runservice: fix linter errors
Fix errors reported by default golangci-lint linters
This commit is contained in:
parent
49d0238a1e
commit
19793db0c2
|
@ -178,7 +178,6 @@ func TestRecreateRun(t *testing.T) {
|
||||||
req *RunCreateRequest
|
req *RunCreateRequest
|
||||||
outrc *types.RunConfig
|
outrc *types.RunConfig
|
||||||
outr *types.Run
|
outr *types.Run
|
||||||
err error
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "test recreate run from start with all not start tasks",
|
name: "test recreate run from start with all not start tasks",
|
||||||
|
|
|
@ -94,22 +94,22 @@ func httpError(w http.ResponseWriter, err error) bool {
|
||||||
switch {
|
switch {
|
||||||
case errors.Is(err, &util.ErrBadRequest{}):
|
case errors.Is(err, &util.ErrBadRequest{}):
|
||||||
w.WriteHeader(http.StatusBadRequest)
|
w.WriteHeader(http.StatusBadRequest)
|
||||||
w.Write(resj)
|
_, _ = w.Write(resj)
|
||||||
case errors.Is(err, &util.ErrNotFound{}):
|
case errors.Is(err, &util.ErrNotFound{}):
|
||||||
w.WriteHeader(http.StatusNotFound)
|
w.WriteHeader(http.StatusNotFound)
|
||||||
w.Write(resj)
|
_, _ = w.Write(resj)
|
||||||
case errors.Is(err, &util.ErrForbidden{}):
|
case errors.Is(err, &util.ErrForbidden{}):
|
||||||
w.WriteHeader(http.StatusForbidden)
|
w.WriteHeader(http.StatusForbidden)
|
||||||
w.Write(resj)
|
_, _ = w.Write(resj)
|
||||||
case errors.Is(err, &util.ErrUnauthorized{}):
|
case errors.Is(err, &util.ErrUnauthorized{}):
|
||||||
w.WriteHeader(http.StatusUnauthorized)
|
w.WriteHeader(http.StatusUnauthorized)
|
||||||
w.Write(resj)
|
_, _ = w.Write(resj)
|
||||||
case errors.Is(err, &util.ErrInternal{}):
|
case errors.Is(err, &util.ErrInternal{}):
|
||||||
w.WriteHeader(http.StatusInternalServerError)
|
w.WriteHeader(http.StatusInternalServerError)
|
||||||
w.Write(resj)
|
_, _ = w.Write(resj)
|
||||||
default:
|
default:
|
||||||
w.WriteHeader(http.StatusInternalServerError)
|
w.WriteHeader(http.StatusInternalServerError)
|
||||||
w.Write(resj)
|
_, _ = w.Write(resj)
|
||||||
}
|
}
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
@ -599,7 +599,6 @@ type RunActionsRequest struct {
|
||||||
type RunActionsHandler struct {
|
type RunActionsHandler struct {
|
||||||
log *zap.SugaredLogger
|
log *zap.SugaredLogger
|
||||||
ah *action.ActionHandler
|
ah *action.ActionHandler
|
||||||
readDB *readdb.ReadDB
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewRunActionsHandler(logger *zap.Logger, ah *action.ActionHandler) *RunActionsHandler {
|
func NewRunActionsHandler(logger *zap.Logger, ah *action.ActionHandler) *RunActionsHandler {
|
||||||
|
@ -669,7 +668,6 @@ type RunTaskActionsRequest struct {
|
||||||
type RunTaskActionsHandler struct {
|
type RunTaskActionsHandler struct {
|
||||||
log *zap.SugaredLogger
|
log *zap.SugaredLogger
|
||||||
ah *action.ActionHandler
|
ah *action.ActionHandler
|
||||||
readDB *readdb.ReadDB
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewRunTaskActionsHandler(logger *zap.Logger, ah *action.ActionHandler) *RunTaskActionsHandler {
|
func NewRunTaskActionsHandler(logger *zap.Logger, ah *action.ActionHandler) *RunTaskActionsHandler {
|
||||||
|
|
|
@ -333,7 +333,7 @@ func matchCache(ost *objectstorage.ObjStorage, key string, prefix bool) (string,
|
||||||
return "", object.Err
|
return "", object.Err
|
||||||
}
|
}
|
||||||
|
|
||||||
if (lastObject == nil) || (lastObject != nil && lastObject.LastModified.Before(object.LastModified)) {
|
if (lastObject == nil) || (lastObject.LastModified.Before(object.LastModified)) {
|
||||||
lastObject = &object
|
lastObject = &object
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -70,10 +70,6 @@ var (
|
||||||
StorageCountersDir = path.Join(StorageDataDir, "counters")
|
StorageCountersDir = path.Join(StorageDataDir, "counters")
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
|
||||||
etcdWalsMinRevisionRange = 100
|
|
||||||
)
|
|
||||||
|
|
||||||
type DataType string
|
type DataType string
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
|
|
@ -59,22 +59,22 @@ var (
|
||||||
revisionSelect = sb.Select("revision").From("revision")
|
revisionSelect = sb.Select("revision").From("revision")
|
||||||
revisionInsert = sb.Insert("revision").Columns("revision")
|
revisionInsert = sb.Insert("revision").Columns("revision")
|
||||||
|
|
||||||
runSelect = sb.Select("id", "grouppath", "phase").From("run")
|
//runSelect = sb.Select("id", "grouppath", "phase").From("run")
|
||||||
runInsert = sb.Insert("run").Columns("id", "grouppath", "phase")
|
runInsert = sb.Insert("run").Columns("id", "grouppath", "phase")
|
||||||
|
|
||||||
rundataInsert = sb.Insert("rundata").Columns("id", "data")
|
rundataInsert = sb.Insert("rundata").Columns("id", "data")
|
||||||
|
|
||||||
runeventSelect = sb.Select("data").From("runevent")
|
//runeventSelect = sb.Select("data").From("runevent")
|
||||||
runeventInsert = sb.Insert("runevent").Columns("sequence", "data")
|
runeventInsert = sb.Insert("runevent").Columns("sequence", "data")
|
||||||
|
|
||||||
changegrouprevisionSelect = sb.Select("id, revision").From("changegrouprevision")
|
changegrouprevisionSelect = sb.Select("id, revision").From("changegrouprevision")
|
||||||
changegrouprevisionInsert = sb.Insert("changegrouprevision").Columns("id", "revision")
|
changegrouprevisionInsert = sb.Insert("changegrouprevision").Columns("id", "revision")
|
||||||
|
|
||||||
// readdb tables based on objectstorage data
|
// readdb tables based on objectstorage data
|
||||||
revisionOSTSelect = sb.Select("revision").From("revision_ost")
|
//revisionOSTSelect = sb.Select("revision").From("revision_ost")
|
||||||
revisionOSTInsert = sb.Insert("revision_ost").Columns("revision")
|
revisionOSTInsert = sb.Insert("revision_ost").Columns("revision")
|
||||||
|
|
||||||
runOSTSelect = sb.Select("id", "grouppath", "phase").From("run_ost")
|
//runOSTSelect = sb.Select("id", "grouppath", "phase").From("run_ost")
|
||||||
runOSTInsert = sb.Insert("run_ost").Columns("id", "grouppath", "phase")
|
runOSTInsert = sb.Insert("run_ost").Columns("id", "grouppath", "phase")
|
||||||
|
|
||||||
rundataOSTInsert = sb.Insert("rundata_ost").Columns("id", "data")
|
rundataOSTInsert = sb.Insert("rundata_ost").Columns("id", "data")
|
||||||
|
@ -367,7 +367,7 @@ func (r *ReadDB) handleEvents(ctx context.Context) error {
|
||||||
}
|
}
|
||||||
// check that the run sequence epoch isn't different than the current one (this means etcd
|
// check that the run sequence epoch isn't different than the current one (this means etcd
|
||||||
// has been reset, or worst, restored from a backup or manually deleted)
|
// has been reset, or worst, restored from a backup or manually deleted)
|
||||||
if runSequence == nil || runSequence.Epoch != lastRunSequence.Epoch {
|
if runSequence.Epoch != lastRunSequence.Epoch {
|
||||||
r.SetInitialized(false)
|
r.SetInitialized(false)
|
||||||
return errors.Errorf("last run epoch %d is different than current epoch in etcd %d, reinitializing.", lastRunSequence.Epoch, runSequence.Epoch)
|
return errors.Errorf("last run epoch %d is different than current epoch in etcd %d, reinitializing.", lastRunSequence.Epoch, runSequence.Epoch)
|
||||||
}
|
}
|
||||||
|
@ -1525,7 +1525,7 @@ func fetchChangeGroupsRevisionOST(tx *db.Tx, q string, args ...interface{}) (map
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
defer rows.Close()
|
defer rows.Close()
|
||||||
return scanChangeGroupsRevision(rows)
|
return scanChangeGroupsRevisionOST(rows)
|
||||||
}
|
}
|
||||||
|
|
||||||
func scanChangeGroupsRevisionOST(rows *sql.Rows) (map[string]int64, error) {
|
func scanChangeGroupsRevisionOST(rows *sql.Rows) (map[string]int64, error) {
|
||||||
|
|
|
@ -156,19 +156,14 @@ func (s *Runservice) Run(ctx context.Context) error {
|
||||||
time.Sleep(1 * time.Second)
|
time.Sleep(1 * time.Second)
|
||||||
}
|
}
|
||||||
|
|
||||||
go s.readDB.Run(ctx)
|
go func() { errCh <- s.readDB.Run(ctx) }()
|
||||||
|
|
||||||
ch := make(chan *types.ExecutorTask)
|
ch := make(chan *types.ExecutorTask)
|
||||||
|
|
||||||
// noop coors handler
|
|
||||||
corsHandler := func(h http.Handler) http.Handler {
|
|
||||||
return h
|
|
||||||
}
|
|
||||||
|
|
||||||
corsAllowedMethodsOptions := ghandlers.AllowedMethods([]string{"GET", "HEAD", "POST", "PUT", "DELETE"})
|
corsAllowedMethodsOptions := ghandlers.AllowedMethods([]string{"GET", "HEAD", "POST", "PUT", "DELETE"})
|
||||||
corsAllowedHeadersOptions := ghandlers.AllowedHeaders([]string{"Accept", "Accept-Encoding", "Authorization", "Content-Length", "Content-Type", "X-CSRF-Token", "Authorization"})
|
corsAllowedHeadersOptions := ghandlers.AllowedHeaders([]string{"Accept", "Accept-Encoding", "Authorization", "Content-Length", "Content-Type", "X-CSRF-Token", "Authorization"})
|
||||||
corsAllowedOriginsOptions := ghandlers.AllowedOrigins([]string{"*"})
|
corsAllowedOriginsOptions := ghandlers.AllowedOrigins([]string{"*"})
|
||||||
corsHandler = ghandlers.CORS(corsAllowedMethodsOptions, corsAllowedHeadersOptions, corsAllowedOriginsOptions)
|
corsHandler := ghandlers.CORS(corsAllowedMethodsOptions, corsAllowedHeadersOptions, corsAllowedOriginsOptions)
|
||||||
|
|
||||||
// executor dedicated api, only calls from executor should happen on these handlers
|
// executor dedicated api, only calls from executor should happen on these handlers
|
||||||
executorStatusHandler := api.NewExecutorStatusHandler(logger, s.e, s.ah)
|
executorStatusHandler := api.NewExecutorStatusHandler(logger, s.e, s.ah)
|
||||||
|
|
|
@ -76,15 +76,6 @@ func (s *Runservice) runActiveExecutorTasks(ctx context.Context, runID string) (
|
||||||
return activeTasks, nil
|
return activeTasks, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Runservice) runHasActiveExecutorTasks(ctx context.Context, runID string) (bool, error) {
|
|
||||||
activeTasks, err := s.runActiveExecutorTasks(ctx, runID)
|
|
||||||
if err != nil {
|
|
||||||
return false, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return len(activeTasks) > 0, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func advanceRunTasks(ctx context.Context, curRun *types.Run, rc *types.RunConfig, activeExecutorTasks []*types.ExecutorTask) (*types.Run, error) {
|
func advanceRunTasks(ctx context.Context, curRun *types.Run, rc *types.RunConfig, activeExecutorTasks []*types.ExecutorTask) (*types.Run, error) {
|
||||||
log.Debugf("run: %s", util.Dump(curRun))
|
log.Debugf("run: %s", util.Dump(curRun))
|
||||||
log.Debugf("rc: %s", util.Dump(rc))
|
log.Debugf("rc: %s", util.Dump(rc))
|
||||||
|
@ -281,7 +272,7 @@ func (s *Runservice) chooseExecutor(ctx context.Context, rct *types.RunConfigTas
|
||||||
func chooseExecutor(executors []*types.Executor, rct *types.RunConfigTask) *types.Executor {
|
func chooseExecutor(executors []*types.Executor, rct *types.RunConfigTask) *types.Executor {
|
||||||
requiresPrivilegedContainers := false
|
requiresPrivilegedContainers := false
|
||||||
for _, c := range rct.Runtime.Containers {
|
for _, c := range rct.Runtime.Containers {
|
||||||
if c.Privileged == true {
|
if c.Privileged {
|
||||||
requiresPrivilegedContainers = true
|
requiresPrivilegedContainers = true
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
@ -293,7 +284,7 @@ func chooseExecutor(executors []*types.Executor, rct *types.RunConfigTask) *type
|
||||||
}
|
}
|
||||||
|
|
||||||
// skip executor provileged containers are required but not allowed
|
// skip executor provileged containers are required but not allowed
|
||||||
if requiresPrivilegedContainers == true && e.AllowPrivilegedContainers == false {
|
if requiresPrivilegedContainers && !e.AllowPrivilegedContainers {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -864,7 +855,7 @@ func (s *Runservice) runTasksUpdater(ctx context.Context) error {
|
||||||
if err := m.Lock(ctx); err != nil {
|
if err := m.Lock(ctx); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
defer m.Unlock(ctx)
|
defer func() { _ = m.Unlock(ctx) }()
|
||||||
|
|
||||||
resp, err := s.e.List(ctx, common.EtcdTasksDir, "", 0)
|
resp, err := s.e.List(ctx, common.EtcdTasksDir, "", 0)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -1378,7 +1369,7 @@ func (s *Runservice) cacheCleaner(ctx context.Context, cacheExpireInterval time.
|
||||||
if err := m.Lock(ctx); err != nil {
|
if err := m.Lock(ctx); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
defer m.Unlock(ctx)
|
defer func() { _ = m.Unlock(ctx) }()
|
||||||
|
|
||||||
doneCh := make(chan struct{})
|
doneCh := make(chan struct{})
|
||||||
defer close(doneCh)
|
defer close(doneCh)
|
||||||
|
|
|
@ -129,7 +129,6 @@ func TestAdvanceRunTasks(t *testing.T) {
|
||||||
r *types.Run
|
r *types.Run
|
||||||
activeExecutorTasks []*types.ExecutorTask
|
activeExecutorTasks []*types.ExecutorTask
|
||||||
out *types.Run
|
out *types.Run
|
||||||
err error
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "test top level task not started",
|
name: "test top level task not started",
|
||||||
|
@ -472,7 +471,6 @@ func TestGetTasksToRun(t *testing.T) {
|
||||||
rc *types.RunConfig
|
rc *types.RunConfig
|
||||||
r *types.Run
|
r *types.Run
|
||||||
out []string
|
out []string
|
||||||
err error
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "test run top level tasks",
|
name: "test run top level tasks",
|
||||||
|
@ -532,8 +530,8 @@ func TestGetTasksToRun(t *testing.T) {
|
||||||
for _, t := range tasks {
|
for _, t := range tasks {
|
||||||
outTasks = append(outTasks, t.ID)
|
outTasks = append(outTasks, t.ID)
|
||||||
}
|
}
|
||||||
sort.Sort(sort.StringSlice(tt.out))
|
sort.Strings(tt.out)
|
||||||
sort.Sort(sort.StringSlice(outTasks))
|
sort.Strings(outTasks)
|
||||||
|
|
||||||
if diff := cmp.Diff(tt.out, outTasks); diff != "" {
|
if diff := cmp.Diff(tt.out, outTasks); diff != "" {
|
||||||
t.Error(diff)
|
t.Error(diff)
|
||||||
|
@ -606,7 +604,6 @@ func TestChooseExecutor(t *testing.T) {
|
||||||
executors []*types.Executor
|
executors []*types.Executor
|
||||||
rct *types.RunConfigTask
|
rct *types.RunConfigTask
|
||||||
out *types.Executor
|
out *types.Executor
|
||||||
err error
|
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "test single executor ok",
|
name: "test single executor ok",
|
||||||
|
|
|
@ -363,7 +363,7 @@ func GetExecutorTasksForRun(ctx context.Context, e *etcd.Store, runID string) ([
|
||||||
}
|
}
|
||||||
|
|
||||||
rtIDs := make([]string, len(r.Tasks))
|
rtIDs := make([]string, len(r.Tasks))
|
||||||
for rtID, _ := range r.Tasks {
|
for rtID := range r.Tasks {
|
||||||
rtIDs = append(rtIDs, rtID)
|
rtIDs = append(rtIDs, rtID)
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue