Skip to content

Commit a3488b4

Browse files
authored
Merge pull request kubernetes#81206 from tallclair/staticcheck-kubelet-push
Cleanup Kubelet static analysis issues
2 parents fa9e1d2 + b3f8671 commit a3488b4

File tree

101 files changed

+326
-460
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

101 files changed

+326
-460
lines changed

hack/.staticcheck_failures

Lines changed: 0 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -34,41 +34,11 @@ pkg/credentialprovider/aws
3434
pkg/credentialprovider/azure
3535
pkg/kubeapiserver/admission
3636
pkg/kubectl/cmd/get
37-
pkg/kubelet
38-
pkg/kubelet/apis/config
3937
pkg/kubelet/apis/podresources
40-
pkg/kubelet/apis/stats/v1alpha1
41-
pkg/kubelet/checkpoint
42-
pkg/kubelet/cm
43-
pkg/kubelet/cm/cpumanager
44-
pkg/kubelet/cm/cpumanager/state
4538
pkg/kubelet/cm/devicemanager
46-
pkg/kubelet/config
47-
pkg/kubelet/container/testing
48-
pkg/kubelet/dockershim/libdocker
49-
pkg/kubelet/dockershim/network/cni
50-
pkg/kubelet/dockershim/network/kubenet
51-
pkg/kubelet/eviction
52-
pkg/kubelet/kubeletconfig/checkpoint
53-
pkg/kubelet/kuberuntime
54-
pkg/kubelet/kuberuntime/logs
55-
pkg/kubelet/lifecycle
56-
pkg/kubelet/network/dns
57-
pkg/kubelet/pluginmanager
58-
pkg/kubelet/pluginmanager/metrics
5939
pkg/kubelet/pluginmanager/operationexecutor
6040
pkg/kubelet/pluginmanager/pluginwatcher
61-
pkg/kubelet/pluginmanager/reconciler
6241
pkg/kubelet/remote
63-
pkg/kubelet/remote/fake
64-
pkg/kubelet/server
65-
pkg/kubelet/server/streaming
66-
pkg/kubelet/stats
67-
pkg/kubelet/status
68-
pkg/kubelet/types
69-
pkg/kubelet/util/format
70-
pkg/kubelet/volumemanager/cache
71-
pkg/kubelet/volumemanager/reconciler
7242
pkg/master
7343
pkg/printers
7444
pkg/printers/internalversion

pkg/kubelet/active_deadline.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ func newActiveDeadlineHandler(
5151

5252
// check for all required fields
5353
if clock == nil || podStatusProvider == nil || recorder == nil {
54-
return nil, fmt.Errorf("Required arguments must not be nil: %v, %v, %v", clock, podStatusProvider, recorder)
54+
return nil, fmt.Errorf("required arguments must not be nil: %v, %v, %v", clock, podStatusProvider, recorder)
5555
}
5656
return &activeDeadlineHandler{
5757
clock: clock,

pkg/kubelet/apis/config/helpers_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,8 @@ func allPrimitiveFieldPaths(t *testing.T, tp reflect.Type, path *field.Path) set
7979
return paths
8080
}
8181

82+
//lint:file-ignore U1000 Ignore dummy types, used by tests.
83+
8284
// dummy helper types
8385
type foo struct {
8486
foo int

pkg/kubelet/apis/podresources/client.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func GetClient(socket string, connectionTimeout time.Duration, maxMsgSize int) (
3838

3939
conn, err := grpc.DialContext(ctx, addr, grpc.WithInsecure(), grpc.WithDialer(dialer), grpc.WithDefaultCallOptions(grpc.MaxCallRecvMsgSize(maxMsgSize)))
4040
if err != nil {
41-
return nil, nil, fmt.Errorf("Error dialing socket %s: %v", socket, err)
41+
return nil, nil, fmt.Errorf("error dialing socket %s: %v", socket, err)
4242
}
4343
return podresourcesapi.NewPodResourcesListerClient(conn), conn, nil
4444
}

pkg/kubelet/apis/stats/v1alpha1/types.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ type ContainerStats struct {
146146
// User defined metrics that are exposed by containers in the pod. Typically, we expect only one container in the pod to be exposing user defined metrics. In the event of multiple containers exposing metrics, they will be combined here.
147147
// +patchMergeKey=name
148148
// +patchStrategy=merge
149-
UserDefinedMetrics []UserDefinedMetric `json:"userDefinedMetrics,omitmepty" patchStrategy:"merge" patchMergeKey:"name"`
149+
UserDefinedMetrics []UserDefinedMetric `json:"userDefinedMetrics,omitempty" patchStrategy:"merge" patchMergeKey:"name"`
150150
}
151151

152152
// PodReference contains enough information to locate the referenced pod.

pkg/kubelet/certificate/bootstrap/bootstrap.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -235,32 +235,32 @@ func isClientConfigStillValid(kubeconfigPath string) (bool, error) {
235235
}
236236
bootstrapClientConfig, err := loadRESTClientConfig(kubeconfigPath)
237237
if err != nil {
238-
utilruntime.HandleError(fmt.Errorf("Unable to read existing bootstrap client config: %v", err))
238+
utilruntime.HandleError(fmt.Errorf("unable to read existing bootstrap client config: %v", err))
239239
return false, nil
240240
}
241241
transportConfig, err := bootstrapClientConfig.TransportConfig()
242242
if err != nil {
243-
utilruntime.HandleError(fmt.Errorf("Unable to load transport configuration from existing bootstrap client config: %v", err))
243+
utilruntime.HandleError(fmt.Errorf("unable to load transport configuration from existing bootstrap client config: %v", err))
244244
return false, nil
245245
}
246246
// has side effect of populating transport config data fields
247247
if _, err := transport.TLSConfigFor(transportConfig); err != nil {
248-
utilruntime.HandleError(fmt.Errorf("Unable to load TLS configuration from existing bootstrap client config: %v", err))
248+
utilruntime.HandleError(fmt.Errorf("unable to load TLS configuration from existing bootstrap client config: %v", err))
249249
return false, nil
250250
}
251251
certs, err := certutil.ParseCertsPEM(transportConfig.TLS.CertData)
252252
if err != nil {
253-
utilruntime.HandleError(fmt.Errorf("Unable to load TLS certificates from existing bootstrap client config: %v", err))
253+
utilruntime.HandleError(fmt.Errorf("unable to load TLS certificates from existing bootstrap client config: %v", err))
254254
return false, nil
255255
}
256256
if len(certs) == 0 {
257-
utilruntime.HandleError(fmt.Errorf("Unable to read TLS certificates from existing bootstrap client config: %v", err))
257+
utilruntime.HandleError(fmt.Errorf("unable to read TLS certificates from existing bootstrap client config: %v", err))
258258
return false, nil
259259
}
260260
now := time.Now()
261261
for _, cert := range certs {
262262
if now.After(cert.NotAfter) {
263-
utilruntime.HandleError(fmt.Errorf("Part of the existing bootstrap client certificate is expired: %s", cert.NotAfter))
263+
utilruntime.HandleError(fmt.Errorf("part of the existing bootstrap client certificate is expired: %s", cert.NotAfter))
264264
return false, nil
265265
}
266266
}

pkg/kubelet/checkpoint/checkpoint.go

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,9 +91,7 @@ func getPodKey(pod *v1.Pod) string {
9191
func LoadPods(cpm checkpointmanager.CheckpointManager) ([]*v1.Pod, error) {
9292
pods := make([]*v1.Pod, 0)
9393

94-
var err error
95-
checkpointKeys := []string{}
96-
checkpointKeys, err = cpm.ListCheckpoints()
94+
checkpointKeys, err := cpm.ListCheckpoints()
9795
if err != nil {
9896
klog.Errorf("Failed to list checkpoints: %v", err)
9997
}

pkg/kubelet/cm/cgroup_manager_linux.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@ func (m *cgroupManagerImpl) Destroy(cgroupConfig *CgroupConfig) error {
303303

304304
// Delete cgroups using libcontainers Managers Destroy() method
305305
if err = manager.Destroy(); err != nil {
306-
return fmt.Errorf("Unable to destroy cgroup paths for cgroup %v : %v", cgroupConfig.Name, err)
306+
return fmt.Errorf("unable to destroy cgroup paths for cgroup %v : %v", cgroupConfig.Name, err)
307307
}
308308

309309
return nil
@@ -346,14 +346,14 @@ func setSupportedSubsystems(cgroupConfig *libcontainerconfigs.Cgroup) error {
346346
for sys, required := range getSupportedSubsystems() {
347347
if _, ok := cgroupConfig.Paths[sys.Name()]; !ok {
348348
if required {
349-
return fmt.Errorf("Failed to find subsystem mount for required subsystem: %v", sys.Name())
349+
return fmt.Errorf("failed to find subsystem mount for required subsystem: %v", sys.Name())
350350
}
351351
// the cgroup is not mounted, but its not required so continue...
352352
klog.V(6).Infof("Unable to find subsystem mount for optional subsystem: %v", sys.Name())
353353
continue
354354
}
355355
if err := sys.Set(cgroupConfig.Paths[sys.Name()], cgroupConfig); err != nil {
356-
return fmt.Errorf("Failed to set config for supported subsystems : %v", err)
356+
return fmt.Errorf("failed to set config for supported subsystems : %v", err)
357357
}
358358
}
359359
return nil
@@ -560,14 +560,14 @@ func getStatsSupportedSubsystems(cgroupPaths map[string]string) (*libcontainercg
560560
for sys, required := range getSupportedSubsystems() {
561561
if _, ok := cgroupPaths[sys.Name()]; !ok {
562562
if required {
563-
return nil, fmt.Errorf("Failed to find subsystem mount for required subsystem: %v", sys.Name())
563+
return nil, fmt.Errorf("failed to find subsystem mount for required subsystem: %v", sys.Name())
564564
}
565565
// the cgroup is not mounted, but its not required so continue...
566566
klog.V(6).Infof("Unable to find subsystem mount for optional subsystem: %v", sys.Name())
567567
continue
568568
}
569569
if err := sys.GetStats(cgroupPaths[sys.Name()], stats); err != nil {
570-
return nil, fmt.Errorf("Failed to get stats for supported subsystems : %v", err)
570+
return nil, fmt.Errorf("failed to get stats for supported subsystems : %v", err)
571571
}
572572
}
573573
return stats, nil

pkg/kubelet/cm/container_manager_linux.go

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,6 @@ type containerManagerImpl struct {
110110
status Status
111111
// External containers being managed.
112112
systemContainers []*systemContainer
113-
qosContainers QOSContainersInfo
114113
// Tasks that are run periodically
115114
periodicTasks []func()
116115
// Holds all the mounted cgroup subsystems
@@ -215,7 +214,7 @@ func NewContainerManager(mountUtil mount.Interface, cadvisorInterface cadvisor.I
215214
// If there is more than one line (table headers) in /proc/swaps, swap is enabled and we should
216215
// error out unless --fail-swap-on is set to false.
217216
if len(swapLines) > 1 {
218-
return nil, fmt.Errorf("Running with swap on is not supported, please disable swap! or set --fail-swap-on flag to false. /proc/swaps contained: %v", swapLines)
217+
return nil, fmt.Errorf("running with swap on is not supported, please disable swap! or set --fail-swap-on flag to false. /proc/swaps contained: %v", swapLines)
219218
}
220219
}
221220

@@ -396,7 +395,7 @@ func setupKernelTunables(option KernelTunableBehavior) error {
396395

397396
switch option {
398397
case KernelTunableError:
399-
errList = append(errList, fmt.Errorf("Invalid kernel flag: %v, expected value: %v, actual value: %v", flag, expectedValue, val))
398+
errList = append(errList, fmt.Errorf("invalid kernel flag: %v, expected value: %v, actual value: %v", flag, expectedValue, val))
400399
case KernelTunableWarn:
401400
klog.V(2).Infof("Invalid kernel flag: %v, expected value: %v, actual value: %v", flag, expectedValue, val)
402401
case KernelTunableModify:

pkg/kubelet/cm/cpumanager/policy_static_test.go

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,11 +52,8 @@ type staticPolicyMultiContainerTest struct {
5252
stAssignments state.ContainerCPUAssignments
5353
stDefaultCPUSet cpuset.CPUSet
5454
pod *v1.Pod
55-
expErr error
56-
expCPUAlloc bool
5755
expInitCSets []cpuset.CPUSet
5856
expCSets []cpuset.CPUSet
59-
expPanic bool
6057
}
6158

6259
func TestStaticPolicyName(t *testing.T) {

0 commit comments

Comments
 (0)