Skip to content

Commit

Permalink
Update to go 1.10.1 everywhere.
Browse files Browse the repository at this point in the history
  • Loading branch information
dlorenc committed Apr 30, 2018
1 parent 3663f74 commit 2eeef75
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 5 deletions.
2 changes: 1 addition & 1 deletion .travis.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ os: linux
sudo: required

go:
- 1.9.x
- 1.10.x
go_import_path: k8s.io/minikube

install:
Expand Down
4 changes: 2 additions & 2 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,8 @@ INSTALL_SIZE ?= $(shell du out/minikube-windows-amd64.exe | cut -f1)
BUILDROOT_BRANCH ?= 2017.11
REGISTRY?=gcr.io/k8s-minikube

HYPERKIT_BUILD_IMAGE ?= karalabe/xgo-1.8.3
BUILD_IMAGE ?= k8s.gcr.io/kube-cross:v1.9.1-1
HYPERKIT_BUILD_IMAGE ?= karalabe/xgo-1.10.x
BUILD_IMAGE ?= k8s.gcr.io/kube-cross:v1.10.1-1
ISO_BUILD_IMAGE ?= $(REGISTRY)/buildroot-image

ISO_VERSION ?= v0.26.0
Expand Down
3 changes: 1 addition & 2 deletions cmd/minikube/cmd/start.go
Original file line number Diff line number Diff line change
Expand Up @@ -321,8 +321,7 @@ func runStart(cmd *cobra.Command, args []string) {
if viper.GetBool(cfg.WantNoneDriverWarning) {
fmt.Println(`===================
WARNING: IT IS RECOMMENDED NOT TO RUN THE NONE DRIVER ON PERSONAL WORKSTATIONS
The 'none' driver will run an insecure kubernetes apiserver as root that may leave the host vulnerable to CSRF attacks
`)
The 'none' driver will run an insecure kubernetes apiserver as root that may leave the host vulnerable to CSRF attacks`)
}

if os.Getenv("CHANGE_MINIKUBE_NONE_USER") == "" {
Expand Down

0 comments on commit 2eeef75

Please sign in to comment.