feat: replace github.com/pkg/errors to errors
Signed-off-by: haoyun <yun.hao@daocloud.io> Co-authored-by: zounengren <zouyee1989@gmail.com>
This commit is contained in:
		| @@ -18,6 +18,7 @@ package opts | ||||
|  | ||||
| import ( | ||||
| 	"context" | ||||
| 	"errors" | ||||
| 	"fmt" | ||||
| 	"os" | ||||
| 	"path/filepath" | ||||
| @@ -33,7 +34,6 @@ import ( | ||||
| 	"github.com/containerd/containerd/oci" | ||||
| 	runtimespec "github.com/opencontainers/runtime-spec/specs-go" | ||||
| 	"github.com/opencontainers/selinux/go-selinux/label" | ||||
| 	"github.com/pkg/errors" | ||||
| 	"github.com/sirupsen/logrus" | ||||
| 	"golang.org/x/sys/unix" | ||||
| 	runtime "k8s.io/cri-api/pkg/apis/runtime/v1" | ||||
| @@ -159,17 +159,17 @@ func WithMounts(osi osinterface.OS, config *runtime.ContainerConfig, extra []*ru | ||||
| 			// TODO(random-liu): Add CRI validation test for this case. | ||||
| 			if _, err := osi.Stat(src); err != nil { | ||||
| 				if !os.IsNotExist(err) { | ||||
| 					return errors.Wrapf(err, "failed to stat %q", src) | ||||
| 					return fmt.Errorf("failed to stat %q: %w", src, err) | ||||
| 				} | ||||
| 				if err := osi.MkdirAll(src, 0755); err != nil { | ||||
| 					return errors.Wrapf(err, "failed to mkdir %q", src) | ||||
| 					return fmt.Errorf("failed to mkdir %q: %w", src, err) | ||||
| 				} | ||||
| 			} | ||||
| 			// TODO(random-liu): Add cri-containerd integration test or cri validation test | ||||
| 			// for this. | ||||
| 			src, err := osi.ResolveSymbolicLink(src) | ||||
| 			if err != nil { | ||||
| 				return errors.Wrapf(err, "failed to resolve symlink %q", src) | ||||
| 				return fmt.Errorf("failed to resolve symlink %q: %w", src, err) | ||||
| 			} | ||||
| 			if s.Linux == nil { | ||||
| 				s.Linux = &runtimespec.Linux{} | ||||
| @@ -210,7 +210,7 @@ func WithMounts(osi osinterface.OS, config *runtime.ContainerConfig, extra []*ru | ||||
|  | ||||
| 			if mount.GetSelinuxRelabel() { | ||||
| 				if err := label.Relabel(src, mountLabel, false); err != nil && err != unix.ENOTSUP { | ||||
| 					return errors.Wrapf(err, "relabel %q with %q failed", src, mountLabel) | ||||
| 					return fmt.Errorf("relabel %q with %q failed: %w", src, mountLabel, err) | ||||
| 				} | ||||
| 			} | ||||
| 			s.Mounts = append(s.Mounts, runtimespec.Mount{ | ||||
| @@ -239,7 +239,7 @@ func ensureShared(path string, lookupMount func(string) (mount.Info, error)) err | ||||
| 		} | ||||
| 	} | ||||
|  | ||||
| 	return errors.Errorf("path %q is mounted on %q but it is not a shared mount", path, mountInfo.Mountpoint) | ||||
| 	return fmt.Errorf("path %q is mounted on %q but it is not a shared mount", path, mountInfo.Mountpoint) | ||||
| } | ||||
|  | ||||
| // ensure mount point on which path is mounted, is either shared or slave. | ||||
| @@ -257,7 +257,7 @@ func ensureSharedOrSlave(path string, lookupMount func(string) (mount.Info, erro | ||||
| 			return nil | ||||
| 		} | ||||
| 	} | ||||
| 	return errors.Errorf("path %q is mounted on %q but it is not a shared or slave mount", path, mountInfo.Mountpoint) | ||||
| 	return fmt.Errorf("path %q is mounted on %q but it is not a shared or slave mount", path, mountInfo.Mountpoint) | ||||
| } | ||||
|  | ||||
| // getDeviceUserGroupID() is used to find the right uid/gid | ||||
| @@ -514,7 +514,7 @@ var ( | ||||
| func cgroupv1HasHugetlb() (bool, error) { | ||||
| 	_cgroupv1HasHugetlbOnce.Do(func() { | ||||
| 		if _, err := os.ReadDir("/sys/fs/cgroup/hugetlb"); err != nil { | ||||
| 			_cgroupv1HasHugetlbErr = errors.Wrap(err, "readdir /sys/fs/cgroup/hugetlb") | ||||
| 			_cgroupv1HasHugetlbErr = fmt.Errorf("readdir /sys/fs/cgroup/hugetlb: %w", err) | ||||
| 			_cgroupv1HasHugetlb = false | ||||
| 		} else { | ||||
| 			_cgroupv1HasHugetlbErr = nil | ||||
| @@ -530,7 +530,7 @@ func cgroupv2HasHugetlb() (bool, error) { | ||||
| 	_cgroupv2HasHugetlbOnce.Do(func() { | ||||
| 		controllers, err := os.ReadFile("/sys/fs/cgroup/cgroup.controllers") | ||||
| 		if err != nil { | ||||
| 			_cgroupv2HasHugetlbErr = errors.Wrap(err, "read /sys/fs/cgroup/cgroup.controllers") | ||||
| 			_cgroupv2HasHugetlbErr = fmt.Errorf("read /sys/fs/cgroup/cgroup.controllers: %w", err) | ||||
| 			return | ||||
| 		} | ||||
| 		_cgroupv2HasHugetlb = strings.Contains(string(controllers), "hugetlb") | ||||
| @@ -678,12 +678,12 @@ func nullOpt(_ context.Context, _ oci.Client, _ *containers.Container, _ *runtim | ||||
| func getCurrentOOMScoreAdj() (int, error) { | ||||
| 	b, err := os.ReadFile("/proc/self/oom_score_adj") | ||||
| 	if err != nil { | ||||
| 		return 0, errors.Wrap(err, "could not get the daemon oom_score_adj") | ||||
| 		return 0, fmt.Errorf("could not get the daemon oom_score_adj: %w", err) | ||||
| 	} | ||||
| 	s := strings.TrimSpace(string(b)) | ||||
| 	i, err := strconv.Atoi(s) | ||||
| 	if err != nil { | ||||
| 		return 0, errors.Wrap(err, "could not get the daemon oom_score_adj") | ||||
| 		return 0, fmt.Errorf("could not get the daemon oom_score_adj: %w", err) | ||||
| 	} | ||||
| 	return i, nil | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 haoyun
					haoyun