@@ -33,19 +33,14 @@ import (
33
33
"sigs.k8s.io/container-object-storage-interface-api/apis/objectstorage.k8s.io/v1alpha1"
34
34
buckets "sigs.k8s.io/container-object-storage-interface-api/clientset"
35
35
bucketapi "sigs.k8s.io/container-object-storage-interface-api/clientset/typed/objectstorage.k8s.io/v1alpha1"
36
+ "sigs.k8s.io/container-object-storage-interface-provisioner-sidecar/pkg/const"
36
37
cosi "sigs.k8s.io/container-object-storage-interface-spec"
37
38
38
39
"github.com/pkg/errors"
39
40
"google.golang.org/grpc/codes"
40
41
"google.golang.org/grpc/status"
41
42
)
42
43
43
- const (
44
- accountNamePrefix = "ba-"
45
- baFinalizer = "cosi.objectstorage.k8s.io/bucketaccess-protection-"
46
- secretFinalizer = "cosi.objectstorage.k8s.io/secret-protection"
47
- )
48
-
49
44
// BucketAccessListener manages Bucket objects
50
45
type BucketAccessListener struct {
51
46
provisionerClient cosi.ProvisionerClient
@@ -155,7 +150,7 @@ func (bal *BucketAccessListener) Add(ctx context.Context, inputBucketAccess *v1a
155
150
return errors .New ("BucketAccess can't be granted to bucket not in Ready state and without a bucketID" )
156
151
}
157
152
158
- accountName := accountNamePrefix + string (bucketAccess .UID )
153
+ accountName := const . AccountNamePrefix + string (bucketAccess .UID )
159
154
160
155
req := & cosi.DriverGrantBucketAccessRequest {
161
156
BucketId : bucket .Status .BucketID ,
@@ -214,7 +209,7 @@ func (bal *BucketAccessListener) Add(ctx context.Context, inputBucketAccess *v1a
214
209
ObjectMeta : metav1.ObjectMeta {
215
210
Name : secretCredName ,
216
211
Namespace : namespace ,
217
- Finalizers : []string {secretFinalizer },
212
+ Finalizers : []string {const . SecretFinalizer },
218
213
},
219
214
StringData : map [string ]string {
220
215
BucketInfo : string (stringData ),
@@ -231,7 +226,7 @@ func (bal *BucketAccessListener) Add(ctx context.Context, inputBucketAccess *v1a
231
226
}
232
227
}
233
228
234
- bucketFinalizer := baFinalizer + string (bucketAccess .ObjectMeta .UID )
229
+ bucketFinalizer := const . BaFinalizer + string (bucketAccess .ObjectMeta .UID )
235
230
finalizers := bucket .ObjectMeta .Finalizers
236
231
finalizers = append (finalizers , bucketFinalizer )
237
232
bucket .ObjectMeta .Finalizers = finalizers
@@ -281,7 +276,7 @@ func (bal *BucketAccessListener) Delete(ctx context.Context, bucketAccess *v1alp
281
276
return err
282
277
}
283
278
284
- if controllerutil .RemoveFinalizer (secret , secretFinalizer ) {
279
+ if controllerutil .RemoveFinalizer (secret , const . SecretFinalizer ) {
285
280
_ , err = bal .Secrets (bucketAccess .ObjectMeta .Namespace ).Update (ctx , credSecretName , metav1.UpdateOptions {})
286
281
if err != nil {
287
282
return err
@@ -299,7 +294,7 @@ func (bal *BucketAccessListener) Delete(ctx context.Context, bucketAccess *v1alp
299
294
return err
300
295
}
301
296
302
- bucketFinalizer := baFinalizer + string (bucketAccess .ObjectMeta .UID )
297
+ bucketFinalizer := const . BaFinalizer + string (bucketAccess .ObjectMeta .UID )
303
298
if controllerutil .RemoveFinalizer (bucketFinalizer ) {
304
299
_ , err = bal .Buckets ().Update (ctx , bucket , metav1.UpdateOptions {})
305
300
if err != nil {
0 commit comments