diff --git a/pkg/cosign/cosign.go b/pkg/cosign/cosign.go index f5e2afeebc..006127b8af 100644 --- a/pkg/cosign/cosign.go +++ b/pkg/cosign/cosign.go @@ -245,22 +245,6 @@ func FetchAttestations(imageRef string, imageVerify v1.ImageVerification) ([]map return nil, errors.Wrap(err, "loading credentials") } - var opts []remote.Option - ro := options.RegistryOptions{} - - opts, err = ro.ClientOpts(ctx) - if err != nil { - return nil, errors.Wrap(err, "constructing client options") - } - opts = append(opts, remote.WithRemoteOptions(gcrremote.WithAuthFromKeychain(registryclient.DefaultKeychain))) - if imageVerify.Repository != "" { - signatureRepo, err := name.NewRepository(imageVerify.Repository) - if err != nil { - return nil, errors.Wrapf(err, "failed to parse signature repository %s", imageVerify.Repository) - } - opts = append(opts, remote.WithTargetRepository(signatureRepo)) - } - ref, err := name.ParseReference(imageRef) if err != nil { return nil, errors.Wrap(err, "failed to parse image") diff --git a/pkg/openapi/crdSync.go b/pkg/openapi/crdSync.go index 2d202151a3..c07427e31e 100644 --- a/pkg/openapi/crdSync.go +++ b/pkg/openapi/crdSync.go @@ -187,7 +187,7 @@ func (o *Controller) ParseCRD(crd unstructured.Unstructured) { parsedSchema, err := openapiv2.NewSchema(&schema, compiler.NewContext("schema", &schema, nil)) if err != nil { v3valueFound := isOpenV3Error(err) - if v3valueFound == false { + if !v3valueFound { log.Log.Error(err, "failed to parse crd schema", "name", crdName) } return diff --git a/pkg/openapi/validation.go b/pkg/openapi/validation.go index aab3dd72bd..fa668616c4 100644 --- a/pkg/openapi/validation.go +++ b/pkg/openapi/validation.go @@ -151,7 +151,7 @@ func (o *Controller) ValidatePolicyMutation(policy v1.PolicyInterface) error { spec.SetRules(rules) k := o.gvkToDefinitionName.GetKind(kind) resource, _ := o.generateEmptyResource(o.definitions.GetSchema(k)).(map[string]interface{}) - if resource == nil || len(resource) == 0 { + if len(resource) == 0 { log.Log.V(2).Info("unable to validate resource. OpenApi definition not found", "kind", kind) return nil } diff --git a/pkg/policy/validate.go b/pkg/policy/validate.go index 23368dccf0..f22b2f8b2c 100644 --- a/pkg/policy/validate.go +++ b/pkg/policy/validate.go @@ -615,7 +615,7 @@ func isLabelAndAnnotationsString(rule kyverno.Rule) bool { patternMap, ok := pattern.(map[string]interface{}) if ok { ret := checkMetadata(patternMap) - if ret == false { + if !ret { return ret } } @@ -734,13 +734,13 @@ func validateConditions(conditions apiextensions.JSON, schemaKey string) (string "conditions": true, } if !allowedSchemaKeys[schemaKey] { - return fmt.Sprintf(schemaKey), fmt.Errorf("wrong schema key found for validating the conditions. Conditions can only occur under one of ['preconditions', 'conditions'] keys in the policy schema") + return schemaKey, fmt.Errorf("wrong schema key found for validating the conditions. Conditions can only occur under one of ['preconditions', 'conditions'] keys in the policy schema") } // conditions are currently in the form of []interface{} kyvernoConditions, err := utils.ApiextensionsJsonToKyvernoConditions(conditions) if err != nil { - return fmt.Sprintf("%s", schemaKey), err + return schemaKey, err } switch typedConditions := kyvernoConditions.(type) { case kyverno.AnyAllConditions: @@ -838,8 +838,6 @@ func validateRuleContext(rule kyverno.Rule) error { return nil } - contextNames := make([]string, 0) - for _, entry := range rule.Context { if entry.Name == "" { return fmt.Errorf("a name is required for context entries") @@ -849,7 +847,6 @@ func validateRuleContext(rule kyverno.Rule) error { return fmt.Errorf("entry name %s is invalid as it conflicts with a pre-defined variable %s", entry.Name, v) } } - contextNames = append(contextNames, entry.Name) var err error if entry.ConfigMap != nil && entry.APICall == nil && entry.ImageRegistry == nil && entry.Variable == nil { @@ -1022,7 +1019,7 @@ func podControllerAutoGenExclusion(policy kyverno.PolicyInterface) bool { reorderVal := strings.Split(strings.ToLower(val), ",") sort.Slice(reorderVal, func(i, j int) bool { return reorderVal[i] < reorderVal[j] }) - if ok && reflect.DeepEqual(reorderVal, []string{"cronjob", "daemonset", "deployment", "job", "statefulset"}) == false { + if ok && !reflect.DeepEqual(reorderVal, []string{"cronjob", "daemonset", "deployment", "job", "statefulset"}) { return true } return false diff --git a/pkg/webhooks/generation.go b/pkg/webhooks/generation.go index 98bbdf936d..4fb45d101b 100644 --- a/pkg/webhooks/generation.go +++ b/pkg/webhooks/generation.go @@ -302,9 +302,7 @@ func stripNonPolicyFields(obj, newRes map[string]interface{}, logger logr.Logger newRes["metadata"] = requiredMetadataInNewRes } - if _, found := obj["status"]; found { - delete(obj, "status") - } + delete(obj, "status") if _, found := obj["spec"]; found { delete(obj["spec"].(map[string]interface{}), "tolerations") @@ -312,9 +310,9 @@ func stripNonPolicyFields(obj, newRes map[string]interface{}, logger logr.Logger if dataMap, found := obj["data"]; found { keyInData := make([]string, 0) - switch dataMap.(type) { + switch dataMap := dataMap.(type) { case map[string]interface{}: - for k := range dataMap.(map[string]interface{}) { + for k := range dataMap { keyInData = append(keyInData, k) } }