mirror of https://github.com/kubernetes/kops.git
Merge pull request #6798 from justinsb/golang_1_11_5
Switch to golang 1.11.5
This commit is contained in:
commit
732121d226
10
.travis.yml
10
.travis.yml
|
|
@ -3,12 +3,12 @@ os:
|
||||||
- linux
|
- linux
|
||||||
- osx
|
- osx
|
||||||
go:
|
go:
|
||||||
# 1.8 & 1.9 are now best-effort; we recommend 1.10; k8s apimachinery relies on 1.10
|
# 1.10 is now best-effort; we recommend 1.11; 1.12 is in the wild but not the k8s recommended version
|
||||||
# - 1.8
|
#- "1.10" gofmt changes mean this fails testing
|
||||||
# - 1.9
|
- "1.11"
|
||||||
- "1.10"
|
- "1.12"
|
||||||
|
|
||||||
go_import_path: k8s.io/kops
|
go_import_path: k8s.io/kops
|
||||||
|
|
||||||
script:
|
script:
|
||||||
- make ci
|
- make travis-ci
|
||||||
|
|
|
||||||
|
|
@ -21,3 +21,10 @@ go_library(
|
||||||
],
|
],
|
||||||
importpath = "k8s.io/kops",
|
importpath = "k8s.io/kops",
|
||||||
)
|
)
|
||||||
|
|
||||||
|
load("@io_k8s_repo_infra//defs:run_in_workspace.bzl", "workspace_binary")
|
||||||
|
|
||||||
|
workspace_binary(
|
||||||
|
name = "gofmt",
|
||||||
|
cmd = "@go_sdk//:bin/gofmt",
|
||||||
|
)
|
||||||
|
|
|
||||||
27
Makefile
27
Makefile
|
|
@ -21,7 +21,7 @@ GCS_URL=$(GCS_LOCATION:gs://%=https://storage.googleapis.com/%)
|
||||||
LATEST_FILE?=latest-ci.txt
|
LATEST_FILE?=latest-ci.txt
|
||||||
GOPATH_1ST:=$(shell go env | grep GOPATH | cut -f 2 -d \")
|
GOPATH_1ST:=$(shell go env | grep GOPATH | cut -f 2 -d \")
|
||||||
UNIQUE:=$(shell date +%s)
|
UNIQUE:=$(shell date +%s)
|
||||||
GOVERSION=1.10.8
|
GOVERSION=1.11.5
|
||||||
BUILD=$(GOPATH_1ST)/src/k8s.io/kops/.build
|
BUILD=$(GOPATH_1ST)/src/k8s.io/kops/.build
|
||||||
LOCAL=$(BUILD)/local
|
LOCAL=$(BUILD)/local
|
||||||
BINDATA_TARGETS=upup/models/bindata.go
|
BINDATA_TARGETS=upup/models/bindata.go
|
||||||
|
|
@ -500,20 +500,7 @@ dep-ensure: dep-prereqs
|
||||||
|
|
||||||
.PHONY: gofmt
|
.PHONY: gofmt
|
||||||
gofmt:
|
gofmt:
|
||||||
gofmt -w -s channels/
|
find -name "*.go" | grep -v vendor | xargs bazel run //:gofmt -- -w -s
|
||||||
gofmt -w -s cloudmock/
|
|
||||||
gofmt -w -s cmd/
|
|
||||||
gofmt -w -s examples/
|
|
||||||
gofmt -w -s nodeup/
|
|
||||||
gofmt -w -s util/
|
|
||||||
gofmt -w -s upup/pkg/
|
|
||||||
gofmt -w -s pkg/
|
|
||||||
gofmt -w -s tests/
|
|
||||||
gofmt -w -s protokube/cmd
|
|
||||||
gofmt -w -s protokube/pkg
|
|
||||||
gofmt -w -s protokube/tests
|
|
||||||
gofmt -w -s dns-controller/cmd
|
|
||||||
gofmt -w -s dns-controller/pkg
|
|
||||||
|
|
||||||
.PHONY: goimports
|
.PHONY: goimports
|
||||||
goimports:
|
goimports:
|
||||||
|
|
@ -562,7 +549,8 @@ verify-gendocs: ${KOPS}
|
||||||
.PHONY: verify-bazel
|
.PHONY: verify-bazel
|
||||||
verify-bazel:
|
verify-bazel:
|
||||||
hack/verify-bazel.sh
|
hack/verify-bazel.sh
|
||||||
#
|
|
||||||
|
# ci target is for developers, it aims to cover all the CI jobs
|
||||||
# verify-gendocs will call kops target
|
# verify-gendocs will call kops target
|
||||||
# verify-package has to be after verify-gendoc, because with .gitignore for federation bindata
|
# verify-package has to be after verify-gendoc, because with .gitignore for federation bindata
|
||||||
# it bombs in travis. verify-gendoc generates the bindata file.
|
# it bombs in travis. verify-gendoc generates the bindata file.
|
||||||
|
|
@ -570,6 +558,13 @@ verify-bazel:
|
||||||
ci: govet verify-gofmt verify-boilerplate verify-bazel verify-misspelling nodeup examples test | verify-gendocs verify-packages verify-apimachinery
|
ci: govet verify-gofmt verify-boilerplate verify-bazel verify-misspelling nodeup examples test | verify-gendocs verify-packages verify-apimachinery
|
||||||
echo "Done!"
|
echo "Done!"
|
||||||
|
|
||||||
|
# travis-ci is the target that travis-ci calls
|
||||||
|
# we skip tasks that rely on bazel and are covered by other jobs
|
||||||
|
# verify-gofmt: uses bazel, covered by pull-kops-verify-gofmt
|
||||||
|
.PHONY: travis-ci
|
||||||
|
travis-ci: govet verify-boilerplate verify-bazel verify-misspelling nodeup examples test | verify-gendocs verify-packages verify-apimachinery
|
||||||
|
echo "Done!"
|
||||||
|
|
||||||
.PHONY: pr
|
.PHONY: pr
|
||||||
pr:
|
pr:
|
||||||
@echo "Test passed!"
|
@echo "Test passed!"
|
||||||
|
|
|
||||||
|
|
@ -21,7 +21,7 @@ load("@io_bazel_rules_go//go:deps.bzl", "go_rules_dependencies", "go_register_to
|
||||||
go_rules_dependencies()
|
go_rules_dependencies()
|
||||||
|
|
||||||
go_register_toolchains(
|
go_register_toolchains(
|
||||||
go_version = "1.10.8",
|
go_version = "1.11.5",
|
||||||
)
|
)
|
||||||
|
|
||||||
load("@bazel_gazelle//:deps.bzl", "gazelle_dependencies")
|
load("@bazel_gazelle//:deps.bzl", "gazelle_dependencies")
|
||||||
|
|
@ -113,3 +113,10 @@ http_file(
|
||||||
urls = ["https://kubeupv2.s3.amazonaws.com/kops/1.11.1/linux/amd64/utils.tar.gz"],
|
urls = ["https://kubeupv2.s3.amazonaws.com/kops/1.11.1/linux/amd64/utils.tar.gz"],
|
||||||
sha256 = "0e685eb751a32f782705311049b2592c4724add6f19ffdad1e7ce4f55816d7d8",
|
sha256 = "0e685eb751a32f782705311049b2592c4724add6f19ffdad1e7ce4f55816d7d8",
|
||||||
)
|
)
|
||||||
|
|
||||||
|
git_repository(
|
||||||
|
name = "io_k8s_repo_infra",
|
||||||
|
commit = "4ce715fbe67d8fbed05ec2bb47a148e754100a4b",
|
||||||
|
remote = "https://github.com/kubernetes/repo-infra.git",
|
||||||
|
shallow_since = "1517262872 -0800",
|
||||||
|
)
|
||||||
|
|
|
||||||
|
|
@ -58,13 +58,13 @@ func (m *MockAutoscaling) CreateAutoScalingGroup(input *autoscaling.CreateAutoSc
|
||||||
DefaultCooldown: input.DefaultCooldown,
|
DefaultCooldown: input.DefaultCooldown,
|
||||||
DesiredCapacity: input.DesiredCapacity,
|
DesiredCapacity: input.DesiredCapacity,
|
||||||
// EnabledMetrics: input.EnabledMetrics,
|
// EnabledMetrics: input.EnabledMetrics,
|
||||||
HealthCheckGracePeriod: input.HealthCheckGracePeriod,
|
HealthCheckGracePeriod: input.HealthCheckGracePeriod,
|
||||||
HealthCheckType: input.HealthCheckType,
|
HealthCheckType: input.HealthCheckType,
|
||||||
Instances: []*autoscaling.Instance{},
|
Instances: []*autoscaling.Instance{},
|
||||||
LaunchConfigurationName: input.LaunchConfigurationName,
|
LaunchConfigurationName: input.LaunchConfigurationName,
|
||||||
LoadBalancerNames: input.LoadBalancerNames,
|
LoadBalancerNames: input.LoadBalancerNames,
|
||||||
MaxSize: input.MaxSize,
|
MaxSize: input.MaxSize,
|
||||||
MinSize: input.MinSize,
|
MinSize: input.MinSize,
|
||||||
NewInstancesProtectedFromScaleIn: input.NewInstancesProtectedFromScaleIn,
|
NewInstancesProtectedFromScaleIn: input.NewInstancesProtectedFromScaleIn,
|
||||||
PlacementGroup: input.PlacementGroup,
|
PlacementGroup: input.PlacementGroup,
|
||||||
// Status: input.Status,
|
// Status: input.Status,
|
||||||
|
|
|
||||||
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
FROM alpine:3.8
|
FROM alpine:3.8
|
||||||
|
|
||||||
ARG GO_VERSION=1.10.8
|
ARG GO_VERSION=1.11.5
|
||||||
|
|
||||||
# KOPS_GITISH: Modify to build at an explicit tag/gitish
|
# KOPS_GITISH: Modify to build at an explicit tag/gitish
|
||||||
ARG KOPS_GITISH=release
|
ARG KOPS_GITISH=release
|
||||||
|
|
|
||||||
|
|
@ -16,9 +16,9 @@
|
||||||
|
|
||||||
. $(dirname "${BASH_SOURCE}")/common.sh
|
. $(dirname "${BASH_SOURCE}")/common.sh
|
||||||
|
|
||||||
GOFMT="gofmt -s -w"
|
GOFMT="bazel run //:gofmt -- -s -w"
|
||||||
|
|
||||||
bad_files=$(git ls-files "*.go" | grep -v vendor | xargs -I {} $GOFMT -l {})
|
bad_files=$(git ls-files "*.go" | grep -v vendor | xargs $GOFMT -l)
|
||||||
if [[ -n "${bad_files}" ]]; then
|
if [[ -n "${bad_files}" ]]; then
|
||||||
echo "FAIL: '$GOFMT' needs to be run on the following files: "
|
echo "FAIL: '$GOFMT' needs to be run on the following files: "
|
||||||
echo "${bad_files}"
|
echo "${bad_files}"
|
||||||
|
|
|
||||||
|
|
@ -24,7 +24,7 @@ RUN apt-get update && apt-get install --yes --reinstall lsb-base \
|
||||||
&& rm -rf /var/lib/apt/lists/*
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
# Install golang
|
# Install golang
|
||||||
RUN curl -L https://storage.googleapis.com/golang/go1.10.3.linux-amd64.tar.gz | tar zx -C /usr/local
|
RUN curl -L https://storage.googleapis.com/golang/go1.11.5.linux-amd64.tar.gz | tar zx -C /usr/local
|
||||||
ENV PATH $PATH:/usr/local/go/bin
|
ENV PATH $PATH:/usr/local/go/bin
|
||||||
|
|
||||||
COPY onbuild.sh /onbuild.sh
|
COPY onbuild.sh /onbuild.sh
|
||||||
|
|
|
||||||
|
|
@ -24,7 +24,7 @@ RUN apt-get update && apt-get install --yes --reinstall lsb-base \
|
||||||
&& rm -rf /var/lib/apt/lists/*
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
# Install golang
|
# Install golang
|
||||||
RUN curl -L https://storage.googleapis.com/golang/go1.10.3.linux-amd64.tar.gz | tar zx -C /usr/local
|
RUN curl -L https://storage.googleapis.com/golang/go1.11.5.linux-amd64.tar.gz | tar zx -C /usr/local
|
||||||
ENV PATH $PATH:/usr/local/go/bin
|
ENV PATH $PATH:/usr/local/go/bin
|
||||||
|
|
||||||
COPY onbuild.sh /onbuild.sh
|
COPY onbuild.sh /onbuild.sh
|
||||||
|
|
|
||||||
|
|
@ -98,7 +98,7 @@ func makeKubeconfig(ctx context.Context, config *Config, token string) ([]byte,
|
||||||
{
|
{
|
||||||
Name: clusterName,
|
Name: clusterName,
|
||||||
Cluster: v1.Cluster{
|
Cluster: v1.Cluster{
|
||||||
Server: config.KubeAPI,
|
Server: config.KubeAPI,
|
||||||
CertificateAuthorityData: content,
|
CertificateAuthorityData: content,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
||||||
|
|
@ -590,7 +590,7 @@ func (b *KubeletBuilder) buildMasterKubeletKubeconfig() (*nodetasks.File, error)
|
||||||
|
|
||||||
template := &x509.Certificate{
|
template := &x509.Certificate{
|
||||||
BasicConstraintsValid: true,
|
BasicConstraintsValid: true,
|
||||||
IsCA: false,
|
IsCA: false,
|
||||||
}
|
}
|
||||||
|
|
||||||
template.Subject = pkix.Name{
|
template.Subject = pkix.Name{
|
||||||
|
|
|
||||||
|
|
@ -64,7 +64,7 @@ func Test_SharedGroups(t *testing.T) {
|
||||||
func makeTestInstanceGroupSec(role kops.InstanceGroupRole, secGroup *string) *kops.InstanceGroup {
|
func makeTestInstanceGroupSec(role kops.InstanceGroupRole, secGroup *string) *kops.InstanceGroup {
|
||||||
return &kops.InstanceGroup{
|
return &kops.InstanceGroup{
|
||||||
Spec: kops.InstanceGroupSpec{
|
Spec: kops.InstanceGroupSpec{
|
||||||
Role: role,
|
Role: role,
|
||||||
SecurityGroupOverride: secGroup,
|
SecurityGroupOverride: secGroup,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -58,7 +58,7 @@ func TestGenerateCertificate(t *testing.T) {
|
||||||
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
|
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
|
||||||
ExtKeyUsage: []x509.ExtKeyUsage{},
|
ExtKeyUsage: []x509.ExtKeyUsage{},
|
||||||
BasicConstraintsValid: true,
|
BasicConstraintsValid: true,
|
||||||
IsCA: true,
|
IsCA: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
cert, err := SignNewCertificate(key, template, nil, nil)
|
cert, err := SignNewCertificate(key, template, nil, nil)
|
||||||
|
|
|
||||||
|
|
@ -417,16 +417,16 @@ func (c *ApplyClusterCmd) Run() error {
|
||||||
"iamRolePolicy": &awstasks.IAMRolePolicy{},
|
"iamRolePolicy": &awstasks.IAMRolePolicy{},
|
||||||
|
|
||||||
// VPC / Networking
|
// VPC / Networking
|
||||||
"dhcpOptions": &awstasks.DHCPOptions{},
|
"dhcpOptions": &awstasks.DHCPOptions{},
|
||||||
"internetGateway": &awstasks.InternetGateway{},
|
"internetGateway": &awstasks.InternetGateway{},
|
||||||
"route": &awstasks.Route{},
|
"route": &awstasks.Route{},
|
||||||
"routeTable": &awstasks.RouteTable{},
|
"routeTable": &awstasks.RouteTable{},
|
||||||
"routeTableAssociation": &awstasks.RouteTableAssociation{},
|
"routeTableAssociation": &awstasks.RouteTableAssociation{},
|
||||||
"securityGroup": &awstasks.SecurityGroup{},
|
"securityGroup": &awstasks.SecurityGroup{},
|
||||||
"securityGroupRule": &awstasks.SecurityGroupRule{},
|
"securityGroupRule": &awstasks.SecurityGroupRule{},
|
||||||
"subnet": &awstasks.Subnet{},
|
"subnet": &awstasks.Subnet{},
|
||||||
"vpc": &awstasks.VPC{},
|
"vpc": &awstasks.VPC{},
|
||||||
"ngw": &awstasks.NatGateway{},
|
"ngw": &awstasks.NatGateway{},
|
||||||
"vpcDHDCPOptionsAssociation": &awstasks.VPCDHCPOptionsAssociation{},
|
"vpcDHDCPOptionsAssociation": &awstasks.VPCDHCPOptionsAssociation{},
|
||||||
|
|
||||||
// ELB
|
// ELB
|
||||||
|
|
|
||||||
|
|
@ -169,13 +169,13 @@ func (t *LaunchTemplate) Find(c *fi.Context) (*LaunchTemplate, error) {
|
||||||
glog.V(3).Infof("found existing LaunchTemplate: %s", fi.StringValue(lt.LaunchTemplateName))
|
glog.V(3).Infof("found existing LaunchTemplate: %s", fi.StringValue(lt.LaunchTemplateName))
|
||||||
|
|
||||||
actual := &LaunchTemplate{
|
actual := &LaunchTemplate{
|
||||||
AssociatePublicIP: fi.Bool(false),
|
AssociatePublicIP: fi.Bool(false),
|
||||||
ID: lt.LaunchTemplateName,
|
ID: lt.LaunchTemplateName,
|
||||||
ImageID: lt.LaunchTemplateData.ImageId,
|
ImageID: lt.LaunchTemplateData.ImageId,
|
||||||
InstanceMonitoring: fi.Bool(false),
|
InstanceMonitoring: fi.Bool(false),
|
||||||
InstanceType: lt.LaunchTemplateData.InstanceType,
|
InstanceType: lt.LaunchTemplateData.InstanceType,
|
||||||
Lifecycle: t.Lifecycle,
|
Lifecycle: t.Lifecycle,
|
||||||
Name: t.Name,
|
Name: t.Name,
|
||||||
RootVolumeOptimization: lt.LaunchTemplateData.EbsOptimized,
|
RootVolumeOptimization: lt.LaunchTemplateData.EbsOptimized,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -293,7 +293,7 @@ func buildCertificateTemplateForType(certificateType string) (*x509.Certificate,
|
||||||
|
|
||||||
template := &x509.Certificate{
|
template := &x509.Certificate{
|
||||||
BasicConstraintsValid: true,
|
BasicConstraintsValid: true,
|
||||||
IsCA: false,
|
IsCA: false,
|
||||||
}
|
}
|
||||||
|
|
||||||
tokens := strings.Split(certificateType, ",")
|
tokens := strings.Split(certificateType, ",")
|
||||||
|
|
|
||||||
|
|
@ -144,7 +144,7 @@ func BuildCAX509Template() *x509.Certificate {
|
||||||
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
|
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
|
||||||
ExtKeyUsage: []x509.ExtKeyUsage{},
|
ExtKeyUsage: []x509.ExtKeyUsage{},
|
||||||
BasicConstraintsValid: true,
|
BasicConstraintsValid: true,
|
||||||
IsCA: true,
|
IsCA: true,
|
||||||
}
|
}
|
||||||
return template
|
return template
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue