mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-29 14:37:00 +00:00
Merge pull request #79137 from qingsenLi/k8s-190618-golint
fix golint failures for pkg/volume/scaleio and pkg/volume/storageos
This commit is contained in:
commit
2b7b6713b1
@ -257,8 +257,6 @@ pkg/volume/csi/fake
|
|||||||
pkg/volume/git_repo
|
pkg/volume/git_repo
|
||||||
pkg/volume/iscsi
|
pkg/volume/iscsi
|
||||||
pkg/volume/rbd
|
pkg/volume/rbd
|
||||||
pkg/volume/scaleio
|
|
||||||
pkg/volume/storageos
|
|
||||||
pkg/volume/testing
|
pkg/volume/testing
|
||||||
pkg/volume/util/fs
|
pkg/volume/util/fs
|
||||||
pkg/volume/util/volumepathhandler
|
pkg/volume/util/volumepathhandler
|
||||||
|
@ -76,13 +76,12 @@ var (
|
|||||||
sdcGUIDLabelName = "scaleio.sdcGUID"
|
sdcGUIDLabelName = "scaleio.sdcGUID"
|
||||||
sdcRootPath = "/opt/emc/scaleio/sdc/bin"
|
sdcRootPath = "/opt/emc/scaleio/sdc/bin"
|
||||||
|
|
||||||
secretNotFoundErr = errors.New("secret not found")
|
errSecretNotFound = errors.New("secret not found")
|
||||||
configMapNotFoundErr = errors.New("configMap not found")
|
errGatewayNotProvided = errors.New("ScaleIO gateway not provided")
|
||||||
gatewayNotProvidedErr = errors.New("ScaleIO gateway not provided")
|
errSecretRefNotProvided = errors.New("secret ref not provided")
|
||||||
secretRefNotProvidedErr = errors.New("secret ref not provided")
|
errSystemNotProvided = errors.New("ScaleIO system not provided")
|
||||||
systemNotProvidedErr = errors.New("ScaleIO system not provided")
|
errStoragePoolNotProvided = errors.New("ScaleIO storage pool not provided")
|
||||||
storagePoolNotProvidedErr = errors.New("ScaleIO storage pool not provided")
|
errProtectionDomainNotProvided = errors.New("ScaleIO protection domain not provided")
|
||||||
protectionDomainNotProvidedErr = errors.New("ScaleIO protection domain not provided")
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// mapVolumeSpec maps attributes from either ScaleIOVolumeSource or ScaleIOPersistentVolumeSource to config
|
// mapVolumeSpec maps attributes from either ScaleIOVolumeSource or ScaleIOPersistentVolumeSource to config
|
||||||
@ -118,19 +117,19 @@ func mapVolumeSpec(config map[string]string, spec *volume.Spec) {
|
|||||||
|
|
||||||
func validateConfigs(config map[string]string) error {
|
func validateConfigs(config map[string]string) error {
|
||||||
if config[confKey.gateway] == "" {
|
if config[confKey.gateway] == "" {
|
||||||
return gatewayNotProvidedErr
|
return errGatewayNotProvided
|
||||||
}
|
}
|
||||||
if config[confKey.secretName] == "" {
|
if config[confKey.secretName] == "" {
|
||||||
return secretRefNotProvidedErr
|
return errSecretRefNotProvided
|
||||||
}
|
}
|
||||||
if config[confKey.system] == "" {
|
if config[confKey.system] == "" {
|
||||||
return systemNotProvidedErr
|
return errSystemNotProvided
|
||||||
}
|
}
|
||||||
if config[confKey.storagePool] == "" {
|
if config[confKey.storagePool] == "" {
|
||||||
return storagePoolNotProvidedErr
|
return errStoragePoolNotProvided
|
||||||
}
|
}
|
||||||
if config[confKey.protectionDomain] == "" {
|
if config[confKey.protectionDomain] == "" {
|
||||||
return protectionDomainNotProvidedErr
|
return errProtectionDomainNotProvided
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
@ -222,7 +221,7 @@ func attachSecret(plug *sioPlugin, namespace string, configData map[string]strin
|
|||||||
secretMap, err := volutil.GetSecretForPV(namespace, secretRefName, sioPluginName, kubeClient)
|
secretMap, err := volutil.GetSecretForPV(namespace, secretRefName, sioPluginName, kubeClient)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
klog.Error(log("failed to get secret: %v", err))
|
klog.Error(log("failed to get secret: %v", err))
|
||||||
return secretNotFoundErr
|
return errSecretNotFound
|
||||||
}
|
}
|
||||||
// merge secret data
|
// merge secret data
|
||||||
for key, val := range secretMap {
|
for key, val := range secretMap {
|
||||||
|
@ -93,7 +93,7 @@ func TestUtilValidateConfigs(t *testing.T) {
|
|||||||
confKey.secretName: "sio-secret",
|
confKey.secretName: "sio-secret",
|
||||||
confKey.system: "sio",
|
confKey.system: "sio",
|
||||||
}
|
}
|
||||||
if err := validateConfigs(data); err != gatewayNotProvidedErr {
|
if err := validateConfigs(data); err != errGatewayNotProvided {
|
||||||
t.Error("Expecting error for missing gateway, but did not get it")
|
t.Error("Expecting error for missing gateway, but did not get it")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -37,9 +37,12 @@ const (
|
|||||||
modeFile
|
modeFile
|
||||||
modeUnsupported
|
modeUnsupported
|
||||||
|
|
||||||
ErrDeviceNotFound = "device not found"
|
//ErrDeviceNotFound defines "device not found"
|
||||||
|
ErrDeviceNotFound = "device not found"
|
||||||
|
//ErrDeviceNotSupported defines "device not supported"
|
||||||
ErrDeviceNotSupported = "device not supported"
|
ErrDeviceNotSupported = "device not supported"
|
||||||
ErrNotAvailable = "not available"
|
//ErrNotAvailable defines "not available"
|
||||||
|
ErrNotAvailable = "not available"
|
||||||
)
|
)
|
||||||
|
|
||||||
type deviceType int
|
type deviceType int
|
||||||
|
Loading…
Reference in New Issue
Block a user