@@ -375,14 +375,14 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
375
375
service .SetOwnerReferences (append (service .GetOwnerReferences (), existingService .GetOwnerReferences ()... ))
376
376
377
377
// Delete the Service to replace
378
- deleteErr := a .OpClient .DeleteService (service .GetNamespace (), service .GetName (), & metav1.DeleteOptions {})
378
+ deleteErr := a .opClient .DeleteService (service .GetNamespace (), service .GetName (), & metav1.DeleteOptions {})
379
379
if err != nil && ! k8serrors .IsNotFound (deleteErr ) {
380
380
return nil , fmt .Errorf ("could not delete existing service %s" , service .GetName ())
381
381
}
382
382
}
383
383
384
384
// Attempt to create the Service
385
- _ , err = a .OpClient .CreateService (service )
385
+ _ , err = a .opClient .CreateService (service )
386
386
if err != nil {
387
387
logger .Warnf ("could not create service %s" , service .GetName ())
388
388
return nil , fmt .Errorf ("could not create service %s: %s" , service .GetName (), err .Error ())
@@ -433,14 +433,14 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
433
433
}
434
434
435
435
// Attempt an update
436
- if _ , err := a .OpClient .UpdateSecret (secret ); err != nil {
436
+ if _ , err := a .opClient .UpdateSecret (secret ); err != nil {
437
437
logger .Warnf ("could not update secret %s" , secret .GetName ())
438
438
return nil , err
439
439
}
440
440
} else if k8serrors .IsNotFound (err ) {
441
441
// Create the secret
442
442
ownerutil .AddNonBlockingOwner (secret , csv )
443
- _ , err = a .OpClient .CreateSecret (secret )
443
+ _ , err = a .opClient .CreateSecret (secret )
444
444
if err != nil {
445
445
log .Warnf ("could not create secret %s" , secret .GetName ())
446
446
return nil , err
@@ -471,14 +471,14 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
471
471
}
472
472
473
473
// Attempt an update
474
- if _ , err := a .OpClient .UpdateRole (secretRole ); err != nil {
474
+ if _ , err := a .opClient .UpdateRole (secretRole ); err != nil {
475
475
logger .Warnf ("could not update secret role %s" , secretRole .GetName ())
476
476
return nil , err
477
477
}
478
478
} else if k8serrors .IsNotFound (err ) {
479
479
// Create the role
480
480
ownerutil .AddNonBlockingOwner (secretRole , csv )
481
- _ , err = a .OpClient .CreateRole (secretRole )
481
+ _ , err = a .opClient .CreateRole (secretRole )
482
482
if err != nil {
483
483
log .Warnf ("could not create secret role %s" , secretRole .GetName ())
484
484
return nil , err
@@ -517,14 +517,14 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
517
517
}
518
518
519
519
// Attempt an update
520
- if _ , err := a .OpClient .UpdateRoleBinding (secretRoleBinding ); err != nil {
520
+ if _ , err := a .opClient .UpdateRoleBinding (secretRoleBinding ); err != nil {
521
521
logger .Warnf ("could not update secret rolebinding %s" , secretRoleBinding .GetName ())
522
522
return nil , err
523
523
}
524
524
} else if k8serrors .IsNotFound (err ) {
525
525
// Create the role
526
526
ownerutil .AddNonBlockingOwner (secretRoleBinding , csv )
527
- _ , err = a .OpClient .CreateRoleBinding (secretRoleBinding )
527
+ _ , err = a .opClient .CreateRoleBinding (secretRoleBinding )
528
528
if err != nil {
529
529
log .Warnf ("could not create secret rolebinding with dep spec: %+v" , depSpec )
530
530
return nil , err
@@ -562,7 +562,7 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
562
562
}
563
563
564
564
// Attempt an update.
565
- if _ , err := a .OpClient .UpdateClusterRoleBinding (authDelegatorClusterRoleBinding ); err != nil {
565
+ if _ , err := a .opClient .UpdateClusterRoleBinding (authDelegatorClusterRoleBinding ); err != nil {
566
566
logger .Warnf ("could not update auth delegator clusterrolebinding %s" , authDelegatorClusterRoleBinding .GetName ())
567
567
return nil , err
568
568
}
@@ -571,7 +571,7 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
571
571
if err := ownerutil .AddOwnerLabels (authDelegatorClusterRoleBinding , csv ); err != nil {
572
572
return nil , err
573
573
}
574
- _ , err = a .OpClient .CreateClusterRoleBinding (authDelegatorClusterRoleBinding )
574
+ _ , err = a .opClient .CreateClusterRoleBinding (authDelegatorClusterRoleBinding )
575
575
if err != nil {
576
576
log .Warnf ("could not create auth delegator clusterrolebinding %s" , authDelegatorClusterRoleBinding .GetName ())
577
577
return nil , err
@@ -609,7 +609,7 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
609
609
}
610
610
}
611
611
// Attempt an update.
612
- if _ , err := a .OpClient .UpdateRoleBinding (authReaderRoleBinding ); err != nil {
612
+ if _ , err := a .opClient .UpdateRoleBinding (authReaderRoleBinding ); err != nil {
613
613
logger .Warnf ("could not update auth reader role binding %s" , authReaderRoleBinding .GetName ())
614
614
return nil , err
615
615
}
@@ -618,7 +618,7 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
618
618
if err := ownerutil .AddOwnerLabels (authReaderRoleBinding , csv ); err != nil {
619
619
return nil , err
620
620
}
621
- _ , err = a .OpClient .CreateRoleBinding (authReaderRoleBinding )
621
+ _ , err = a .opClient .CreateRoleBinding (authReaderRoleBinding )
622
622
if err != nil {
623
623
log .Warnf ("could not create auth reader role binding %s" , authReaderRoleBinding .GetName ())
624
624
return nil , err
@@ -739,10 +739,10 @@ func (a *Operator) installAPIServiceRequirements(desc v1alpha1.APIServiceDescrip
739
739
// attempt a update or create
740
740
if exists {
741
741
logger .Debug ("updating APIService" )
742
- _ , err = a .OpClient .UpdateAPIService (apiService )
742
+ _ , err = a .opClient .UpdateAPIService (apiService )
743
743
} else {
744
744
logger .Debug ("creating APIService" )
745
- _ , err = a .OpClient .CreateAPIService (apiService )
745
+ _ , err = a .opClient .CreateAPIService (apiService )
746
746
}
747
747
748
748
if err != nil {
0 commit comments