Merge pull request #1946 from flant/prealloc-unparam-sqlclosecheck

Enable unparam, prealloc, sqlclosecheck linters
This commit is contained in:
Márk Sági-Kazár 2021-02-10 13:24:47 +01:00 committed by GitHub
commit 1c551fd86b
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
15 changed files with 50 additions and 76 deletions

View file

@ -32,13 +32,16 @@ linters:
- misspell - misspell
- nakedret - nakedret
- nolintlint - nolintlint
- prealloc
- rowserrcheck - rowserrcheck
- sqlclosecheck
- staticcheck - staticcheck
- structcheck - structcheck
- stylecheck - stylecheck
- tparallel - tparallel
- typecheck - typecheck
- unconvert - unconvert
- unparam
- unused - unused
- varcheck - varcheck
- whitespace - whitespace
@ -51,8 +54,6 @@ linters:
# - godot # - godot
# - nlreturn # - nlreturn
# - noctx # - noctx
# - prealloc
# - sqlclosecheck
# - wrapcheck # - wrapcheck
# TODO: fix linter errors before enabling (from original config) # TODO: fix linter errors before enabling (from original config)
@ -63,7 +64,6 @@ linters:
# - gosec # - gosec
# - lll # - lll
# - scopelint # - scopelint
# - unparam
# unused # unused
# - depguard # - depguard

View file

@ -128,10 +128,7 @@ func (c *crowdConnector) Login(ctx context.Context, s connector.Scopes, username
return connector.Identity{}, false, err return connector.Identity{}, false, err
} }
if ident, err = c.identityFromCrowdUser(user); err != nil { ident = c.identityFromCrowdUser(user)
return connector.Identity{}, false, err
}
if s.Groups { if s.Groups {
userGroups, err := c.getGroups(ctx, client, s.Groups, ident.Username) userGroups, err := c.getGroups(ctx, client, s.Groups, ident.Username)
if err != nil { if err != nil {
@ -165,10 +162,7 @@ func (c *crowdConnector) Refresh(ctx context.Context, s connector.Scopes, ident
return ident, fmt.Errorf("crowd: get user %q: %v", data.Username, err) return ident, fmt.Errorf("crowd: get user %q: %v", data.Username, err)
} }
newIdent, err := c.identityFromCrowdUser(user) newIdent := c.identityFromCrowdUser(user)
if err != nil {
return ident, err
}
newIdent.ConnectorData = ident.ConnectorData newIdent.ConnectorData = ident.ConnectorData
// If user exists, authenticate it to prolong sso session. // If user exists, authenticate it to prolong sso session.
@ -366,7 +360,7 @@ func (c *crowdConnector) groups(ctx context.Context, client *http.Client, userna
} }
// identityFromCrowdUser converts crowdUser to Identity // identityFromCrowdUser converts crowdUser to Identity
func (c *crowdConnector) identityFromCrowdUser(user crowdUser) (connector.Identity, error) { func (c *crowdConnector) identityFromCrowdUser(user crowdUser) connector.Identity {
identity := connector.Identity{ identity := connector.Identity{
Username: user.Name, Username: user.Name,
UserID: user.Key, UserID: user.Key,
@ -387,7 +381,7 @@ func (c *crowdConnector) identityFromCrowdUser(user crowdUser) (connector.Identi
} }
} }
return identity, nil return identity
} }
// getGroups retrieves a list of user's groups and filters it // getGroups retrieves a list of user's groups and filters it

View file

@ -71,9 +71,6 @@ func TestUserLoginFlow(t *testing.T) {
expectEquals(t, user.Name, "testuser") expectEquals(t, user.Name, "testuser")
expectEquals(t, user.Email, "testuser@example.com") expectEquals(t, user.Email, "testuser@example.com")
_, err = c.identityFromCrowdUser(user)
expectNil(t, err)
err = c.authenticateUser(context.Background(), newClient(), "testuser") err = c.authenticateUser(context.Background(), newClient(), "testuser")
expectNil(t, err) expectNil(t, err)
@ -119,8 +116,7 @@ func TestIdentityFromCrowdUser(t *testing.T) {
expectEquals(t, user.Email, "testuser@example.com") expectEquals(t, user.Email, "testuser@example.com")
// Test unconfigured behaviour // Test unconfigured behaviour
i, err := c.identityFromCrowdUser(user) i := c.identityFromCrowdUser(user)
expectNil(t, err)
expectEquals(t, i.UserID, "12345") expectEquals(t, i.UserID, "12345")
expectEquals(t, i.Username, "testuser") expectEquals(t, i.Username, "testuser")
expectEquals(t, i.Email, "testuser@example.com") expectEquals(t, i.Email, "testuser@example.com")
@ -131,23 +127,19 @@ func TestIdentityFromCrowdUser(t *testing.T) {
expectEquals(t, i.PreferredUsername, "") expectEquals(t, i.PreferredUsername, "")
c.Config.PreferredUsernameField = "key" c.Config.PreferredUsernameField = "key"
i, err = c.identityFromCrowdUser(user) i = c.identityFromCrowdUser(user)
expectNil(t, err)
expectEquals(t, i.PreferredUsername, "12345") expectEquals(t, i.PreferredUsername, "12345")
c.Config.PreferredUsernameField = "name" c.Config.PreferredUsernameField = "name"
i, err = c.identityFromCrowdUser(user) i = c.identityFromCrowdUser(user)
expectNil(t, err)
expectEquals(t, i.PreferredUsername, "testuser") expectEquals(t, i.PreferredUsername, "testuser")
c.Config.PreferredUsernameField = "email" c.Config.PreferredUsernameField = "email"
i, err = c.identityFromCrowdUser(user) i = c.identityFromCrowdUser(user)
expectNil(t, err)
expectEquals(t, i.PreferredUsername, "testuser@example.com") expectEquals(t, i.PreferredUsername, "testuser@example.com")
c.Config.PreferredUsernameField = "invalidstring" c.Config.PreferredUsernameField = "invalidstring"
i, err = c.identityFromCrowdUser(user) i = c.identityFromCrowdUser(user)
expectNil(t, err)
expectEquals(t, i.PreferredUsername, "") expectEquals(t, i.PreferredUsername, "")
} }

View file

@ -421,7 +421,6 @@ type group struct {
} }
func (b *bitbucketConnector) userTeamGroups(ctx context.Context, client *http.Client, teamName string) ([]string, error) { func (b *bitbucketConnector) userTeamGroups(ctx context.Context, client *http.Client, teamName string) ([]string, error) {
var teamGroups []string
apiURL := b.legacyAPIURL + "/groups/" + teamName apiURL := b.legacyAPIURL + "/groups/" + teamName
var response []group var response []group
@ -429,6 +428,7 @@ func (b *bitbucketConnector) userTeamGroups(ctx context.Context, client *http.Cl
return nil, fmt.Errorf("get user team %q groups: %v", teamName, err) return nil, fmt.Errorf("get user team %q groups: %v", teamName, err)
} }
teamGroups := make([]string, 0, len(response))
for _, group := range response { for _, group := range response {
teamGroups = append(teamGroups, teamName+"/"+group.Slug) teamGroups = append(teamGroups, teamName+"/"+group.Slug)
} }

View file

@ -72,7 +72,7 @@ type giteaConnector struct {
useLoginAsID bool useLoginAsID bool
} }
func (c *giteaConnector) oauth2Config(scopes connector.Scopes) *oauth2.Config { func (c *giteaConnector) oauth2Config(_ connector.Scopes) *oauth2.Config {
giteaEndpoint := oauth2.Endpoint{AuthURL: c.baseURL + "/login/oauth/authorize", TokenURL: c.baseURL + "/login/oauth/access_token"} giteaEndpoint := oauth2.Endpoint{AuthURL: c.baseURL + "/login/oauth/authorize", TokenURL: c.baseURL + "/login/oauth/access_token"}
return &oauth2.Config{ return &oauth2.Config{
ClientID: c.clientID, ClientID: c.clientID,

View file

@ -609,7 +609,7 @@ func (c *ldapConnector) groups(ctx context.Context, user ldap.Entry) ([]string,
} }
} }
var groupNames []string groupNames := make([]string, 0, len(groups))
for _, group := range groups { for _, group := range groups {
name := getAttr(*group, c.GroupSearch.NameAttr) name := getAttr(*group, c.GroupSearch.NameAttr)
if name == "" { if name == "" {

View file

@ -488,7 +488,7 @@ func (p *provider) validateSubject(subject *subject, inResponseTo string) error
return fmt.Errorf("subject contained no SubjectConfirmations") return fmt.Errorf("subject contained no SubjectConfirmations")
} }
var errs []error errs := make([]error, 0, len(subject.SubjectConfirmations))
// One of these must match our assumptions, not all. // One of these must match our assumptions, not all.
for _, c := range subject.SubjectConfirmations { for _, c := range subject.SubjectConfirmations {
err := func() error { err := func() error {

View file

@ -233,7 +233,7 @@ func (d dexAPI) ListPasswords(ctx context.Context, req *api.ListPasswordReq) (*a
return nil, fmt.Errorf("list passwords: %v", err) return nil, fmt.Errorf("list passwords: %v", err)
} }
var passwords []*api.Password passwords := make([]*api.Password, 0, len(passwordList))
for _, password := range passwordList { for _, password := range passwordList {
p := api.Password{ p := api.Password{
Email: password.Email, Email: password.Email,
@ -286,20 +286,18 @@ func (d dexAPI) ListRefresh(ctx context.Context, req *api.ListRefreshReq) (*api.
return nil, err return nil, err
} }
var refreshTokenRefs []*api.RefreshTokenRef
offlineSessions, err := d.s.GetOfflineSessions(id.UserId, id.ConnId) offlineSessions, err := d.s.GetOfflineSessions(id.UserId, id.ConnId)
if err != nil { if err != nil {
if err == storage.ErrNotFound { if err == storage.ErrNotFound {
// This means that this user-client pair does not have a refresh token yet. // This means that this user-client pair does not have a refresh token yet.
// An empty list should be returned instead of an error. // An empty list should be returned instead of an error.
return &api.ListRefreshResp{ return &api.ListRefreshResp{}, nil
RefreshTokens: refreshTokenRefs,
}, nil
} }
d.logger.Errorf("api: failed to list refresh tokens %t here : %v", err == storage.ErrNotFound, err) d.logger.Errorf("api: failed to list refresh tokens %t here : %v", err == storage.ErrNotFound, err)
return nil, err return nil, err
} }
refreshTokenRefs := make([]*api.RefreshTokenRef, 0, len(offlineSessions.Refresh))
for _, session := range offlineSessions.Refresh { for _, session := range offlineSessions.Refresh {
r := api.RefreshTokenRef{ r := api.RefreshTokenRef{
Id: session.ID, Id: session.ID,

View file

@ -77,11 +77,7 @@ func (s *Server) handleDeviceCode(w http.ResponseWriter, r *http.Request) {
deviceCode := storage.NewDeviceCode() deviceCode := storage.NewDeviceCode()
// make user code // make user code
userCode, err := storage.NewUserCode() userCode := storage.NewUserCode()
if err != nil {
s.logger.Errorf("Error generating user code: %v", err)
s.tokenErrHelper(w, errInvalidRequest, "", http.StatusInternalServerError)
}
// Generate the expire time // Generate the expire time
expireTime := time.Now().Add(s.deviceRequestsValidFor) expireTime := time.Now().Add(s.deviceRequestsValidFor)

View file

@ -252,10 +252,8 @@ func newServer(ctx context.Context, c Config, rotationStrategy rotationStrategy)
} }
} }
instrumentHandlerCounter := func(handlerName string, handler http.Handler) http.HandlerFunc { instrumentHandlerCounter := func(_ string, handler http.Handler) http.HandlerFunc {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { return handler.ServeHTTP
handler.ServeHTTP(w, r)
})
} }
if c.PrometheusRegistry != nil { if c.PrometheusRegistry != nil {
@ -270,10 +268,10 @@ func newServer(ctx context.Context, c Config, rotationStrategy rotationStrategy)
} }
instrumentHandlerCounter = func(handlerName string, handler http.Handler) http.HandlerFunc { instrumentHandlerCounter = func(handlerName string, handler http.Handler) http.HandlerFunc {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { return func(w http.ResponseWriter, r *http.Request) {
m := httpsnoop.CaptureMetrics(handler, w, r) m := httpsnoop.CaptureMetrics(handler, w, r)
requestCounter.With(prometheus.Labels{"handler": handlerName, "code": strconv.Itoa(m.Code), "method": r.Method}).Inc() requestCounter.With(prometheus.Labels{"handler": handlerName, "code": strconv.Itoa(m.Code), "method": r.Method}).Inc()
}) }
} }
} }

View file

@ -285,7 +285,7 @@ func testClientCRUD(t *testing.T, s storage.Storage) {
t.Fatalf("create client: %v", err) t.Fatalf("create client: %v", err)
} }
getAndCompare := func(id string, want storage.Client) { getAndCompare := func(_ string, want storage.Client) {
gc, err := s.GetClient(id1) gc, err := s.GetClient(id1)
if err != nil { if err != nil {
t.Errorf("get client: %v", err) t.Errorf("get client: %v", err)
@ -845,13 +845,8 @@ func testGC(t *testing.T, s storage.Storage) {
t.Errorf("expected storage.ErrNotFound, got %v", err) t.Errorf("expected storage.ErrNotFound, got %v", err)
} }
userCode, err := storage.NewUserCode()
if err != nil {
t.Errorf("Unexpected Error: %v", err)
}
d := storage.DeviceRequest{ d := storage.DeviceRequest{
UserCode: userCode, UserCode: storage.NewUserCode(),
DeviceCode: storage.NewID(), DeviceCode: storage.NewID(),
ClientID: "client1", ClientID: "client1",
ClientSecret: "secret1", ClientSecret: "secret1",
@ -970,12 +965,8 @@ func testTimezones(t *testing.T, s storage.Storage) {
} }
func testDeviceRequestCRUD(t *testing.T, s storage.Storage) { func testDeviceRequestCRUD(t *testing.T, s storage.Storage) {
userCode, err := storage.NewUserCode()
if err != nil {
panic(err)
}
d1 := storage.DeviceRequest{ d1 := storage.DeviceRequest{
UserCode: userCode, UserCode: storage.NewUserCode(),
DeviceCode: storage.NewID(), DeviceCode: storage.NewID(),
ClientID: "client1", ClientID: "client1",
ClientSecret: "secret1", ClientSecret: "secret1",
@ -988,7 +979,7 @@ func testDeviceRequestCRUD(t *testing.T, s storage.Storage) {
} }
// Attempt to create same DeviceRequest twice. // Attempt to create same DeviceRequest twice.
err = s.CreateDeviceRequest(d1) err := s.CreateDeviceRequest(d1)
mustBeErrAlreadyExists(t, "device request", err) mustBeErrAlreadyExists(t, "device request", err)
// No manual deletes for device requests, will be handled by garbage collection routines // No manual deletes for device requests, will be handled by garbage collection routines

View file

@ -338,13 +338,13 @@ func (c *conn) ListPasswords() (passwords []storage.Password, err error) {
func (c *conn) CreateOfflineSessions(s storage.OfflineSessions) error { func (c *conn) CreateOfflineSessions(s storage.OfflineSessions) error {
ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout) ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout)
defer cancel() defer cancel()
return c.txnCreate(ctx, keySession(offlineSessionPrefix, s.UserID, s.ConnID), fromStorageOfflineSessions(s)) return c.txnCreate(ctx, keySession(s.UserID, s.ConnID), fromStorageOfflineSessions(s))
} }
func (c *conn) UpdateOfflineSessions(userID string, connID string, updater func(s storage.OfflineSessions) (storage.OfflineSessions, error)) error { func (c *conn) UpdateOfflineSessions(userID string, connID string, updater func(s storage.OfflineSessions) (storage.OfflineSessions, error)) error {
ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout) ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout)
defer cancel() defer cancel()
return c.txnUpdate(ctx, keySession(offlineSessionPrefix, userID, connID), func(currentValue []byte) ([]byte, error) { return c.txnUpdate(ctx, keySession(userID, connID), func(currentValue []byte) ([]byte, error) {
var current OfflineSessions var current OfflineSessions
if len(currentValue) > 0 { if len(currentValue) > 0 {
if err := json.Unmarshal(currentValue, &current); err != nil { if err := json.Unmarshal(currentValue, &current); err != nil {
@ -363,7 +363,7 @@ func (c *conn) GetOfflineSessions(userID string, connID string) (s storage.Offli
ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout) ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout)
defer cancel() defer cancel()
var os OfflineSessions var os OfflineSessions
if err = c.getKey(ctx, keySession(offlineSessionPrefix, userID, connID), &os); err != nil { if err = c.getKey(ctx, keySession(userID, connID), &os); err != nil {
return return
} }
return toStorageOfflineSessions(os), nil return toStorageOfflineSessions(os), nil
@ -372,7 +372,7 @@ func (c *conn) GetOfflineSessions(userID string, connID string) (s storage.Offli
func (c *conn) DeleteOfflineSessions(userID string, connID string) error { func (c *conn) DeleteOfflineSessions(userID string, connID string) error {
ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout) ctx, cancel := context.WithTimeout(context.Background(), defaultStorageTimeout)
defer cancel() defer cancel()
return c.deleteKey(ctx, keySession(offlineSessionPrefix, userID, connID)) return c.deleteKey(ctx, keySession(userID, connID))
} }
func (c *conn) CreateConnector(connector storage.Connector) error { func (c *conn) CreateConnector(connector storage.Connector) error {
@ -564,8 +564,8 @@ func (c *conn) txnUpdate(ctx context.Context, key string, update func(current []
func keyID(prefix, id string) string { return prefix + id } func keyID(prefix, id string) string { return prefix + id }
func keyEmail(prefix, email string) string { return prefix + strings.ToLower(email) } func keyEmail(prefix, email string) string { return prefix + strings.ToLower(email) }
func keySession(prefix, userID, connID string) string { func keySession(userID, connID string) string {
return prefix + strings.ToLower(userID+"|"+connID) return offlineSessionPrefix + strings.ToLower(userID+"|"+connID)
} }
func (c *conn) CreateDeviceRequest(d storage.DeviceRequest) error { func (c *conn) CreateDeviceRequest(d storage.DeviceRequest) error {

View file

@ -19,7 +19,7 @@ package k8sapi
// Where possible, json tags match the cli argument names. // Where possible, json tags match the cli argument names.
// Top level config objects and all values required for proper functioning are not "omitempty". Any truly optional piece of config is allowed to be omitted. // Top level config objects and all values required for proper functioning are not "omitempty". Any truly optional piece of config is allowed to be omitted.
// Config holds the information needed to build connect to remote kubernetes clusters as a given user // Config holds the information needed to build connect to remote kubernetes clusters as a given user.
type Config struct { type Config struct {
// Legacy field from pkg/api/types.go TypeMeta. // Legacy field from pkg/api/types.go TypeMeta.
// TODO(jlowdermilk): remove this after eliminating downstream dependencies. // TODO(jlowdermilk): remove this after eliminating downstream dependencies.
@ -51,7 +51,7 @@ type Preferences struct {
Extensions []NamedExtension `json:"extensions,omitempty"` Extensions []NamedExtension `json:"extensions,omitempty"`
} }
// Cluster contains information about how to communicate with a kubernetes cluster // Cluster contains information about how to communicate with a kubernetes cluster.
type Cluster struct { type Cluster struct {
// Server is the address of the kubernetes cluster (https://hostname:port). // Server is the address of the kubernetes cluster (https://hostname:port).
Server string `json:"server"` Server string `json:"server"`
@ -97,7 +97,8 @@ type AuthInfo struct {
Extensions []NamedExtension `json:"extensions,omitempty"` Extensions []NamedExtension `json:"extensions,omitempty"`
} }
// Context is a tuple of references to a cluster (how do I communicate with a kubernetes cluster), a user (how do I identify myself), and a namespace (what subset of resources do I want to work with) // Context is a tuple of references to a cluster (how do I communicate with a kubernetes cluster),
// a user (how do I identify myself), and a namespace (what subset of resources do I want to work with).
type Context struct { type Context struct {
// Cluster is the name of the cluster for this context // Cluster is the name of the cluster for this context
Cluster string `json:"cluster"` Cluster string `json:"cluster"`

View file

@ -378,6 +378,8 @@ func (c *conn) ListRefreshTokens() ([]storage.RefreshToken, error) {
if err != nil { if err != nil {
return nil, fmt.Errorf("query: %v", err) return nil, fmt.Errorf("query: %v", err)
} }
defer rows.Close()
var tokens []storage.RefreshToken var tokens []storage.RefreshToken
for rows.Next() { for rows.Next() {
r, err := scanRefresh(rows) r, err := scanRefresh(rows)
@ -556,6 +558,8 @@ func (c *conn) ListClients() ([]storage.Client, error) {
if err != nil { if err != nil {
return nil, err return nil, err
} }
defer rows.Close()
var clients []storage.Client var clients []storage.Client
for rows.Next() { for rows.Next() {
cli, err := scanClient(rows) cli, err := scanClient(rows)
@ -652,6 +656,7 @@ func (c *conn) ListPasswords() ([]storage.Password, error) {
if err != nil { if err != nil {
return nil, err return nil, err
} }
defer rows.Close()
var passwords []storage.Password var passwords []storage.Password
for rows.Next() { for rows.Next() {
@ -837,6 +842,8 @@ func (c *conn) ListConnectors() ([]storage.Connector, error) {
if err != nil { if err != nil {
return nil, err return nil, err
} }
defer rows.Close()
var connectors []storage.Connector var connectors []storage.Connector
for rows.Next() { for rows.Next() {
conn, err := scanConnector(rows) conn, err := scanConnector(rows)

View file

@ -386,22 +386,19 @@ type Keys struct {
// NewUserCode returns a randomized 8 character user code for the device flow. // NewUserCode returns a randomized 8 character user code for the device flow.
// No vowels are included to prevent accidental generation of words // No vowels are included to prevent accidental generation of words
func NewUserCode() (string, error) { func NewUserCode() string {
code, err := randomString(8) code := randomString(8)
if err != nil { return code[:4] + "-" + code[4:]
return "", err
}
return code[:4] + "-" + code[4:], nil
} }
func randomString(n int) (string, error) { func randomString(n int) string {
v := big.NewInt(int64(len(validUserCharacters))) v := big.NewInt(int64(len(validUserCharacters)))
bytes := make([]byte, n) bytes := make([]byte, n)
for i := 0; i < n; i++ { for i := 0; i < n; i++ {
c, _ := rand.Int(rand.Reader, v) c, _ := rand.Int(rand.Reader, v)
bytes[i] = validUserCharacters[c.Int64()] bytes[i] = validUserCharacters[c.Int64()]
} }
return string(bytes), nil return string(bytes)
} }
// DeviceRequest represents an OIDC device authorization request. It holds the state of a device request until the user // DeviceRequest represents an OIDC device authorization request. It holds the state of a device request until the user