Skip to content

Commit a432151

Browse files
authored
Enable more linters (#2545)
1 parent f74d70a commit a432151

File tree

20 files changed

+82
-66
lines changed

20 files changed

+82
-66
lines changed

.golangci.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,19 @@ linters:
5353
enable:
5454
- asasalint
5555
- asciicheck
56+
- bidichk
5657
- copyloopvar
5758
- dupword
59+
- durationcheck
5860
- errcheck
61+
- errchkjson
5962
- errname
6063
- errorlint
6164
- fatcontext
6265
- ginkgolinter
6366
- gocheckcompilerdirectives
67+
- gochecksumtype
68+
- gocritic
6469
- gocyclo
6570
- godot
6671
- gofmt
@@ -76,6 +81,7 @@ linters:
7681
- loggercheck
7782
- makezero
7883
- misspell
84+
- musttag
7985
- nilerr
8086
- noctx
8187
- nolintlint
@@ -86,6 +92,7 @@ linters:
8692
- spancheck
8793
- staticcheck
8894
- stylecheck
95+
- tagalign
8996
- tenv
9097
- thelper
9198
- tparallel

internal/mode/provisioner/manager.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ func StartManager(cfg Config) error {
133133
statusUpdater,
134134
mgr.GetClient(),
135135
embeddedfiles.StaticModeDeploymentYAML,
136-
func() metav1.Time { return metav1.Now() },
136+
metav1.Now,
137137
)
138138

139139
eventLoop := events.NewEventLoop(

internal/mode/static/handler.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -471,8 +471,7 @@ func getGatewayAddresses(
471471
}
472472

473473
var addresses, hostnames []string
474-
switch gwSvc.Spec.Type {
475-
case v1.ServiceTypeLoadBalancer:
474+
if gwSvc.Spec.Type == v1.ServiceTypeLoadBalancer {
476475
for _, ingress := range gwSvc.Status.LoadBalancer.Ingress {
477476
if ingress.IP != "" {
478477
addresses = append(addresses, ingress.IP)

internal/mode/static/manager.go

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,8 @@ func StartManager(cfg config.Config) error {
107107
Namespace: cfg.GatewayPodConfig.Namespace,
108108
Name: cfg.ConfigName,
109109
}
110-
if err := registerControllers(ctx, cfg, mgr, recorder, logLevelSetter, eventCh, controlConfigNSName); err != nil {
110+
err = registerControllers(ctx, cfg, mgr, recorder, logLevelSetter, eventCh, controlConfigNSName)
111+
if err != nil {
111112
return err
112113
}
113114

@@ -149,9 +150,11 @@ func StartManager(cfg config.Config) error {
149150
processHandler := ngxruntime.NewProcessHandlerImpl(os.ReadFile, os.Stat)
150151

151152
// Ensure NGINX is running before registering metrics & starting the manager.
152-
if _, err := processHandler.FindMainProcess(ctx, ngxruntime.PidFileTimeout); err != nil {
153+
p, err := processHandler.FindMainProcess(ctx, ngxruntime.PidFileTimeout)
154+
if err != nil {
153155
return fmt.Errorf("NGINX is not running: %w", err)
154156
}
157+
cfg.Logger.V(1).Info("NGINX is running with PID", "pid", p)
155158

156159
var (
157160
ngxruntimeCollector ngxruntime.MetricsCollector = collectors.NewManagerNoopCollector()
@@ -162,11 +165,6 @@ func StartManager(cfg config.Config) error {
162165
var usageSecret *usage.Secret
163166

164167
if cfg.Plus {
165-
ngxPlusClient, err = ngxruntime.CreatePlusClient()
166-
if err != nil {
167-
return fmt.Errorf("error creating NGINX plus client: %w", err)
168-
}
169-
170168
if cfg.UsageReportConfig != nil {
171169
usageSecret = usage.NewUsageSecret()
172170
reporter, err := createUsageReporterJob(mgr.GetAPIReader(), cfg, usageSecret, nginxChecker.getReadyCh())
@@ -188,6 +186,10 @@ func StartManager(cfg config.Config) error {
188186
constLabels := map[string]string{"class": cfg.GatewayClassName}
189187
var ngxCollector prometheus.Collector
190188
if cfg.Plus {
189+
ngxPlusClient, err = ngxruntime.CreatePlusClient()
190+
if err != nil {
191+
return fmt.Errorf("error creating NGINX plus client: %w", err)
192+
}
191193
ngxCollector, err = collectors.NewNginxPlusMetricsCollector(ngxPlusClient, constLabels, promLogger)
192194
} else {
193195
ngxCollector = collectors.NewNginxMetricsCollector(constLabels, promLogger)

internal/mode/static/nginx/config/validation/common_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ func TestValidateEscapedStringNoVarExpansion(t *testing.T) {
4848

4949
func TestValidateValidHeaderName(t *testing.T) {
5050
t.Parallel()
51-
validator := func(value string) error { return validateHeaderName(value) }
51+
validator := validateHeaderName
5252

5353
testValidValuesForSimpleValidator(
5454
t,

internal/mode/static/nginx/file/folders.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@ func ClearFolders(fileMgr ClearFoldersOSFileManager, paths []string) (removedFil
2828
}
2929

3030
for _, entry := range entries {
31-
path := filepath.Join(path, entry.Name())
32-
if err := fileMgr.Remove(path); err != nil {
33-
return removedFiles, fmt.Errorf("failed to remove %q: %w", path, err)
31+
entryPath := filepath.Join(path, entry.Name())
32+
if err := fileMgr.Remove(entryPath); err != nil {
33+
return removedFiles, fmt.Errorf("failed to remove %q: %w", entryPath, err)
3434
}
3535

36-
removedFiles = append(removedFiles, path)
36+
removedFiles = append(removedFiles, entryPath)
3737
}
3838
}
3939

internal/mode/static/nginx/runtime/manager.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,9 +121,9 @@ func (m *ManagerImpl) Reload(ctx context.Context, configVersion int) error {
121121

122122
// send HUP signal to the NGINX main process reload configuration
123123
// See https://nginx.org/en/docs/control.html
124-
if err := m.processHandler.Kill(pid); err != nil {
124+
if errP := m.processHandler.Kill(pid); errP != nil {
125125
m.metricsCollector.IncReloadErrors()
126-
return fmt.Errorf("failed to send the HUP signal to NGINX main: %w", err)
126+
return fmt.Errorf("failed to send the HUP signal to NGINX main: %w", errP)
127127
}
128128

129129
if err = m.verifyClient.WaitForCorrectVersion(

internal/mode/static/state/dataplane/configuration.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -279,12 +279,12 @@ func buildBackendGroups(servers []VirtualServer) []BackendGroup {
279279
for _, mr := range pr.MatchRules {
280280
group := mr.BackendGroup
281281

282-
key := key{
282+
k := key{
283283
nsname: group.Source,
284284
ruleIdx: group.RuleIdx,
285285
}
286286

287-
uniqueGroups[key] = group
287+
uniqueGroups[k] = group
288288
}
289289
}
290290
}

internal/mode/static/state/graph/backend_refs.go

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -238,12 +238,10 @@ func validateBackendTLSPolicyMatchingAllBackends(backendRefs []BackendRef) *cond
238238
if referencePolicy == nil {
239239
// First reference, store the policy as reference
240240
referencePolicy = backendRef.BackendTLSPolicy
241-
} else {
241+
} else if checkPoliciesEqual(backendRef.BackendTLSPolicy.Source, referencePolicy.Source) {
242242
// Check if the policies match
243-
if checkPoliciesEqual(backendRef.BackendTLSPolicy.Source, referencePolicy.Source) {
244-
mismatch = true
245-
break
246-
}
243+
mismatch = true
244+
break
247245
}
248246
}
249247
if mismatch {

internal/mode/static/state/graph/backend_tls_policy.go

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -86,23 +86,27 @@ func validateBackendTLSPolicy(
8686

8787
caCertRefs := backendTLSPolicy.Spec.Validation.CACertificateRefs
8888
wellKnownCerts := backendTLSPolicy.Spec.Validation.WellKnownCACertificates
89-
if len(caCertRefs) > 0 && wellKnownCerts != nil {
89+
switch {
90+
case len(caCertRefs) > 0 && wellKnownCerts != nil:
9091
valid = false
9192
msg := "CACertificateRefs and WellKnownCACertificates are mutually exclusive"
9293
conds = append(conds, staticConds.NewPolicyInvalid(msg))
93-
} else if len(caCertRefs) > 0 {
94+
95+
case len(caCertRefs) > 0:
9496
if err := validateBackendTLSCACertRef(backendTLSPolicy, configMapResolver); err != nil {
9597
valid = false
9698
conds = append(conds, staticConds.NewPolicyInvalid(
9799
fmt.Sprintf("invalid CACertificateRef: %s", err.Error())))
98100
}
99-
} else if wellKnownCerts != nil {
101+
102+
case wellKnownCerts != nil:
100103
if err := validateBackendTLSWellKnownCACerts(backendTLSPolicy); err != nil {
101104
valid = false
102105
conds = append(conds, staticConds.NewPolicyInvalid(
103106
fmt.Sprintf("invalid WellKnownCACertificates: %s", err.Error())))
104107
}
105-
} else {
108+
109+
default:
106110
valid = false
107111
conds = append(conds, staticConds.NewPolicyInvalid("CACertRefs and WellKnownCACerts are both nil"))
108112
}

0 commit comments

Comments
 (0)