescope_controller.go

Lines changed: 8 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ import (
2121
"crypto/sha256"
2222
"encoding/hex"
2323
"reflect"
24+
"regexp"
2425
"strings"
2526
"time"
2627

@@ -128,18 +129,18 @@ func (r *NamespaceScopeReconciler) Reconcile(req ctrl.Request) (ctrl.Result, err
128129
return ctrl.Result{}, err
129130
}
130131

132+
reg, _ := regexp.Compile(`^nss-managed-role-from.*`)
131133
for _, namespaceMember := range instance.Spec.NamespaceMembers {
132134
if rolesList, _ := r.GetRolesFromNamespace(namespaceMember); len(rolesList) != 0 {
133135
var summarizedRules []rbacv1.PolicyRule
134136
for _, role := range rolesList {
135-
if role.Name != constant.NamespaceScopeManagedPrefix+instance.Namespace {
137+
if !reg.MatchString(role.Name) {
136138
summarizedRules = append(summarizedRules, role.Rules...)
137139
}
138140
}
139-
140141
if err := r.CreateRuntimeRoleToNamespace(instance, namespaceMember, summarizedRules); err != nil {
141142
klog.Infof("Failed to create runtime role: %v", err)
142-
return ctrl.Result{}, nil
143+
return ctrl.Result{RequeueAfter: 60 * time.Second}, nil
143144
}
144145
}
145146
}
@@ -206,10 +207,7 @@ func (r *NamespaceScopeReconciler) UpdateConfigMap(instance *operatorv1.Namespac
206207
}
207208
klog.Infof("Created ConfigMap %s", cmKey.String())
208209

209-
if err := r.RestartPods(instance.Spec.RestartLabels, cm, instance.Namespace); err != nil {
210-
return err
211-
}
212-
return nil
210+
return r.RestartPods(instance.Spec.RestartLabels, cm, instance.Namespace)
213211
}
214212
return err
215213
}
@@ -282,11 +280,7 @@ func (r *NamespaceScopeReconciler) CreateRuntimeRoleToNamespace(instance *operat
282280
if toNs == operatorNs {
283281
return nil
284282
}
285-
if err := r.generateRuntimeRoleForNSS(instance, summarizedRules, fromNs, toNs); err != nil {
286-
return err
287-
}
288-
289-
return nil
283+
return r.generateRuntimeRoleForNSS(instance, summarizedRules, fromNs, toNs)
290284
}
291285

292286
func (r *NamespaceScopeReconciler) DeleteRbacFromUnmanagedNamespace(instance *operatorv1.NamespaceScope) error {
@@ -406,10 +400,7 @@ func (r *NamespaceScopeReconciler) generateRBACForNSS(instance *operatorv1.Names
406400
func (r *NamespaceScopeReconciler) generateRuntimeRoleForNSS(instance *operatorv1.NamespaceScope, summarizedRules []rbacv1.PolicyRule, fromNs, toNs string) error {
407401
if err := r.createRuntimeRoleForNSS(summarizedRules, fromNs, toNs); err != nil {
408402
if errors.IsAlreadyExists(err) {
409-
if err := r.updateRuntimeRoleForNSS(summarizedRules, fromNs, toNs); err != nil {
410-
return err
411-
}
412-
return nil
403+
return r.updateRuntimeRoleForNSS(summarizedRules, fromNs, toNs)
413404
}
414405
if errors.IsForbidden(err) {
415406
r.Recorder.Eventf(instance, corev1.EventTypeWarning, "Forbidden", "cannot create resource roles in API group rbac.authorization.k8s.io in the namespace %s. Please authorize service account ibm-namespace-scope-operator namespace admin permission of %s namespace", toNs, toNs)
@@ -1001,9 +992,8 @@ func (r *NamespaceScopeReconciler) getValidatedNamespaces(instance *operatorv1.N
1001992
if errors.IsNotFound(err) {
1002993
klog.Infof("Namespace %s does not exist and will be ignored", nsMem)
1003994
continue
1004-
} else {
1005-
return nil, err
1006995
}
996+
return nil, err
1007997
}
1008998
if ns.Status.Phase == corev1.NamespaceTerminating {
1009999
klog.Infof("Namespace %s is terminating. Ignore this namespace", nsMem)

0 commit comments

Comments
 (0)