blob: 49250e5bb92696c9bdd36c69a9f394e93296777b [file] [log] [blame]
Copyright 2020 The Monogon Project Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
This fixes OpenAPI codegen for when included from the Smalltown workspace. It basically undoes vendorification.
diff -ur io_k8s_kubernetes.orig/build/code_generation.bzl io_k8s_kubernetes/build/code_generation.bzl
--- io_k8s_kubernetes.orig/build/code_generation.bzl 2020-04-15 13:43:57.785669620 +0200
+++ io_k8s_kubernetes/build/code_generation.bzl 2020-04-16 18:19:44.297531873 +0200
@@ -27,6 +27,12 @@
...
)
"""
+ if pkg.startswith('staging/src/k8s.io/'):
+ parts = pkg.split('/', 4)
+ project = parts[3]
+ project = project.replace('-', '_')
+ path = parts[4]
+ return "@io_k8s_%s//%s:go_default_library" % (project, path)
return "//%s:go_default_library" % pkg
def go_pkg(pkg):
@@ -42,6 +48,8 @@
...
)
"""
+ if pkg.startswith('staging/src/'):
+ return pkg[len('staging/src/'):]
for prefix in ["staging/src", "vendor"]:
if pkg.startswith(prefix):
return paths.relativize(pkg, prefix)
@@ -49,8 +57,8 @@
def openapi_deps():
deps = [
- "//vendor/github.com/go-openapi/spec:go_default_library",
- "//vendor/k8s.io/kube-openapi/pkg/common:go_default_library",
+ "@com_github_go_openapi_spec//:go_default_library",
+ "@io_k8s_kube_openapi//pkg/common:go_default_library",
]
deps.extend([bazel_go_library(pkg) for pkg in tags_values_pkgs["openapi-gen"]["true"]])
return deps
@@ -76,7 +84,7 @@
# the generator must run from the repo root inside the generated GOPATH.
# All of bazel's $(location)s are relative to the original working directory, however.
cmd = " ".join([
- "$(location //vendor/k8s.io/kube-openapi/cmd/openapi-gen)",
+ "$(location @io_k8s_kube_openapi//cmd/openapi-gen)",
"--v 1",
"--logtostderr",
"--go-header-file $(location //" + openapi_vendor_prefix + "hack/boilerplate:boilerplate.generatego.txt)",
@@ -88,6 +96,6 @@
"&& rm tmp_api_violations.report",
]),
go_deps = openapi_deps(),
- tools = ["//vendor/k8s.io/kube-openapi/cmd/openapi-gen"],
+ tools = ["@io_k8s_kube_openapi//cmd/openapi-gen"],
message = "GenOpenAPI",
)
The rest rips out a bunch of volume providers. We're only interested in CSI and hostpath/local.
diff -ur io_k8s_kubernetes.orig/cmd/kube-apiserver/app/options/globalflags.go io_k8s_kubernetes/cmd/kube-apiserver/app/options/globalflags.go
--- io_k8s_kubernetes.orig/cmd/kube-apiserver/app/options/globalflags.go 2020-04-15 13:43:57.811669689 +0200
+++ io_k8s_kubernetes/cmd/kube-apiserver/app/options/globalflags.go 2020-04-17 13:29:41.578264893 +0200
@@ -32,9 +32,6 @@
func AddCustomGlobalFlags(fs *pflag.FlagSet) {
// Lookup flags in global flag set and re-register the values with our flagset.
- // Adds flags from k8s.io/kubernetes/pkg/cloudprovider/providers.
- registerLegacyGlobalFlags(fs)
-
// Adds flags from k8s.io/apiserver/pkg/admission.
globalflag.Register(fs, "default-not-ready-toleration-seconds")
globalflag.Register(fs, "default-unreachable-toleration-seconds")
diff -ur io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/controllermanager.go io_k8s_kubernetes/cmd/kube-controller-manager/app/controllermanager.go
--- io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/controllermanager.go 2020-04-15 13:43:57.812669692 +0200
+++ io_k8s_kubernetes/cmd/kube-controller-manager/app/controllermanager.go 2020-04-17 13:30:39.975397151 +0200
@@ -126,7 +126,6 @@
namedFlagSets := s.Flags(KnownControllers(), ControllersDisabledByDefault.List())
verflag.AddFlags(namedFlagSets.FlagSet("global"))
globalflag.AddGlobalFlags(namedFlagSets.FlagSet("global"), cmd.Name())
- registerLegacyGlobalFlags(namedFlagSets)
for _, f := range namedFlagSets.FlagSets {
fs.AddFlagSet(f)
}
diff -ur io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/plugins.go io_k8s_kubernetes/cmd/kube-controller-manager/app/plugins.go
--- io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/plugins.go 2020-04-15 13:43:57.813669694 +0200
+++ io_k8s_kubernetes/cmd/kube-controller-manager/app/plugins.go 2020-04-17 13:34:19.393894095 +0200
@@ -32,19 +32,9 @@
// Volume plugins
"k8s.io/kubernetes/pkg/volume"
"k8s.io/kubernetes/pkg/volume/csi"
- "k8s.io/kubernetes/pkg/volume/fc"
"k8s.io/kubernetes/pkg/volume/flexvolume"
- "k8s.io/kubernetes/pkg/volume/flocker"
- "k8s.io/kubernetes/pkg/volume/glusterfs"
"k8s.io/kubernetes/pkg/volume/hostpath"
- "k8s.io/kubernetes/pkg/volume/iscsi"
"k8s.io/kubernetes/pkg/volume/local"
- "k8s.io/kubernetes/pkg/volume/nfs"
- "k8s.io/kubernetes/pkg/volume/portworx"
- "k8s.io/kubernetes/pkg/volume/quobyte"
- "k8s.io/kubernetes/pkg/volume/rbd"
- "k8s.io/kubernetes/pkg/volume/scaleio"
- "k8s.io/kubernetes/pkg/volume/storageos"
volumeutil "k8s.io/kubernetes/pkg/volume/util"
utilfeature "k8s.io/apiserver/pkg/util/feature"
@@ -58,18 +48,7 @@
// The list of plugins is manually compiled. This code and the plugin
// initialization code for kubelet really, really need a through refactor.
func ProbeAttachableVolumePlugins() ([]volume.VolumePlugin, error) {
- var err error
allPlugins := []volume.VolumePlugin{}
- allPlugins, err = appendAttachableLegacyProviderVolumes(allPlugins, utilfeature.DefaultFeatureGate)
- if err != nil {
- return allPlugins, err
- }
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, fc.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, iscsi.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, csi.ProbeVolumePlugins()...)
return allPlugins, nil
}
@@ -83,18 +62,7 @@
// ProbeExpandableVolumePlugins returns volume plugins which are expandable
func ProbeExpandableVolumePlugins(config persistentvolumeconfig.VolumeConfiguration) ([]volume.VolumePlugin, error) {
- var err error
allPlugins := []volume.VolumePlugin{}
- allPlugins, err = appendExpandableLegacyProviderVolumes(allPlugins, utilfeature.DefaultFeatureGate)
- if err != nil {
- return allPlugins, err
- }
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, glusterfs.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, fc.ProbeVolumePlugins()...)
return allPlugins, nil
}
@@ -124,30 +92,7 @@
}
allPlugins = append(allPlugins, hostpath.ProbeVolumePlugins(hostPathConfig)...)
- nfsConfig := volume.VolumeConfig{
- RecyclerMinimumTimeout: int(config.PersistentVolumeRecyclerConfiguration.MinimumTimeoutNFS),
- RecyclerTimeoutIncrement: int(config.PersistentVolumeRecyclerConfiguration.IncrementTimeoutNFS),
- RecyclerPodTemplate: volume.NewPersistentVolumeRecyclerPodTemplate(),
- }
- if err := AttemptToLoadRecycler(config.PersistentVolumeRecyclerConfiguration.PodTemplateFilePathNFS, &nfsConfig); err != nil {
- klog.Fatalf("Could not create NFS recycler pod from file %s: %+v", config.PersistentVolumeRecyclerConfiguration.PodTemplateFilePathNFS, err)
- }
- allPlugins = append(allPlugins, nfs.ProbeVolumePlugins(nfsConfig)...)
- allPlugins = append(allPlugins, glusterfs.ProbeVolumePlugins()...)
- // add rbd provisioner
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, quobyte.ProbeVolumePlugins()...)
- var err error
- allPlugins, err = appendExpandableLegacyProviderVolumes(allPlugins, utilfeature.DefaultFeatureGate)
- if err != nil {
- return allPlugins, err
- }
-
- allPlugins = append(allPlugins, flocker.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, local.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
if utilfeature.DefaultFeatureGate.Enabled(features.CSIInlineVolume) {
allPlugins = append(allPlugins, csi.ProbeVolumePlugins()...)
diff -ur io_k8s_kubernetes.orig/cmd/kubectl/BUILD io_k8s_kubernetes/cmd/kubectl/BUILD
--- io_k8s_kubernetes.orig/cmd/kubectl/BUILD 2020-04-20 14:58:52.573455879 +0200
+++ io_k8s_kubernetes/cmd/kubectl/BUILD 2020-04-20 14:56:41.199032687 +0200
@@ -3,7 +3,7 @@
"go_binary",
"go_library",
)
-load("//staging/src/k8s.io/component-base/version:def.bzl", "version_x_defs")
+load("@//third_party/go:kubernetes_version_def.bzl", "version_x_defs")
go_binary(
name = "kubectl",
We also take the opportunity to remove azure/gcp auth.
diff -ur io_k8s_kubernetes.orig/cmd/kubelet/app/options/globalflags.go io_k8s_kubernetes/cmd/kubelet/app/options/globalflags.go
--- io_k8s_kubernetes.orig/cmd/kubelet/app/options/globalflags.go 2020-04-15 13:43:57.827669732 +0200
+++ io_k8s_kubernetes/cmd/kubelet/app/options/globalflags.go 2020-04-16 15:58:30.964945445 +0200
@@ -28,10 +28,6 @@
"k8s.io/component-base/logs"
"k8s.io/component-base/version/verflag"
"k8s.io/klog/v2"
-
- // ensure libs have a chance to globally register their flags
- _ "k8s.io/kubernetes/pkg/credentialprovider/azure"
- _ "k8s.io/kubernetes/pkg/credentialprovider/gcp"
)
// AddGlobalFlags explicitly registers flags that libraries (glog, verflag, etc.) register
@@ -80,14 +76,8 @@
// addCredentialProviderFlags adds flags from k8s.io/kubernetes/pkg/credentialprovider
func addCredentialProviderFlags(fs *pflag.FlagSet) {
- // lookup flags in global flag set and re-register the values with our flagset
- global := pflag.CommandLine
local := pflag.NewFlagSet(os.Args[0], pflag.ExitOnError)
- // TODO(#58034): This is not a static file, so it's not quite as straightforward as --google-json-key.
- // We need to figure out how ACR users can dynamically provide pull credentials before we can deprecate this.
- pflagRegister(global, local, "azure-container-registry-config")
-
fs.AddFlagSet(local)
}
diff -ur io_k8s_kubernetes.orig/cmd/kubelet/app/plugins.go io_k8s_kubernetes/cmd/kubelet/app/plugins.go
--- io_k8s_kubernetes.orig/cmd/kubelet/app/plugins.go 2020-04-15 13:43:57.827669732 +0200
+++ io_k8s_kubernetes/cmd/kubelet/app/plugins.go 2020-04-16 16:10:13.366081373 +0200
@@ -19,8 +19,6 @@
// This file exists to force the desired plugin implementations to be linked.
import (
// Credential providers
- _ "k8s.io/kubernetes/pkg/credentialprovider/aws"
- _ "k8s.io/kubernetes/pkg/credentialprovider/azure"
_ "k8s.io/kubernetes/pkg/credentialprovider/gcp"
"k8s.io/component-base/featuregate"
@@ -28,27 +26,15 @@
// Volume plugins
"k8s.io/kubernetes/pkg/volume"
- "k8s.io/kubernetes/pkg/volume/cephfs"
"k8s.io/kubernetes/pkg/volume/configmap"
"k8s.io/kubernetes/pkg/volume/csi"
"k8s.io/kubernetes/pkg/volume/downwardapi"
"k8s.io/kubernetes/pkg/volume/emptydir"
- "k8s.io/kubernetes/pkg/volume/fc"
"k8s.io/kubernetes/pkg/volume/flexvolume"
- "k8s.io/kubernetes/pkg/volume/flocker"
- "k8s.io/kubernetes/pkg/volume/git_repo"
- "k8s.io/kubernetes/pkg/volume/glusterfs"
"k8s.io/kubernetes/pkg/volume/hostpath"
- "k8s.io/kubernetes/pkg/volume/iscsi"
"k8s.io/kubernetes/pkg/volume/local"
- "k8s.io/kubernetes/pkg/volume/nfs"
- "k8s.io/kubernetes/pkg/volume/portworx"
"k8s.io/kubernetes/pkg/volume/projected"
- "k8s.io/kubernetes/pkg/volume/quobyte"
- "k8s.io/kubernetes/pkg/volume/rbd"
- "k8s.io/kubernetes/pkg/volume/scaleio"
"k8s.io/kubernetes/pkg/volume/secret"
- "k8s.io/kubernetes/pkg/volume/storageos"
// Cloud providers
_ "k8s.io/kubernetes/pkg/cloudprovider/providers"
@@ -64,30 +48,13 @@
//
// Kubelet does not currently need to configure volume plugins.
// If/when it does, see kube-controller-manager/app/plugins.go for example of using volume.VolumeConfig
- var err error
- allPlugins, err = appendLegacyProviderVolumes(allPlugins, featureGate)
- if err != nil {
- return allPlugins, err
- }
allPlugins = append(allPlugins, emptydir.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, git_repo.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, hostpath.ProbeVolumePlugins(volume.VolumeConfig{})...)
- allPlugins = append(allPlugins, nfs.ProbeVolumePlugins(volume.VolumeConfig{})...)
allPlugins = append(allPlugins, secret.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, iscsi.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, glusterfs.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, quobyte.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, cephfs.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, downwardapi.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, fc.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, flocker.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, configmap.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, projected.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, local.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, csi.ProbeVolumePlugins()...)
return allPlugins, nil
}
diff -ur io_k8s_kubernetes.orig/cmd/kubelet/BUILD io_k8s_kubernetes/cmd/kubelet/BUILD
--- io_k8s_kubernetes.orig/cmd/kubelet/BUILD 2020-04-15 13:43:57.827669732 +0200
+++ io_k8s_kubernetes/cmd/kubelet/BUILD 2020-04-20 14:56:20.446965836 +0200
@@ -5,7 +5,7 @@
go_binary = "go_binary_conditional_pure",
)
load("@io_bazel_rules_go//go:def.bzl", "go_library")
-load("//staging/src/k8s.io/component-base/version:def.bzl", "version_x_defs")
+load("@//third_party/go:kubernetes_version_def.bzl", "version_x_defs")
go_binary(
name = "kubelet",
diff -ur io_k8s_kubernetes.orig/pkg/controller/nodeipam/ipam/cidr_allocator.go io_k8s_kubernetes/pkg/controller/nodeipam/ipam/cidr_allocator.go
--- io_k8s_kubernetes.orig/pkg/controller/nodeipam/ipam/cidr_allocator.go 2020-04-15 13:43:57.860669820 +0200
+++ io_k8s_kubernetes/pkg/controller/nodeipam/ipam/cidr_allocator.go 2020-04-17 13:18:36.157842990 +0200
@@ -111,8 +111,6 @@
switch allocatorType {
case RangeAllocatorType:
return NewCIDRRangeAllocator(kubeClient, nodeInformer, allocatorParams, nodeList)
- case CloudAllocatorType:
- return NewCloudCIDRAllocator(kubeClient, cloud, nodeInformer)
default:
return nil, fmt.Errorf("invalid CIDR allocator type: %v", allocatorType)
}
diff -ur io_k8s_kubernetes.orig/pkg/controller/nodeipam/nolegacyprovider.go io_k8s_kubernetes/pkg/controller/nodeipam/nolegacyprovider.go
--- io_k8s_kubernetes.orig/pkg/controller/nodeipam/nolegacyprovider.go 2020-04-15 13:43:57.860669820 +0200
+++ io_k8s_kubernetes/pkg/controller/nodeipam/nolegacyprovider.go 2020-04-17 13:27:12.440927122 +0200
@@ -1,5 +1,3 @@
-// +build providerless
-
/*
Copyright 2019 The Kubernetes Authors.
diff -ur io_k8s_kubernetes.orig/pkg/kubelet/cadvisor/cadvisor_linux.go io_k8s_kubernetes/pkg/kubelet/cadvisor/cadvisor_linux.go
--- io_k8s_kubernetes.orig/pkg/kubelet/cadvisor/cadvisor_linux.go 2020-04-15 13:43:57.875669859 +0200
+++ io_k8s_kubernetes/pkg/kubelet/cadvisor/cadvisor_linux.go 2020-04-15 18:24:28.683551309 +0200
@@ -34,8 +34,6 @@
// Register cloud info providers.
// TODO(#68522): Remove this in 1.20+ once the cAdvisor endpoints are removed.
- _ "github.com/google/cadvisor/utils/cloudinfo/aws"
- _ "github.com/google/cadvisor/utils/cloudinfo/azure"
_ "github.com/google/cadvisor/utils/cloudinfo/gce"
"github.com/google/cadvisor/cache/memory"