@@ -33,19 +33,14 @@ import (
3333 "sigs.k8s.io/container-object-storage-interface-api/apis/objectstorage.k8s.io/v1alpha1"
3434 buckets "sigs.k8s.io/container-object-storage-interface-api/clientset"
3535 bucketapi "sigs.k8s.io/container-object-storage-interface-api/clientset/typed/objectstorage.k8s.io/v1alpha1"
36+ "sigs.k8s.io/container-object-storage-interface-provisioner-sidecar/pkg/const"
3637 cosi "sigs.k8s.io/container-object-storage-interface-spec"
3738
3839 "github.com/pkg/errors"
3940 "google.golang.org/grpc/codes"
4041 "google.golang.org/grpc/status"
4142)
4243
43- const (
44- accountNamePrefix = "ba-"
45- baFinalizer = "cosi.objectstorage.k8s.io/bucketaccess-protection-"
46- secretFinalizer = "cosi.objectstorage.k8s.io/secret-protection"
47- )
48-
4944// BucketAccessListener manages Bucket objects
5045type BucketAccessListener struct {
5146 provisionerClient cosi.ProvisionerClient
@@ -155,7 +150,7 @@ func (bal *BucketAccessListener) Add(ctx context.Context, inputBucketAccess *v1a
155150 return errors .New ("BucketAccess can't be granted to bucket not in Ready state and without a bucketID" )
156151 }
157152
158- accountName := accountNamePrefix + string (bucketAccess .UID )
153+ accountName := const . AccountNamePrefix + string (bucketAccess .UID )
159154
160155 req := & cosi.DriverGrantBucketAccessRequest {
161156 BucketId : bucket .Status .BucketID ,
@@ -214,7 +209,7 @@ func (bal *BucketAccessListener) Add(ctx context.Context, inputBucketAccess *v1a
214209 ObjectMeta : metav1.ObjectMeta {
215210 Name : secretCredName ,
216211 Namespace : namespace ,
217- Finalizers : []string {secretFinalizer },
212+ Finalizers : []string {const . SecretFinalizer },
218213 },
219214 StringData : map [string ]string {
220215 BucketInfo : string (stringData ),
@@ -231,7 +226,7 @@ func (bal *BucketAccessListener) Add(ctx context.Context, inputBucketAccess *v1a
231226 }
232227 }
233228
234- bucketFinalizer := baFinalizer + string (bucketAccess .ObjectMeta .UID )
229+ bucketFinalizer := const . BaFinalizer + string (bucketAccess .ObjectMeta .UID )
235230 finalizers := bucket .ObjectMeta .Finalizers
236231 finalizers = append (finalizers , bucketFinalizer )
237232 bucket .ObjectMeta .Finalizers = finalizers
@@ -281,7 +276,7 @@ func (bal *BucketAccessListener) Delete(ctx context.Context, bucketAccess *v1alp
281276 return err
282277 }
283278
284- if controllerutil .RemoveFinalizer (secret , secretFinalizer ) {
279+ if controllerutil .RemoveFinalizer (secret , const . SecretFinalizer ) {
285280 _ , err = bal .Secrets (bucketAccess .ObjectMeta .Namespace ).Update (ctx , credSecretName , metav1.UpdateOptions {})
286281 if err != nil {
287282 return err
@@ -299,7 +294,7 @@ func (bal *BucketAccessListener) Delete(ctx context.Context, bucketAccess *v1alp
299294 return err
300295 }
301296
302- bucketFinalizer := baFinalizer + string (bucketAccess .ObjectMeta .UID )
297+ bucketFinalizer := const . BaFinalizer + string (bucketAccess .ObjectMeta .UID )
303298 if controllerutil .RemoveFinalizer (bucketFinalizer ) {
304299 _ , err = bal .Buckets ().Update (ctx , bucket , metav1.UpdateOptions {})
305300 if err != nil {
0 commit comments