Bumping k8s dependencies to 1.13
This commit is contained in:
60
vendor/golang.org/x/tools/go/analysis/multichecker/multichecker.go
generated
vendored
Normal file
60
vendor/golang.org/x/tools/go/analysis/multichecker/multichecker.go
generated
vendored
Normal file
@@ -0,0 +1,60 @@
|
||||
// Copyright 2018 The Go Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
// Package multichecker defines the main function for an analysis driver
|
||||
// with several analyzers. This package makes it easy for anyone to build
|
||||
// an analysis tool containing just the analyzers they need.
|
||||
package multichecker
|
||||
|
||||
import (
|
||||
"flag"
|
||||
"fmt"
|
||||
"log"
|
||||
"os"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
|
||||
"golang.org/x/tools/go/analysis"
|
||||
"golang.org/x/tools/go/analysis/internal/analysisflags"
|
||||
"golang.org/x/tools/go/analysis/internal/checker"
|
||||
"golang.org/x/tools/go/analysis/unitchecker"
|
||||
)
|
||||
|
||||
func Main(analyzers ...*analysis.Analyzer) {
|
||||
progname := filepath.Base(os.Args[0])
|
||||
log.SetFlags(0)
|
||||
log.SetPrefix(progname + ": ") // e.g. "vet: "
|
||||
|
||||
if err := analysis.Validate(analyzers); err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
|
||||
checker.RegisterFlags()
|
||||
|
||||
analyzers = analysisflags.Parse(analyzers, true)
|
||||
|
||||
args := flag.Args()
|
||||
if len(args) == 0 {
|
||||
fmt.Fprintf(os.Stderr, `%[1]s is a tool for static analysis of Go programs.
|
||||
|
||||
Usage: %[1]s [-flag] [package]
|
||||
|
||||
Run '%[1]s help' for more detail,
|
||||
or '%[1]s help name' for details and flags of a specific analyzer.
|
||||
`, progname)
|
||||
os.Exit(1)
|
||||
}
|
||||
|
||||
if args[0] == "help" {
|
||||
analysisflags.Help(progname, analyzers, args[1:])
|
||||
os.Exit(0)
|
||||
}
|
||||
|
||||
if len(args) == 1 && strings.HasSuffix(args[0], ".cfg") {
|
||||
unitchecker.Run(args[0], analyzers)
|
||||
panic("unreachable")
|
||||
}
|
||||
|
||||
os.Exit(checker.Run(args, analyzers))
|
||||
}
|
82
vendor/golang.org/x/tools/go/analysis/multichecker/multichecker_test.go
generated
vendored
Normal file
82
vendor/golang.org/x/tools/go/analysis/multichecker/multichecker_test.go
generated
vendored
Normal file
@@ -0,0 +1,82 @@
|
||||
// +build go1.12
|
||||
|
||||
package multichecker_test
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"os"
|
||||
"os/exec"
|
||||
"runtime"
|
||||
"testing"
|
||||
|
||||
"golang.org/x/tools/go/analysis"
|
||||
"golang.org/x/tools/go/analysis/multichecker"
|
||||
"golang.org/x/tools/go/analysis/passes/findcall"
|
||||
)
|
||||
|
||||
func main() {
|
||||
fail := &analysis.Analyzer{
|
||||
Name: "fail",
|
||||
Doc: "always fail on a package 'sort'",
|
||||
Run: func(pass *analysis.Pass) (interface{}, error) {
|
||||
if pass.Pkg.Path() == "sort" {
|
||||
return nil, fmt.Errorf("failed")
|
||||
}
|
||||
return nil, nil
|
||||
},
|
||||
}
|
||||
multichecker.Main(findcall.Analyzer, fail)
|
||||
}
|
||||
|
||||
// TestExitCode ensures that analysis failures are reported correctly.
|
||||
// This test fork/execs the main function above.
|
||||
func TestExitCode(t *testing.T) {
|
||||
if runtime.GOOS != "linux" {
|
||||
t.Skipf("skipping fork/exec test on this platform")
|
||||
}
|
||||
|
||||
if os.Getenv("MULTICHECKER_CHILD") == "1" {
|
||||
// child process
|
||||
|
||||
// replace [progname -test.run=TestExitCode -- ...]
|
||||
// by [progname ...]
|
||||
os.Args = os.Args[2:]
|
||||
os.Args[0] = "vet"
|
||||
main()
|
||||
panic("unreachable")
|
||||
}
|
||||
|
||||
for _, test := range []struct {
|
||||
args []string
|
||||
want int
|
||||
}{
|
||||
{[]string{"nosuchdir/..."}, 1}, // matched no packages
|
||||
{[]string{"nosuchpkg"}, 1}, // matched no packages
|
||||
{[]string{"-unknownflag"}, 2}, // flag error
|
||||
{[]string{"-findcall.name=panic", "io"}, 3}, // finds diagnostics
|
||||
{[]string{"-findcall=0", "io"}, 0}, // no checkers
|
||||
{[]string{"-findcall.name=nosuchfunc", "io"}, 0}, // no diagnostics
|
||||
{[]string{"-findcall.name=panic", "sort", "io"}, 1}, // 'fail' failed on 'sort'
|
||||
|
||||
// -json: exits zero even in face of diagnostics or package errors.
|
||||
{[]string{"-findcall.name=panic", "-json", "io"}, 0},
|
||||
{[]string{"-findcall.name=panic", "-json", "io"}, 0},
|
||||
{[]string{"-findcall.name=panic", "-json", "sort", "io"}, 0},
|
||||
} {
|
||||
args := []string{"-test.run=TestExitCode", "--"}
|
||||
args = append(args, test.args...)
|
||||
cmd := exec.Command(os.Args[0], args...)
|
||||
cmd.Env = append(os.Environ(), "MULTICHECKER_CHILD=1")
|
||||
out, err := cmd.CombinedOutput()
|
||||
if len(out) > 0 {
|
||||
t.Logf("%s: out=<<%s>>", test.args, out)
|
||||
}
|
||||
var exitcode int
|
||||
if err, ok := err.(*exec.ExitError); ok {
|
||||
exitcode = err.ExitCode() // requires go1.12
|
||||
}
|
||||
if exitcode != test.want {
|
||||
t.Errorf("%s: exited %d, want %d", test.args, exitcode, test.want)
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user