Skip to content

Commit 4b6ac36

Browse files
committed
Clean up staticcheck issues for gce.
Dealing with deprecated issues. (staticcheck SA1019) Dealing with error discard issue. (staticcheck SA4006) Dealing with context overwritten issue. (staticcheck SA4009) Dealing with unused functions. (staticcheck U1000) Remove gce from staticcheck failure list
1 parent 9a5b87a commit 4b6ac36

File tree

8 files changed

+28
-32
lines changed

8 files changed

+28
-32
lines changed

hack/.staticcheck_failures

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -251,7 +251,6 @@ vendor/k8s.io/kubectl/pkg/describe/versioned
251251
vendor/k8s.io/kubectl/pkg/scale
252252
vendor/k8s.io/legacy-cloud-providers/aws
253253
vendor/k8s.io/legacy-cloud-providers/azure
254-
vendor/k8s.io/legacy-cloud-providers/gce
255254
vendor/k8s.io/legacy-cloud-providers/vsphere
256255
vendor/k8s.io/metrics/pkg/client/custom_metrics
257256
vendor/k8s.io/sample-controller

staging/src/k8s.io/legacy-cloud-providers/gce/gce.go

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -863,7 +863,7 @@ func newOauthClient(tokenSource oauth2.TokenSource) (*http.Client, error) {
863863
if tokenSource == nil {
864864
var err error
865865
tokenSource, err = google.DefaultTokenSource(
866-
oauth2.NoContext,
866+
context.Background(),
867867
compute.CloudPlatformScope,
868868
compute.ComputeScope)
869869
klog.Infof("Using DefaultTokenSource %#v", tokenSource)
@@ -890,7 +890,7 @@ func newOauthClient(tokenSource oauth2.TokenSource) (*http.Client, error) {
890890
return nil, err
891891
}
892892

893-
return oauth2.NewClient(oauth2.NoContext, tokenSource), nil
893+
return oauth2.NewClient(context.Background(), tokenSource), nil
894894
}
895895

896896
func (manager *gceServiceManager) getProjectsAPIEndpoint() string {
@@ -901,12 +901,3 @@ func (manager *gceServiceManager) getProjectsAPIEndpoint() string {
901901

902902
return projectsAPIEndpoint
903903
}
904-
905-
func (manager *gceServiceManager) getProjectsAPIEndpointBeta() string {
906-
projectsAPIEndpoint := gceComputeAPIEndpointBeta + "projects/"
907-
if manager.gce.service != nil {
908-
projectsAPIEndpoint = manager.gce.serviceBeta.BasePath
909-
}
910-
911-
return projectsAPIEndpoint
912-
}

staging/src/k8s.io/legacy-cloud-providers/gce/gce_alpha.go

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,6 @@ limitations under the License.
1818

1919
package gce
2020

21-
import (
22-
"fmt"
23-
)
24-
2521
const (
2622
// AlphaFeatureNetworkTiers allows Services backed by a GCP load balancer to choose
2723
// what network tier to use. Currently supports "Standard" and "Premium" (default).
@@ -54,10 +50,3 @@ func NewAlphaFeatureGate(features []string) *AlphaFeatureGate {
5450
}
5551
return &AlphaFeatureGate{featureMap}
5652
}
57-
58-
func (g *Cloud) alphaFeatureEnabled(feature string) error {
59-
if !g.AlphaFeatureGate.Enabled(feature) {
60-
return fmt.Errorf("alpha feature %q is not enabled", feature)
61-
}
62-
return nil
63-
}

staging/src/k8s.io/legacy-cloud-providers/gce/gce_instances.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,15 +111,15 @@ func (g *Cloud) NodeAddresses(_ context.Context, _ types.NodeName) ([]v1.NodeAdd
111111
// NodeAddressesByProviderID will not be called from the node that is requesting this ID.
112112
// i.e. metadata service and other local methods cannot be used here
113113
func (g *Cloud) NodeAddressesByProviderID(ctx context.Context, providerID string) ([]v1.NodeAddress, error) {
114-
ctx, cancel := cloud.ContextWithCallTimeout()
114+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
115115
defer cancel()
116116

117117
_, zone, name, err := splitProviderID(providerID)
118118
if err != nil {
119119
return []v1.NodeAddress{}, err
120120
}
121121

122-
instance, err := g.c.Instances().Get(ctx, meta.ZonalKey(canonicalizeInstanceName(name), zone))
122+
instance, err := g.c.Instances().Get(timeoutCtx, meta.ZonalKey(canonicalizeInstanceName(name), zone))
123123
if err != nil {
124124
return []v1.NodeAddress{}, fmt.Errorf("error while querying for providerID %q: %v", providerID, err)
125125
}

staging/src/k8s.io/legacy-cloud-providers/gce/gce_loadbalancer_external_test.go

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -571,6 +571,7 @@ func TestTargetPoolNeedsRecreation(t *testing.T) {
571571
require.NoError(t, err)
572572
hostNames := nodeNames(nodes)
573573
hosts, err := gce.getInstancesByNames(hostNames)
574+
require.NoError(t, err)
574575

575576
var instances []string
576577
for _, host := range hosts {
@@ -762,6 +763,7 @@ func TestFirewallNeedsUpdate(t *testing.T) {
762763
fw.Allowed[0].IPProtocol = "tcp"
763764
fw.SourceRanges[0] = trueSourceRange
764765
fw, err = gce.GetFirewall(MakeFirewallName(tc.lbName))
766+
require.NoError(t, err)
765767
require.Equal(t, fw.Allowed[0].IPProtocol, "tcp")
766768
require.Equal(t, fw.SourceRanges[0], trueSourceRange)
767769

@@ -801,6 +803,7 @@ func TestEnsureTargetPoolAndHealthCheck(t *testing.T) {
801803

802804
hostNames := nodeNames(nodes)
803805
hosts, err := gce.getInstancesByNames(hostNames)
806+
require.NoError(t, err)
804807
clusterID := vals.ClusterID
805808

806809
ipAddr := status.Ingress[0].IP
@@ -813,15 +816,19 @@ func TestEnsureTargetPoolAndHealthCheck(t *testing.T) {
813816
// Apply a tag on the target pool. By verifying the change of the tag, target pool update can be ensured.
814817
tag := "A Tag"
815818
pool, err := gce.GetTargetPool(lbName, region)
819+
require.NoError(t, err)
816820
pool.CreationTimestamp = tag
817821
pool, err = gce.GetTargetPool(lbName, region)
822+
require.NoError(t, err)
818823
require.Equal(t, tag, pool.CreationTimestamp)
819824
err = gce.ensureTargetPoolAndHealthCheck(true, true, svc, lbName, clusterID, ipAddr, hosts, hcToCreate, hcToDelete)
820825
assert.NoError(t, err)
821826
pool, err = gce.GetTargetPool(lbName, region)
827+
require.NoError(t, err)
822828
assert.NotEqual(t, pool.CreationTimestamp, tag)
823829

824830
pool, err = gce.GetTargetPool(lbName, region)
831+
require.NoError(t, err)
825832
assert.Equal(t, 1, len(pool.Instances))
826833
var manyNodeName [maxTargetPoolCreateInstances + 1]string
827834
for i := 0; i < maxTargetPoolCreateInstances+1; i++ {
@@ -831,15 +838,18 @@ func TestEnsureTargetPoolAndHealthCheck(t *testing.T) {
831838
require.NoError(t, err)
832839
manyHostNames := nodeNames(manyNodes)
833840
manyHosts, err := gce.getInstancesByNames(manyHostNames)
841+
require.NoError(t, err)
834842
err = gce.ensureTargetPoolAndHealthCheck(true, true, svc, lbName, clusterID, ipAddr, manyHosts, hcToCreate, hcToDelete)
835843
assert.NoError(t, err)
836844

837845
pool, err = gce.GetTargetPool(lbName, region)
846+
require.NoError(t, err)
838847
assert.Equal(t, maxTargetPoolCreateInstances+1, len(pool.Instances))
839848

840849
err = gce.ensureTargetPoolAndHealthCheck(true, false, svc, lbName, clusterID, ipAddr, hosts, hcToCreate, hcToDelete)
841850
assert.NoError(t, err)
842851
pool, err = gce.GetTargetPool(lbName, region)
852+
require.NoError(t, err)
843853
assert.Equal(t, 1, len(pool.Instances))
844854
}
845855

@@ -1011,6 +1021,7 @@ func TestEnsureExternalLoadBalancerErrors(t *testing.T) {
10111021
} {
10121022
t.Run(desc, func(t *testing.T) {
10131023
gce, err := fakeGCECloud(DefaultTestClusterValues())
1024+
require.NoError(t, err)
10141025
nodes, err := createAndInsertNodes(gce, []string{"test-node-1"}, vals.ZoneName)
10151026
require.NoError(t, err)
10161027
svc := fakeLoadbalancerService("")

staging/src/k8s.io/legacy-cloud-providers/gce/gce_loadbalancer_internal_test.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,7 @@ func TestEnsureInternalBackendServiceUpdates(t *testing.T) {
6464
svc := fakeLoadbalancerService(string(LBTypeInternal))
6565
lbName := gce.GetLoadBalancerName(context.TODO(), "", svc)
6666
nodes, err := createAndInsertNodes(gce, nodeNames, vals.ZoneName)
67+
require.NoError(t, err)
6768
igName := makeInstanceGroupName(vals.ClusterID)
6869
igLinks, err := gce.ensureInternalInstanceGroups(igName, nodes)
6970
require.NoError(t, err)
@@ -110,6 +111,7 @@ func TestEnsureInternalBackendServiceGroups(t *testing.T) {
110111
svc := fakeLoadbalancerService(string(LBTypeInternal))
111112
lbName := gce.GetLoadBalancerName(context.TODO(), "", svc)
112113
nodes, err := createAndInsertNodes(gce, nodeNames, vals.ZoneName)
114+
require.NoError(t, err)
113115
igName := makeInstanceGroupName(vals.ClusterID)
114116
igLinks, err := gce.ensureInternalInstanceGroups(igName, nodes)
115117
require.NoError(t, err)
@@ -180,6 +182,7 @@ func TestEnsureInternalLoadBalancerWithExistingResources(t *testing.T) {
180182
require.NoError(t, err)
181183

182184
nodes, err := createAndInsertNodes(gce, nodeNames, vals.ZoneName)
185+
require.NoError(t, err)
183186
igName := makeInstanceGroupName(vals.ClusterID)
184187
igLinks, err := gce.ensureInternalInstanceGroups(igName, nodes)
185188
require.NoError(t, err)
@@ -499,6 +502,7 @@ func TestClearPreviousInternalResources(t *testing.T) {
499502
err = gce.ensureInternalBackendService(svc.ObjectMeta.Name, "", svc.Spec.SessionAffinity, cloud.SchemeInternal, v1.ProtocolTCP, []string{}, "")
500503
require.NoError(t, err)
501504
backendSvc, err := gce.GetRegionBackendService(svc.ObjectMeta.Name, gce.region)
505+
require.NoError(t, err)
502506
backendSvc.HealthChecks = []string{hc1.SelfLink, hc2.SelfLink}
503507

504508
c.MockRegionBackendServices.DeleteHook = mock.DeleteRegionBackendServicesErrHook
@@ -747,6 +751,7 @@ func TestEnsureInternalLoadBalancerErrors(t *testing.T) {
747751
} {
748752
t.Run(desc, func(t *testing.T) {
749753
gce, err := fakeGCECloud(DefaultTestClusterValues())
754+
require.NoError(t, err)
750755
nodes, err := createAndInsertNodes(gce, []string{"test-node-1"}, vals.ZoneName)
751756
require.NoError(t, err)
752757
params = newEnsureILBParams(nodes)

staging/src/k8s.io/legacy-cloud-providers/gce/gce_routes.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -40,13 +40,13 @@ func newRoutesMetricContext(request string) *metricContext {
4040

4141
// ListRoutes in the cloud environment.
4242
func (g *Cloud) ListRoutes(ctx context.Context, clusterName string) ([]*cloudprovider.Route, error) {
43-
ctx, cancel := cloud.ContextWithCallTimeout()
43+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
4444
defer cancel()
4545

4646
mc := newRoutesMetricContext("list")
4747
prefix := truncateClusterName(clusterName)
4848
f := filter.Regexp("name", prefix+"-.*").AndRegexp("network", g.NetworkURL()).AndRegexp("description", k8sNodeRouteTag)
49-
routes, err := g.c.Routes().List(ctx, f)
49+
routes, err := g.c.Routes().List(timeoutCtx, f)
5050
if err != nil {
5151
return nil, mc.Observe(err)
5252
}
@@ -66,7 +66,7 @@ func (g *Cloud) ListRoutes(ctx context.Context, clusterName string) ([]*cloudpro
6666

6767
// CreateRoute in the cloud environment.
6868
func (g *Cloud) CreateRoute(ctx context.Context, clusterName string, nameHint string, route *cloudprovider.Route) error {
69-
ctx, cancel := cloud.ContextWithCallTimeout()
69+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
7070
defer cancel()
7171

7272
mc := newRoutesMetricContext("create")
@@ -84,7 +84,7 @@ func (g *Cloud) CreateRoute(ctx context.Context, clusterName string, nameHint st
8484
Priority: 1000,
8585
Description: k8sNodeRouteTag,
8686
}
87-
err = g.c.Routes().Insert(ctx, meta.GlobalKey(cr.Name), cr)
87+
err = g.c.Routes().Insert(timeoutCtx, meta.GlobalKey(cr.Name), cr)
8888
if isHTTPErrorCode(err, http.StatusConflict) {
8989
klog.Infof("Route %q already exists.", cr.Name)
9090
err = nil
@@ -94,11 +94,11 @@ func (g *Cloud) CreateRoute(ctx context.Context, clusterName string, nameHint st
9494

9595
// DeleteRoute from the cloud environment.
9696
func (g *Cloud) DeleteRoute(ctx context.Context, clusterName string, route *cloudprovider.Route) error {
97-
ctx, cancel := cloud.ContextWithCallTimeout()
97+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
9898
defer cancel()
9999

100100
mc := newRoutesMetricContext("delete")
101-
return mc.Observe(g.c.Routes().Delete(ctx, meta.GlobalKey(route.Name)))
101+
return mc.Observe(g.c.Routes().Delete(timeoutCtx, meta.GlobalKey(route.Name)))
102102
}
103103

104104
func truncateClusterName(clusterName string) string {

staging/src/k8s.io/legacy-cloud-providers/gce/token_source.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ limitations under the License.
1919
package gce
2020

2121
import (
22+
"context"
2223
"encoding/json"
2324
"net/http"
2425
"strings"
@@ -106,7 +107,7 @@ func (a *AltTokenSource) token() (*oauth2.Token, error) {
106107

107108
// NewAltTokenSource constructs a new alternate token source for generating tokens.
108109
func NewAltTokenSource(tokenURL, tokenBody string) oauth2.TokenSource {
109-
client := oauth2.NewClient(oauth2.NoContext, google.ComputeTokenSource(""))
110+
client := oauth2.NewClient(context.Background(), google.ComputeTokenSource(""))
110111
a := &AltTokenSource{
111112
oauthClient: client,
112113
tokenURL: tokenURL,

0 commit comments

Comments
 (0)