Skip to content

Commit 518017c

Browse files
committed
Use golangci-lint 2.0.2
1 parent 11bfefa commit 518017c

13 files changed

+118
-110
lines changed

.golangci.yml

+61-53
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
1-
run:
2-
timeout: 5m
1+
version: "2"
2+
output:
3+
formats:
4+
tab:
5+
path: stdout
6+
print-linter-name: true
7+
colors: false
38
linters:
49
enable:
510
- bodyclose
@@ -11,66 +16,69 @@ linters:
1116
- gochecknoinits
1217
- goconst
1318
- gocritic
14-
- gofmt
15-
- goimports
1619
- gosec
17-
- govet
1820
- lll
1921
- misspell
2022
- mnd
2123
- nakedret
2224
- noctx
2325
- nolintlint
24-
- stylecheck
26+
- staticcheck
2527
- unconvert
2628
- unparam
27-
linters-settings:
28-
goconst:
29-
# Exclude few word constants
30-
min-len: 20
31-
# Don't use goconst to check test files
32-
ignore-tests: true
29+
settings:
30+
goconst:
31+
min-len: 20
32+
exclusions:
33+
generated: lax
34+
presets:
35+
- comments
36+
- common-false-positives
37+
- legacy
38+
- std-error-handling
39+
rules:
40+
- linters:
41+
- mnd
42+
text: 'Magic number: [0-9]{1},'
43+
- linters:
44+
- mnd
45+
text: 'Magic number: 0[0-7]{3},'
46+
- linters:
47+
- mnd
48+
path: pkg/controllers/proxy/network_services_controller.go
49+
text: 'Magic number: 255,'
50+
- linters:
51+
- mnd
52+
text: 'Magic number: 32,'
53+
- linters:
54+
- mnd
55+
text: 'Magic number: 10,'
56+
- linters:
57+
- gosec
58+
text: 'G306:'
59+
- linters:
60+
- lll
61+
path: _test\.go
62+
- linters:
63+
- dupl
64+
path: _test\.go
65+
- linters:
66+
- goconst
67+
path: (.+)_test\.go
68+
paths:
69+
- third_party$
70+
- builtin$
71+
- examples$
3372
issues:
34-
exclude-rules:
35-
# Excluding single digits from magic number detector because it produces too many obvious results (like klog)
36-
- text: "Magic number: [0-9]{1},"
37-
linters:
38-
- mnd
39-
# Exclude file masks from magic number detector because these numbers are obvious
40-
- text: "Magic number: 0[0-7]{3},"
41-
linters:
42-
- mnd
43-
# Exlude IP masks netmasks as substituting them for constants only makes these less obvious
44-
- text: "Magic number: 255,"
45-
linters:
46-
- mnd
47-
path: pkg/controllers/proxy/network_services_controller.go
48-
# Exclude IP netmasks from magic number detector because these numbers are obvious
49-
- text: "Magic number: 32,"
50-
linters:
51-
- mnd
52-
# Exclude decimal bases from magic number detector because these numbers are obvious
53-
- text: "Magic number: 10,"
54-
linters:
55-
- mnd
56-
# Exclude file mask security findings as we are always intentional about the file masks we use
57-
- text: "G306:"
58-
linters:
59-
- gosec
60-
# Exclude tests from long line linter
61-
- linters:
62-
- lll
63-
path: _test\.go
64-
# Exclude tests from duplicate linter
65-
- linters:
66-
- dupl
67-
path: _test\.go
68-
# always show all issues rather than only showing 50 at a time
6973
max-issues-per-linter: 0
70-
# always show all issues of a type rather than showing 3
7174
max-same-issues: 0
72-
output:
73-
formats:
74-
- format: tab
75-
print-issued-lines: true
76-
print-linter-name: true
75+
formatters:
76+
enable:
77+
- gofmt
78+
- goimports
79+
exclusions:
80+
generated: lax
81+
paths:
82+
- third_party$
83+
- builtin$
84+
- examples$

Makefile

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ GO_CACHE?=$(shell go env GOCACHE)
2424
GO_MOD_CACHE?=$(shell go env GOMODCACHE)
2525
BUILDTIME_BASE?=$(DOCKER_BUILD_IMAGE)
2626
RUNTIME_BASE?=alpine:3.21
27-
DOCKER_LINT_IMAGE?=golangci/golangci-lint:v1.63.4
27+
DOCKER_LINT_IMAGE?=golangci/golangci-lint:v2.0.2
2828
DOCKER_MARKDOWNLINT_IMAGE?=tmknom/markdownlint:0.39.0
2929
GOBGP_VERSION=v3.29.0
3030
QEMU_IMAGE?=multiarch/qemu-user-static

pkg/cmd/kube-router.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ func (kr *KubeRouter) Run() error {
8080
var ipsetMutex sync.Mutex
8181
var wg sync.WaitGroup
8282

83-
if !(kr.Config.RunFirewall || kr.Config.RunServiceProxy || kr.Config.RunRouter) {
83+
if !kr.Config.RunFirewall && !kr.Config.RunServiceProxy && !kr.Config.RunRouter {
8484
klog.Info("Router, Firewall or Service proxy functionality must be specified. Exiting!")
8585
os.Exit(0)
8686
}

pkg/controllers/netpol/network_policy_controller.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -877,7 +877,7 @@ func NewNetworkPolicyController(clientset kubernetes.Interface,
877877
netutils.IsIPv4CIDR(&npc.serviceClusterIPRanges[1])
878878
ipv6Provided := netutils.IsIPv6CIDR(&npc.serviceClusterIPRanges[0]) ||
879879
netutils.IsIPv6CIDR(&npc.serviceClusterIPRanges[1])
880-
if !(ipv4Provided && ipv6Provided) {
880+
if !ipv4Provided || !ipv6Provided {
881881
return nil, fmt.Errorf("failed to get parse --service-cluster-ip-range parameter: " +
882882
"dual-stack is enabled, both IPv4 and IPv6 addresses should be provided")
883883
}

pkg/controllers/netpol/pod.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -329,9 +329,9 @@ func (npc *NetworkPolicyController) getLocalPods(localPods map[string]podInfo, n
329329
localPods[pod.Status.PodIP] = podInfo{
330330
ip: pod.Status.PodIP,
331331
ips: pod.Status.PodIPs,
332-
name: pod.ObjectMeta.Name,
333-
namespace: pod.ObjectMeta.Namespace,
334-
labels: pod.ObjectMeta.Labels}
332+
name: pod.Name,
333+
namespace: pod.Namespace,
334+
labels: pod.Labels}
335335
}
336336
}
337337

pkg/controllers/netpol/policy.go

+9-9
Original file line numberDiff line numberDiff line change
@@ -550,9 +550,9 @@ func (npc *NetworkPolicyController) buildNetworkPoliciesInfo() ([]networkPolicyI
550550
continue
551551
}
552552
newPolicy.targetPods[matchingPod.Status.PodIP] = podInfo{ips: matchingPod.Status.PodIPs,
553-
name: matchingPod.ObjectMeta.Name,
554-
namespace: matchingPod.ObjectMeta.Namespace,
555-
labels: matchingPod.ObjectMeta.Labels}
553+
name: matchingPod.Name,
554+
namespace: matchingPod.Namespace,
555+
labels: matchingPod.Labels}
556556
npc.grabNamedPortFromPod(matchingPod, &namedPort2IngressEps)
557557
}
558558
}
@@ -587,9 +587,9 @@ func (npc *NetworkPolicyController) buildNetworkPoliciesInfo() ([]networkPolicyI
587587
}
588588
ingressRule.srcPods = append(ingressRule.srcPods,
589589
podInfo{ips: peerPod.Status.PodIPs,
590-
name: peerPod.ObjectMeta.Name,
591-
namespace: peerPod.ObjectMeta.Namespace,
592-
labels: peerPod.ObjectMeta.Labels})
590+
name: peerPod.Name,
591+
namespace: peerPod.Namespace,
592+
labels: peerPod.Labels})
593593
}
594594
}
595595
peerIPBlock := npc.evalIPBlockPeer(peer)
@@ -661,9 +661,9 @@ func (npc *NetworkPolicyController) buildNetworkPoliciesInfo() ([]networkPolicyI
661661
}
662662
egressRule.dstPods = append(egressRule.dstPods,
663663
podInfo{ips: peerPod.Status.PodIPs,
664-
name: peerPod.ObjectMeta.Name,
665-
namespace: peerPod.ObjectMeta.Namespace,
666-
labels: peerPod.ObjectMeta.Labels})
664+
name: peerPod.Name,
665+
namespace: peerPod.Namespace,
666+
labels: peerPod.Labels})
667667
npc.grabNamedPortFromPod(peerPod, &namedPort2EgressEps)
668668
}
669669

pkg/controllers/netpol/utils_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ func Test_isPodUpdateNetPolRelevant(t *testing.T) {
5656
})
5757
t.Run("Pod Label change should be detected as NetworkPolicy relevant", func(t *testing.T) {
5858
newPod := fakePod.DeepCopy()
59-
newPod.ObjectMeta.Labels = map[string]string{"bar": "foo"}
59+
newPod.Labels = map[string]string{"bar": "foo"}
6060
assert.True(t, isPodUpdateNetPolRelevant(&fakePod, newPod))
6161
})
6262
t.Run("Pod Host IP change should be detected as NetworkPolicy relevant", func(t *testing.T) {
@@ -71,7 +71,7 @@ func Test_isPodUpdateNetPolRelevant(t *testing.T) {
7171
})
7272
t.Run("Pod Name change should NOT be detected as NetworkPolicy relevant", func(t *testing.T) {
7373
newPod := fakePod.DeepCopy()
74-
newPod.ObjectMeta.Name = "otherpod"
74+
newPod.Name = "otherpod"
7575
assert.False(t, isPodUpdateNetPolRelevant(&fakePod, newPod))
7676
})
7777
}

pkg/controllers/proxy/linux_networking.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ func (ln *linuxNetworking) ipAddrAdd(iface netlink.Link, ip string, nodeIP strin
157157
naddr := &netlink.Addr{IPNet: &net.IPNet{IP: parsedIP, Mask: netMask}, Scope: syscall.RT_SCOPE_LINK}
158158
err := netlink.AddrAdd(iface, naddr)
159159
if err != nil && err.Error() != IfaceHasAddr {
160-
klog.Errorf("failed to assign cluster ip %s to dummy interface: %s", naddr.IPNet.IP.String(), err.Error())
160+
klog.Errorf("failed to assign cluster ip %s to dummy interface: %s", naddr.IP.String(), err.Error())
161161
return err
162162
}
163163

@@ -522,8 +522,8 @@ func (ln *linuxNetworking) setupRoutesForExternalIPForDSR(serviceInfoMap service
522522
err)
523523
}
524524

525-
if !(strings.Contains(string(out), externalIPRouteTableName) ||
526-
strings.Contains(string(out), externalIPRouteTableID)) {
525+
if !strings.Contains(string(out), externalIPRouteTableName) &&
526+
!strings.Contains(string(out), externalIPRouteTableID) {
527527
err = runIPCommandsWithArgs(ipArgs, "rule", "add", "prio", "32765", "from", "all", "lookup",
528528
externalIPRouteTableID).Run()
529529
if err != nil {

pkg/controllers/proxy/network_services_controller.go

+15-15
Original file line numberDiff line numberDiff line change
@@ -941,36 +941,36 @@ func (nsc *NetworkServicesController) buildServicesInfo() serviceInfoMap {
941941
targetPort: port.TargetPort.String(),
942942
protocol: strings.ToLower(string(port.Protocol)),
943943
nodePort: int(port.NodePort),
944-
name: svc.ObjectMeta.Name,
945-
namespace: svc.ObjectMeta.Namespace,
944+
name: svc.Name,
945+
namespace: svc.Namespace,
946946
externalIPs: make([]string, len(svc.Spec.ExternalIPs)),
947947
intTrafficPolicy: &intClusterPolicyDefault,
948948
extTrafficPolicy: &extClusterPolicyDefault,
949949
healthCheckNodePort: int(svc.Spec.HealthCheckNodePort),
950950
}
951-
dsrMethod, ok := svc.ObjectMeta.Annotations[svcDSRAnnotation]
951+
dsrMethod, ok := svc.Annotations[svcDSRAnnotation]
952952
if ok {
953953
svcInfo.directServerReturn = true
954954
svcInfo.directServerReturnMethod = dsrMethod
955955
}
956956
svcInfo.scheduler = ipvs.RoundRobin
957-
schedulingMethod, ok := svc.ObjectMeta.Annotations[svcSchedulerAnnotation]
957+
schedulingMethod, ok := svc.Annotations[svcSchedulerAnnotation]
958958
if ok {
959-
switch {
960-
case schedulingMethod == ipvs.RoundRobin:
959+
switch schedulingMethod {
960+
case ipvs.RoundRobin:
961961
svcInfo.scheduler = ipvs.RoundRobin
962-
case schedulingMethod == ipvs.LeastConnection:
962+
case ipvs.LeastConnection:
963963
svcInfo.scheduler = ipvs.LeastConnection
964-
case schedulingMethod == ipvs.DestinationHashing:
964+
case ipvs.DestinationHashing:
965965
svcInfo.scheduler = ipvs.DestinationHashing
966-
case schedulingMethod == ipvs.SourceHashing:
966+
case ipvs.SourceHashing:
967967
svcInfo.scheduler = ipvs.SourceHashing
968-
case schedulingMethod == IpvsMaglevHashing:
968+
case IpvsMaglevHashing:
969969
svcInfo.scheduler = IpvsMaglevHashing
970970
}
971971
}
972972

973-
flags, ok := svc.ObjectMeta.Annotations[svcSchedFlagsAnnotation]
973+
flags, ok := svc.Annotations[svcSchedFlagsAnnotation]
974974
if ok && svcInfo.scheduler == IpvsMaglevHashing {
975975
svcInfo.flags = parseSchedFlags(flags)
976976
}
@@ -990,17 +990,17 @@ func (nsc *NetworkServicesController) buildServicesInfo() serviceInfoMap {
990990
// https://github.com/kubernetes/kubernetes/blob/master/pkg/apis/core/v1/defaults.go#L106
991991
svcInfo.sessionAffinityTimeoutSeconds = *svc.Spec.SessionAffinityConfig.ClientIP.TimeoutSeconds
992992
}
993-
_, svcInfo.hairpin = svc.ObjectMeta.Annotations[svcHairpinAnnotation]
994-
_, svcInfo.hairpinExternalIPs = svc.ObjectMeta.Annotations[svcHairpinExternalIPsAnnotation]
995-
_, svcInfo.skipLbIps = svc.ObjectMeta.Annotations[svcSkipLbIpsAnnotation]
993+
_, svcInfo.hairpin = svc.Annotations[svcHairpinAnnotation]
994+
_, svcInfo.hairpinExternalIPs = svc.Annotations[svcHairpinExternalIPsAnnotation]
995+
_, svcInfo.skipLbIps = svc.Annotations[svcSkipLbIpsAnnotation]
996996
svcInfo.intTrafficPolicy = svc.Spec.InternalTrafficPolicy
997997
svcInfo.extTrafficPolicy = &svc.Spec.ExternalTrafficPolicy
998998

999999
// The kube-router.io/service.local annotation has the ability to override the internal and external traffic
10001000
// policy that is set in the spec. Previously, when this was active set both to local when the annotation is
10011001
// true so that previous functionality of the annotation is best preserved. However, this has proved to not
10021002
// be a good fit for ClusterIP traffic, so we retain cluster for internal traffic policy.
1003-
if svc.ObjectMeta.Annotations[svcLocalAnnotation] == "true" {
1003+
if svc.Annotations[svcLocalAnnotation] == "true" {
10041004
intTrafficPolicyLocal := v1.ServiceInternalTrafficPolicyCluster
10051005
extTrafficPolicyLocal := v1.ServiceExternalTrafficPolicyLocal
10061006
svcInfo.intTrafficPolicy = &intTrafficPolicyLocal

pkg/controllers/routing/bgp_peers.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -59,15 +59,15 @@ func (nrc *NetworkRoutingController) syncInternalPeers() {
5959

6060
// we are rr-client peer only with rr-server
6161
if nrc.bgpRRClient {
62-
if _, ok := node.ObjectMeta.Annotations[rrServerAnnotation]; !ok {
62+
if _, ok := node.Annotations[rrServerAnnotation]; !ok {
6363
continue
6464
}
6565
}
6666

6767
// if node full mesh is not requested then just peer with nodes with same ASN
6868
// (run iBGP among same ASN peers)
6969
if !nrc.bgpFullMeshMode {
70-
nodeasn, ok := node.ObjectMeta.Annotations[nodeASNAnnotation]
70+
nodeasn, ok := node.Annotations[nodeASNAnnotation]
7171
if !ok {
7272
klog.Infof("Not peering with the Node %s as ASN number of the node is unknown.",
7373
targetNode.GetPrimaryNodeIP().String())
@@ -94,7 +94,7 @@ func (nrc *NetworkRoutingController) syncInternalPeers() {
9494

9595
if targetNodeIsIPv4 != sourceNodeIsIPv4 {
9696
klog.Warningf("Not peering with Node %s as it's primary IP (%s) uses a different protocol than "+
97-
"our primary IP (%s)", node.ObjectMeta.Name, targetNode.GetPrimaryNodeIP(),
97+
"our primary IP (%s)", node.Name, targetNode.GetPrimaryNodeIP(),
9898
nrc.krNode.GetPrimaryNodeIP())
9999
continue
100100
}
@@ -159,7 +159,7 @@ func (nrc *NetworkRoutingController) syncInternalPeers() {
159159

160160
// we are rr-server peer with other rr-client with reflection enabled
161161
if nrc.bgpRRServer {
162-
if _, ok := node.ObjectMeta.Annotations[rrClientAnnotation]; ok {
162+
if _, ok := node.Annotations[rrClientAnnotation]; ok {
163163
// add rr options with clusterId
164164
n.RouteReflector = &gobgpapi.RouteReflector{
165165
RouteReflectorClient: true,

pkg/controllers/routing/ecmp_vip_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -911,7 +911,7 @@ func Test_getVIPsForService(t *testing.T) {
911911

912912
// Take care of adding annotations
913913
if serviceAdvertisedIP.annotations != nil {
914-
serviceAdvertisedIP.service.ObjectMeta.Annotations = serviceAdvertisedIP.annotations
914+
serviceAdvertisedIP.service.Annotations = serviceAdvertisedIP.annotations
915915
}
916916

917917
if serviceAdvertisedIP.internalTrafficPolicy != nil {
@@ -924,8 +924,8 @@ func Test_getVIPsForService(t *testing.T) {
924924

925925
// Take care of adding endpoints if needed for test
926926
if endpoints != nil {
927-
endpoints.ObjectMeta.Name = serviceAdvertisedIP.service.Name
928-
endpoints.ObjectMeta.Namespace = serviceAdvertisedIP.service.Namespace
927+
endpoints.Name = serviceAdvertisedIP.service.Name
928+
endpoints.Namespace = serviceAdvertisedIP.service.Namespace
929929
if _, err := clientset.CoreV1().Endpoints(endpoints.GetObjectMeta().GetNamespace()).Create(
930930
context.Background(), endpoints, metav1.CreateOptions{}); err != nil {
931931
t.Fatalf("failed to create endpoints for test: %v", err)

0 commit comments

Comments
 (0)