mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-21 10:51:29 +00:00
drop bazel logic from hack/lib/golang.sh
This commit is contained in:
parent
45f910e79e
commit
8f3cbc923a
@ -458,20 +458,6 @@ kube::golang::create_gopath_tree() {
|
|||||||
if [[ ! -e "${go_pkg_dir}" || "$(readlink "${go_pkg_dir}")" != "${KUBE_ROOT}" ]]; then
|
if [[ ! -e "${go_pkg_dir}" || "$(readlink "${go_pkg_dir}")" != "${KUBE_ROOT}" ]]; then
|
||||||
ln -snf "${KUBE_ROOT}" "${go_pkg_dir}"
|
ln -snf "${KUBE_ROOT}" "${go_pkg_dir}"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# Using bazel with a recursive target (e.g. bazel test ...) will abort due to
|
|
||||||
# the symlink loop created in this function, so create this special file which
|
|
||||||
# tells bazel not to follow the symlink.
|
|
||||||
touch "${go_pkg_basedir}/DONT_FOLLOW_SYMLINKS_WHEN_TRAVERSING_THIS_DIRECTORY_VIA_A_RECURSIVE_TARGET_PATTERN"
|
|
||||||
# Additionally, the //:package-srcs glob recursively includes all
|
|
||||||
# subdirectories, and similarly fails due to the symlink loop. By creating a
|
|
||||||
# BUILD.bazel file, we effectively create a dummy package, which stops the
|
|
||||||
# glob from descending further into the tree and hitting the loop.
|
|
||||||
cat >"${KUBE_GOPATH}/BUILD.bazel" <<EOF
|
|
||||||
# This dummy BUILD file prevents Bazel from trying to descend through the
|
|
||||||
# infinite loop created by the symlink at
|
|
||||||
# ${go_pkg_dir}
|
|
||||||
EOF
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# Ensure the go tool exists and is a viable version.
|
# Ensure the go tool exists and is a viable version.
|
||||||
|
Loading…
Reference in New Issue
Block a user