|
5 | 5 |
|
6 | 6 | corev1 "k8s.io/api/core/v1" |
7 | 7 | rbacv1 "k8s.io/api/rbac/v1" |
8 | | - "k8s.io/apimachinery/pkg/types" |
9 | | - |
10 | 8 | "sigs.k8s.io/controller-runtime/pkg/client" |
11 | 9 |
|
12 | 10 | "github.com/openshift/cert-manager-operator/api/operator/v1alpha1" |
@@ -61,14 +59,14 @@ func (r *Reconciler) createOrApplyClusterRoles(istiocsr *v1alpha1.IstioCSR, reso |
61 | 59 | exist bool |
62 | 60 | err error |
63 | 61 | roleName string |
64 | | - key types.NamespacedName |
| 62 | + key client.ObjectKey |
65 | 63 | fetched = &rbacv1.ClusterRole{} |
66 | 64 | ) |
67 | 65 | r.log.V(4).Info("reconciling clusterrole resource created for istiocsr", "namespace", istiocsr.GetNamespace(), "name", istiocsr.GetName()) |
68 | 66 | if istiocsr.Status.ClusterRole != "" { |
69 | 67 | roleName = fmt.Sprintf("%s/%s", desired.GetNamespace(), istiocsr.Status.ClusterRole) |
70 | 68 | fetched = &rbacv1.ClusterRole{} |
71 | | - key = types.NamespacedName{ |
| 69 | + key = client.ObjectKey{ |
72 | 70 | Name: istiocsr.Status.ClusterRole, |
73 | 71 | Namespace: desired.GetNamespace(), |
74 | 72 | } |
@@ -154,14 +152,14 @@ func (r *Reconciler) createOrApplyClusterRoleBindings(istiocsr *v1alpha1.IstioCS |
154 | 152 | exist bool |
155 | 153 | err error |
156 | 154 | roleBindingName string |
157 | | - key types.NamespacedName |
| 155 | + key client.ObjectKey |
158 | 156 | fetched = &rbacv1.ClusterRoleBinding{} |
159 | 157 | ) |
160 | 158 | r.log.V(4).Info("reconciling clusterrolebinding resource created for istiocsr", "namespace", istiocsr.GetNamespace(), "name", istiocsr.GetName()) |
161 | 159 | if istiocsr.Status.ClusterRoleBinding != "" { |
162 | 160 | roleBindingName = fmt.Sprintf("%s/%s", desired.GetNamespace(), istiocsr.Status.ClusterRoleBinding) |
163 | 161 | fetched = &rbacv1.ClusterRoleBinding{} |
164 | | - key = types.NamespacedName{ |
| 162 | + key = client.ObjectKey{ |
165 | 163 | Name: istiocsr.Status.ClusterRoleBinding, |
166 | 164 | Namespace: desired.GetNamespace(), |
167 | 165 | } |
@@ -243,11 +241,7 @@ func (r *Reconciler) createOrApplyRoles(istiocsr *v1alpha1.IstioCSR, resourceLab |
243 | 241 | roleName := fmt.Sprintf("%s/%s", desired.GetNamespace(), desired.GetName()) |
244 | 242 | r.log.V(4).Info("reconciling role resource", "name", roleName) |
245 | 243 | fetched := &rbacv1.Role{} |
246 | | - key := types.NamespacedName{ |
247 | | - Name: desired.GetName(), |
248 | | - Namespace: desired.GetNamespace(), |
249 | | - } |
250 | | - exist, err := r.Exists(r.ctx, key, fetched) |
| 244 | + exist, err := r.Exists(r.ctx, client.ObjectKeyFromObject(desired), fetched) |
251 | 245 | if err != nil { |
252 | 246 | return FromClientError(err, "failed to check %s role resource already exists", roleName) |
253 | 247 | } |
@@ -287,11 +281,7 @@ func (r *Reconciler) createOrApplyRoleBindings(istiocsr *v1alpha1.IstioCSR, serv |
287 | 281 | roleBindingName := fmt.Sprintf("%s/%s", desired.GetNamespace(), desired.GetName()) |
288 | 282 | r.log.V(4).Info("reconciling rolebinding resource", "name", roleBindingName) |
289 | 283 | fetched := &rbacv1.RoleBinding{} |
290 | | - key := types.NamespacedName{ |
291 | | - Name: desired.GetName(), |
292 | | - Namespace: desired.GetNamespace(), |
293 | | - } |
294 | | - exist, err := r.Exists(r.ctx, key, fetched) |
| 284 | + exist, err := r.Exists(r.ctx, client.ObjectKeyFromObject(desired), fetched) |
295 | 285 | if err != nil { |
296 | 286 | return FromClientError(err, "failed to check %s rolebinding resource already exists", roleBindingName) |
297 | 287 | } |
@@ -333,11 +323,7 @@ func (r *Reconciler) createOrApplyRoleForLeases(istiocsr *v1alpha1.IstioCSR, res |
333 | 323 | roleName := fmt.Sprintf("%s/%s", desired.GetNamespace(), desired.GetName()) |
334 | 324 | r.log.V(4).Info("reconciling role for lease resource", "name", roleName) |
335 | 325 | fetched := &rbacv1.Role{} |
336 | | - key := types.NamespacedName{ |
337 | | - Name: desired.GetName(), |
338 | | - Namespace: desired.GetNamespace(), |
339 | | - } |
340 | | - exist, err := r.Exists(r.ctx, key, fetched) |
| 326 | + exist, err := r.Exists(r.ctx, client.ObjectKeyFromObject(desired), fetched) |
341 | 327 | if err != nil { |
342 | 328 | return FromClientError(err, "failed to check %s role resource already exists", roleName) |
343 | 329 | } |
@@ -377,11 +363,7 @@ func (r *Reconciler) createOrApplyRoleBindingForLeases(istiocsr *v1alpha1.IstioC |
377 | 363 | roleBindingName := fmt.Sprintf("%s/%s", desired.GetNamespace(), desired.GetName()) |
378 | 364 | r.log.V(4).Info("reconciling rolebinding for lease resource", "name", roleBindingName) |
379 | 365 | fetched := &rbacv1.RoleBinding{} |
380 | | - key := types.NamespacedName{ |
381 | | - Name: desired.GetName(), |
382 | | - Namespace: desired.GetNamespace(), |
383 | | - } |
384 | | - exist, err := r.Exists(r.ctx, key, fetched) |
| 366 | + exist, err := r.Exists(r.ctx, client.ObjectKeyFromObject(desired), fetched) |
385 | 367 | if err != nil { |
386 | 368 | return FromClientError(err, "failed to check %s rolebinding resource already exists", roleBindingName) |
387 | 369 | } |
|
0 commit comments