forked from TrueCloudLab/lego
chore: update golangci-lint. (#782)
This commit is contained in:
parent
f05aa4c241
commit
6fdf45c474
15 changed files with 44 additions and 43 deletions
|
@ -41,6 +41,7 @@
|
|||
"cyclomatic complexity (.+) of func `NewDNSChallengeProviderByName` is high (.+)", # providers/dns/dns_providers.go
|
||||
"string `(lego\\.wtf|manhattan)` has (\\d+) occurrences, make it a constant", #providers/dns/gcloud/googlecloud_test.go
|
||||
|
||||
"(dnsHelp|createRenew\\$1|createRun\\$1|run) - result 0 \\(error\\) is always nil", # cmd/
|
||||
"`(tlsFeatureExtensionOID|ocspMustStapleFeature)` is a global variable", # certcrypto/crypto.go
|
||||
"`(defaultNameservers|recursiveNameservers|dnsTimeout|fqdnToZone|muFqdnToZone)` is a global variable", # challenge/dns01/nameserver.go
|
||||
"`idPeAcmeIdentifierV1` is a global variable", # challenge/tlsalpn01/tls_alpn_challenge.go
|
||||
|
|
|
@ -30,7 +30,7 @@ before_install:
|
|||
- go get -u github.com/letsencrypt/pebble/...
|
||||
|
||||
# Install linters and misspell
|
||||
- curl -sfL https://install.goreleaser.com/github.com/golangci/golangci-lint.sh | bash -s -- -b $GOPATH/bin v1.12.5
|
||||
- curl -sfL https://install.goreleaser.com/github.com/golangci/golangci-lint.sh | bash -s -- -b $GOPATH/bin v1.13.2
|
||||
- golangci-lint --version
|
||||
|
||||
install:
|
||||
|
|
|
@ -77,7 +77,7 @@ func TestCertificateService_Get_issuerRelUp(t *testing.T) {
|
|||
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
||||
w.Header().Set("Link", "<"+apiURL+`/issuer>; rel="up"`)
|
||||
_, err := w.Write([]byte(certResponseMock))
|
||||
if err != nil {
|
||||
|
@ -85,7 +85,7 @@ func TestCertificateService_Get_issuerRelUp(t *testing.T) {
|
|||
}
|
||||
})
|
||||
|
||||
mux.HandleFunc("/issuer", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/issuer", func(w http.ResponseWriter, _ *http.Request) {
|
||||
p, _ := pem.Decode([]byte(issuerMock))
|
||||
_, err := w.Write(p.Bytes)
|
||||
if err != nil {
|
||||
|
@ -109,7 +109,7 @@ func TestCertificateService_Get_embeddedIssuer(t *testing.T) {
|
|||
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
||||
_, err := w.Write([]byte(certResponseMock))
|
||||
if err != nil {
|
||||
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||||
|
|
|
@ -12,7 +12,7 @@ import (
|
|||
)
|
||||
|
||||
func TestNotHoldingLockWhileMakingHTTPRequests(t *testing.T) {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {
|
||||
time.Sleep(250 * time.Millisecond)
|
||||
w.Header().Add("Replay-Nonce", "12345")
|
||||
w.Header().Add("Retry-After", "0")
|
||||
|
|
|
@ -13,7 +13,7 @@ import (
|
|||
)
|
||||
|
||||
func TestNotHoldingLockWhileMakingHTTPRequests(t *testing.T) {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {
|
||||
time.Sleep(250 * time.Millisecond)
|
||||
w.Header().Add("Replay-Nonce", "12345")
|
||||
w.Header().Add("Retry-After", "0")
|
||||
|
|
|
@ -12,7 +12,7 @@ import (
|
|||
|
||||
func TestDo_UserAgentOnAllHTTPMethod(t *testing.T) {
|
||||
var ua, method string
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
ts := httptest.NewServer(http.HandlerFunc(func(_ http.ResponseWriter, r *http.Request) {
|
||||
ua = r.Header.Get("User-Agent")
|
||||
method = r.Method
|
||||
}))
|
||||
|
|
|
@ -80,7 +80,7 @@ func Test_checkResponse(t *testing.T) {
|
|||
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
||||
_, err := w.Write([]byte(certResponseMock))
|
||||
if err != nil {
|
||||
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||||
|
@ -119,7 +119,7 @@ func Test_checkResponse_issuerRelUp(t *testing.T) {
|
|||
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
||||
w.Header().Set("Link", "<"+apiURL+`/issuer>; rel="up"`)
|
||||
_, err := w.Write([]byte(certResponseMock))
|
||||
if err != nil {
|
||||
|
@ -127,7 +127,7 @@ func Test_checkResponse_issuerRelUp(t *testing.T) {
|
|||
}
|
||||
})
|
||||
|
||||
mux.HandleFunc("/issuer", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/issuer", func(w http.ResponseWriter, _ *http.Request) {
|
||||
p, _ := pem.Decode([]byte(issuerMock))
|
||||
_, err := w.Write(p.Bytes)
|
||||
if err != nil {
|
||||
|
@ -167,7 +167,7 @@ func Test_checkResponse_embeddedIssuer(t *testing.T) {
|
|||
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/certificate", func(w http.ResponseWriter, _ *http.Request) {
|
||||
_, err := w.Write([]byte(certResponseMock))
|
||||
if err != nil {
|
||||
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||||
|
|
|
@ -111,7 +111,7 @@ func TestNewDNSProviderConfig(t *testing.T) {
|
|||
tenantID: "C",
|
||||
subscriptionID: "",
|
||||
resourceGroup: "",
|
||||
handler: func(w http.ResponseWriter, r *http.Request) {
|
||||
handler: func(w http.ResponseWriter, _ *http.Request) {
|
||||
_, err := w.Write([]byte("foo"))
|
||||
if err != nil {
|
||||
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||||
|
|
|
@ -184,13 +184,13 @@ func TestClient_Login_errors(t *testing.T) {
|
|||
}{
|
||||
{
|
||||
desc: "HTTP error",
|
||||
handler: func(rw http.ResponseWriter, req *http.Request) {
|
||||
handler: func(rw http.ResponseWriter, _ *http.Request) {
|
||||
http.Error(rw, "error message", http.StatusInternalServerError)
|
||||
},
|
||||
},
|
||||
{
|
||||
desc: "API error",
|
||||
handler: func(rw http.ResponseWriter, req *http.Request) {
|
||||
handler: func(rw http.ResponseWriter, _ *http.Request) {
|
||||
response := `
|
||||
{
|
||||
"serverrequestid":"YxTr4EzdbJ101T211zR4yzUEMVE",
|
||||
|
@ -210,7 +210,7 @@ func TestClient_Login_errors(t *testing.T) {
|
|||
},
|
||||
{
|
||||
desc: "responsedata marshaling error",
|
||||
handler: func(rw http.ResponseWriter, req *http.Request) {
|
||||
handler: func(rw http.ResponseWriter, _ *http.Request) {
|
||||
response := `
|
||||
{
|
||||
"serverrequestid": "srv-request-id",
|
||||
|
@ -289,13 +289,13 @@ func TestClient_Logout_errors(t *testing.T) {
|
|||
}{
|
||||
{
|
||||
desc: "HTTP error",
|
||||
handler: func(rw http.ResponseWriter, req *http.Request) {
|
||||
handler: func(rw http.ResponseWriter, _ *http.Request) {
|
||||
http.Error(rw, "error message", http.StatusInternalServerError)
|
||||
},
|
||||
},
|
||||
{
|
||||
desc: "API error",
|
||||
handler: func(rw http.ResponseWriter, req *http.Request) {
|
||||
handler: func(rw http.ResponseWriter, _ *http.Request) {
|
||||
response := `
|
||||
{
|
||||
"serverrequestid":"YxTr4EzdbJ101T211zR4yzUEMVE",
|
||||
|
@ -417,13 +417,13 @@ func TestClient_GetDNSRecords_errors(t *testing.T) {
|
|||
}{
|
||||
{
|
||||
desc: "HTTP error",
|
||||
handler: func(rw http.ResponseWriter, req *http.Request) {
|
||||
handler: func(rw http.ResponseWriter, _ *http.Request) {
|
||||
http.Error(rw, "error message", http.StatusInternalServerError)
|
||||
},
|
||||
},
|
||||
{
|
||||
desc: "API error",
|
||||
handler: func(rw http.ResponseWriter, req *http.Request) {
|
||||
handler: func(rw http.ResponseWriter, _ *http.Request) {
|
||||
response := `
|
||||
{
|
||||
"serverrequestid":"YxTr4EzdbJ101T211zR4yzUEMVE",
|
||||
|
|
|
@ -11,7 +11,7 @@ import (
|
|||
)
|
||||
|
||||
func runTestServer(responseBody string, statusCode int) *httptest.Server {
|
||||
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
server := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {
|
||||
w.WriteHeader(statusCode)
|
||||
fmt.Fprintln(w, responseBody)
|
||||
}))
|
||||
|
|
|
@ -41,7 +41,7 @@ func (m *DNSServerMock) ShutdownServer() {
|
|||
|
||||
// HandleAuthSuccessfully Handle auth successfully
|
||||
func (m *DNSServerMock) HandleAuthSuccessfully() {
|
||||
m.Mux.HandleFunc("/v3/auth/token", func(w http.ResponseWriter, r *http.Request) {
|
||||
m.Mux.HandleFunc("/v3/auth/token", func(w http.ResponseWriter, _ *http.Request) {
|
||||
w.Header().Set("X-Subject-Token", fakeOTCToken)
|
||||
|
||||
fmt.Fprintf(w, `{
|
||||
|
|
|
@ -135,7 +135,7 @@ func identityHandler(dnsEndpoint string) http.Handler {
|
|||
|
||||
resp := strings.Replace(identityResponseMock, "https://dns.api.rackspacecloud.com/v1.0/123456", dnsEndpoint, 1)
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, resp)
|
||||
fmt.Fprint(w, resp)
|
||||
})
|
||||
}
|
||||
|
||||
|
@ -146,7 +146,7 @@ func dnsHandler() *http.ServeMux {
|
|||
mux.HandleFunc("/123456/domains", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.URL.Query().Get("name") == "example.com" {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, zoneDetailsMock)
|
||||
fmt.Fprint(w, zoneDetailsMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
@ -168,12 +168,12 @@ func dnsHandler() *http.ServeMux {
|
|||
}
|
||||
|
||||
w.WriteHeader(http.StatusAccepted)
|
||||
fmt.Fprintf(w, recordResponseMock)
|
||||
fmt.Fprint(w, recordResponseMock)
|
||||
// Used by `findTxtRecord()` finding `record.ID` "?type=TXT&name=_acme-challenge.example.com"
|
||||
case http.MethodGet:
|
||||
if r.URL.Query().Get("type") == "TXT" && r.URL.Query().Get("name") == "_acme-challenge.example.com" {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, recordDetailsMock)
|
||||
fmt.Fprint(w, recordDetailsMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
@ -182,7 +182,7 @@ func dnsHandler() *http.ServeMux {
|
|||
case http.MethodDelete:
|
||||
if r.URL.Query().Get("id") == "TXT-654321" {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, recordDeleteMock)
|
||||
fmt.Fprint(w, recordDeleteMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
|
|
@ -157,7 +157,7 @@ func TestDNSProvider_getZoneRecords(t *testing.T) {
|
|||
provider, mux, tearDown := setupMockAPITest()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/STACK_ID/zones/A/records", func(w http.ResponseWriter, req *http.Request) {
|
||||
mux.HandleFunc("/STACK_ID/zones/A/records", func(w http.ResponseWriter, _ *http.Request) {
|
||||
content := `
|
||||
{
|
||||
"records": [
|
||||
|
@ -188,7 +188,7 @@ func TestDNSProvider_getZoneRecords_apiError(t *testing.T) {
|
|||
provider, mux, tearDown := setupMockAPITest()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/STACK_ID/zones/A/records", func(w http.ResponseWriter, req *http.Request) {
|
||||
mux.HandleFunc("/STACK_ID/zones/A/records", func(w http.ResponseWriter, _ *http.Request) {
|
||||
content := `
|
||||
{
|
||||
"code": 401,
|
||||
|
@ -213,7 +213,7 @@ func TestDNSProvider_getZones(t *testing.T) {
|
|||
provider, mux, tearDown := setupMockAPITest()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/STACK_ID/zones", func(w http.ResponseWriter, req *http.Request) {
|
||||
mux.HandleFunc("/STACK_ID/zones", func(w http.ResponseWriter, _ *http.Request) {
|
||||
content := `
|
||||
{
|
||||
"pageInfo": {
|
||||
|
|
|
@ -145,7 +145,7 @@ func muxSuccess() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/token", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method == http.MethodPost {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, tokenResponseMock)
|
||||
fmt.Fprint(w, tokenResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
@ -154,7 +154,7 @@ func muxSuccess() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/domains", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.URL.Query().Get("search") == "example.com" {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, domainsResponseMock)
|
||||
fmt.Fprint(w, domainsResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusNotFound)
|
||||
|
@ -165,14 +165,14 @@ func muxSuccess() *http.ServeMux {
|
|||
case http.MethodGet:
|
||||
if r.URL.Query().Get("domain_id") == "1" {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, recordsResponseMock)
|
||||
fmt.Fprint(w, recordsResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusNotFound)
|
||||
return
|
||||
case http.MethodPost:
|
||||
w.WriteHeader(http.StatusCreated)
|
||||
fmt.Fprintf(w, recordCreatedResponseMock)
|
||||
fmt.Fprint(w, recordCreatedResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
@ -181,7 +181,7 @@ func muxSuccess() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/records/3", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method == http.MethodDelete {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, recordDeletedResponseMock)
|
||||
fmt.Fprint(w, recordDeletedResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
@ -201,13 +201,13 @@ func muxFailToFindZone() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/token", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method == http.MethodPost {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, tokenResponseMock)
|
||||
fmt.Fprint(w, tokenResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
})
|
||||
|
||||
mux.HandleFunc("/1.0/domains", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/1.0/domains", func(w http.ResponseWriter, _ *http.Request) {
|
||||
w.WriteHeader(http.StatusNotFound)
|
||||
})
|
||||
|
||||
|
@ -220,7 +220,7 @@ func muxFailToCreateTXT() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/token", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method == http.MethodPost {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, tokenResponseMock)
|
||||
fmt.Fprint(w, tokenResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
@ -229,7 +229,7 @@ func muxFailToCreateTXT() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/domains", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.URL.Query().Get("search") == testDomain {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, domainsResponseMock)
|
||||
fmt.Fprint(w, domainsResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusNotFound)
|
||||
|
@ -240,7 +240,7 @@ func muxFailToCreateTXT() *http.ServeMux {
|
|||
case http.MethodGet:
|
||||
if r.URL.Query().Get("domain_id") == "1" {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, recordsResponseMock)
|
||||
fmt.Fprint(w, recordsResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusNotFound)
|
||||
|
@ -261,7 +261,7 @@ func muxFailToGetRecordID() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/token", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.Method == http.MethodPost {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, tokenResponseMock)
|
||||
fmt.Fprint(w, tokenResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusBadRequest)
|
||||
|
@ -270,7 +270,7 @@ func muxFailToGetRecordID() *http.ServeMux {
|
|||
mux.HandleFunc("/1.0/domains", func(w http.ResponseWriter, r *http.Request) {
|
||||
if r.URL.Query().Get("search") == testDomain {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
fmt.Fprintf(w, domainsResponseMock)
|
||||
fmt.Fprint(w, domainsResponseMock)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusNotFound)
|
||||
|
|
|
@ -17,7 +17,7 @@ func TestRegistrar_ResolveAccountByKey(t *testing.T) {
|
|||
mux, apiURL, tearDown := tester.SetupFakeAPI()
|
||||
defer tearDown()
|
||||
|
||||
mux.HandleFunc("/account", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/account", func(w http.ResponseWriter, _ *http.Request) {
|
||||
w.Header().Set("Location", apiURL+"/account_recovery")
|
||||
_, err := w.Write([]byte("{}"))
|
||||
if err != nil {
|
||||
|
@ -25,7 +25,7 @@ func TestRegistrar_ResolveAccountByKey(t *testing.T) {
|
|||
}
|
||||
})
|
||||
|
||||
mux.HandleFunc("/account_recovery", func(w http.ResponseWriter, r *http.Request) {
|
||||
mux.HandleFunc("/account_recovery", func(w http.ResponseWriter, _ *http.Request) {
|
||||
err := tester.WriteJSONResponse(w, acme.Account{
|
||||
Status: "valid",
|
||||
})
|
||||
|
|
Loading…
Reference in a new issue