Skip to content

Commit 871c10a

Browse files
Merge pull request #244 from sebrandon1/import_consistency
refactor: Improves naming consistency across all go imports
2 parents e3a7070 + 3cf4a40 commit 871c10a

File tree

16 files changed

+124
-125
lines changed

16 files changed

+124
-125
lines changed

pkg/controller/deployment/credentials_request.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ import (
1212
"github.com/openshift/cert-manager-operator/pkg/operator/operatorclient"
1313
configinformersv1 "github.com/openshift/client-go/config/informers/externalversions/config/v1"
1414

15-
v1 "github.com/openshift/api/operator/v1"
15+
operatorv1 "github.com/openshift/api/operator/v1"
1616
)
1717

1818
const (
@@ -29,16 +29,16 @@ const (
2929
cloudCredentialsVolumeName = "cloud-credentials"
3030
)
3131

32-
func withCloudCredentials(secretsInformer coreinformersv1.SecretInformer, infraInformer configinformersv1.InfrastructureInformer, deploymentName, secretName string) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
32+
func withCloudCredentials(secretsInformer coreinformersv1.SecretInformer, infraInformer configinformersv1.InfrastructureInformer, deploymentName, secretName string) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
3333
// cloud credentials is only required for the controller deployment,
3434
// other deployments should be left untouched
3535
if deploymentName != certmanagerControllerDeployment {
36-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
36+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
3737
return nil
3838
}
3939
}
4040

41-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
41+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
4242
if len(secretName) == 0 {
4343
return nil
4444
}

pkg/controller/deployment/deployment_log_level.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,19 +3,19 @@ package deployment
33
import (
44
appsv1 "k8s.io/api/apps/v1"
55

6-
v1 "github.com/openshift/api/operator/v1"
6+
operatorv1 "github.com/openshift/api/operator/v1"
77
)
88

9-
var logLevels = map[v1.LogLevel]string{
10-
v1.Normal: "--v=2",
11-
v1.Debug: "--v=4",
12-
v1.Trace: "--v=6",
13-
v1.TraceAll: "--v=8",
9+
var logLevels = map[operatorv1.LogLevel]string{
10+
operatorv1.Normal: "--v=2",
11+
operatorv1.Debug: "--v=4",
12+
operatorv1.Trace: "--v=6",
13+
operatorv1.TraceAll: "--v=8",
1414
}
1515

1616
// withLogLevel sets the values of verbosity --v arg using
1717
// logLevel specified in spec
18-
func withLogLevel(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
18+
func withLogLevel(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
1919
verbosityArg := logLevels[operatorSpec.LogLevel]
2020
if verbosityArg == "" {
2121
return nil

pkg/controller/deployment/deployment_overrides.go

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ import (
1111
coreinformersv1 "k8s.io/client-go/informers/core/v1"
1212
"k8s.io/utils/pointer"
1313

14-
v1 "github.com/openshift/api/operator/v1"
14+
operatorv1 "github.com/openshift/api/operator/v1"
1515
"github.com/operator-framework/operator-lib/proxy"
1616

1717
"github.com/openshift/cert-manager-operator/api/operator/v1alpha1"
@@ -69,7 +69,7 @@ type overrideSchedulingFunc func(certmanagerinformer.CertManagerInformer, string
6969

7070
// withOperandImageOverrideHook overrides the deployment image with
7171
// the operand images provided to the operator.
72-
func withOperandImageOverrideHook(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
72+
func withOperandImageOverrideHook(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
7373
for index := range deployment.Spec.Template.Spec.Containers {
7474
deployment.Spec.Template.Spec.Containers[index].Image = certManagerImage(deployment.Spec.Template.Spec.Containers[index].Image)
7575
}
@@ -85,8 +85,8 @@ func withOperandImageOverrideHook(operatorSpec *v1.OperatorSpec, deployment *app
8585

8686
// withContainerArgsOverrideHook overrides the container args with those provided by
8787
// the overrideArgsFunc function.
88-
func withContainerArgsOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideArgsFunc) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
89-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
88+
func withContainerArgsOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideArgsFunc) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
89+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
9090
overrideArgs, err := fn(certmanagerinformer, deploymentName)
9191
if err != nil {
9292
return err
@@ -103,8 +103,8 @@ func withContainerArgsOverrideHook(certmanagerinformer certmanagerinformer.CertM
103103

104104
// withContainerEnvOverrideHook verrides the container env with those provided by
105105
// the overrideEnvFunc function.
106-
func withContainerEnvOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideEnvFunc) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
107-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
106+
func withContainerEnvOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideEnvFunc) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
107+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
108108
overrideEnv, err := fn(certmanagerinformer, deploymentName)
109109
if err != nil {
110110
return err
@@ -121,8 +121,8 @@ func withContainerEnvOverrideHook(certmanagerinformer certmanagerinformer.CertMa
121121

122122
// withContainerResourcesOverrideHook overrides the container resources with those provided by
123123
// the overrideResourcesFunc function.
124-
func withContainerResourcesOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideResourcesFunc) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
125-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
124+
func withContainerResourcesOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideResourcesFunc) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
125+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
126126
overrideResources, err := fn(certmanagerinformer, deploymentName)
127127
if err != nil {
128128
return err
@@ -139,8 +139,8 @@ func withContainerResourcesOverrideHook(certmanagerinformer certmanagerinformer.
139139

140140
// withPodSchedulingOverrideHook overrides the pod scheduling with those provided by
141141
// the overrideSchedulingFunc function.
142-
func withPodSchedulingOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideSchedulingFunc) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
143-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
142+
func withPodSchedulingOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideSchedulingFunc) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
143+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
144144
overrideScheduling, err := fn(certmanagerinformer, deploymentName)
145145
if err != nil {
146146
return err
@@ -160,15 +160,15 @@ func withPodSchedulingOverrideHook(certmanagerinformer certmanagerinformer.CertM
160160

161161
// withProxyEnv patches the operand deployment if operator
162162
// has proxy variables set. Sets HTTPS_PROXY, HTTP_PROXY and NO_PROXY.
163-
func withProxyEnv(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
163+
func withProxyEnv(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
164164
deployment.Spec.Template.Spec.Containers[0].Env = mergeContainerEnvs(deployment.Spec.Template.Spec.Containers[0].Env, proxy.ReadProxyVarsFromEnv())
165165
return nil
166166
}
167167

168168
// withCAConfigMap patches the operand deployment to include the custom
169169
// ca bundle as a volume. This is set when a trusted ca configmap is provided.
170-
func withCAConfigMap(configmapinformer coreinformersv1.ConfigMapInformer, deployment *appsv1.Deployment, trustedCAConfigmapName string) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
171-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
170+
func withCAConfigMap(configmapinformer coreinformersv1.ConfigMapInformer, deployment *appsv1.Deployment, trustedCAConfigmapName string) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
171+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
172172

173173
if len(trustedCAConfigmapName) == 0 {
174174
return nil
@@ -205,8 +205,8 @@ func withCAConfigMap(configmapinformer coreinformersv1.ConfigMapInformer, deploy
205205
}
206206

207207
// withPodLabels patches the operand deployment to include custom pod labels
208-
func withPodLabelsOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideLabelsFunc) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
209-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
208+
func withPodLabelsOverrideHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string, fn overrideLabelsFunc) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
209+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
210210
overrideLabels, err := fn(certmanagerinformer, deploymentName)
211211
if err != nil {
212212
return err
@@ -220,7 +220,7 @@ func withPodLabelsOverrideHook(certmanagerinformer certmanagerinformer.CertManag
220220
}
221221
}
222222

223-
func withSABoundToken(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
223+
func withSABoundToken(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
224224
volume := corev1.Volume{
225225
Name: boundSATokenVolumeName,
226226
VolumeSource: corev1.VolumeSource{

pkg/controller/deployment/deployment_overrides_validation.go

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,15 @@ import (
1313
corevalidation "k8s.io/kubernetes/pkg/apis/core/validation"
1414
"k8s.io/utils/strings/slices"
1515

16-
v1 "github.com/openshift/api/operator/v1"
16+
operatorv1 "github.com/openshift/api/operator/v1"
1717

1818
"github.com/openshift/cert-manager-operator/api/operator/v1alpha1"
1919
certmanagerinformer "github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/operator/v1alpha1"
2020
)
2121

2222
// withContainerArgsValidateHook validates the container args with those that
2323
// are supported by the operator.
24-
func withContainerArgsValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
24+
func withContainerArgsValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
2525

2626
supportedCertManagerArgs := []string{
2727
// A list of comma separated dns server endpoints used for ACME HTTP01 check requests.
@@ -73,7 +73,7 @@ func withContainerArgsValidateHook(certmanagerinformer certmanagerinformer.CertM
7373
return nil
7474
}
7575

76-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
76+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
7777
certmanager, err := certmanagerinformer.Lister().Get("cluster")
7878
if err != nil {
7979
return fmt.Errorf("failed to get certmanager %q due to %v", "cluster", err)
@@ -106,7 +106,7 @@ func withContainerArgsValidateHook(certmanagerinformer certmanagerinformer.CertM
106106

107107
// withContainerEnvValidateHook validates the container env with those that
108108
// are supported by the operator.
109-
func withContainerEnvValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
109+
func withContainerEnvValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
110110

111111
supportedCertManagerEnv := []string{
112112
"HTTP_PROXY", "HTTPS_PROXY", "NO_PROXY",
@@ -123,7 +123,7 @@ func withContainerEnvValidateHook(certmanagerinformer certmanagerinformer.CertMa
123123
return nil
124124
}
125125

126-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
126+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
127127
certmanager, err := certmanagerinformer.Lister().Get("cluster")
128128
if err != nil {
129129
return fmt.Errorf("failed to get certmanager %q due to %v", "cluster", err)
@@ -156,7 +156,7 @@ func withContainerEnvValidateHook(certmanagerinformer certmanagerinformer.CertMa
156156

157157
// withPodLabelsValidateHook validates the pod labels from specific deployment config
158158
// with those that are supported by the operator.
159-
func withPodLabelsValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
159+
func withPodLabelsValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
160160

161161
supportedCertManagerLabelKeys := []string{
162162
"azure.workload.identity/use",
@@ -173,7 +173,7 @@ func withPodLabelsValidateHook(certmanagerinformer certmanagerinformer.CertManag
173173
return nil
174174
}
175175

176-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
176+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
177177
certmanager, err := certmanagerinformer.Lister().Get("cluster")
178178
if err != nil {
179179
return fmt.Errorf("failed to get certmanager %q due to %v", "cluster", err)
@@ -202,7 +202,7 @@ func withPodLabelsValidateHook(certmanagerinformer certmanagerinformer.CertManag
202202

203203
// withContainerResourcesValidateHook validates the container resources with those that
204204
// are supported by the operator.
205-
func withContainerResourcesValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
205+
func withContainerResourcesValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
206206

207207
supportedCertManagerResourceNames := []string{
208208
string(corev1.ResourceCPU), string(corev1.ResourceMemory),
@@ -214,7 +214,7 @@ func withContainerResourcesValidateHook(certmanagerinformer certmanagerinformer.
214214
string(corev1.ResourceCPU), string(corev1.ResourceMemory),
215215
}
216216

217-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
217+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
218218
certmanager, err := certmanagerinformer.Lister().Get("cluster")
219219
if err != nil {
220220
return fmt.Errorf("failed to get certmanager %q due to %v", "cluster", err)
@@ -258,9 +258,9 @@ func validateResources(resources v1alpha1.CertManagerResourceRequirements, suppo
258258
}
259259

260260
// withPodSchedulingValidateHook validates the overrides scheduling field for each operand.
261-
func withPodSchedulingValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
261+
func withPodSchedulingValidateHook(certmanagerinformer certmanagerinformer.CertManagerInformer, deploymentName string) func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
262262

263-
return func(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
263+
return func(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
264264
certmanager, err := certmanagerinformer.Lister().Get("cluster")
265265
if err != nil {
266266
return fmt.Errorf("failed to get certmanager %q due to %v", "cluster", err)

pkg/controller/deployment/deployment_unsupported_overrides.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ import (
55

66
appsv1 "k8s.io/api/apps/v1"
77

8-
v1 "github.com/openshift/api/operator/v1"
8+
operatorv1 "github.com/openshift/api/operator/v1"
99

1010
"github.com/openshift/cert-manager-operator/api/operator/v1alpha1"
1111
)
@@ -36,7 +36,7 @@ func unsupportedConfigOverrides(deployment *appsv1.Deployment, unsupportedConfig
3636

3737
// withUnsupportedArgsOverrideHook overrides the container args with those provided by
3838
// UnsupportedConfigOverrides in the operatorSpec.
39-
func withUnsupportedArgsOverrideHook(operatorSpec *v1.OperatorSpec, deployment *appsv1.Deployment) error {
39+
func withUnsupportedArgsOverrideHook(operatorSpec *operatorv1.OperatorSpec, deployment *appsv1.Deployment) error {
4040
cfg := &v1alpha1.UnsupportedConfigOverrides{}
4141
if len(operatorSpec.UnsupportedConfigOverrides.Raw) != 0 {
4242
err := json.Unmarshal(operatorSpec.UnsupportedConfigOverrides.Raw, cfg)

pkg/operator/clientset/versioned/fake/register.go

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

pkg/operator/clientset/versioned/scheme/register.go

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)