blob: 0efaa3753def9a2b66384007a0f8d2a9ef8f6e4d [file] [log] [blame]
Copyright 2020 The Monogon Project Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
This fixes OpenAPI codegen for when included from the Monogon workspace. It basically undoes vendorification.
diff -ur io_k8s_kubernetes.orig/build/code_generation.bzl io_k8s_kubernetes/build/code_generation.bzl
--- io_k8s_kubernetes.orig/build/code_generation.bzl 2021-01-26 12:10:52.593725692 +0100
+++ io_k8s_kubernetes/build/code_generation.bzl 2021-01-26 12:11:04.571786562 +0100
@@ -27,6 +27,12 @@
...
)
"""
+ if pkg.startswith('staging/src/k8s.io/'):
+ parts = pkg.split('/', 4)
+ project = parts[3]
+ project = project.replace('-', '_')
+ path = parts[4]
+ return "@io_k8s_%s//%s:go_default_library" % (project, path)
return "//%s:go_default_library" % pkg
def go_pkg(pkg):
@@ -42,6 +48,8 @@
...
)
"""
+ if pkg.startswith('staging/src/'):
+ return pkg[len('staging/src/'):]
for prefix in ["staging/src", "vendor"]:
if pkg.startswith(prefix):
return paths.relativize(pkg, prefix)
@@ -49,8 +57,8 @@
def openapi_deps():
deps = [
- "//vendor/github.com/go-openapi/spec:go_default_library",
- "//vendor/k8s.io/kube-openapi/pkg/common:go_default_library",
+ "@com_github_go_openapi_spec//:go_default_library",
+ "@io_k8s_kube_openapi//pkg/common:go_default_library",
]
deps.extend([bazel_go_library(pkg) for pkg in tags_values_pkgs["openapi-gen"]["true"]])
return deps
@@ -76,7 +84,7 @@
# the generator must run from the repo root inside the generated GOPATH.
# All of bazel's $(location)s are relative to the original working directory, however.
cmd = " ".join([
- "$(location //vendor/k8s.io/kube-openapi/cmd/openapi-gen)",
+ "$(location @io_k8s_kube_openapi//cmd/openapi-gen)",
"--v 1",
"--logtostderr",
"--go-header-file $(location //" + openapi_vendor_prefix + "hack/boilerplate:boilerplate.generatego.txt)",
@@ -88,6 +96,6 @@
"&& rm tmp_api_violations.report",
]),
go_deps = openapi_deps(),
- tools = ["//vendor/k8s.io/kube-openapi/cmd/openapi-gen"],
+ tools = ["@io_k8s_kube_openapi//cmd/openapi-gen"],
message = "GenOpenAPI",
)
diff -ur io_k8s_kubernetes.orig/cmd/kube-apiserver/app/options/globalflags.go io_k8s_kubernetes/cmd/kube-apiserver/app/options/globalflags.go
--- io_k8s_kubernetes.orig/cmd/kube-apiserver/app/options/globalflags.go 2021-01-26 12:10:52.605725751 +0100
+++ io_k8s_kubernetes/cmd/kube-apiserver/app/options/globalflags.go 2021-01-26 12:11:04.572786567 +0100
@@ -32,9 +32,6 @@
func AddCustomGlobalFlags(fs *pflag.FlagSet) {
// Lookup flags in global flag set and re-register the values with our flagset.
- // Adds flags from k8s.io/kubernetes/pkg/cloudprovider/providers.
- registerLegacyGlobalFlags(fs)
-
// Adds flags from k8s.io/apiserver/pkg/admission.
globalflag.Register(fs, "default-not-ready-toleration-seconds")
globalflag.Register(fs, "default-unreachable-toleration-seconds")
diff -ur io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/controllermanager.go io_k8s_kubernetes/cmd/kube-controller-manager/app/controllermanager.go
--- io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/controllermanager.go 2021-01-26 12:10:52.605725751 +0100
+++ io_k8s_kubernetes/cmd/kube-controller-manager/app/controllermanager.go 2021-01-26 12:11:04.572786567 +0100
@@ -140,7 +140,6 @@
namedFlagSets := s.Flags(KnownControllers(), ControllersDisabledByDefault.List())
verflag.AddFlags(namedFlagSets.FlagSet("global"))
globalflag.AddGlobalFlags(namedFlagSets.FlagSet("global"), cmd.Name())
- registerLegacyGlobalFlags(namedFlagSets)
for _, f := range namedFlagSets.FlagSets {
fs.AddFlagSet(f)
}
Only in io_k8s_kubernetes/cmd/kube-controller-manager/app: controllermanager.go.orig
diff -ur io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/plugins.go io_k8s_kubernetes/cmd/kube-controller-manager/app/plugins.go
--- io_k8s_kubernetes.orig/cmd/kube-controller-manager/app/plugins.go 2021-01-26 12:10:52.606725757 +0100
+++ io_k8s_kubernetes/cmd/kube-controller-manager/app/plugins.go 2021-01-26 12:11:04.572786567 +0100
@@ -32,19 +32,9 @@
// Volume plugins
"k8s.io/kubernetes/pkg/volume"
"k8s.io/kubernetes/pkg/volume/csi"
- "k8s.io/kubernetes/pkg/volume/fc"
"k8s.io/kubernetes/pkg/volume/flexvolume"
- "k8s.io/kubernetes/pkg/volume/flocker"
- "k8s.io/kubernetes/pkg/volume/glusterfs"
"k8s.io/kubernetes/pkg/volume/hostpath"
- "k8s.io/kubernetes/pkg/volume/iscsi"
"k8s.io/kubernetes/pkg/volume/local"
- "k8s.io/kubernetes/pkg/volume/nfs"
- "k8s.io/kubernetes/pkg/volume/portworx"
- "k8s.io/kubernetes/pkg/volume/quobyte"
- "k8s.io/kubernetes/pkg/volume/rbd"
- "k8s.io/kubernetes/pkg/volume/scaleio"
- "k8s.io/kubernetes/pkg/volume/storageos"
volumeutil "k8s.io/kubernetes/pkg/volume/util"
utilfeature "k8s.io/apiserver/pkg/util/feature"
@@ -58,18 +48,7 @@
// The list of plugins is manually compiled. This code and the plugin
// initialization code for kubelet really, really need a through refactor.
func ProbeAttachableVolumePlugins() ([]volume.VolumePlugin, error) {
- var err error
allPlugins := []volume.VolumePlugin{}
- allPlugins, err = appendAttachableLegacyProviderVolumes(allPlugins, utilfeature.DefaultFeatureGate)
- if err != nil {
- return allPlugins, err
- }
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, fc.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, iscsi.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, csi.ProbeVolumePlugins()...)
return allPlugins, nil
}
@@ -83,18 +62,7 @@
// ProbeExpandableVolumePlugins returns volume plugins which are expandable
func ProbeExpandableVolumePlugins(config persistentvolumeconfig.VolumeConfiguration) ([]volume.VolumePlugin, error) {
- var err error
allPlugins := []volume.VolumePlugin{}
- allPlugins, err = appendExpandableLegacyProviderVolumes(allPlugins, utilfeature.DefaultFeatureGate)
- if err != nil {
- return allPlugins, err
- }
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, glusterfs.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, fc.ProbeVolumePlugins()...)
return allPlugins, nil
}
@@ -124,30 +92,7 @@
}
allPlugins = append(allPlugins, hostpath.ProbeVolumePlugins(hostPathConfig)...)
- nfsConfig := volume.VolumeConfig{
- RecyclerMinimumTimeout: int(config.PersistentVolumeRecyclerConfiguration.MinimumTimeoutNFS),
- RecyclerTimeoutIncrement: int(config.PersistentVolumeRecyclerConfiguration.IncrementTimeoutNFS),
- RecyclerPodTemplate: volume.NewPersistentVolumeRecyclerPodTemplate(),
- }
- if err := AttemptToLoadRecycler(config.PersistentVolumeRecyclerConfiguration.PodTemplateFilePathNFS, &nfsConfig); err != nil {
- klog.Fatalf("Could not create NFS recycler pod from file %s: %+v", config.PersistentVolumeRecyclerConfiguration.PodTemplateFilePathNFS, err)
- }
- allPlugins = append(allPlugins, nfs.ProbeVolumePlugins(nfsConfig)...)
- allPlugins = append(allPlugins, glusterfs.ProbeVolumePlugins()...)
- // add rbd provisioner
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, quobyte.ProbeVolumePlugins()...)
- var err error
- allPlugins, err = appendExpandableLegacyProviderVolumes(allPlugins, utilfeature.DefaultFeatureGate)
- if err != nil {
- return allPlugins, err
- }
-
- allPlugins = append(allPlugins, flocker.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, local.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
if utilfeature.DefaultFeatureGate.Enabled(features.CSIInlineVolume) {
allPlugins = append(allPlugins, csi.ProbeVolumePlugins()...)
diff -ur io_k8s_kubernetes.orig/cmd/kubectl/BUILD io_k8s_kubernetes/cmd/kubectl/BUILD
--- io_k8s_kubernetes.orig/cmd/kubectl/BUILD 2021-01-26 12:10:52.616725807 +0100
+++ io_k8s_kubernetes/cmd/kubectl/BUILD 2021-01-26 12:11:04.572786567 +0100
@@ -3,7 +3,7 @@
"go_binary",
"go_library",
)
-load("//staging/src/k8s.io/component-base/version:def.bzl", "version_x_defs")
+load("@//third_party/go:kubernetes_version_def.bzl", "version_x_defs")
go_binary(
name = "kubectl",
diff -ur io_k8s_kubernetes.orig/cmd/kubelet/app/options/globalflags.go io_k8s_kubernetes/cmd/kubelet/app/options/globalflags.go
--- io_k8s_kubernetes.orig/cmd/kubelet/app/options/globalflags.go 2021-01-26 12:10:52.617725812 +0100
+++ io_k8s_kubernetes/cmd/kubelet/app/options/globalflags.go 2021-01-26 12:12:03.724087183 +0100
@@ -28,10 +28,6 @@
"k8s.io/component-base/logs"
"k8s.io/component-base/version/verflag"
"k8s.io/klog/v2"
-
- // ensure libs have a chance to globally register their flags
- _ "k8s.io/kubernetes/pkg/credentialprovider/azure"
- _ "k8s.io/kubernetes/pkg/credentialprovider/gcp"
)
// AddGlobalFlags explicitly registers flags that libraries (glog, verflag, etc.) register
@@ -80,12 +76,8 @@
// addCredentialProviderFlags adds flags from k8s.io/kubernetes/pkg/credentialprovider
func addCredentialProviderFlags(fs *pflag.FlagSet) {
- // lookup flags in global flag set and re-register the values with our flagset
- global := pflag.CommandLine
local := pflag.NewFlagSet(os.Args[0], pflag.ExitOnError)
- addLegacyCloudProviderCredentialProviderFlags(global, local)
-
fs.AddFlagSet(local)
}
diff -ur io_k8s_kubernetes.orig/cmd/kubelet/app/plugins.go io_k8s_kubernetes/cmd/kubelet/app/plugins.go
--- io_k8s_kubernetes.orig/cmd/kubelet/app/plugins.go 2021-01-26 12:10:52.617725812 +0100
+++ io_k8s_kubernetes/cmd/kubelet/app/plugins.go 2021-01-26 12:11:04.573786572 +0100
@@ -19,8 +19,6 @@
// This file exists to force the desired plugin implementations to be linked.
import (
// Credential providers
- _ "k8s.io/kubernetes/pkg/credentialprovider/aws"
- _ "k8s.io/kubernetes/pkg/credentialprovider/azure"
_ "k8s.io/kubernetes/pkg/credentialprovider/gcp"
"k8s.io/component-base/featuregate"
@@ -28,27 +26,15 @@
// Volume plugins
"k8s.io/kubernetes/pkg/volume"
- "k8s.io/kubernetes/pkg/volume/cephfs"
"k8s.io/kubernetes/pkg/volume/configmap"
"k8s.io/kubernetes/pkg/volume/csi"
"k8s.io/kubernetes/pkg/volume/downwardapi"
"k8s.io/kubernetes/pkg/volume/emptydir"
- "k8s.io/kubernetes/pkg/volume/fc"
"k8s.io/kubernetes/pkg/volume/flexvolume"
- "k8s.io/kubernetes/pkg/volume/flocker"
- "k8s.io/kubernetes/pkg/volume/git_repo"
- "k8s.io/kubernetes/pkg/volume/glusterfs"
"k8s.io/kubernetes/pkg/volume/hostpath"
- "k8s.io/kubernetes/pkg/volume/iscsi"
"k8s.io/kubernetes/pkg/volume/local"
- "k8s.io/kubernetes/pkg/volume/nfs"
- "k8s.io/kubernetes/pkg/volume/portworx"
"k8s.io/kubernetes/pkg/volume/projected"
- "k8s.io/kubernetes/pkg/volume/quobyte"
- "k8s.io/kubernetes/pkg/volume/rbd"
- "k8s.io/kubernetes/pkg/volume/scaleio"
"k8s.io/kubernetes/pkg/volume/secret"
- "k8s.io/kubernetes/pkg/volume/storageos"
// Cloud providers
_ "k8s.io/kubernetes/pkg/cloudprovider/providers"
@@ -64,30 +50,13 @@
//
// Kubelet does not currently need to configure volume plugins.
// If/when it does, see kube-controller-manager/app/plugins.go for example of using volume.VolumeConfig
- var err error
- allPlugins, err = appendLegacyProviderVolumes(allPlugins, featureGate)
- if err != nil {
- return allPlugins, err
- }
allPlugins = append(allPlugins, emptydir.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, git_repo.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, hostpath.ProbeVolumePlugins(volume.VolumeConfig{})...)
- allPlugins = append(allPlugins, nfs.ProbeVolumePlugins(volume.VolumeConfig{})...)
allPlugins = append(allPlugins, secret.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, iscsi.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, glusterfs.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, rbd.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, quobyte.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, cephfs.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, downwardapi.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, fc.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, flocker.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, configmap.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, projected.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, portworx.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, scaleio.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, local.ProbeVolumePlugins()...)
- allPlugins = append(allPlugins, storageos.ProbeVolumePlugins()...)
allPlugins = append(allPlugins, csi.ProbeVolumePlugins()...)
return allPlugins, nil
}
diff -ur io_k8s_kubernetes.orig/cmd/kubelet/BUILD io_k8s_kubernetes/cmd/kubelet/BUILD
--- io_k8s_kubernetes.orig/cmd/kubelet/BUILD 2021-01-26 12:10:52.616725807 +0100
+++ io_k8s_kubernetes/cmd/kubelet/BUILD 2021-01-26 12:11:04.573786572 +0100
@@ -5,7 +5,7 @@
go_binary = "go_binary_conditional_pure",
)
load("@io_bazel_rules_go//go:def.bzl", "go_library")
-load("//staging/src/k8s.io/component-base/version:def.bzl", "version_x_defs")
+load("@//third_party/go:kubernetes_version_def.bzl", "version_x_defs")
go_binary(
name = "kubelet",
diff -ur io_k8s_kubernetes.orig/pkg/controller/nodeipam/ipam/cidr_allocator.go io_k8s_kubernetes/pkg/controller/nodeipam/ipam/cidr_allocator.go
--- io_k8s_kubernetes.orig/pkg/controller/nodeipam/ipam/cidr_allocator.go 2021-01-26 12:10:52.664726051 +0100
+++ io_k8s_kubernetes/pkg/controller/nodeipam/ipam/cidr_allocator.go 2021-01-26 12:11:04.573786572 +0100
@@ -112,8 +112,6 @@
switch allocatorType {
case RangeAllocatorType:
return NewCIDRRangeAllocator(kubeClient, nodeInformer, allocatorParams, nodeList)
- case CloudAllocatorType:
- return NewCloudCIDRAllocator(kubeClient, cloud, nodeInformer)
default:
return nil, fmt.Errorf("invalid CIDR allocator type: %v", allocatorType)
}
Only in io_k8s_kubernetes/pkg/controller/nodeipam/ipam: cidr_allocator.go.orig
diff -ur io_k8s_kubernetes.orig/pkg/controller/nodeipam/nolegacyprovider.go io_k8s_kubernetes/pkg/controller/nodeipam/nolegacyprovider.go
--- io_k8s_kubernetes.orig/pkg/controller/nodeipam/nolegacyprovider.go 2021-01-26 12:10:52.665726056 +0100
+++ io_k8s_kubernetes/pkg/controller/nodeipam/nolegacyprovider.go 2021-01-26 12:11:04.573786572 +0100
@@ -1,5 +1,3 @@
-// +build providerless
-
/*
Copyright 2019 The Kubernetes Authors.
diff -ur io_k8s_kubernetes.orig/pkg/kubelet/cadvisor/cadvisor_linux.go io_k8s_kubernetes/pkg/kubelet/cadvisor/cadvisor_linux.go
--- io_k8s_kubernetes.orig/pkg/kubelet/cadvisor/cadvisor_linux.go 2021-01-26 12:10:52.676726112 +0100
+++ io_k8s_kubernetes/pkg/kubelet/cadvisor/cadvisor_linux.go 2021-01-26 12:11:04.573786572 +0100
@@ -33,8 +33,6 @@
// Register cloud info providers.
// TODO(#68522): Remove this in 1.20+ once the cAdvisor endpoints are removed.
- _ "github.com/google/cadvisor/utils/cloudinfo/aws"
- _ "github.com/google/cadvisor/utils/cloudinfo/azure"
_ "github.com/google/cadvisor/utils/cloudinfo/gce"
"github.com/google/cadvisor/cache/memory"
Only in io_k8s_kubernetes/pkg/kubelet/cadvisor: cadvisor_linux.go.orig
diff -ur io_k8s_kubernetes.orig/test/e2e/BUILD io_k8s_kubernetes/test/e2e/BUILD
--- io_k8s_kubernetes.orig/test/e2e/BUILD 2021-01-26 12:10:52.736726417 +0100
+++ io_k8s_kubernetes/test/e2e/BUILD 2021-01-26 12:11:04.573786572 +0100
@@ -5,7 +5,7 @@
go_test = "go_test_conditional_pure",
)
load("@io_bazel_rules_go//go:def.bzl", "go_library")
-load("//staging/src/k8s.io/component-base/version:def.bzl", "version_x_defs")
+load("@//third_party/go:kubernetes_version_def.bzl", "version_x_defs")
go_test(
name = "go_default_test",
diff -ur io_k8s_kubernetes.orig/test/e2e/generated/BUILD io_k8s_kubernetes/test/e2e/generated/BUILD
--- io_k8s_kubernetes.orig/test/e2e/generated/BUILD 2021-01-26 12:10:52.743726453 +0100
+++ io_k8s_kubernetes/test/e2e/generated/BUILD 2021-01-26 12:11:04.573786572 +0100
@@ -4,23 +4,24 @@
"@io_bazel_rules_go//go:def.bzl",
"go_library",
)
-load("//build:bindata.bzl", "go_bindata")
+load("@dev_source_monogon//build/bindata:bindata.bzl", "bindata")
go_library(
name = "go_default_library",
srcs = [
- "bindata.go",
"gobindata_util.go",
"main.go",
],
+ embed = [
+ ":bindata",
+ ],
importpath = "k8s.io/kubernetes/test/e2e/generated",
deps = [
"@io_k8s_klog_v2//:go_default_library",
],
)
-# IMPORTANT: if you make any changes here, you must also update hack/generate-bindata.sh.
-go_bindata(
+bindata(
name = "bindata",
srcs = [
"//test/conformance/testdata:all-srcs",
@@ -29,9 +30,7 @@
"//test/fixtures:all-srcs",
"//test/images:all-srcs",
],
- outs = ["bindata.go"],
- compress = True,
- include_metadata = False,
+ package = "generated",
)
filegroup(