Skip to content

Commit

Permalink
fix staticcheck linter
Browse files Browse the repository at this point in the history
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
  • Loading branch information
inteon committed Mar 27, 2024
1 parent 63b5d3d commit a82c9ab
Show file tree
Hide file tree
Showing 10 changed files with 20 additions and 23 deletions.
1 change: 0 additions & 1 deletion .golangci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@ issues:
exclude-rules:
- linters:
- gosec
- staticcheck
- prealloc
- errorlint
- containedctx
Expand Down
4 changes: 2 additions & 2 deletions internal/approver/controller/controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ import (
apiequality "k8s.io/apimachinery/pkg/api/equality"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
"k8s.io/klog/v2/klogr"
"k8s.io/klog/v2/ktesting"
fakeclock "k8s.io/utils/clock/testing"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
Expand Down Expand Up @@ -136,7 +136,7 @@ func Test_Reconcile(t *testing.T) {
a := &approver{
client: fakeclient,
lister: fakeclient,
log: klogr.New(),
log: ktesting.NewLogger(t, ktesting.DefaultConfig),
evaluator: test.evaluator,
}

Expand Down
3 changes: 1 addition & 2 deletions internal/approver/controller/test/suite.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,6 @@ import (
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/klog/v2/klogr"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/metrics/server"
Expand Down Expand Up @@ -72,7 +71,7 @@ var _ = Context("Approval", func() {
}
Expect(cl.Create(ctx, &namespace)).NotTo(HaveOccurred())

log := klogr.New().WithName("testing")
log := GinkgoLogr
mgr, err := ctrl.NewManager(env.Config, ctrl.Options{
Scheme: scheme,
LeaderElection: true,
Expand Down
4 changes: 2 additions & 2 deletions internal/approver/evaluator/evaluator_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ import (
utilpki "github.com/cert-manager/cert-manager/pkg/util/pki"
"github.com/stretchr/testify/assert"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/utils/pointer"
"k8s.io/utils/ptr"
)

func Test_Evaluate(t *testing.T) {
Expand Down Expand Up @@ -231,7 +231,7 @@ func Test_Evaluate(t *testing.T) {
csr, err := utilpki.GenerateCSR(&cmapi.Certificate{
Spec: cmapi.CertificateSpec{
PrivateKey: &cmapi.CertificatePrivateKey{Algorithm: cmapi.ECDSAKeyAlgorithm},
EncodeUsagesInRequest: pointer.Bool(true),
EncodeUsagesInRequest: ptr.To(true),
URIs: []string{"spiffe://foo.bar/ns/sandbox/sa/sleep"},
Usages: []cmapi.KeyUsage{
cmapi.UsageDigitalSignature, cmapi.UsageKeyEncipherment,
Expand Down
4 changes: 2 additions & 2 deletions internal/csi/driver/camanager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ import (
"time"

"github.com/stretchr/testify/assert"
"k8s.io/klog/v2/klogr"
"k8s.io/klog/v2/ktesting"

"github.com/cert-manager/csi-driver-spiffe/internal/csi/rootca"
)
Expand All @@ -37,7 +37,7 @@ func Test_manageCAFiles(t *testing.T) {
t.Log("starting manageCAFiles()")
rootCAsChan := make(chan []byte)
c := &camanager{
log: klogr.New(),
log: ktesting.NewLogger(t, ktesting.DefaultConfig),
rootCAs: rootca.NewMemory(ctx, rootCAsChan),
}
go func() {
Expand Down
4 changes: 2 additions & 2 deletions internal/csi/driver/driver_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ func Test_writeKeyPair(t *testing.T) {
capk, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
require.NoError(t, err)

caTmpl, err := utilpki.GenerateTemplate(&cmapi.Certificate{Spec: cmapi.CertificateSpec{CommonName: "my-ca"}})
caTmpl, err := utilpki.CertificateTemplateFromCertificate(&cmapi.Certificate{Spec: cmapi.CertificateSpec{CommonName: "my-ca"}})
require.NoError(t, err)

caPEM, ca, err := utilpki.SignCertificate(caTmpl, caTmpl, capk.Public(), capk)
Expand All @@ -52,7 +52,7 @@ func Test_writeKeyPair(t *testing.T) {
leafpk, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
require.NoError(t, err)

leafTmpl, err := utilpki.GenerateTemplate(
leafTmpl, err := utilpki.CertificateTemplateFromCertificate(
&cmapi.Certificate{
Spec: cmapi.CertificateSpec{URIs: []string{"spiffe://cert-manager.io/ns/sandbox/sa/default"}},
},
Expand Down
6 changes: 3 additions & 3 deletions internal/csi/rootca/file_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,14 +24,14 @@ import (
"time"

"github.com/stretchr/testify/assert"
"k8s.io/klog/v2/klogr"
"k8s.io/klog/v2/ktesting"
)

func Test_NewFile(t *testing.T) {
filepath := filepath.Join(t.TempDir(), "test-file.pem")

t.Log("if no file exists, expect NewFile to error")
_, err := NewFile(context.TODO(), klogr.New(), filepath)
_, err := NewFile(context.TODO(), ktesting.NewLogger(t, ktesting.DefaultConfig), filepath)
assert.Error(t, err, "expect file to not exist")

t.Log("should return the contents of the file with CertificatesPEM()")
Expand All @@ -43,7 +43,7 @@ func Test_NewFile(t *testing.T) {
cancel()
})

f, err := NewFile(ctx, klogr.New(), filepath)
f, err := NewFile(ctx, ktesting.NewLogger(t, ktesting.DefaultConfig), filepath)
assert.NoError(t, err)

assert.Equal(t, []byte("test data"), f.CertificatesPEM())
Expand Down
3 changes: 1 addition & 2 deletions internal/flags/flags.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,6 @@ import (
"k8s.io/client-go/rest"
cliflag "k8s.io/component-base/cli/flag"
"k8s.io/klog/v2"
"k8s.io/klog/v2/klogr"

_ "k8s.io/client-go/plugin/pkg/client/auth"
)
Expand Down Expand Up @@ -69,7 +68,7 @@ func (f *Flags) Prepare(cmd *cobra.Command) *Flags {

func (f *Flags) Complete() error {
klog.InitFlags(nil)
f.Logr = klogr.New()
f.Logr = klog.TODO()
if err := flag.Set("v", f.logLevel); err != nil {
return fmt.Errorf("failed to set log level: %s", err)
}
Expand Down
4 changes: 2 additions & 2 deletions test/e2e/suite/carotation/carotation.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ import (
corev1 "k8s.io/api/core/v1"
rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/utils/pointer"
"k8s.io/utils/ptr"
"sigs.k8s.io/controller-runtime/pkg/client"

"github.com/cert-manager/csi-driver-spiffe/test/e2e/framework"
Expand Down Expand Up @@ -88,7 +88,7 @@ var _ = framework.CasesDescribe("CA rotation", func() {
VolumeSource: corev1.VolumeSource{
CSI: &corev1.CSIVolumeSource{
Driver: "spiffe.csi.cert-manager.io",
ReadOnly: pointer.Bool(true),
ReadOnly: ptr.To(true),
},
},
}},
Expand Down
10 changes: 5 additions & 5 deletions test/e2e/suite/fsgroup/fsgroup.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ import (
corev1 "k8s.io/api/core/v1"
rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/utils/pointer"
"k8s.io/utils/ptr"
"sigs.k8s.io/controller-runtime/pkg/client"

"github.com/cert-manager/csi-driver-spiffe/test/e2e/framework"
Expand Down Expand Up @@ -51,16 +51,16 @@ var _ = framework.CasesDescribe("FSGroup", func() {
VolumeSource: corev1.VolumeSource{
CSI: &corev1.CSIVolumeSource{
Driver: "spiffe.csi.cert-manager.io",
ReadOnly: pointer.Bool(true),
ReadOnly: ptr.To(true),
VolumeAttributes: map[string]string{
"spiffe.csi.cert-manager.io/fs-group": "1541",
},
},
},
}},
SecurityContext: &corev1.PodSecurityContext{
RunAsUser: pointer.Int64(1321),
RunAsGroup: pointer.Int64(1541),
RunAsUser: ptr.To(int64(1321)),
RunAsGroup: ptr.To(int64(1541)),
},
Containers: []corev1.Container{
{
Expand Down Expand Up @@ -165,7 +165,7 @@ var _ = framework.CasesDescribe("FSGroup", func() {
badPod := *podTemplate.DeepCopy()
badPod.Namespace = f.Namespace.Name
badPod.Spec.ServiceAccountName = serviceAccount.Name
badPod.Spec.SecurityContext.RunAsGroup = pointer.Int64(123)
badPod.Spec.SecurityContext.RunAsGroup = ptr.To(int64(123))
Expect(f.Client().Create(f.Context(), &badPod)).NotTo(HaveOccurred())

By("Waiting for pod to become ready")
Expand Down

0 comments on commit a82c9ab

Please sign in to comment.