@@ -108,7 +108,7 @@ var _ = Describe("ClusterPermission controller", func() {
108108 }},
109109 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
110110 Subjects : []rbacv1.Subject {},
111- Subject : rbacv1.Subject {
111+ Subject : & rbacv1.Subject {
112112 Kind : "ServiceAccount" ,
113113 Name : "klusterlet-work-sa" ,
114114 Namespace : "open-cluster-management-agent" ,
@@ -119,7 +119,7 @@ var _ = Describe("ClusterPermission controller", func() {
119119 Namespace : "default" ,
120120 RoleRef : cpv1alpha1.RoleRef {Kind : "ClusterRole" },
121121 Subjects : []rbacv1.Subject {},
122- Subject : rbacv1.Subject {
122+ Subject : & rbacv1.Subject {
123123 Kind : "ServiceAccount" ,
124124 Name : "klusterlet-work-sa" ,
125125 Namespace : "open-cluster-management-agent" ,
@@ -216,7 +216,7 @@ var _ = Describe("ClusterPermission controller", func() {
216216 }},
217217 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
218218 Subjects : []rbacv1.Subject {},
219- Subject : rbacv1.Subject {
219+ Subject : & rbacv1.Subject {
220220 APIGroup : "authentication.open-cluster-management.io" ,
221221 Kind : "ManagedServiceAccount" ,
222222 Name : msaName ,
@@ -227,7 +227,7 @@ var _ = Describe("ClusterPermission controller", func() {
227227 Namespace : "default" ,
228228 RoleRef : cpv1alpha1.RoleRef {Kind : "ClusterRole" },
229229 Subjects : []rbacv1.Subject {},
230- Subject : rbacv1.Subject {
230+ Subject : & rbacv1.Subject {
231231 APIGroup : "authentication.open-cluster-management.io" ,
232232 Kind : "ManagedServiceAccount" ,
233233 Name : msaName ,
@@ -274,7 +274,7 @@ var _ = Describe("ClusterPermission controller", func() {
274274 NamespaceSelector : & metav1.LabelSelector {MatchLabels : map [string ]string {"a" : "b" }},
275275 RoleRef : cpv1alpha1.RoleRef {Kind : "ClusterRole" },
276276 Subjects : []rbacv1.Subject {},
277- Subject : rbacv1.Subject {
277+ Subject : & rbacv1.Subject {
278278 APIGroup : "authentication.open-cluster-management.io" ,
279279 Kind : "ManagedServiceAccount" ,
280280 Name : msaName ,
@@ -322,7 +322,7 @@ var _ = Describe("ClusterPermission controller", func() {
322322 Name : "argocd-application-controller-1" ,
323323 },
324324 Subjects : []rbacv1.Subject {},
325- Subject : rbacv1.Subject {
325+ Subject : & rbacv1.Subject {
326326 Namespace : "openshift-gitops" ,
327327 Kind : "ServiceAccount" ,
328328 Name : "sa-sample-existing" ,
@@ -337,7 +337,7 @@ var _ = Describe("ClusterPermission controller", func() {
337337 Name : "argocd-application-controller-2" ,
338338 },
339339 Subjects : []rbacv1.Subject {},
340- Subject : rbacv1.Subject {
340+ Subject : & rbacv1.Subject {
341341 APIGroup : "rbac.authorization.k8s.io" ,
342342 Kind : "User" ,
343343 Name : "user1" ,
@@ -351,7 +351,7 @@ var _ = Describe("ClusterPermission controller", func() {
351351 Name : "argocd-application-controller-2" ,
352352 },
353353 Subjects : []rbacv1.Subject {},
354- Subject : rbacv1.Subject {
354+ Subject : & rbacv1.Subject {
355355 APIGroup : "rbac.authorization.k8s.io" ,
356356 Kind : "User" ,
357357 Name : "user1" ,
@@ -366,7 +366,7 @@ var _ = Describe("ClusterPermission controller", func() {
366366 Name : "argocd-application-controller-3" ,
367367 },
368368 Subjects : []rbacv1.Subject {},
369- Subject : rbacv1.Subject {
369+ Subject : & rbacv1.Subject {
370370 APIGroup : "rbac.authorization.k8s.io" ,
371371 Kind : "Group" ,
372372 Name : "group1" ,
@@ -401,7 +401,7 @@ var _ = Describe("ClusterPermission controller", func() {
401401 Name : "argocd-application-controller-1" ,
402402 },
403403 Subjects : []rbacv1.Subject {},
404- Subject : rbacv1.Subject {
404+ Subject : & rbacv1.Subject {
405405 Kind : "User" ,
406406 Name : "user1" ,
407407 },
@@ -490,7 +490,7 @@ var _ = Describe("ClusterPermission controller", func() {
490490 },
491491 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
492492 Subjects : []rbacv1.Subject {},
493- Subject : rbacv1.Subject {
493+ Subject : & rbacv1.Subject {
494494 APIGroup : "authentication.open-cluster-management.io" ,
495495 Kind : "ManagedServiceAccount" ,
496496 Name : msaName + "1" ,
@@ -538,7 +538,7 @@ var _ = Describe("ClusterPermission controller", func() {
538538 RoleBindings : & []cpv1alpha1.RoleBinding {
539539 {
540540 Subjects : []rbacv1.Subject {},
541- Subject : rbacv1.Subject {
541+ Subject : & rbacv1.Subject {
542542 APIGroup : "authentication.open-cluster-management.io" ,
543543 Kind : "ManagedServiceAccount" ,
544544 Name : msaName ,
@@ -624,7 +624,7 @@ var _ = Describe("ClusterPermission controller", func() {
624624 Name : "argocd-application-controller-1" ,
625625 },
626626 Subjects : []rbacv1.Subject {},
627- Subject : rbacv1.Subject {
627+ Subject : & rbacv1.Subject {
628628 Namespace : "openshift-gitops" ,
629629 Kind : "ServiceAccount" ,
630630 Name : "sa-sample-existing" ,
@@ -652,7 +652,7 @@ var _ = Describe("ClusterPermission controller", func() {
652652 Kind : "ClusterRole" ,
653653 },
654654 Subjects : []rbacv1.Subject {},
655- Subject : rbacv1.Subject {
655+ Subject : & rbacv1.Subject {
656656 Namespace : "openshift-gitops" ,
657657 Kind : "ServiceAccount" ,
658658 Name : "sa-sample-existing" ,
@@ -665,7 +665,7 @@ var _ = Describe("ClusterPermission controller", func() {
665665 Expect (k8sClient .Create (ctx , & clusterPermissionMissingName )).Should (Succeed ())
666666
667667 By ("Test getSubjects()" )
668- Expect (len (getSubjects (rbacv1.Subject {}, []rbacv1.Subject {
668+ Expect (len (getSubjects (& rbacv1.Subject {}, []rbacv1.Subject {
669669 {
670670 Namespace : "openshift-gitops" ,
671671 Kind : "ServiceAccount" ,
@@ -849,7 +849,7 @@ func TestGenerateSubjects(t *testing.T) {
849849 Scheme : testscheme ,
850850 }
851851
852- subjects , err := cpr .generateSubjects (context .TODO (), getSubjects (c .subject , c .subjects ), c .clusterNamespace )
852+ subjects , err := cpr .generateSubjects (context .TODO (), getSubjects (& c .subject , c .subjects ), c .clusterNamespace )
853853 if err != nil {
854854 t .Errorf ("generateSubjects() error = %v" , err )
855855 }
@@ -1345,7 +1345,7 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
13451345 },
13461346 Spec : cpv1alpha1.ClusterPermissionSpec {
13471347 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
1348- Subject : rbacv1.Subject {
1348+ Subject : & rbacv1.Subject {
13491349 APIGroup : msav1beta1 .GroupVersion .Group ,
13501350 Kind : "ManagedServiceAccount" ,
13511351 Name : "test-msa" ,
@@ -1360,7 +1360,7 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
13601360 },
13611361 Spec : cpv1alpha1.ClusterPermissionSpec {
13621362 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
1363- Subject : rbacv1.Subject {
1363+ Subject : & rbacv1.Subject {
13641364 Kind : "ServiceAccount" ,
13651365 Name : "regular-sa" ,
13661366 Namespace : "default" ,
@@ -1377,7 +1377,7 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
13771377 RoleBindings : & []cpv1alpha1.RoleBinding {
13781378 {
13791379 Namespace : "default" ,
1380- Subject : rbacv1.Subject {
1380+ Subject : & rbacv1.Subject {
13811381 APIGroup : msav1beta1 .GroupVersion .Group ,
13821382 Kind : "ManagedServiceAccount" ,
13831383 Name : "another-msa" ,
@@ -1418,7 +1418,7 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
14181418 },
14191419 Spec : cpv1alpha1.ClusterPermissionSpec {
14201420 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
1421- Subject : rbacv1.Subject {
1421+ Subject : & rbacv1.Subject {
14221422 Kind : "ServiceAccount" ,
14231423 Name : "regular-sa" ,
14241424 Namespace : "default" ,
@@ -1433,7 +1433,7 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
14331433 },
14341434 Spec : cpv1alpha1.ClusterPermissionSpec {
14351435 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
1436- Subject : rbacv1.Subject {
1436+ Subject : & rbacv1.Subject {
14371437 Kind : "User" ,
14381438 Name : "test-user" ,
14391439 },
@@ -1501,14 +1501,14 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
15011501 Spec : cpv1alpha1.ClusterPermissionSpec {
15021502 ClusterRoleBindings : & []cpv1alpha1.ClusterRoleBinding {
15031503 {
1504- Subject : rbacv1.Subject {
1504+ Subject : & rbacv1.Subject {
15051505 Kind : "ServiceAccount" ,
15061506 Name : "regular-sa" ,
15071507 Namespace : "default" ,
15081508 },
15091509 },
15101510 {
1511- Subject : rbacv1.Subject {
1511+ Subject : & rbacv1.Subject {
15121512 APIGroup : msav1beta1 .GroupVersion .Group ,
15131513 Kind : "ManagedServiceAccount" ,
15141514 Name : "test-msa" ,
@@ -1554,7 +1554,7 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
15541554 },
15551555 Spec : cpv1alpha1.ClusterPermissionSpec {
15561556 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
1557- Subject : rbacv1.Subject {
1557+ Subject : & rbacv1.Subject {
15581558 APIGroup : msav1beta1 .GroupVersion .Group ,
15591559 Kind : "ManagedServiceAccount" ,
15601560 Name : "test-msa" ,
@@ -1592,15 +1592,15 @@ func TestManagedClusterAddOnEventHandler(t *testing.T) {
15921592 },
15931593 Spec : cpv1alpha1.ClusterPermissionSpec {
15941594 ClusterRoleBinding : & cpv1alpha1.ClusterRoleBinding {
1595- Subject : rbacv1.Subject {
1595+ Subject : & rbacv1.Subject {
15961596 Kind : "ServiceAccount" ,
15971597 Name : "regular-sa" ,
15981598 Namespace : "default" ,
15991599 },
16001600 },
16011601 ClusterRoleBindings : & []cpv1alpha1.ClusterRoleBinding {
16021602 {
1603- Subject : rbacv1.Subject {
1603+ Subject : & rbacv1.Subject {
16041604 APIGroup : msav1beta1 .GroupVersion .Group ,
16051605 Kind : "ManagedServiceAccount" ,
16061606 Name : "test-msa-1" ,
0 commit comments