Skip to content

Commit 8fe5a89

Browse files
authored
Upgrade golangci-lint and fix all warnings/errors (#346)
1 parent a8d4060 commit 8fe5a89

File tree

7 files changed

+15
-18
lines changed

7 files changed

+15
-18
lines changed

.golangci.json

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,6 @@
1111
]
1212
},
1313
"run": {
14-
"skip-dirs": [
15-
"pkg/generated"
16-
],
17-
"skip-files": [
18-
"/zz_generated_"
19-
],
2014
"deadline": "5m"
2115
},
2216
"issues": {
@@ -25,6 +19,9 @@
2519
"linters": "revive",
2620
"text": "should have comment or be unexported"
2721
}
22+
],
23+
"exclude-dirs": [
24+
"pkg/generated"
2825
]
2926
}
3027
}

Dockerfile.dapper

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ RUN zypper -n install git docker vim less file curl wget awk
1111
RUN curl -sL https://get.helm.sh/helm-${HELM_VERSION}-linux-${ARCH}.tar.gz | tar xvzf - -C /usr/local/bin --strip-components=1
1212

1313
RUN if [ "${ARCH}" = "amd64" ]; then \
14-
curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s v1.55.2; \
14+
curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s v1.57.1; \
1515
helm plugin install https://github.com/helm-unittest/helm-unittest.git --version ${HELM_UNITTEST_VERSION}>/out.txt 2>&1; \
1616
fi
1717

pkg/resolvers/aggregateResolver_test.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ func (a *AggregateResolverSuite) TestAggregateRuleResolverGetRules() {
5757
expectedRules := []rbacv1.PolicyRule{a.ruleAdmin}
5858
resolver := NewMockAuthorizationRuleResolver(gomock.NewController(t))
5959
resolver.EXPECT().VisitRulesFor(testUser, testNameSpace, gomock.Any()).
60-
DoAndReturn(func(userInfo user.Info, namespace string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
60+
DoAndReturn(func(_ user.Info, _ string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
6161
for _, rule := range expectedRules {
6262
visitor(nil, &rule, nil)
6363
}
@@ -76,13 +76,13 @@ func (a *AggregateResolverSuite) TestAggregateRuleResolverGetRules() {
7676
expectedRules := []rbacv1.PolicyRule{}
7777
resolver := NewMockAuthorizationRuleResolver(gomock.NewController(t))
7878
resolver.EXPECT().VisitRulesFor(gomock.Any(), testNameSpace, gomock.Any()).
79-
DoAndReturn(func(userInfo user.Info, namespace string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
79+
DoAndReturn(func(_ user.Info, _ string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
8080
visitor(nil, nil, errNotFound)
8181
return true
8282
})
8383
resolver2 := NewMockAuthorizationRuleResolver(gomock.NewController(t))
8484
resolver2.EXPECT().VisitRulesFor(gomock.Any(), testNameSpace, gomock.Any()).
85-
DoAndReturn(func(userInfo user.Info, namespace string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
85+
DoAndReturn(func(_ user.Info, _ string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
8686
visitor(nil, nil, errNotFound)
8787
return true
8888
})
@@ -97,13 +97,13 @@ func (a *AggregateResolverSuite) TestAggregateRuleResolverGetRules() {
9797
expectedRules := []rbacv1.PolicyRule{a.ruleReadPods}
9898
resolver := NewMockAuthorizationRuleResolver(gomock.NewController(t))
9999
resolver.EXPECT().VisitRulesFor(testUser, testNameSpace, gomock.Any()).
100-
DoAndReturn(func(userInfo user.Info, namespace string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
100+
DoAndReturn(func(_ user.Info, _ string, _ func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
101101
return true
102102
})
103103
resolver.EXPECT().GetRoleReferenceRules(gomock.Any(), gomock.Any()).Return(expectedRules, nil)
104104
resolver2 := NewMockAuthorizationRuleResolver(gomock.NewController(t))
105105
resolver2.EXPECT().VisitRulesFor(testUser, testNameSpace, gomock.Any()).
106-
DoAndReturn(func(userInfo user.Info, namespace string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
106+
DoAndReturn(func(_ user.Info, _ string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
107107
for _, rule := range expectedRules {
108108
visitor(nil, &rule, nil)
109109
}
@@ -122,7 +122,7 @@ func (a *AggregateResolverSuite) TestAggregateRuleResolverGetRules() {
122122
expectedRules2 := []rbacv1.PolicyRule{a.ruleReadPods}
123123
resolver := NewMockAuthorizationRuleResolver(gomock.NewController(t))
124124
resolver.EXPECT().VisitRulesFor(testUser, testNameSpace, gomock.Any()).
125-
DoAndReturn(func(userInfo user.Info, namespace string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
125+
DoAndReturn(func(_ user.Info, _ string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
126126
for _, rule := range expectedRules1 {
127127
visitor(nil, &rule, nil)
128128
}
@@ -131,7 +131,7 @@ func (a *AggregateResolverSuite) TestAggregateRuleResolverGetRules() {
131131
resolver.EXPECT().GetRoleReferenceRules(gomock.Any(), gomock.Any()).Return(expectedRules1, nil)
132132
resolver2 := NewMockAuthorizationRuleResolver(gomock.NewController(t))
133133
resolver2.EXPECT().VisitRulesFor(testUser, testNameSpace, gomock.Any()).
134-
DoAndReturn(func(userInfo user.Info, namespace string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
134+
DoAndReturn(func(_ user.Info, _ string, visitor func(source fmt.Stringer, rule *rbacv1.PolicyRule, err error) bool) bool {
135135
for _, rule := range expectedRules2 {
136136
visitor(nil, &rule, nil)
137137
}

pkg/resolvers/crtbResolver_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ func NewCRTBCache(ctrl *gomock.Controller, bindings []*apisv3.ClusterRoleTemplat
294294
return nil, errNotFound
295295
}).AnyTimes()
296296
clusterCache.EXPECT().AddIndexer(crtbSubjectIndex, gomock.Any()).AnyTimes()
297-
clusterCache.EXPECT().GetByIndex(crtbSubjectIndex, gomock.Any()).DoAndReturn(func(index string, subject string) ([]*apisv3.ClusterRoleTemplateBinding, error) {
297+
clusterCache.EXPECT().GetByIndex(crtbSubjectIndex, gomock.Any()).DoAndReturn(func(_ string, subject string) ([]*apisv3.ClusterRoleTemplateBinding, error) {
298298
retList := []*apisv3.ClusterRoleTemplateBinding{}
299299
// for each binding create a lists of subject keys from the binding
300300
// if the provided subject matches any of those keys at the binding to the returned list

pkg/resolvers/prtbResolver_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -290,7 +290,7 @@ func NewPRTBCache(ctrl *gomock.Controller, bindings []*apisv3.ProjectRoleTemplat
290290

291291
projectCache.EXPECT().AddIndexer(prtbSubjectIndex, gomock.Any()).AnyTimes()
292292

293-
projectCache.EXPECT().GetByIndex(prtbSubjectIndex, gomock.Any()).DoAndReturn(func(index string, subject string) ([]*apisv3.ProjectRoleTemplateBinding, error) {
293+
projectCache.EXPECT().GetByIndex(prtbSubjectIndex, gomock.Any()).DoAndReturn(func(_ string, subject string) ([]*apisv3.ProjectRoleTemplateBinding, error) {
294294
retList := []*apisv3.ProjectRoleTemplateBinding{}
295295

296296
// for each binding create a lists of subject keys from the binding

pkg/resources/common/common_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ func TestIsRulesAllowed(t *testing.T) {
236236
sar: func() *k8fake.FakeSubjectAccessReviews {
237237
k8Fake := &k8testing.Fake{}
238238
fakeSAR := &k8fake.FakeSubjectAccessReviews{Fake: &k8fake.FakeAuthorizationV1{Fake: k8Fake}}
239-
fakeSAR.Fake.AddReactor("create", "subjectaccessreviews", func(action k8testing.Action) (handled bool, ret runtime.Object, err error) {
239+
fakeSAR.Fake.AddReactor("create", "subjectaccessreviews", func(_ k8testing.Action) (handled bool, ret runtime.Object, err error) {
240240
return true, nil, fmt.Errorf("error")
241241
})
242242
return fakeSAR

tests/integration/rkeMachineConfig_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ func (m *IntegrationSuite) TestRKEMachineConfig() {
1717
validCreateObj.SetName("test-rke.machine")
1818
validCreateObj.SetNamespace(testNamespace)
1919
validCreateObj.SetGroupVersionKind(objGVK)
20-
invalidUpdate := func(created *unstructured.Unstructured) *unstructured.Unstructured {
20+
invalidUpdate := func(_ *unstructured.Unstructured) *unstructured.Unstructured {
2121
invalidUpdateObj := validCreateObj.DeepCopy()
2222
invalidUpdateObj.SetAnnotations(map[string]string{auth.CreatorIDAnn: "foobar"})
2323
return invalidUpdateObj

0 commit comments

Comments
 (0)