Skip to content

Commit ec344a1

Browse files
authored
Merge pull request kubernetes#81771 from RainbowMango/pr_fix_static_error_for_gce
Cleanup gce static analysis issues
2 parents ce8cccb + 4b6ac36 commit ec344a1

File tree

8 files changed

+28
-32
lines changed

8 files changed

+28
-32
lines changed

hack/.staticcheck_failures

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -251,7 +251,6 @@ vendor/k8s.io/kubectl/pkg/describe/versioned
251251
vendor/k8s.io/kubectl/pkg/scale
252252
vendor/k8s.io/legacy-cloud-providers/aws
253253
vendor/k8s.io/legacy-cloud-providers/azure
254-
vendor/k8s.io/legacy-cloud-providers/gce
255254
vendor/k8s.io/legacy-cloud-providers/vsphere
256255
vendor/k8s.io/metrics/pkg/client/custom_metrics
257256
vendor/k8s.io/sample-controller

staging/src/k8s.io/legacy-cloud-providers/gce/gce.go

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -863,7 +863,7 @@ func newOauthClient(tokenSource oauth2.TokenSource) (*http.Client, error) {
863863
if tokenSource == nil {
864864
var err error
865865
tokenSource, err = google.DefaultTokenSource(
866-
oauth2.NoContext,
866+
context.Background(),
867867
compute.CloudPlatformScope,
868868
compute.ComputeScope)
869869
klog.Infof("Using DefaultTokenSource %#v", tokenSource)
@@ -890,7 +890,7 @@ func newOauthClient(tokenSource oauth2.TokenSource) (*http.Client, error) {
890890
return nil, err
891891
}
892892

893-
return oauth2.NewClient(oauth2.NoContext, tokenSource), nil
893+
return oauth2.NewClient(context.Background(), tokenSource), nil
894894
}
895895

896896
func (manager *gceServiceManager) getProjectsAPIEndpoint() string {
@@ -901,12 +901,3 @@ func (manager *gceServiceManager) getProjectsAPIEndpoint() string {
901901

902902
return projectsAPIEndpoint
903903
}
904-
905-
func (manager *gceServiceManager) getProjectsAPIEndpointBeta() string {
906-
projectsAPIEndpoint := gceComputeAPIEndpointBeta + "projects/"
907-
if manager.gce.service != nil {
908-
projectsAPIEndpoint = manager.gce.serviceBeta.BasePath
909-
}
910-
911-
return projectsAPIEndpoint
912-
}

staging/src/k8s.io/legacy-cloud-providers/gce/gce_alpha.go

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,6 @@ limitations under the License.
1818

1919
package gce
2020

21-
import (
22-
"fmt"
23-
)
24-
2521
const (
2622
// AlphaFeatureNetworkTiers allows Services backed by a GCP load balancer to choose
2723
// what network tier to use. Currently supports "Standard" and "Premium" (default).
@@ -54,10 +50,3 @@ func NewAlphaFeatureGate(features []string) *AlphaFeatureGate {
5450
}
5551
return &AlphaFeatureGate{featureMap}
5652
}
57-
58-
func (g *Cloud) alphaFeatureEnabled(feature string) error {
59-
if !g.AlphaFeatureGate.Enabled(feature) {
60-
return fmt.Errorf("alpha feature %q is not enabled", feature)
61-
}
62-
return nil
63-
}

staging/src/k8s.io/legacy-cloud-providers/gce/gce_instances.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,15 +111,15 @@ func (g *Cloud) NodeAddresses(_ context.Context, _ types.NodeName) ([]v1.NodeAdd
111111
// NodeAddressesByProviderID will not be called from the node that is requesting this ID.
112112
// i.e. metadata service and other local methods cannot be used here
113113
func (g *Cloud) NodeAddressesByProviderID(ctx context.Context, providerID string) ([]v1.NodeAddress, error) {
114-
ctx, cancel := cloud.ContextWithCallTimeout()
114+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
115115
defer cancel()
116116

117117
_, zone, name, err := splitProviderID(providerID)
118118
if err != nil {
119119
return []v1.NodeAddress{}, err
120120
}
121121

122-
instance, err := g.c.Instances().Get(ctx, meta.ZonalKey(canonicalizeInstanceName(name), zone))
122+
instance, err := g.c.Instances().Get(timeoutCtx, meta.ZonalKey(canonicalizeInstanceName(name), zone))
123123
if err != nil {
124124
return []v1.NodeAddress{}, fmt.Errorf("error while querying for providerID %q: %v", providerID, err)
125125
}

staging/src/k8s.io/legacy-cloud-providers/gce/gce_loadbalancer_external_test.go

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -571,6 +571,7 @@ func TestTargetPoolNeedsRecreation(t *testing.T) {
571571
require.NoError(t, err)
572572
hostNames := nodeNames(nodes)
573573
hosts, err := gce.getInstancesByNames(hostNames)
574+
require.NoError(t, err)
574575

575576
var instances []string
576577
for _, host := range hosts {
@@ -762,6 +763,7 @@ func TestFirewallNeedsUpdate(t *testing.T) {
762763
fw.Allowed[0].IPProtocol = "tcp"
763764
fw.SourceRanges[0] = trueSourceRange
764765
fw, err = gce.GetFirewall(MakeFirewallName(tc.lbName))
766+
require.NoError(t, err)
765767
require.Equal(t, fw.Allowed[0].IPProtocol, "tcp")
766768
require.Equal(t, fw.SourceRanges[0], trueSourceRange)
767769

@@ -801,6 +803,7 @@ func TestEnsureTargetPoolAndHealthCheck(t *testing.T) {
801803

802804
hostNames := nodeNames(nodes)
803805
hosts, err := gce.getInstancesByNames(hostNames)
806+
require.NoError(t, err)
804807
clusterID := vals.ClusterID
805808

806809
ipAddr := status.Ingress[0].IP
@@ -813,15 +816,19 @@ func TestEnsureTargetPoolAndHealthCheck(t *testing.T) {
813816
// Apply a tag on the target pool. By verifying the change of the tag, target pool update can be ensured.
814817
tag := "A Tag"
815818
pool, err := gce.GetTargetPool(lbName, region)
819+
require.NoError(t, err)
816820
pool.CreationTimestamp = tag
817821
pool, err = gce.GetTargetPool(lbName, region)
822+
require.NoError(t, err)
818823
require.Equal(t, tag, pool.CreationTimestamp)
819824
err = gce.ensureTargetPoolAndHealthCheck(true, true, svc, lbName, clusterID, ipAddr, hosts, hcToCreate, hcToDelete)
820825
assert.NoError(t, err)
821826
pool, err = gce.GetTargetPool(lbName, region)
827+
require.NoError(t, err)
822828
assert.NotEqual(t, pool.CreationTimestamp, tag)
823829

824830
pool, err = gce.GetTargetPool(lbName, region)
831+
require.NoError(t, err)
825832
assert.Equal(t, 1, len(pool.Instances))
826833
var manyNodeName [maxTargetPoolCreateInstances + 1]string
827834
for i := 0; i < maxTargetPoolCreateInstances+1; i++ {
@@ -831,15 +838,18 @@ func TestEnsureTargetPoolAndHealthCheck(t *testing.T) {
831838
require.NoError(t, err)
832839
manyHostNames := nodeNames(manyNodes)
833840
manyHosts, err := gce.getInstancesByNames(manyHostNames)
841+
require.NoError(t, err)
834842
err = gce.ensureTargetPoolAndHealthCheck(true, true, svc, lbName, clusterID, ipAddr, manyHosts, hcToCreate, hcToDelete)
835843
assert.NoError(t, err)
836844

837845
pool, err = gce.GetTargetPool(lbName, region)
846+
require.NoError(t, err)
838847
assert.Equal(t, maxTargetPoolCreateInstances+1, len(pool.Instances))
839848

840849
err = gce.ensureTargetPoolAndHealthCheck(true, false, svc, lbName, clusterID, ipAddr, hosts, hcToCreate, hcToDelete)
841850
assert.NoError(t, err)
842851
pool, err = gce.GetTargetPool(lbName, region)
852+
require.NoError(t, err)
843853
assert.Equal(t, 1, len(pool.Instances))
844854
}
845855

@@ -1011,6 +1021,7 @@ func TestEnsureExternalLoadBalancerErrors(t *testing.T) {
10111021
} {
10121022
t.Run(desc, func(t *testing.T) {
10131023
gce, err := fakeGCECloud(DefaultTestClusterValues())
1024+
require.NoError(t, err)
10141025
nodes, err := createAndInsertNodes(gce, []string{"test-node-1"}, vals.ZoneName)
10151026
require.NoError(t, err)
10161027
svc := fakeLoadbalancerService("")

staging/src/k8s.io/legacy-cloud-providers/gce/gce_loadbalancer_internal_test.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,7 @@ func TestEnsureInternalBackendServiceUpdates(t *testing.T) {
6464
svc := fakeLoadbalancerService(string(LBTypeInternal))
6565
lbName := gce.GetLoadBalancerName(context.TODO(), "", svc)
6666
nodes, err := createAndInsertNodes(gce, nodeNames, vals.ZoneName)
67+
require.NoError(t, err)
6768
igName := makeInstanceGroupName(vals.ClusterID)
6869
igLinks, err := gce.ensureInternalInstanceGroups(igName, nodes)
6970
require.NoError(t, err)
@@ -110,6 +111,7 @@ func TestEnsureInternalBackendServiceGroups(t *testing.T) {
110111
svc := fakeLoadbalancerService(string(LBTypeInternal))
111112
lbName := gce.GetLoadBalancerName(context.TODO(), "", svc)
112113
nodes, err := createAndInsertNodes(gce, nodeNames, vals.ZoneName)
114+
require.NoError(t, err)
113115
igName := makeInstanceGroupName(vals.ClusterID)
114116
igLinks, err := gce.ensureInternalInstanceGroups(igName, nodes)
115117
require.NoError(t, err)
@@ -180,6 +182,7 @@ func TestEnsureInternalLoadBalancerWithExistingResources(t *testing.T) {
180182
require.NoError(t, err)
181183

182184
nodes, err := createAndInsertNodes(gce, nodeNames, vals.ZoneName)
185+
require.NoError(t, err)
183186
igName := makeInstanceGroupName(vals.ClusterID)
184187
igLinks, err := gce.ensureInternalInstanceGroups(igName, nodes)
185188
require.NoError(t, err)
@@ -499,6 +502,7 @@ func TestClearPreviousInternalResources(t *testing.T) {
499502
err = gce.ensureInternalBackendService(svc.ObjectMeta.Name, "", svc.Spec.SessionAffinity, cloud.SchemeInternal, v1.ProtocolTCP, []string{}, "")
500503
require.NoError(t, err)
501504
backendSvc, err := gce.GetRegionBackendService(svc.ObjectMeta.Name, gce.region)
505+
require.NoError(t, err)
502506
backendSvc.HealthChecks = []string{hc1.SelfLink, hc2.SelfLink}
503507

504508
c.MockRegionBackendServices.DeleteHook = mock.DeleteRegionBackendServicesErrHook
@@ -747,6 +751,7 @@ func TestEnsureInternalLoadBalancerErrors(t *testing.T) {
747751
} {
748752
t.Run(desc, func(t *testing.T) {
749753
gce, err := fakeGCECloud(DefaultTestClusterValues())
754+
require.NoError(t, err)
750755
nodes, err := createAndInsertNodes(gce, []string{"test-node-1"}, vals.ZoneName)
751756
require.NoError(t, err)
752757
params = newEnsureILBParams(nodes)

staging/src/k8s.io/legacy-cloud-providers/gce/gce_routes.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -40,13 +40,13 @@ func newRoutesMetricContext(request string) *metricContext {
4040

4141
// ListRoutes in the cloud environment.
4242
func (g *Cloud) ListRoutes(ctx context.Context, clusterName string) ([]*cloudprovider.Route, error) {
43-
ctx, cancel := cloud.ContextWithCallTimeout()
43+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
4444
defer cancel()
4545

4646
mc := newRoutesMetricContext("list")
4747
prefix := truncateClusterName(clusterName)
4848
f := filter.Regexp("name", prefix+"-.*").AndRegexp("network", g.NetworkURL()).AndRegexp("description", k8sNodeRouteTag)
49-
routes, err := g.c.Routes().List(ctx, f)
49+
routes, err := g.c.Routes().List(timeoutCtx, f)
5050
if err != nil {
5151
return nil, mc.Observe(err)
5252
}
@@ -66,7 +66,7 @@ func (g *Cloud) ListRoutes(ctx context.Context, clusterName string) ([]*cloudpro
6666

6767
// CreateRoute in the cloud environment.
6868
func (g *Cloud) CreateRoute(ctx context.Context, clusterName string, nameHint string, route *cloudprovider.Route) error {
69-
ctx, cancel := cloud.ContextWithCallTimeout()
69+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
7070
defer cancel()
7171

7272
mc := newRoutesMetricContext("create")
@@ -84,7 +84,7 @@ func (g *Cloud) CreateRoute(ctx context.Context, clusterName string, nameHint st
8484
Priority: 1000,
8585
Description: k8sNodeRouteTag,
8686
}
87-
err = g.c.Routes().Insert(ctx, meta.GlobalKey(cr.Name), cr)
87+
err = g.c.Routes().Insert(timeoutCtx, meta.GlobalKey(cr.Name), cr)
8888
if isHTTPErrorCode(err, http.StatusConflict) {
8989
klog.Infof("Route %q already exists.", cr.Name)
9090
err = nil
@@ -94,11 +94,11 @@ func (g *Cloud) CreateRoute(ctx context.Context, clusterName string, nameHint st
9494

9595
// DeleteRoute from the cloud environment.
9696
func (g *Cloud) DeleteRoute(ctx context.Context, clusterName string, route *cloudprovider.Route) error {
97-
ctx, cancel := cloud.ContextWithCallTimeout()
97+
timeoutCtx, cancel := cloud.ContextWithCallTimeout()
9898
defer cancel()
9999

100100
mc := newRoutesMetricContext("delete")
101-
return mc.Observe(g.c.Routes().Delete(ctx, meta.GlobalKey(route.Name)))
101+
return mc.Observe(g.c.Routes().Delete(timeoutCtx, meta.GlobalKey(route.Name)))
102102
}
103103

104104
func truncateClusterName(clusterName string) string {

staging/src/k8s.io/legacy-cloud-providers/gce/token_source.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ limitations under the License.
1919
package gce
2020

2121
import (
22+
"context"
2223
"encoding/json"
2324
"net/http"
2425
"strings"
@@ -106,7 +107,7 @@ func (a *AltTokenSource) token() (*oauth2.Token, error) {
106107

107108
// NewAltTokenSource constructs a new alternate token source for generating tokens.
108109
func NewAltTokenSource(tokenURL, tokenBody string) oauth2.TokenSource {
109-
client := oauth2.NewClient(oauth2.NoContext, google.ComputeTokenSource(""))
110+
client := oauth2.NewClient(context.Background(), google.ComputeTokenSource(""))
110111
a := &AltTokenSource{
111112
oauthClient: client,
112113
tokenURL: tokenURL,

0 commit comments

Comments
 (0)