-
Notifications
You must be signed in to change notification settings - Fork 18.9k
vendor: remove most "replace" rules and update github.com/armon/go-radix #44498
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -15,7 +15,7 @@ require ( | |||||
| github.com/Microsoft/go-winio v0.5.2 | ||||||
| github.com/Microsoft/hcsshim v0.9.5 | ||||||
| github.com/RackSec/srslog v0.0.0-20180709174129-a4725f04ec91 | ||||||
| github.com/armon/go-radix v0.0.0-20180808171621-7fddfc383310 | ||||||
| github.com/armon/go-radix v1.0.1-0.20221118154546-54df44f2176c | ||||||
| github.com/aws/aws-sdk-go v1.31.6 | ||||||
| github.com/bsphere/le_go v0.0.0-20200109081728-fc06dab2caa8 | ||||||
| github.com/cloudflare/cfssl v0.0.0-20180323000720-5d63dbd981b5 | ||||||
|
|
@@ -116,7 +116,7 @@ require ( | |||||
| github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da // indirect | ||||||
| github.com/golang/protobuf v1.5.2 // indirect | ||||||
| github.com/google/btree v1.1.2 // indirect | ||||||
| github.com/google/certificate-transparency-go v1.1.2 // indirect | ||||||
| github.com/google/certificate-transparency-go v1.1.2 // indirect; replaced; see "replace" section at the bottom of this file for the actual version. | ||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
I don't think we need the full explanation, the semantics of go.mod and
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I tried to be explicit, as it's definitely not obvious to many (I know many missed it in the BuildKit repository, and ended up with "unpredictable" outcomes.
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Fair enough; if you think it's helpful I don't think it's objectionable 😆
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||||||
| github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect | ||||||
| github.com/googleapis/gax-go/v2 v2.0.5 // indirect | ||||||
| github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 // indirect | ||||||
|
|
@@ -165,15 +165,8 @@ require ( | |||||
| google.golang.org/protobuf v1.28.0 // indirect | ||||||
| ) | ||||||
|
|
||||||
| replace ( | ||||||
| // More recent versions result in a panic in libnetwork. | ||||||
| // FIXME(thaJeztah): we need to fix how we use this library or replace it; see https://github.com/moby/moby/issues/43753 | ||||||
| github.com/armon/go-radix => github.com/armon/go-radix v0.0.0-20150105235045-e39d623f12e8 | ||||||
| // Resolve dependency hell with github.com/cloudflare/cfssl (transitive via | ||||||
| // swarmkit) by pinning the certificate-transparency-go version. Remove once | ||||||
| // module go.etcd.io/etcd/server/v3 has upgraded its dependency on | ||||||
| // go.opentelemetry.io/otel to v1. | ||||||
| github.com/google/certificate-transparency-go => github.com/google/certificate-transparency-go v1.0.20 | ||||||
| // Removes etcd dependency | ||||||
| github.com/rexray/gocsi => github.com/dperny/gocsi v1.2.3-pre | ||||||
| ) | ||||||
| // Resolve dependency hell with github.com/cloudflare/cfssl (transitive via | ||||||
| // swarmkit) by pinning the certificate-transparency-go version. Remove once | ||||||
| // module go.etcd.io/etcd/server/v3 has upgraded its dependency on | ||||||
| // go.opentelemetry.io/otel to v1. | ||||||
| replace github.com/google/certificate-transparency-go => github.com/google/certificate-transparency-go v1.0.20 | ||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. You don't need this anymore, etcd upgraded to otel v1.
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yes, working on that one (currently struggling with SwarmKit CI), so I'll do that in a follow-up 😄 |
||||||
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In case you change your mind and prefer a better maintained repo: https://github.com/moby/moby/compare/master...tiborvass:immutable_radix?expand=1
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That was my initial attempt in moby/libnetwork#2581, but (don't recall exactly) I think it didn't work. But must admit that I didn't dive deeply into why (or forgot that I did) 😂
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What was the problem? From looking at your branch, what possibly didn't work is that you take the lock twice. createOrUpdateEntry should not have a lock because the caller has to lock.
I'm opening #44501 we can discuss it there.