Skip to content

Commit

Permalink
Merge pull request #6815 from justinsb/cherry_pick_6799
Browse files Browse the repository at this point in the history
Cherry pick of #6798 and #6799 onto release-1.14
  • Loading branch information
k8s-ci-robot authored Apr 23, 2019
2 parents dd39c67 + 309fb48 commit 50506f0
Show file tree
Hide file tree
Showing 17 changed files with 70 additions and 57 deletions.
10 changes: 5 additions & 5 deletions .travis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,12 +3,12 @@ os:
- linux
- osx
go:
# 1.8 & 1.9 are now best-effort; we recommend 1.10; k8s apimachinery relies on 1.10
# - 1.8
# - 1.9
- "1.10"
# 1.10 & 1.11 are now best-effort; we recommend 1.12
# - "1.10" gofmt changes mean 1.10 fails testing
- "1.11"
- "1.12"

go_import_path: k8s.io/kops

script:
- make ci
- make travis-ci
7 changes: 7 additions & 0 deletions BUILD.bazel
Original file line number Diff line number Diff line change
Expand Up @@ -21,3 +21,10 @@ go_library(
],
importpath = "k8s.io/kops",
)

load("@io_k8s_repo_infra//defs:run_in_workspace.bzl", "workspace_binary")

workspace_binary(
name = "gofmt",
cmd = "@go_sdk//:bin/gofmt",
)
31 changes: 15 additions & 16 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ GCS_URL=$(GCS_LOCATION:gs://%=https://storage.googleapis.com/%)
LATEST_FILE?=latest-ci.txt
GOPATH_1ST:=$(shell go env | grep GOPATH | cut -f 2 -d \")
UNIQUE:=$(shell date +%s)
GOVERSION=1.10.8
GOVERSION=1.12.1
BUILD=$(GOPATH_1ST)/src/k8s.io/kops/.build
LOCAL=$(BUILD)/local
BINDATA_TARGETS=upup/models/bindata.go
Expand Down Expand Up @@ -216,6 +216,10 @@ check-builds-in-go19:
check-builds-in-go110:
docker run -v ${GOPATH_1ST}/src/k8s.io/kops:/go/src/k8s.io/kops golang:1.10 make -C /go/src/k8s.io/kops ci

.PHONY: check-builds-in-go111
check-builds-in-go111:
docker run -v ${GOPATH_1ST}/src/k8s.io/kops:/go/src/k8s.io/kops golang:1.11 make -C /go/src/k8s.io/kops ci

.PHONY: codegen
codegen: kops-gobindata
go install k8s.io/kops/upup/tools/generators/...
Expand Down Expand Up @@ -500,20 +504,7 @@ dep-ensure: dep-prereqs

.PHONY: gofmt
gofmt:
gofmt -w -s channels/
gofmt -w -s cloudmock/
gofmt -w -s cmd/
gofmt -w -s examples/
gofmt -w -s nodeup/
gofmt -w -s util/
gofmt -w -s upup/pkg/
gofmt -w -s pkg/
gofmt -w -s tests/
gofmt -w -s protokube/cmd
gofmt -w -s protokube/pkg
gofmt -w -s protokube/tests
gofmt -w -s dns-controller/cmd
gofmt -w -s dns-controller/pkg
find -name "*.go" | grep -v vendor | xargs bazel run //:gofmt -- -w -s

.PHONY: goimports
goimports:
Expand Down Expand Up @@ -562,14 +553,22 @@ verify-gendocs: ${KOPS}
.PHONY: verify-bazel
verify-bazel:
hack/verify-bazel.sh
#

# ci target is for developers, it aims to cover all the CI jobs
# verify-gendocs will call kops target
# verify-package has to be after verify-gendoc, because with .gitignore for federation bindata
# it bombs in travis. verify-gendoc generates the bindata file.
.PHONY: ci
ci: govet verify-gofmt verify-boilerplate verify-bazel verify-misspelling nodeup examples test | verify-gendocs verify-packages verify-apimachinery
echo "Done!"

# travis-ci is the target that travis-ci calls
# we skip tasks that rely on bazel and are covered by other jobs
# verify-gofmt: uses bazel, covered by pull-kops-verify-gofmt
.PHONY: travis-ci
travis-ci: govet verify-boilerplate verify-bazel verify-misspelling nodeup examples test | verify-gendocs verify-packages verify-apimachinery
echo "Done!"

.PHONY: pr
pr:
@echo "Test passed!"
Expand Down
9 changes: 8 additions & 1 deletion WORKSPACE
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ load("@io_bazel_rules_go//go:deps.bzl", "go_rules_dependencies", "go_register_to
go_rules_dependencies()

go_register_toolchains(
go_version = "1.10.8",
go_version = "1.12.1",
)

load("@bazel_gazelle//:deps.bzl", "gazelle_dependencies")
Expand Down Expand Up @@ -113,3 +113,10 @@ http_file(
urls = ["https://kubeupv2.s3.amazonaws.com/kops/1.11.1/linux/amd64/utils.tar.gz"],
sha256 = "0e685eb751a32f782705311049b2592c4724add6f19ffdad1e7ce4f55816d7d8",
)

git_repository(
name = "io_k8s_repo_infra",
commit = "4ce715fbe67d8fbed05ec2bb47a148e754100a4b",
remote = "https://github.com/kubernetes/repo-infra.git",
shallow_since = "1517262872 -0800",
)
14 changes: 7 additions & 7 deletions cloudmock/aws/mockautoscaling/group.go
Original file line number Diff line number Diff line change
Expand Up @@ -58,13 +58,13 @@ func (m *MockAutoscaling) CreateAutoScalingGroup(input *autoscaling.CreateAutoSc
DefaultCooldown: input.DefaultCooldown,
DesiredCapacity: input.DesiredCapacity,
// EnabledMetrics: input.EnabledMetrics,
HealthCheckGracePeriod: input.HealthCheckGracePeriod,
HealthCheckType: input.HealthCheckType,
Instances: []*autoscaling.Instance{},
LaunchConfigurationName: input.LaunchConfigurationName,
LoadBalancerNames: input.LoadBalancerNames,
MaxSize: input.MaxSize,
MinSize: input.MinSize,
HealthCheckGracePeriod: input.HealthCheckGracePeriod,
HealthCheckType: input.HealthCheckType,
Instances: []*autoscaling.Instance{},
LaunchConfigurationName: input.LaunchConfigurationName,
LoadBalancerNames: input.LoadBalancerNames,
MaxSize: input.MaxSize,
MinSize: input.MinSize,
NewInstancesProtectedFromScaleIn: input.NewInstancesProtectedFromScaleIn,
PlacementGroup: input.PlacementGroup,
// Status: input.Status,
Expand Down
2 changes: 1 addition & 1 deletion docker/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@

FROM alpine:3.8

ARG GO_VERSION=1.10.8
ARG GO_VERSION=1.12.1

# KOPS_GITISH: Modify to build at an explicit tag/gitish
ARG KOPS_GITISH=release
Expand Down
4 changes: 2 additions & 2 deletions hack/verify-gofmt.sh
Original file line number Diff line number Diff line change
Expand Up @@ -16,9 +16,9 @@

. $(dirname "${BASH_SOURCE}")/common.sh

GOFMT="gofmt -s -w"
GOFMT="bazel run //:gofmt -- -s -w"

bad_files=$(git ls-files "*.go" | grep -v vendor | xargs -I {} $GOFMT -l {})
bad_files=$(git ls-files "*.go" | grep -v vendor | xargs $GOFMT -l)
if [[ -n "${bad_files}" ]]; then
echo "FAIL: '$GOFMT' needs to be run on the following files: "
echo "${bad_files}"
Expand Down
2 changes: 1 addition & 1 deletion images/dns-controller-builder/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ RUN apt-get update && apt-get install --yes --reinstall lsb-base \
&& rm -rf /var/lib/apt/lists/*

# Install golang
RUN curl -L https://storage.googleapis.com/golang/go1.10.3.linux-amd64.tar.gz | tar zx -C /usr/local
RUN curl -L https://storage.googleapis.com/golang/go1.12.1.linux-amd64.tar.gz | tar zx -C /usr/local
ENV PATH $PATH:/usr/local/go/bin

COPY onbuild.sh /onbuild.sh
2 changes: 1 addition & 1 deletion images/protokube-builder/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ RUN apt-get update && apt-get install --yes --reinstall lsb-base \
&& rm -rf /var/lib/apt/lists/*

# Install golang
RUN curl -L https://storage.googleapis.com/golang/go1.10.3.linux-amd64.tar.gz | tar zx -C /usr/local
RUN curl -L https://storage.googleapis.com/golang/go1.12.1.linux-amd64.tar.gz | tar zx -C /usr/local
ENV PATH $PATH:/usr/local/go/bin

COPY onbuild.sh /onbuild.sh
2 changes: 1 addition & 1 deletion node-authorizer/pkg/client/helper.go
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ func makeKubeconfig(ctx context.Context, config *Config, token string) ([]byte,
{
Name: clusterName,
Cluster: v1.Cluster{
Server: config.KubeAPI,
Server: config.KubeAPI,
CertificateAuthorityData: content,
},
},
Expand Down
2 changes: 1 addition & 1 deletion nodeup/pkg/model/kubelet.go
Original file line number Diff line number Diff line change
Expand Up @@ -590,7 +590,7 @@ func (b *KubeletBuilder) buildMasterKubeletKubeconfig() (*nodetasks.File, error)

template := &x509.Certificate{
BasicConstraintsValid: true,
IsCA: false,
IsCA: false,
}

template.Subject = pkix.Name{
Expand Down
2 changes: 1 addition & 1 deletion pkg/model/firewall_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ func Test_SharedGroups(t *testing.T) {
func makeTestInstanceGroupSec(role kops.InstanceGroupRole, secGroup *string) *kops.InstanceGroup {
return &kops.InstanceGroup{
Spec: kops.InstanceGroupSpec{
Role: role,
Role: role,
SecurityGroupOverride: secGroup,
},
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/pki/certificate_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ func TestGenerateCertificate(t *testing.T) {
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
ExtKeyUsage: []x509.ExtKeyUsage{},
BasicConstraintsValid: true,
IsCA: true,
IsCA: true,
}

cert, err := SignNewCertificate(key, template, nil, nil)
Expand Down
20 changes: 10 additions & 10 deletions upup/pkg/fi/cloudup/apply_cluster.go
Original file line number Diff line number Diff line change
Expand Up @@ -417,16 +417,16 @@ func (c *ApplyClusterCmd) Run() error {
"iamRolePolicy": &awstasks.IAMRolePolicy{},

// VPC / Networking
"dhcpOptions": &awstasks.DHCPOptions{},
"internetGateway": &awstasks.InternetGateway{},
"route": &awstasks.Route{},
"routeTable": &awstasks.RouteTable{},
"routeTableAssociation": &awstasks.RouteTableAssociation{},
"securityGroup": &awstasks.SecurityGroup{},
"securityGroupRule": &awstasks.SecurityGroupRule{},
"subnet": &awstasks.Subnet{},
"vpc": &awstasks.VPC{},
"ngw": &awstasks.NatGateway{},
"dhcpOptions": &awstasks.DHCPOptions{},
"internetGateway": &awstasks.InternetGateway{},
"route": &awstasks.Route{},
"routeTable": &awstasks.RouteTable{},
"routeTableAssociation": &awstasks.RouteTableAssociation{},
"securityGroup": &awstasks.SecurityGroup{},
"securityGroupRule": &awstasks.SecurityGroupRule{},
"subnet": &awstasks.Subnet{},
"vpc": &awstasks.VPC{},
"ngw": &awstasks.NatGateway{},
"vpcDHDCPOptionsAssociation": &awstasks.VPCDHCPOptionsAssociation{},

// ELB
Expand Down
14 changes: 7 additions & 7 deletions upup/pkg/fi/cloudup/awstasks/launchtemplate_target_api.go
Original file line number Diff line number Diff line change
Expand Up @@ -169,13 +169,13 @@ func (t *LaunchTemplate) Find(c *fi.Context) (*LaunchTemplate, error) {
glog.V(3).Infof("found existing LaunchTemplate: %s", fi.StringValue(lt.LaunchTemplateName))

actual := &LaunchTemplate{
AssociatePublicIP: fi.Bool(false),
ID: lt.LaunchTemplateName,
ImageID: lt.LaunchTemplateData.ImageId,
InstanceMonitoring: fi.Bool(false),
InstanceType: lt.LaunchTemplateData.InstanceType,
Lifecycle: t.Lifecycle,
Name: t.Name,
AssociatePublicIP: fi.Bool(false),
ID: lt.LaunchTemplateName,
ImageID: lt.LaunchTemplateData.ImageId,
InstanceMonitoring: fi.Bool(false),
InstanceType: lt.LaunchTemplateData.InstanceType,
Lifecycle: t.Lifecycle,
Name: t.Name,
RootVolumeOptimization: lt.LaunchTemplateData.EbsOptimized,
}

Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/fitasks/keypair.go
Original file line number Diff line number Diff line change
Expand Up @@ -293,7 +293,7 @@ func buildCertificateTemplateForType(certificateType string) (*x509.Certificate,

template := &x509.Certificate{
BasicConstraintsValid: true,
IsCA: false,
IsCA: false,
}

tokens := strings.Split(certificateType, ",")
Expand Down
2 changes: 1 addition & 1 deletion upup/pkg/fi/vfs_castore.go
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ func BuildCAX509Template() *x509.Certificate {
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
ExtKeyUsage: []x509.ExtKeyUsage{},
BasicConstraintsValid: true,
IsCA: true,
IsCA: true,
}
return template
}
Expand Down

0 comments on commit 50506f0

Please sign in to comment.