mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-24 20:24:09 +00:00
Merge pull request #84626 from hwdef/fix-staticcheck1
cmd/kubeadm/app: fix staticcheck warning
This commit is contained in:
commit
529d5dd4b2
@ -32,7 +32,6 @@ import (
|
|||||||
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options"
|
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options"
|
||||||
cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util"
|
cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||||
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/phases/certs/renewal"
|
"k8s.io/kubernetes/cmd/kubeadm/app/phases/certs/renewal"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/phases/copycerts"
|
"k8s.io/kubernetes/cmd/kubeadm/app/phases/copycerts"
|
||||||
configutil "k8s.io/kubernetes/cmd/kubeadm/app/util/config"
|
configutil "k8s.io/kubernetes/cmd/kubeadm/app/util/config"
|
||||||
@ -80,7 +79,7 @@ func newCmdCertsUtility(out io.Writer) *cobra.Command {
|
|||||||
}
|
}
|
||||||
|
|
||||||
cmd.AddCommand(newCmdCertsRenewal())
|
cmd.AddCommand(newCmdCertsRenewal())
|
||||||
cmd.AddCommand(newCmdCertsExpiration(out, kubeadmconstants.KubernetesDir))
|
cmd.AddCommand(newCmdCertsExpiration(out, constants.KubernetesDir))
|
||||||
cmd.AddCommand(NewCmdCertificateKey())
|
cmd.AddCommand(NewCmdCertificateKey())
|
||||||
return cmd
|
return cmd
|
||||||
}
|
}
|
||||||
@ -112,7 +111,7 @@ func newCmdCertsRenewal() *cobra.Command {
|
|||||||
RunE: cmdutil.SubCmdRunE("renew"),
|
RunE: cmdutil.SubCmdRunE("renew"),
|
||||||
}
|
}
|
||||||
|
|
||||||
cmd.AddCommand(getRenewSubCommands(kubeadmconstants.KubernetesDir)...)
|
cmd.AddCommand(getRenewSubCommands(constants.KubernetesDir)...)
|
||||||
|
|
||||||
return cmd
|
return cmd
|
||||||
}
|
}
|
||||||
|
@ -28,7 +28,6 @@ import (
|
|||||||
|
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/phases/certs"
|
|
||||||
certsphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/certs"
|
certsphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/certs"
|
||||||
kubeconfigphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/kubeconfig"
|
kubeconfigphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/kubeconfig"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/util/pkiutil"
|
"k8s.io/kubernetes/cmd/kubeadm/app/util/pkiutil"
|
||||||
@ -266,7 +265,7 @@ func TestRunRenewCommands(t *testing.T) {
|
|||||||
func TestRenewUsingCSR(t *testing.T) {
|
func TestRenewUsingCSR(t *testing.T) {
|
||||||
tmpDir := testutil.SetupTempDir(t)
|
tmpDir := testutil.SetupTempDir(t)
|
||||||
defer os.RemoveAll(tmpDir)
|
defer os.RemoveAll(tmpDir)
|
||||||
cert := &certs.KubeadmCertEtcdServer
|
cert := &certsphase.KubeadmCertEtcdServer
|
||||||
|
|
||||||
cfg := testutil.GetDefaultInternalConfig(t)
|
cfg := testutil.GetDefaultInternalConfig(t)
|
||||||
cfg.CertificatesDir = tmpDir
|
cfg.CertificatesDir = tmpDir
|
||||||
|
@ -31,7 +31,6 @@ import (
|
|||||||
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options"
|
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/options"
|
||||||
cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util"
|
cmdutil "k8s.io/kubernetes/cmd/kubeadm/app/cmd/util"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||||
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/phases/controlplane"
|
"k8s.io/kubernetes/cmd/kubeadm/app/phases/controlplane"
|
||||||
kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util"
|
kubeadmutil "k8s.io/kubernetes/cmd/kubeadm/app/util"
|
||||||
configutil "k8s.io/kubernetes/cmd/kubeadm/app/util/config"
|
configutil "k8s.io/kubernetes/cmd/kubeadm/app/util/config"
|
||||||
@ -58,7 +57,7 @@ var (
|
|||||||
// NewCmdDiff returns the cobra command for `kubeadm upgrade diff`
|
// NewCmdDiff returns the cobra command for `kubeadm upgrade diff`
|
||||||
func NewCmdDiff(out io.Writer) *cobra.Command {
|
func NewCmdDiff(out io.Writer) *cobra.Command {
|
||||||
flags := &diffFlags{
|
flags := &diffFlags{
|
||||||
kubeConfigPath: kubeadmconstants.GetAdminKubeConfigPath(),
|
kubeConfigPath: constants.GetAdminKubeConfigPath(),
|
||||||
out: out,
|
out: out,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -29,7 +29,6 @@ import (
|
|||||||
phases "k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/upgrade/node"
|
phases "k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/upgrade/node"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow"
|
"k8s.io/kubernetes/cmd/kubeadm/app/cmd/phases/workflow"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||||
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
||||||
configutil "k8s.io/kubernetes/cmd/kubeadm/app/util/config"
|
configutil "k8s.io/kubernetes/cmd/kubeadm/app/util/config"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -130,7 +129,7 @@ func newNodeData(cmd *cobra.Command, args []string, options *nodeOptions) (*node
|
|||||||
// isControlPlane checks if a node is a control-plane node by looking up
|
// isControlPlane checks if a node is a control-plane node by looking up
|
||||||
// the kube-apiserver manifest file
|
// the kube-apiserver manifest file
|
||||||
isControlPlaneNode := true
|
isControlPlaneNode := true
|
||||||
filepath := kubeadmconstants.GetStaticPodFilepath(kubeadmconstants.KubeAPIServer, kubeadmconstants.GetStaticPodDirectory())
|
filepath := constants.GetStaticPodFilepath(constants.KubeAPIServer, constants.GetStaticPodDirectory())
|
||||||
if _, err := os.Stat(filepath); os.IsNotExist(err) {
|
if _, err := os.Stat(filepath); os.IsNotExist(err) {
|
||||||
isControlPlaneNode = false
|
isControlPlaneNode = false
|
||||||
}
|
}
|
||||||
|
@ -32,7 +32,6 @@ import (
|
|||||||
certsphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/certs"
|
certsphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/certs"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/phases/certs/renewal"
|
"k8s.io/kubernetes/cmd/kubeadm/app/phases/certs/renewal"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/phases/controlplane"
|
"k8s.io/kubernetes/cmd/kubeadm/app/phases/controlplane"
|
||||||
controlplanephase "k8s.io/kubernetes/cmd/kubeadm/app/phases/controlplane"
|
|
||||||
etcdphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/etcd"
|
etcdphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/etcd"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/util"
|
"k8s.io/kubernetes/cmd/kubeadm/app/util"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/util/apiclient"
|
"k8s.io/kubernetes/cmd/kubeadm/app/util/apiclient"
|
||||||
@ -464,7 +463,7 @@ func StaticPodControlPlane(client clientset.Interface, waiter apiclient.Waiter,
|
|||||||
|
|
||||||
// Write the updated static Pod manifests into the temporary directory
|
// Write the updated static Pod manifests into the temporary directory
|
||||||
fmt.Printf("[upgrade/staticpods] Writing new Static Pod manifests to %q\n", pathMgr.TempManifestDir())
|
fmt.Printf("[upgrade/staticpods] Writing new Static Pod manifests to %q\n", pathMgr.TempManifestDir())
|
||||||
err = controlplanephase.CreateInitStaticPodManifestFiles(pathMgr.TempManifestDir(), pathMgr.KustomizeDir(), cfg)
|
err = controlplane.CreateInitStaticPodManifestFiles(pathMgr.TempManifestDir(), pathMgr.KustomizeDir(), cfg)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrap(err, "error creating init static pod manifest files")
|
return errors.Wrap(err, "error creating init static pod manifest files")
|
||||||
}
|
}
|
||||||
|
@ -35,7 +35,6 @@ import (
|
|||||||
certutil "k8s.io/client-go/util/cert"
|
certutil "k8s.io/client-go/util/cert"
|
||||||
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||||
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
||||||
certsphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/certs"
|
certsphase "k8s.io/kubernetes/cmd/kubeadm/app/phases/certs"
|
||||||
"k8s.io/kubernetes/cmd/kubeadm/app/phases/certs/renewal"
|
"k8s.io/kubernetes/cmd/kubeadm/app/phases/certs/renewal"
|
||||||
controlplanephase "k8s.io/kubernetes/cmd/kubeadm/app/phases/controlplane"
|
controlplanephase "k8s.io/kubernetes/cmd/kubeadm/app/phases/controlplane"
|
||||||
@ -432,7 +431,7 @@ func TestStaticPodControlPlane(t *testing.T) {
|
|||||||
moveFileFunc: func(oldPath, newPath string) error {
|
moveFileFunc: func(oldPath, newPath string) error {
|
||||||
return os.Rename(oldPath, newPath)
|
return os.Rename(oldPath, newPath)
|
||||||
},
|
},
|
||||||
skipKubeConfig: kubeadmconstants.SchedulerKubeConfigFileName,
|
skipKubeConfig: constants.SchedulerKubeConfigFileName,
|
||||||
expectedErr: true,
|
expectedErr: true,
|
||||||
manifestShouldChange: false,
|
manifestShouldChange: false,
|
||||||
},
|
},
|
||||||
@ -446,7 +445,7 @@ func TestStaticPodControlPlane(t *testing.T) {
|
|||||||
moveFileFunc: func(oldPath, newPath string) error {
|
moveFileFunc: func(oldPath, newPath string) error {
|
||||||
return os.Rename(oldPath, newPath)
|
return os.Rename(oldPath, newPath)
|
||||||
},
|
},
|
||||||
skipKubeConfig: kubeadmconstants.AdminKubeConfigFileName,
|
skipKubeConfig: constants.AdminKubeConfigFileName,
|
||||||
expectedErr: true,
|
expectedErr: true,
|
||||||
manifestShouldChange: false,
|
manifestShouldChange: false,
|
||||||
},
|
},
|
||||||
@ -488,9 +487,9 @@ func TestStaticPodControlPlane(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, kubeConfig := range []string{
|
for _, kubeConfig := range []string{
|
||||||
kubeadmconstants.AdminKubeConfigFileName,
|
constants.AdminKubeConfigFileName,
|
||||||
kubeadmconstants.SchedulerKubeConfigFileName,
|
constants.SchedulerKubeConfigFileName,
|
||||||
kubeadmconstants.ControllerManagerKubeConfigFileName,
|
constants.ControllerManagerKubeConfigFileName,
|
||||||
} {
|
} {
|
||||||
if rt.skipKubeConfig == kubeConfig {
|
if rt.skipKubeConfig == kubeConfig {
|
||||||
continue
|
continue
|
||||||
@ -743,14 +742,14 @@ func TestRenewCertsByComponent(t *testing.T) {
|
|||||||
name: "all CA exist, should be rotated for scheduler",
|
name: "all CA exist, should be rotated for scheduler",
|
||||||
component: constants.KubeScheduler,
|
component: constants.KubeScheduler,
|
||||||
kubeConfigShouldExist: []string{
|
kubeConfigShouldExist: []string{
|
||||||
kubeadmconstants.SchedulerKubeConfigFileName,
|
constants.SchedulerKubeConfigFileName,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "all CA exist, should be rotated for controller manager",
|
name: "all CA exist, should be rotated for controller manager",
|
||||||
component: constants.KubeControllerManager,
|
component: constants.KubeControllerManager,
|
||||||
kubeConfigShouldExist: []string{
|
kubeConfigShouldExist: []string{
|
||||||
kubeadmconstants.ControllerManagerKubeConfigFileName,
|
constants.ControllerManagerKubeConfigFileName,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -850,7 +849,7 @@ func TestRenewCertsByComponent(t *testing.T) {
|
|||||||
t.Errorf("couldn't load new certificate %q: %v", kubeCert.Name, err)
|
t.Errorf("couldn't load new certificate %q: %v", kubeCert.Name, err)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
oldSerial, _ := certMaps[kubeCert.Name]
|
oldSerial := certMaps[kubeCert.Name]
|
||||||
|
|
||||||
shouldBeRenewed := true
|
shouldBeRenewed := true
|
||||||
if test.certsShouldBeRenewed != nil {
|
if test.certsShouldBeRenewed != nil {
|
||||||
@ -876,7 +875,7 @@ func TestRenewCertsByComponent(t *testing.T) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("error reading embedded certs from %s: %v", kubeConfig, err)
|
t.Fatalf("error reading embedded certs from %s: %v", kubeConfig, err)
|
||||||
}
|
}
|
||||||
oldSerial, _ := certMaps[kubeConfig]
|
oldSerial := certMaps[kubeConfig]
|
||||||
if oldSerial.Cmp(newCerts[0].SerialNumber) == 0 {
|
if oldSerial.Cmp(newCerts[0].SerialNumber) == 0 {
|
||||||
t.Errorf("certifitate %v was not reissued", kubeConfig)
|
t.Errorf("certifitate %v was not reissued", kubeConfig)
|
||||||
}
|
}
|
||||||
|
@ -121,20 +121,14 @@ func (sysd SystemdInitSystem) ServiceExists(service string) bool {
|
|||||||
args := []string{"status", service}
|
args := []string{"status", service}
|
||||||
outBytes, _ := exec.Command("systemctl", args...).Output()
|
outBytes, _ := exec.Command("systemctl", args...).Output()
|
||||||
output := string(outBytes)
|
output := string(outBytes)
|
||||||
if strings.Contains(output, "Loaded: not-found") {
|
return !strings.Contains(output, "Loaded: not-found")
|
||||||
return false
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// ServiceIsEnabled ensures the service is enabled to start on each boot.
|
// ServiceIsEnabled ensures the service is enabled to start on each boot.
|
||||||
func (sysd SystemdInitSystem) ServiceIsEnabled(service string) bool {
|
func (sysd SystemdInitSystem) ServiceIsEnabled(service string) bool {
|
||||||
args := []string{"is-enabled", service}
|
args := []string{"is-enabled", service}
|
||||||
err := exec.Command("systemctl", args...).Run()
|
err := exec.Command("systemctl", args...).Run()
|
||||||
if err != nil {
|
return err == nil
|
||||||
return false
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// ServiceIsActive will check is the service is "active". In the case of
|
// ServiceIsActive will check is the service is "active". In the case of
|
||||||
|
Loading…
Reference in New Issue
Block a user