-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vendoring update for go-discover. #4412
Conversation
@MagnumOpus21 I assume the vendor update is legit although it's a ton of new code - I guess becuase new transitive deps on large vmware SDK or something. Can you add the command you used to update this to the PR please? It's always worth sanity checking as a few PRs recently have pulled in way too much stuff with a slight vendor command slip up. Also, are the new vendors added actually usable in Consul after this PR? If so, can we update the docs too please? |
The first two commands were to add in the vSphere and the packet providers. The one after the newline was for updating the go-discover package. I was looking at kardianos/govendor looking at how to use them. |
This was the git status after the addition of the providers. |
@banks Regarding the documentation, doesn't go-discover's README.md contain instructions on how to use the providers? If I'm not in the right path, what documentation where you alluding to sir. |
@MagnumOpus21 I think he meant adding something with the other cloud auto join docs: https://www.consul.io/docs/agent/cloud-auto-join.html |
I can add the docs for them. ^_^ |
Updated the |
This needs the latest |
It looks like some Terraform tfstate files snuck in here:
And I don't see those in the go-discover repo so guessing they're on your local filesystem. |
Remember the go-discover tests from earlier. They snuck in here. Let me remove them. LUL. |
Deleted terraform state file artifacts from unknown runs.
@@ -240,8 +262,8 @@ | |||
{"path":"golang.org/x/net/proxy","checksumSHA1":"QEm/dePZ0lOnyOs+m22KjXfJ/IU=","revision":"02ac38e2528ff4adea90f184d71a3faa04b4b1b0","revisionTime":"2017-07-18T17:12:47Z"}, | |||
{"path":"golang.org/x/net/trace","checksumSHA1":"u/r66lwYfgg682u5hZG7/E7+VCY=","revision":"d866cfc389cec985d6fda2859936a575a55a3ab6","revisionTime":"2017-12-11T20:45:21Z"}, | |||
{"path":"golang.org/x/sys/cpu","checksumSHA1":"REkmyB368pIiip76LiqMLspgCRk=","revision":"ad87a3a340fa7f3bed189293fbfa7a9b7e021ae1","revisionTime":"2018-06-18T16:37:21Z"}, | |||
{"path":"golang.org/x/sys/unix","checksumSHA1":"vlicYp+fe4ECQ+5QqpAk36VRA3s=","revision":"cd2c276457edda6df7fb04895d3fd6a6add42926","revisionTime":"2017-07-17T10:05:24Z"}, | |||
{"path":"golang.org/x/sys/windows","checksumSHA1":"Pki0iA65Dtsjh4gtabPkp/lOa2I=","revision":"cd2c276457edda6df7fb04895d3fd6a6add42926","revisionTime":"2017-07-17T10:05:24Z"}, | |||
{"path":"golang.org/x/sys/unix","checksumSHA1":"su2QDjUzrUO0JnOH9m0cNg0QqsM=","revision":"ac767d655b305d4e9612f5f6e33120b9176c4ad4","revisionTime":"2018-07-08T03:57:06Z"}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there any concern upgrading this dependency? If I understand correctly it has strict backwards compatibility promises but wanted to raise it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me. My only concern was with the change for the golang.org/x/sys
packages the vsphere provider introduces. After talking to some folks, the promise should be that with the current version of Go compatibility should be retained. More here.
Changes made in this PR include:
Fixes #4408 .