Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug 2224307: build: update go modules #513

Merged
merged 3 commits into from
Aug 28, 2023

Conversation

subhamkrai
Copy link

Update go modules. The primary goal is to remove the goproxy import which has security warnings. The library is not used directly or indirectly by any called Rook code, only dependency modules. Therefore, exclude it from the build.

At the same time, portworx deps are starting to complicate the module update again. Rook also doesn't directly or indirectly use the portworx code, so exclude it also.

(cherry picked from commit 87fc552)

Description of your changes:

Which issue is resolved by this Pull Request:
Resolves #

Checklist:

  • Commit Message Formatting: Commit titles and messages follow guidelines in the developer guide).
  • Skip Tests for Docs: If this is only a documentation change, add the label skip-ci on the PR.
  • Reviewed the developer guide on Submitting a Pull Request
  • Pending release notes updated with breaking and/or notable changes for the next minor release.
  • Documentation has been updated, if necessary.
  • Unit tests have been added, if necessary.
  • Integration tests have been added, if necessary.

Update go modules. The primary goal is to remove the goproxy import
which has security warnings. The library is not used directly or
indirectly by any called Rook code, only dependency modules. Therefore,
exclude it from the build.

At the same time, portworx deps are starting to complicate the module
update again. Rook also doesn't directly or indirectly use the portworx
code, so exclude it also.

Signed-off-by: Blaine Gardner <blaine.gardner@ibm.com>
(cherry picked from commit 87fc552)
Signed-off-by: subhamkrai <srai@redhat.com>
@openshift-ci openshift-ci bot added bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. labels Aug 25, 2023
@openshift-ci
Copy link

openshift-ci bot commented Aug 25, 2023

@subhamkrai: This pull request references Bugzilla bug 2224307, which is valid. The bug has been updated to refer to the pull request using the external bug tracker.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target release (ODF 4.14.0) matches configured target release for branch (ODF 4.14.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, ON_DEV, POST, POST)

No GitHub users were found matching the public email listed for the QA contact in Bugzilla (apolak@redhat.com), skipping review request.

In response to this:

Bug 2224307: build: update go modules

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@subhamkrai
Copy link
Author

@travisn @BlaineEXE ^^

@travisn
Copy link

travisn commented Aug 25, 2023

At the same time let's also cherry-pick the commits from rook#12764.

The go package dependencies (go.mod and go.sum) were created
under the pkg/apis directory to simplify the dependencies for
other projects referencing the rook repo. The downside is that
the dependabot can no longer open a working and valid PR since
the bot is not aware of the go.mod and go.sum in the apis directory.

Since the reduction of dependencies for vault in rook#12455,
the list of extra dependencies is not quite so extensive.
We are putting effort into shrinking the dependency list instead
of using the modules files in the apis subdirectory.

Note that rook#12419 updated the dependencies for the latest controller
runtime which also increased the size of the modules
list in the pkgs subdirectory, which means the difference
in dependencies in the pkgs subdirectory is no longer
signficant anyway.

Signed-off-by: travisn <tnielsen@redhat.com>
(cherry picked from commit 1a4917d)
Run make go.mod.update to update the go modules to
the latest references.

Signed-off-by: travisn <tnielsen@redhat.com>
(cherry picked from commit 138624a)
Signed-off-by: subhamkrai <srai@redhat.com>
@travisn
Copy link

travisn commented Aug 28, 2023

/approve
/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Aug 28, 2023
@openshift-ci
Copy link

openshift-ci bot commented Aug 28, 2023

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: subhamkrai, travisn

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@travisn travisn merged commit bc35c57 into red-hat-storage:release-4.14 Aug 28, 2023
42 of 45 checks passed
@openshift-ci
Copy link

openshift-ci bot commented Aug 28, 2023

@subhamkrai: All pull requests linked via external trackers have merged:

Bugzilla bug 2224307 has been moved to the MODIFIED state.

In response to this:

Bug 2224307: build: update go modules

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bugzilla/severity-medium Referenced Bugzilla bug's severity is medium for the branch this PR is targeting. bugzilla/valid-bug Indicates that a referenced Bugzilla bug is valid for the branch this PR is targeting. lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants