chore(deps): code cleanup, do not use pkg/errors (#5335)

Signed-off-by: ivan katliarchuk <ivan.katliarchuk@gmail.com>
This commit is contained in:
Ivan Ka 2025-04-29 09:17:57 +01:00 committed by GitHub
parent adf9fb20a4
commit ba64e8bb01
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
16 changed files with 46 additions and 39 deletions

View File

@ -201,3 +201,7 @@ helm-template:
helm-lint: helm-lint:
scripts/helm-tools.sh --schema scripts/helm-tools.sh --schema
scripts/helm-tools.sh --docs scripts/helm-tools.sh --docs
.PHONY: go-dependency
go-dependency: ## Dependency maintanance
go mod tidy

2
go.mod
View File

@ -50,7 +50,6 @@ require (
github.com/oracle/oci-go-sdk/v65 v65.89.1 github.com/oracle/oci-go-sdk/v65 v65.89.1
github.com/ovh/go-ovh v1.7.0 github.com/ovh/go-ovh v1.7.0
github.com/patrickmn/go-cache v2.1.0+incompatible github.com/patrickmn/go-cache v2.1.0+incompatible
github.com/pkg/errors v0.9.1
github.com/pluralsh/gqlclient v1.12.2 github.com/pluralsh/gqlclient v1.12.2
github.com/projectcontour/contour v1.30.3 github.com/projectcontour/contour v1.30.3
github.com/prometheus/client_golang v1.22.0 github.com/prometheus/client_golang v1.22.0
@ -170,6 +169,7 @@ require (
github.com/opentracing/opentracing-go v1.2.1-0.20220228012449-10b1cf09e00b // indirect github.com/opentracing/opentracing-go v1.2.1-0.20220228012449-10b1cf09e00b // indirect
github.com/peterhellberg/link v1.1.0 // indirect github.com/peterhellberg/link v1.1.0 // indirect
github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c // indirect github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c // indirect
github.com/pkg/errors v0.9.1 // indirect
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 // indirect github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 // indirect
github.com/prometheus/client_model v0.6.1 // indirect github.com/prometheus/client_model v0.6.1 // indirect
github.com/prometheus/common v0.62.0 // indirect github.com/prometheus/common v0.62.0 // indirect

View File

@ -18,6 +18,7 @@ package oci
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"os" "os"
"strings" "strings"
@ -27,7 +28,6 @@ import (
"github.com/oracle/oci-go-sdk/v65/common" "github.com/oracle/oci-go-sdk/v65/common"
"github.com/oracle/oci-go-sdk/v65/common/auth" "github.com/oracle/oci-go-sdk/v65/common/auth"
"github.com/oracle/oci-go-sdk/v65/dns" "github.com/oracle/oci-go-sdk/v65/dns"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
"sigs.k8s.io/external-dns/endpoint" "sigs.k8s.io/external-dns/endpoint"

View File

@ -18,6 +18,8 @@ package oci
import ( import (
"context" "context"
"errors"
"fmt"
"sort" "sort"
"strings" "strings"
"testing" "testing"
@ -25,7 +27,6 @@ import (
"github.com/oracle/oci-go-sdk/v65/common" "github.com/oracle/oci-go-sdk/v65/common"
"github.com/oracle/oci-go-sdk/v65/dns" "github.com/oracle/oci-go-sdk/v65/dns"
"github.com/pkg/errors"
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
"sigs.k8s.io/external-dns/endpoint" "sigs.k8s.io/external-dns/endpoint"
@ -621,7 +622,7 @@ func (c *mutableMockOCIDNSClient) PatchZoneRecords(ctx context.Context, request
case dns.RecordOperationOperationRemove: case dns.RecordOperationOperationRemove:
delete(records, k) delete(records, k)
default: default:
err = errors.Errorf("unsupported operation %q", op.Operation) err = fmt.Errorf("unsupported operation %q", op.Operation)
return return
} }
} }

View File

@ -18,12 +18,12 @@ package source
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"sort" "sort"
"strings" "strings"
ambassador "github.com/datawire/ambassador/pkg/api/getambassador.io/v2" ambassador "github.com/datawire/ambassador/pkg/api/getambassador.io/v2"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
@ -96,7 +96,7 @@ func NewAmbassadorHostSource(
uc, err := newUnstructuredConverter() uc, err := newUnstructuredConverter()
if err != nil { if err != nil {
return nil, errors.Wrapf(err, "failed to setup Unstructured Converter") return nil, fmt.Errorf("failed to setup Unstructured Converter: %w", err)
} }
return &ambassadorHostSource{ return &ambassadorHostSource{
@ -137,10 +137,10 @@ func (sc *ambassadorHostSource) Endpoints(ctx context.Context) ([]*endpoint.Endp
// Filter Ambassador Hosts // Filter Ambassador Hosts
ambassadorHosts, err = sc.filterByAnnotations(ambassadorHosts) ambassadorHosts, err = sc.filterByAnnotations(ambassadorHosts)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter Ambassador Hosts by annotation") return nil, fmt.Errorf("failed to filter Ambassador Hosts by annotation: %w", err)
} }
endpoints := []*endpoint.Endpoint{} var endpoints []*endpoint.Endpoint
for _, host := range ambassadorHosts { for _, host := range ambassadorHosts {
fullname := fmt.Sprintf("%s/%s", host.Namespace, host.Name) fullname := fmt.Sprintf("%s/%s", host.Namespace, host.Name)
@ -260,7 +260,7 @@ func parseAmbLoadBalancerService(service string) (namespace, name string, err er
} }
// If we got here, this string is simply ill-formatted. Return an error. // If we got here, this string is simply ill-formatted. Return an error.
return "", "", errors.New(fmt.Sprintf("invalid external-dns service: %s", service)) return "", "", fmt.Errorf("invalid external-dns service: %s", service)
} }
func (sc *ambassadorHostSource) AddEventHandler(ctx context.Context, handler func()) { func (sc *ambassadorHostSource) AddEventHandler(ctx context.Context, handler func()) {

View File

@ -18,11 +18,11 @@ package source
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"sort" "sort"
"text/template" "text/template"
"github.com/pkg/errors"
projectcontour "github.com/projectcontour/contour/apis/projectcontour/v1" projectcontour "github.com/projectcontour/contour/apis/projectcontour/v1"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@ -87,7 +87,7 @@ func NewContourHTTPProxySource(
uc, err := NewUnstructuredConverter() uc, err := NewUnstructuredConverter()
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to setup Unstructured Converter") return nil, fmt.Errorf("failed to setup Unstructured Converter: %w", err)
} }
return &httpProxySource{ return &httpProxySource{
@ -121,14 +121,14 @@ func (sc *httpProxySource) Endpoints(ctx context.Context) ([]*endpoint.Endpoint,
hpConverted := &projectcontour.HTTPProxy{} hpConverted := &projectcontour.HTTPProxy{}
err := sc.unstructuredConverter.scheme.Convert(unstructuredHP, hpConverted, nil) err := sc.unstructuredConverter.scheme.Convert(unstructuredHP, hpConverted, nil)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to convert to HTTPProxy") return nil, fmt.Errorf("failed to convert to HTTPProxy: %w", err)
} }
httpProxies = append(httpProxies, hpConverted) httpProxies = append(httpProxies, hpConverted)
} }
httpProxies, err = sc.filterByAnnotations(httpProxies) httpProxies, err = sc.filterByAnnotations(httpProxies)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter HTTPProxies") return nil, fmt.Errorf("failed to filter HTTPProxies: %w", err)
} }
endpoints := []*endpoint.Endpoint{} endpoints := []*endpoint.Endpoint{}
@ -144,14 +144,14 @@ func (sc *httpProxySource) Endpoints(ctx context.Context) ([]*endpoint.Endpoint,
hpEndpoints, err := sc.endpointsFromHTTPProxy(hp) hpEndpoints, err := sc.endpointsFromHTTPProxy(hp)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to get endpoints from HTTPProxy") return nil, fmt.Errorf("failed to get endpoints from HTTPProxy: %w", err)
} }
// apply template if fqdn is missing on HTTPProxy // apply template if fqdn is missing on HTTPProxy
if (sc.combineFQDNAnnotation || len(hpEndpoints) == 0) && sc.fqdnTemplate != nil { if (sc.combineFQDNAnnotation || len(hpEndpoints) == 0) && sc.fqdnTemplate != nil {
tmplEndpoints, err := sc.endpointsFromTemplate(hp) tmplEndpoints, err := sc.endpointsFromTemplate(hp)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to get endpoints from template") return nil, fmt.Errorf("failed to get endpoints from template: %w", err)
} }
if sc.combineFQDNAnnotation { if sc.combineFQDNAnnotation {

View File

@ -18,11 +18,11 @@ package source
import ( import (
"context" "context"
"errors"
"testing" "testing"
fakeDynamic "k8s.io/client-go/dynamic/fake" fakeDynamic "k8s.io/client-go/dynamic/fake"
"github.com/pkg/errors"
projectcontour "github.com/projectcontour/contour/apis/projectcontour/v1" projectcontour "github.com/projectcontour/contour/apis/projectcontour/v1"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"

View File

@ -18,10 +18,10 @@ package source
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"strings" "strings"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
@ -82,7 +82,7 @@ func NewF5TransportServerSource(
uc, err := newTSUnstructuredConverter() uc, err := newTSUnstructuredConverter()
if err != nil { if err != nil {
return nil, errors.Wrapf(err, "failed to setup unstructured converter") return nil, fmt.Errorf("failed to setup unstructured converter: %w", err)
} }
return &f5TransportServerSource{ return &f5TransportServerSource{
@ -120,7 +120,7 @@ func (ts *f5TransportServerSource) Endpoints(ctx context.Context) ([]*endpoint.E
transportServers, err = ts.filterByAnnotations(transportServers) transportServers, err = ts.filterByAnnotations(transportServers)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter TransportServers") return nil, fmt.Errorf("failed to filter TransportServers: %w", err)
} }
endpoints, err := ts.endpointsFromTransportServers(transportServers) endpoints, err := ts.endpointsFromTransportServers(transportServers)

View File

@ -18,11 +18,11 @@ package source
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"sort" "sort"
"strings" "strings"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
@ -83,7 +83,7 @@ func NewF5VirtualServerSource(
uc, err := newVSUnstructuredConverter() uc, err := newVSUnstructuredConverter()
if err != nil { if err != nil {
return nil, errors.Wrapf(err, "failed to setup unstructured converter") return nil, fmt.Errorf("failed to setup unstructured converter: %w", err)
} }
return &f5VirtualServerSource{ return &f5VirtualServerSource{
@ -121,7 +121,7 @@ func (vs *f5VirtualServerSource) Endpoints(ctx context.Context) ([]*endpoint.End
virtualServers, err = vs.filterByAnnotations(virtualServers) virtualServers, err = vs.filterByAnnotations(virtualServers)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter VirtualServers") return nil, fmt.Errorf("failed to filter VirtualServers: %w", err)
} }
endpoints, err := vs.endpointsFromVirtualServers(virtualServers) endpoints, err := vs.endpointsFromVirtualServers(virtualServers)

View File

@ -18,9 +18,9 @@ package source
import ( import (
"context" "context"
"errors"
"testing" "testing"
"github.com/pkg/errors"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
"github.com/stretchr/testify/suite" "github.com/stretchr/testify/suite"

View File

@ -18,10 +18,10 @@ package source
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"testing" "testing"
"github.com/pkg/errors"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require" "github.com/stretchr/testify/require"
"github.com/stretchr/testify/suite" "github.com/stretchr/testify/suite"

View File

@ -18,10 +18,10 @@ package source
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"sort" "sort"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
corev1 "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
@ -82,7 +82,7 @@ func NewKongTCPIngressSource(ctx context.Context, dynamicKubeClient dynamic.Inte
uc, err := newKongUnstructuredConverter() uc, err := newKongUnstructuredConverter()
if err != nil { if err != nil {
return nil, errors.Wrapf(err, "failed to setup Unstructured Converter") return nil, fmt.Errorf("failed to setup Unstructured Converter: %w", err)
} }
return &kongTCPIngressSource{ return &kongTCPIngressSource{
@ -121,7 +121,7 @@ func (sc *kongTCPIngressSource) Endpoints(ctx context.Context) ([]*endpoint.Endp
tcpIngresses, err = sc.filterByAnnotations(tcpIngresses) tcpIngresses, err = sc.filterByAnnotations(tcpIngresses)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter TCPIngresses") return nil, fmt.Errorf("failed to filter TCPIngresses: %w", err)
} }
var endpoints []*endpoint.Endpoint var endpoints []*endpoint.Endpoint

View File

@ -18,9 +18,9 @@ package source
import ( import (
"context" "context"
"errors"
"testing" "testing"
"github.com/pkg/errors"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
"sigs.k8s.io/external-dns/endpoint" "sigs.k8s.io/external-dns/endpoint"
) )

View File

@ -18,6 +18,8 @@ package source
import ( import (
"context" "context"
"errors"
"fmt"
"net/http" "net/http"
"os" "os"
"strings" "strings"
@ -27,7 +29,6 @@ import (
"github.com/cloudfoundry-community/go-cfclient" "github.com/cloudfoundry-community/go-cfclient"
"github.com/linki/instrumented_http" "github.com/linki/instrumented_http"
openshift "github.com/openshift/client-go/route/clientset/versioned" openshift "github.com/openshift/client-go/route/clientset/versioned"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
istioclient "istio.io/client-go/pkg/clientset/versioned" istioclient "istio.io/client-go/pkg/clientset/versioned"
"k8s.io/apimachinery/pkg/labels" "k8s.io/apimachinery/pkg/labels"
@ -509,7 +510,7 @@ func NewIstioClient(kubeConfig string, apiServerURL string) (*istioclient.Client
ic, err := istioclient.NewForConfig(restCfg) ic, err := istioclient.NewForConfig(restCfg)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "Failed to create istio client") return nil, fmt.Errorf("failed to create istio client: %w", err)
} }
return ic, nil return ic, nil

View File

@ -18,12 +18,12 @@ package source
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"regexp" "regexp"
"sort" "sort"
"strings" "strings"
"github.com/pkg/errors"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
@ -151,7 +151,7 @@ func NewTraefikSource(ctx context.Context, dynamicKubeClient dynamic.Interface,
uc, err := newTraefikUnstructuredConverter() uc, err := newTraefikUnstructuredConverter()
if err != nil { if err != nil {
return nil, errors.Wrapf(err, "failed to setup Unstructured Converter") return nil, fmt.Errorf("failed to setup Unstructured Converter: %w", err)
} }
return &traefikSource{ return &traefikSource{
@ -249,7 +249,7 @@ func (ts *traefikSource) ingressRouteEndpoints() ([]*endpoint.Endpoint, error) {
ingressRoutes, err = ts.filterIngressRouteByAnnotation(ingressRoutes) ingressRoutes, err = ts.filterIngressRouteByAnnotation(ingressRoutes)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter IngressRoute") return nil, fmt.Errorf("failed to filter IngressRoute: %w", err)
} }
for _, ingressRoute := range ingressRoutes { for _, ingressRoute := range ingressRoutes {
@ -301,7 +301,7 @@ func (ts *traefikSource) ingressRouteTCPEndpoints() ([]*endpoint.Endpoint, error
ingressRouteTCPs, err = ts.filterIngressRouteTcpByAnnotations(ingressRouteTCPs) ingressRouteTCPs, err = ts.filterIngressRouteTcpByAnnotations(ingressRouteTCPs)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter IngressRouteTCP") return nil, fmt.Errorf("failed to filter IngressRouteTCP: %w", err)
} }
for _, ingressRouteTCP := range ingressRouteTCPs { for _, ingressRouteTCP := range ingressRouteTCPs {
@ -353,7 +353,7 @@ func (ts *traefikSource) ingressRouteUDPEndpoints() ([]*endpoint.Endpoint, error
ingressRouteUDPs, err = ts.filterIngressRouteUdpByAnnotations(ingressRouteUDPs) ingressRouteUDPs, err = ts.filterIngressRouteUdpByAnnotations(ingressRouteUDPs)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter IngressRouteUDP") return nil, fmt.Errorf("failed to filter IngressRouteUDP: %w", err)
} }
for _, ingressRouteUDP := range ingressRouteUDPs { for _, ingressRouteUDP := range ingressRouteUDPs {
@ -405,7 +405,7 @@ func (ts *traefikSource) oldIngressRouteEndpoints() ([]*endpoint.Endpoint, error
ingressRoutes, err = ts.filterIngressRouteByAnnotation(ingressRoutes) ingressRoutes, err = ts.filterIngressRouteByAnnotation(ingressRoutes)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter IngressRoute") return nil, fmt.Errorf("failed to filter IngressRoute: %w", err)
} }
for _, ingressRoute := range ingressRoutes { for _, ingressRoute := range ingressRoutes {
@ -457,7 +457,7 @@ func (ts *traefikSource) oldIngressRouteTCPEndpoints() ([]*endpoint.Endpoint, er
ingressRouteTCPs, err = ts.filterIngressRouteTcpByAnnotations(ingressRouteTCPs) ingressRouteTCPs, err = ts.filterIngressRouteTcpByAnnotations(ingressRouteTCPs)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter IngressRouteTCP") return nil, fmt.Errorf("failed to filter IngressRouteTCP: %w", err)
} }
for _, ingressRouteTCP := range ingressRouteTCPs { for _, ingressRouteTCP := range ingressRouteTCPs {
@ -509,7 +509,7 @@ func (ts *traefikSource) oldIngressRouteUDPEndpoints() ([]*endpoint.Endpoint, er
ingressRouteUDPs, err = ts.filterIngressRouteUdpByAnnotations(ingressRouteUDPs) ingressRouteUDPs, err = ts.filterIngressRouteUdpByAnnotations(ingressRouteUDPs)
if err != nil { if err != nil {
return nil, errors.Wrap(err, "failed to filter IngressRouteUDP") return nil, fmt.Errorf("failed to filter IngressRouteUDP: %w", err)
} }
for _, ingressRouteUDP := range ingressRouteUDPs { for _, ingressRouteUDP := range ingressRouteUDPs {

View File

@ -19,9 +19,10 @@ package source
import ( import (
"context" "context"
"encoding/json" "encoding/json"
"k8s.io/apimachinery/pkg/runtime/schema"
"testing" "testing"
"k8s.io/apimachinery/pkg/runtime/schema"
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" "k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"