Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

pkg/authorization: don't check for cluster workspace lister. #1265

Merged
merged 1 commit into from
Jun 14, 2022

Conversation

s-urbaniak
Copy link
Contributor

Summary

Currently checking for initialize permissions on the parent cluster relies nil-checking the cluster workspace lister.
This worked under the assumption that clusterworkspace CRDs are being installed in the workspace controller/scheduler.
This does not hold true any more. Clusterworkspace CRDs are now initialized as part of the server bootstrap,
independent of the workspace controller/scheduler, hence these CRDs are always available.
Even if we omit bootstrapping those CRDs the value will not be nil (verified in a debugger session).

This fixes it.

Related issue(s)

#425, #422

Currently checking for initialize permissions on the parent cluster relies nil-checking the cluster workspace lister.
This worked under the assumption that clusterworkspace CRDs are being installed in the workspace controller/scheduler.
This does not hold true any more. Clusterworkspace CRDs are now initialized as part of the server bootstrap,
independent of the workspace controller/scheduler, hence these CRDs are always available.
Even if we omit bootstrapping those CRDs the value will not be nil (verified in a debugger session).

This fixes it.
@openshift-ci openshift-ci bot requested review from ncdc and sttts June 14, 2022 09:38
@s-urbaniak
Copy link
Contributor Author

/cc @sttts

@sttts
Copy link
Member

sttts commented Jun 14, 2022

/approve
/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jun 14, 2022
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jun 14, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: s-urbaniak, sttts

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jun 14, 2022
@openshift-ci openshift-ci bot merged commit 1d8f33a into kcp-dev:main Jun 14, 2022
@s-urbaniak s-urbaniak deleted the remove-lister-check branch June 14, 2022 13:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants