mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-03 09:22:44 +00:00
Merge pull request #127472 from skitt/fix-client-go-extensions-broken
Run staging verify scripts from the main make verify
This commit is contained in:
commit
f49fadb4ed
@ -828,6 +828,18 @@ function kube::util::read-array {
|
|||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# kube::util::run-in
|
||||||
|
# Changes directory to "$1", runs the rest of the arguments, and restores the initial directory
|
||||||
|
# Returns 1 if a directory change fails, the result of running the arguments otherwise
|
||||||
|
function kube::util::run-in {
|
||||||
|
pushd "$1" > /dev/null || return 1
|
||||||
|
shift
|
||||||
|
"$@"
|
||||||
|
local result=$?
|
||||||
|
popd > /dev/null || return 1
|
||||||
|
return $result
|
||||||
|
}
|
||||||
|
|
||||||
# Some useful colors.
|
# Some useful colors.
|
||||||
if [[ -z "${color_start-}" ]]; then
|
if [[ -z "${color_start-}" ]]; then
|
||||||
declare -r color_start="\033["
|
declare -r color_start="\033["
|
||||||
|
@ -14,12 +14,17 @@
|
|||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
|
# Indirect calls through kube::util::run-in aren't interpreted
|
||||||
|
# shellcheck disable=SC2317
|
||||||
|
|
||||||
set -o errexit
|
set -o errexit
|
||||||
set -o nounset
|
set -o nounset
|
||||||
set -o pipefail
|
set -o pipefail
|
||||||
|
|
||||||
KUBE_ROOT=$(dirname "${BASH_SOURCE[0]}")/../..
|
KUBE_ROOT=$(dirname "${BASH_SOURCE[0]}")/../..
|
||||||
source "${KUBE_ROOT}/hack/lib/util.sh"
|
source "${KUBE_ROOT}/hack/lib/init.sh"
|
||||||
|
|
||||||
|
kube::golang::setup_env
|
||||||
|
|
||||||
# If KUBE_JUNIT_REPORT_DIR is unset, and ARTIFACTS is set, then have them match.
|
# If KUBE_JUNIT_REPORT_DIR is unset, and ARTIFACTS is set, then have them match.
|
||||||
if [[ -z "${KUBE_JUNIT_REPORT_DIR:-}" && -n "${ARTIFACTS:-}" ]]; then
|
if [[ -z "${KUBE_JUNIT_REPORT_DIR:-}" && -n "${ARTIFACTS:-}" ]]; then
|
||||||
@ -142,7 +147,7 @@ function run-cmd {
|
|||||||
juLog -output="${output}" -class="verify" -name="${testname}" -fail="^ERROR: " "$@"
|
juLog -output="${output}" -class="verify" -name="${testname}" -fail="^ERROR: " "$@"
|
||||||
tr=$?
|
tr=$?
|
||||||
fi
|
fi
|
||||||
return ${tr}
|
return "${tr}"
|
||||||
}
|
}
|
||||||
|
|
||||||
# Collect Failed tests in this Array , initialize it to nil
|
# Collect Failed tests in this Array , initialize it to nil
|
||||||
@ -164,6 +169,10 @@ function run-checks {
|
|||||||
local t
|
local t
|
||||||
for t in ${pattern}
|
for t in ${pattern}
|
||||||
do
|
do
|
||||||
|
if [ "$t" = "$pattern" ]; then
|
||||||
|
# The pattern didn't match any files
|
||||||
|
continue
|
||||||
|
fi
|
||||||
local check_name
|
local check_name
|
||||||
check_name="$(basename "${t}")"
|
check_name="$(basename "${t}")"
|
||||||
if [[ -n ${WHAT:-} ]]; then
|
if [[ -n ${WHAT:-} ]]; then
|
||||||
@ -190,7 +199,7 @@ function run-checks {
|
|||||||
else
|
else
|
||||||
echo -e "${color_red}FAILED${color_norm} ${check_name}\t${elapsed}s"
|
echo -e "${color_red}FAILED${color_norm} ${check_name}\t${elapsed}s"
|
||||||
ret=1
|
ret=1
|
||||||
FAILED_TESTS+=("${t}")
|
FAILED_TESTS+=("${base}/${t}")
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
}
|
}
|
||||||
@ -220,9 +229,17 @@ if ${QUICK} ; then
|
|||||||
echo "Running in quick mode (QUICK=true). Only fast checks will run."
|
echo "Running in quick mode (QUICK=true). Only fast checks will run."
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
export API_KNOWN_VIOLATIONS_DIR="${KUBE_ROOT}"/api/api-rules
|
||||||
ret=0
|
ret=0
|
||||||
run-checks "${KUBE_ROOT}/hack/verify-*.sh" bash
|
modules=() # Pacify shellcheck
|
||||||
run-checks "${KUBE_ROOT}/hack/verify-*.py" python3
|
kube::util::read-array modules < <(go list -f '{{.Dir}}' -m)
|
||||||
|
for module in "${modules[@]}"; do
|
||||||
|
base=${module%/go.mod}
|
||||||
|
if [ -d "$base/hack" ]; then
|
||||||
|
kube::util::run-in "$base" run-checks "hack/verify-*.sh" bash
|
||||||
|
kube::util::run-in "$base" run-checks "hack/verify-*.py" python3
|
||||||
|
fi
|
||||||
|
done
|
||||||
missing-target-checks
|
missing-target-checks
|
||||||
|
|
||||||
if [[ ${ret} -eq 1 ]]; then
|
if [[ ${ret} -eq 1 ]]; then
|
||||||
|
@ -19,7 +19,7 @@ set -o nounset
|
|||||||
set -o pipefail
|
set -o pipefail
|
||||||
|
|
||||||
SCRIPT_ROOT=$(dirname "${BASH_SOURCE[0]}")/..
|
SCRIPT_ROOT=$(dirname "${BASH_SOURCE[0]}")/..
|
||||||
CODEGEN_PKG=${CODEGEN_PKG:-$(cd "${SCRIPT_ROOT}"; ls -d -1 ./vendor/k8s.io/code-generator 2>/dev/null || echo ../code-generator)}
|
CODEGEN_PKG=${CODEGEN_PKG:-$(cd "${SCRIPT_ROOT}"; ls -d -1 ./vendor/k8s.io/code-generator 2>/dev/null || echo ../../../code-generator)}
|
||||||
|
|
||||||
source "${CODEGEN_PKG}/kube_codegen.sh"
|
source "${CODEGEN_PKG}/kube_codegen.sh"
|
||||||
|
|
||||||
|
@ -35,7 +35,7 @@ cp -a "${DIFFROOT}"/* "${TMP_DIFFROOT}"
|
|||||||
"${SCRIPT_ROOT}/hack/update-codegen.sh"
|
"${SCRIPT_ROOT}/hack/update-codegen.sh"
|
||||||
echo "diffing ${DIFFROOT} against freshly generated codegen"
|
echo "diffing ${DIFFROOT} against freshly generated codegen"
|
||||||
ret=0
|
ret=0
|
||||||
diff -Naupr "${DIFFROOT}" "${TMP_DIFFROOT}" || ret=$?
|
diff -Naupr -x.gitignore "${DIFFROOT}" "${TMP_DIFFROOT}" || ret=$?
|
||||||
if [[ $ret -eq 0 ]]; then
|
if [[ $ret -eq 0 ]]; then
|
||||||
echo "${DIFFROOT} up to date."
|
echo "${DIFFROOT} up to date."
|
||||||
else
|
else
|
||||||
|
Loading…
Reference in New Issue
Block a user