mirror of
				https://github.com/go-acme/lego.git
				synced 2025-10-31 16:37:41 +02:00 
			
		
		
		
	chore: update linter. (#997)
This commit is contained in:
		
				
					committed by
					
						 GitHub
						GitHub
					
				
			
			
				
	
			
			
			
						parent
						
							8afde164a1
						
					
				
				
					commit
					635b9ac93d
				
			| @@ -29,7 +29,10 @@ | ||||
|     "dupl", | ||||
|     "prealloc", | ||||
|     "scopelint", | ||||
|     "bodyclose", # https://github.com/timakin/bodyclose/pull/14 | ||||
|     "bodyclose", | ||||
|     "wsl", | ||||
|     "stylecheck", | ||||
|     "godox", | ||||
|   ] | ||||
|  | ||||
| [issues] | ||||
| @@ -112,3 +115,6 @@ | ||||
|   [[issues.exclude-rules]] | ||||
|     path = "providers/dns/gandi/gandi.go" | ||||
|     text = "Function 'Present' is too long" | ||||
|   [[issues.exclude-rules]] | ||||
|     path = "cmd/zz_gen_cmd_dnshelp.go" | ||||
|     linters = ["gocyclo", "funlen"] | ||||
|   | ||||
| @@ -88,3 +88,5 @@ deploy: | ||||
|     local_dir: docs/public | ||||
|     skip_cleanup: true | ||||
|     github_token: ${GITHUB_TOKEN} | ||||
|     on: | ||||
|       condition: $STABLE = true | ||||
|   | ||||
| @@ -120,7 +120,6 @@ func (d *Doer) formatUserAgent() string { | ||||
|  | ||||
| func checkError(req *http.Request, resp *http.Response) error { | ||||
| 	if resp.StatusCode >= http.StatusBadRequest { | ||||
|  | ||||
| 		body, err := ioutil.ReadAll(resp.Body) | ||||
| 		if err != nil { | ||||
| 			return fmt.Errorf("%d :: %s :: %s :: %v", resp.StatusCode, req.Method, req.URL, err) | ||||
|   | ||||
| @@ -44,7 +44,6 @@ func TestDo_UserAgentOnAllHTTPMethod(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.method, func(t *testing.T) { | ||||
|  | ||||
| 			_, err := test.call(ts.URL) | ||||
| 			require.NoError(t, err) | ||||
|  | ||||
|   | ||||
| @@ -93,7 +93,6 @@ func TestChallenge_PreSolve(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			chlg := NewChallenge(core, test.validate, test.provider, WrapPreCheck(test.preCheck)) | ||||
|  | ||||
| 			authz := acme.Authorization{ | ||||
| @@ -178,7 +177,6 @@ func TestChallenge_Solve(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			var options []ChallengeOption | ||||
| 			if test.preCheck != nil { | ||||
| 				options = append(options, WrapPreCheck(test.preCheck)) | ||||
| @@ -266,7 +264,6 @@ func TestChallenge_CleanUp(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			chlg := NewChallenge(core, test.validate, test.provider, WrapPreCheck(test.preCheck)) | ||||
|  | ||||
| 			authz := acme.Authorization{ | ||||
|   | ||||
| @@ -188,7 +188,6 @@ func TestResolveConfServers(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.fixture, func(t *testing.T) { | ||||
|  | ||||
| 			result := getNameservers(test.fixture, test.defaults) | ||||
|  | ||||
| 			sort.Strings(result) | ||||
|   | ||||
| @@ -78,8 +78,8 @@ func (m *forwardedMatcher) matches(r *http.Request, domain string) bool { | ||||
| 	if err != nil { | ||||
| 		return false | ||||
| 	} | ||||
| 	if len(fwds) == 0 { | ||||
|  | ||||
| 	if len(fwds) == 0 { | ||||
| 		return false | ||||
| 	} | ||||
|  | ||||
|   | ||||
| @@ -110,7 +110,6 @@ func Test_needRenewal(t *testing.T) { | ||||
| 	for _, test := range testCases { | ||||
| 		test := test | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			actual := needRenewal(test.x509Cert, "foo.com", test.days) | ||||
|  | ||||
| 			assert.Equal(t, test.expected, actual) | ||||
|   | ||||
| @@ -84,7 +84,6 @@ func displayDNSHelp(name string) error { | ||||
| 	ew := &errWriter{w: w} | ||||
|  | ||||
| 	switch name { | ||||
|  | ||||
| 	case "acme-dns": | ||||
| 		// generated from: providers/dns/acmedns/acmedns.toml | ||||
| 		ew.writeln(`Configuration for Joohoi's ACME-DNS.`) | ||||
|   | ||||
| @@ -27,7 +27,7 @@ func displayDNSHelp(name string) error { | ||||
| 	ew := &errWriter{w: w} | ||||
|  | ||||
| 	switch name { | ||||
| {{ range $provider := .Providers }} | ||||
| {{- range $provider := .Providers }} | ||||
| 	case "{{ $provider.Code }}": | ||||
| 		// generated from: {{ .GeneratedFrom }} | ||||
| 		ew.writeln(`Configuration for {{ $provider.Name }}.`) | ||||
|   | ||||
							
								
								
									
										1
									
								
								platform/config/env/env_test.go
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										1
									
								
								platform/config/env/env_test.go
									
									
									
									
										vendored
									
									
								
							| @@ -304,7 +304,6 @@ func TestGetOrFile_ReadsFiles(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			err := os.Unsetenv(varEnvFileName) | ||||
| 			require.NoError(t, err) | ||||
| 			err = os.Unsetenv(varEnvName) | ||||
|   | ||||
| @@ -95,7 +95,7 @@ func (d *DNSProvider) Timeout() (timeout, interval time.Duration) { | ||||
| func (d *DNSProvider) Present(domain, token, keyAuth string) error { | ||||
| 	fqdn, value := dns01.GetRecord(domain, keyAuth) | ||||
|  | ||||
| 	_, zoneName, err := d.getHostedZone(domain) | ||||
| 	zoneName, err := d.getHostedZone(domain) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("alicloud: %v", err) | ||||
| 	} | ||||
| @@ -118,7 +118,7 @@ func (d *DNSProvider) CleanUp(domain, token, keyAuth string) error { | ||||
| 		return fmt.Errorf("alicloud: %v", err) | ||||
| 	} | ||||
|  | ||||
| 	_, _, err = d.getHostedZone(domain) | ||||
| 	_, err = d.getHostedZone(domain) | ||||
| 	if err != nil { | ||||
| 		return fmt.Errorf("alicloud: %v", err) | ||||
| 	} | ||||
| @@ -134,7 +134,7 @@ func (d *DNSProvider) CleanUp(domain, token, keyAuth string) error { | ||||
| 	return nil | ||||
| } | ||||
|  | ||||
| func (d *DNSProvider) getHostedZone(domain string) (string, string, error) { | ||||
| func (d *DNSProvider) getHostedZone(domain string) (string, error) { | ||||
| 	request := alidns.CreateDescribeDomainsRequest() | ||||
|  | ||||
| 	var domains []alidns.Domain | ||||
| @@ -145,7 +145,7 @@ func (d *DNSProvider) getHostedZone(domain string) (string, string, error) { | ||||
|  | ||||
| 		response, err := d.client.DescribeDomains(request) | ||||
| 		if err != nil { | ||||
| 			return "", "", fmt.Errorf("API call failed: %v", err) | ||||
| 			return "", fmt.Errorf("API call failed: %v", err) | ||||
| 		} | ||||
|  | ||||
| 		domains = append(domains, response.Domains.Domain...) | ||||
| @@ -159,7 +159,7 @@ func (d *DNSProvider) getHostedZone(domain string) (string, string, error) { | ||||
|  | ||||
| 	authZone, err := dns01.FindZoneByFqdn(dns01.ToFqdn(domain)) | ||||
| 	if err != nil { | ||||
| 		return "", "", err | ||||
| 		return "", err | ||||
| 	} | ||||
|  | ||||
| 	var hostedZone alidns.Domain | ||||
| @@ -170,9 +170,10 @@ func (d *DNSProvider) getHostedZone(domain string) (string, string, error) { | ||||
| 	} | ||||
|  | ||||
| 	if hostedZone.DomainId == "" { | ||||
| 		return "", "", fmt.Errorf("zone %s not found in AliDNS for domain %s", authZone, domain) | ||||
| 		return "", fmt.Errorf("zone %s not found in AliDNS for domain %s", authZone, domain) | ||||
| 	} | ||||
| 	return fmt.Sprintf("%v", hostedZone.DomainId), hostedZone.DomainName, nil | ||||
|  | ||||
| 	return hostedZone.DomainName, nil | ||||
| } | ||||
|  | ||||
| func (d *DNSProvider) newTxtRecord(zone, fqdn, value string) *alidns.AddDomainRecordRequest { | ||||
| @@ -186,7 +187,7 @@ func (d *DNSProvider) newTxtRecord(zone, fqdn, value string) *alidns.AddDomainRe | ||||
| } | ||||
|  | ||||
| func (d *DNSProvider) findTxtRecords(domain, fqdn string) ([]alidns.Record, error) { | ||||
| 	_, zoneName, err := d.getHostedZone(domain) | ||||
| 	zoneName, err := d.getHostedZone(domain) | ||||
| 	if err != nil { | ||||
| 		return nil, err | ||||
| 	} | ||||
|   | ||||
| @@ -106,7 +106,6 @@ func TestClientGetDomainInformation(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			server := httptest.NewServer(handlerMock(http.MethodGet, test.response, test.data)) | ||||
|  | ||||
| 			client, _ := NewClient("myKey", "mySecret") | ||||
| @@ -210,7 +209,6 @@ func TestClientFindTxtRecord(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			server := httptest.NewServer(handlerMock(http.MethodGet, test.response, test.txtRecords)) | ||||
|  | ||||
| 			client, _ := NewClient("myKey", "mySecret") | ||||
|   | ||||
| @@ -136,7 +136,6 @@ func TestClient_GetDomainID(t *testing.T) { | ||||
| 			} | ||||
| 		}) | ||||
| 	} | ||||
|  | ||||
| } | ||||
|  | ||||
| func TestClient_CreateRecord(t *testing.T) { | ||||
| @@ -203,8 +202,6 @@ func TestClient_CreateRecord(t *testing.T) { | ||||
| 			} else { | ||||
| 				require.NoError(t, err) | ||||
| 			} | ||||
|  | ||||
| 		}) | ||||
| 	} | ||||
|  | ||||
| } | ||||
|   | ||||
| @@ -112,7 +112,6 @@ func TestNewDNSProviderConfig(t *testing.T) { | ||||
| 				if test.baseURL != "" { | ||||
| 					assert.Equal(t, test.baseURL, p.client.BaseURL) | ||||
| 				} | ||||
|  | ||||
| 			} else { | ||||
| 				require.EqualError(t, err, test.expected) | ||||
| 			} | ||||
|   | ||||
| @@ -237,7 +237,7 @@ func TestDNSProvider_Cleanup_WhenHttpError_ReturnsError(t *testing.T) { | ||||
| 		assert.Equal(t, "Basic VE9LRU46U0VDUkVU", r.Header.Get("Authorization"), "Authorization") | ||||
|  | ||||
| 		w.WriteHeader(http.StatusNotAcceptable) | ||||
| 		_, err := fmt.Fprintf(w, errorMessage) | ||||
| 		_, err := fmt.Fprint(w, errorMessage) | ||||
| 		if err != nil { | ||||
| 			http.Error(w, err.Error(), http.StatusInternalServerError) | ||||
| 		} | ||||
|   | ||||
| @@ -199,7 +199,6 @@ func TestSplitDomain(t *testing.T) { | ||||
| 			assert.Equal(t, test.expectedZone, zone) | ||||
| 		}) | ||||
| 	} | ||||
|  | ||||
| } | ||||
|  | ||||
| func TestLivePresent(t *testing.T) { | ||||
|   | ||||
| @@ -485,7 +485,6 @@ func Test_addTxtEntryToZone(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			zone := addTxtEntryToZone(test.input, "_acme-challenge", "test", 120) | ||||
| 			assert.Equal(t, zone, test.expected) | ||||
| 		}) | ||||
| @@ -527,7 +526,6 @@ func Test_fixTxtLines(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			line := fixTxtLines(test.input) | ||||
| 			assert.Equal(t, line, test.expected) | ||||
| 		}) | ||||
|   | ||||
| @@ -209,7 +209,6 @@ func TestDNSProvider_Present(t *testing.T) { | ||||
|  | ||||
| 	for _, test := range testCases { | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			server := newMockServer(test.mockResponses) | ||||
| 			defer server.Close() | ||||
|  | ||||
|   | ||||
| @@ -226,7 +226,6 @@ func (c *Client) GetDNSRecords(hostname, apiSessionID string) ([]DNSRecord, erro | ||||
| 	} | ||||
|  | ||||
| 	return responseData.DNSRecords, nil | ||||
|  | ||||
| } | ||||
|  | ||||
| // doRequest marshals given body to JSON, send the request to netcup API | ||||
|   | ||||
| @@ -515,7 +515,6 @@ func TestLiveClientAuth(t *testing.T) { | ||||
| 			require.NoError(t, err) | ||||
| 		}) | ||||
| 	} | ||||
|  | ||||
| } | ||||
|  | ||||
| func TestLiveClientGetDnsRecords(t *testing.T) { | ||||
|   | ||||
| @@ -81,7 +81,6 @@ func TestChangeResourceRecordSetsErrors(t *testing.T) { | ||||
| 	for _, test := range testCases { | ||||
| 		test := test | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			server := runTestServer(test.responseBody, test.statusCode) | ||||
| 			defer server.Close() | ||||
|  | ||||
| @@ -161,7 +160,6 @@ func TestGetChangeErrors(t *testing.T) { | ||||
| 	for _, test := range testCases { | ||||
| 		test := test | ||||
| 		t.Run(test.desc, func(t *testing.T) { | ||||
|  | ||||
| 			server := runTestServer(test.responseBody, test.statusCode) | ||||
| 			defer server.Close() | ||||
|  | ||||
| @@ -175,5 +173,4 @@ func TestGetChangeErrors(t *testing.T) { | ||||
| 			assert.EqualError(t, err, test.expected) | ||||
| 		}) | ||||
| 	} | ||||
|  | ||||
| } | ||||
|   | ||||
| @@ -79,7 +79,6 @@ func (m *DNSServerMock) HandleListZonesSuccessfully() { | ||||
| 		    "id":"123123" | ||||
| 		  }]} | ||||
| 		`) | ||||
|  | ||||
| 	}) | ||||
| } | ||||
|  | ||||
|   | ||||
| @@ -98,7 +98,6 @@ func NewDNSProviderConfig(config *Config) (*DNSProvider, error) { | ||||
| 		token:            identity.Access.Token.ID, | ||||
| 		cloudDNSEndpoint: dnsEndpoint, | ||||
| 	}, nil | ||||
|  | ||||
| } | ||||
|  | ||||
| // Present creates a TXT record to fulfill the dns-01 challenge | ||||
|   | ||||
| @@ -180,9 +180,7 @@ func (c *Client) do(req *http.Request, to interface{}) (*http.Response, error) { | ||||
| } | ||||
|  | ||||
| func checkResponse(resp *http.Response) error { | ||||
| 	if resp.StatusCode >= http.StatusBadRequest && | ||||
| 		resp.StatusCode <= http.StatusNetworkAuthenticationRequired { | ||||
|  | ||||
| 	if resp.StatusCode >= http.StatusBadRequest && resp.StatusCode <= http.StatusNetworkAuthenticationRequired { | ||||
| 		if resp.Body == nil { | ||||
| 			return fmt.Errorf("request failed with status code %d and empty body", resp.StatusCode) | ||||
| 		} | ||||
|   | ||||
| @@ -180,9 +180,7 @@ func (c *Client) do(req *http.Request, to interface{}) (*http.Response, error) { | ||||
| } | ||||
|  | ||||
| func checkResponse(resp *http.Response) error { | ||||
| 	if resp.StatusCode >= http.StatusBadRequest && | ||||
| 		resp.StatusCode <= http.StatusNetworkAuthenticationRequired { | ||||
|  | ||||
| 	if resp.StatusCode >= http.StatusBadRequest && resp.StatusCode <= http.StatusNetworkAuthenticationRequired { | ||||
| 		if resp.Body == nil { | ||||
| 			return fmt.Errorf("request failed with status code %d and empty body", resp.StatusCode) | ||||
| 		} | ||||
|   | ||||
		Reference in New Issue
	
	Block a user