Skip to content

Commit 1cf7c3a

Browse files
authored
🧹 Bumping GolangciLint version and fixing lint issues (external-secrets#2304)
Signed-off-by: Gustavo Carvalho <gusfcarvalho@gmail.com>
1 parent c886568 commit 1cf7c3a

File tree

52 files changed

+183
-195
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+183
-195
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ on:
88

99
env:
1010
# Common versions
11-
GOLANGCI_VERSION: 'v1.49.0'
11+
GOLANGCI_VERSION: 'v1.52.2'
1212
KUBERNETES_VERSION: '1.24.x'
1313

1414
# Sonar

apis/externalsecrets/v1beta1/externalsecret_validator.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ import (
2222

2323
type ExternalSecretValidator struct{}
2424

25-
func (esv *ExternalSecretValidator) ValidateCreate(ctx context.Context, obj runtime.Object) error {
25+
func (esv *ExternalSecretValidator) ValidateCreate(_ context.Context, obj runtime.Object) error {
2626
return validateExternalSecret(obj)
2727
}
2828

29-
func (esv *ExternalSecretValidator) ValidateUpdate(ctx context.Context, oldObj, newObj runtime.Object) error {
29+
func (esv *ExternalSecretValidator) ValidateUpdate(_ context.Context, _, newObj runtime.Object) error {
3030
return validateExternalSecret(newObj)
3131
}
3232

33-
func (esv *ExternalSecretValidator) ValidateDelete(ctx context.Context, obj runtime.Object) error {
33+
func (esv *ExternalSecretValidator) ValidateDelete(_ context.Context, _ runtime.Object) error {
3434
return nil
3535
}
3636

apis/externalsecrets/v1beta1/provider_schema_test.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -30,45 +30,45 @@ func (p *PP) Capabilities() SecretStoreCapabilities {
3030
}
3131

3232
// New constructs a SecretsManager Provider.
33-
func (p *PP) NewClient(ctx context.Context, store GenericStore, kube client.Client, namespace string) (SecretsClient, error) {
33+
func (p *PP) NewClient(_ context.Context, _ GenericStore, _ client.Client, _ string) (SecretsClient, error) {
3434
return p, nil
3535
}
3636

3737
// PushSecret writes a single secret into a provider.
38-
func (p *PP) PushSecret(ctx context.Context, value []byte, remoteRef PushRemoteRef) error {
38+
func (p *PP) PushSecret(_ context.Context, _ []byte, _ PushRemoteRef) error {
3939
return nil
4040
}
4141

4242
// DeleteSecret deletes a single secret from a provider.
43-
func (p *PP) DeleteSecret(ctx context.Context, remoteRef PushRemoteRef) error {
43+
func (p *PP) DeleteSecret(_ context.Context, _ PushRemoteRef) error {
4444
return nil
4545
}
4646

4747
// GetSecret returns a single secret from the provider.
48-
func (p *PP) GetSecret(ctx context.Context, ref ExternalSecretDataRemoteRef) ([]byte, error) {
48+
func (p *PP) GetSecret(_ context.Context, _ ExternalSecretDataRemoteRef) ([]byte, error) {
4949
return []byte("NOOP"), nil
5050
}
5151

5252
// GetSecretMap returns multiple k/v pairs from the provider.
53-
func (p *PP) GetSecretMap(ctx context.Context, ref ExternalSecretDataRemoteRef) (map[string][]byte, error) {
53+
func (p *PP) GetSecretMap(_ context.Context, _ ExternalSecretDataRemoteRef) (map[string][]byte, error) {
5454
return map[string][]byte{}, nil
5555
}
5656

5757
// Empty GetAllSecrets.
58-
func (p *PP) GetAllSecrets(ctx context.Context, ref ExternalSecretFind) (map[string][]byte, error) {
58+
func (p *PP) GetAllSecrets(_ context.Context, _ ExternalSecretFind) (map[string][]byte, error) {
5959
// TO be implemented
6060
return map[string][]byte{}, nil
6161
}
6262

63-
func (p *PP) Close(ctx context.Context) error {
63+
func (p *PP) Close(_ context.Context) error {
6464
return nil
6565
}
6666

6767
func (p *PP) Validate() (ValidationResult, error) {
6868
return ValidationResultReady, nil
6969
}
7070

71-
func (p *PP) ValidateStore(store GenericStore) error {
71+
func (p *PP) ValidateStore(_ GenericStore) error {
7272
return nil
7373
}
7474

apis/externalsecrets/v1beta1/secretstore_validator.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ const (
3131
type GenericStoreValidator struct{}
3232

3333
// ValidateCreate implements webhook.Validator so a webhook will be registered for the type.
34-
func (r *GenericStoreValidator) ValidateCreate(ctx context.Context, obj runtime.Object) error {
34+
func (r *GenericStoreValidator) ValidateCreate(_ context.Context, obj runtime.Object) error {
3535
st, ok := obj.(GenericStore)
3636
if !ok {
3737
return fmt.Errorf(errInvalidStore)
@@ -40,7 +40,7 @@ func (r *GenericStoreValidator) ValidateCreate(ctx context.Context, obj runtime.
4040
}
4141

4242
// ValidateUpdate implements webhook.Validator so a webhook will be registered for the type.
43-
func (r *GenericStoreValidator) ValidateUpdate(ctx context.Context, oldObj, newObj runtime.Object) error {
43+
func (r *GenericStoreValidator) ValidateUpdate(_ context.Context, _, newObj runtime.Object) error {
4444
st, ok := newObj.(GenericStore)
4545
if !ok {
4646
return fmt.Errorf(errInvalidStore)
@@ -49,7 +49,7 @@ func (r *GenericStoreValidator) ValidateUpdate(ctx context.Context, oldObj, newO
4949
}
5050

5151
// ValidateDelete implements webhook.Validator so a webhook will be registered for the type.
52-
func (r *GenericStoreValidator) ValidateDelete(ctx context.Context, obj runtime.Object) error {
52+
func (r *GenericStoreValidator) ValidateDelete(_ context.Context, _ runtime.Object) error {
5353
return nil
5454
}
5555

pkg/controllers/crds/crds_controller.go

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -200,10 +200,7 @@ func (r *Reconciler) updateCRD(ctx context.Context, req ctrl.Request) error {
200200
return err
201201
}
202202
}
203-
if err := r.Update(ctx, &updatedResource); err != nil {
204-
return err
205-
}
206-
return nil
203+
return r.Update(ctx, &updatedResource)
207204
}
208205

209206
func injectService(crd *apiext.CustomResourceDefinition, svc types.NamespacedName) error {
@@ -344,10 +341,7 @@ func (r *Reconciler) refreshCerts(refreshCA bool, secret *corev1.Secret) error {
344341
if err != nil {
345342
return err
346343
}
347-
if err := r.writeSecret(cert, key, caArtifacts, secret); err != nil {
348-
return err
349-
}
350-
return nil
344+
return r.writeSecret(cert, key, caArtifacts, secret)
351345
}
352346

353347
func buildArtifactsFromSecret(secret *corev1.Secret) (*KeyPairArtifacts, error) {

pkg/controllers/externalsecret/externalsecret_controller.go

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -331,10 +331,7 @@ func createOrUpdate(ctx context.Context, c client.Client, obj client.Object, f f
331331
return err
332332
}
333333
// Setting Field Owner even for CreationPolicy==Create
334-
if err := c.Create(ctx, obj, client.FieldOwner(fqdn)); err != nil {
335-
return err
336-
}
337-
return nil
334+
return c.Create(ctx, obj, client.FieldOwner(fqdn))
338335
}
339336

340337
existing := obj.DeepCopyObject()
@@ -346,10 +343,7 @@ func createOrUpdate(ctx context.Context, c client.Client, obj client.Object, f f
346343
return nil
347344
}
348345

349-
if err := c.Update(ctx, obj, client.FieldOwner(fqdn)); err != nil {
350-
return err
351-
}
352-
return nil
346+
return c.Update(ctx, obj, client.FieldOwner(fqdn))
353347
}
354348

355349
func patchSecret(ctx context.Context, c client.Client, scheme *runtime.Scheme, secret *v1.Secret, mutationFunc func() error, fieldOwner string) error {

pkg/controllers/externalsecret/externalsecret_controller_template.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ func (p *Parser) MergeSecret(ctx context.Context, namespace string, tpl esv1beta
100100
return nil
101101
}
102102

103-
func (p *Parser) MergeLiteral(ctx context.Context, tpl esv1beta1.TemplateFrom) error {
103+
func (p *Parser) MergeLiteral(_ context.Context, tpl esv1beta1.TemplateFrom) error {
104104
if tpl.Literal == nil {
105105
return nil
106106
}

pkg/controllers/secretstore/client_manager_test.go

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -331,7 +331,7 @@ func (f *WrapProvider) Capabilities() esv1beta1.SecretStoreCapabilities {
331331
}
332332

333333
// ValidateStore checks if the provided store is valid.
334-
func (f *WrapProvider) ValidateStore(store esv1beta1.GenericStore) error {
334+
func (f *WrapProvider) ValidateStore(_ esv1beta1.GenericStore) error {
335335
return nil
336336
}
337337

@@ -340,15 +340,15 @@ type MockFakeClient struct {
340340
closeCalled bool
341341
}
342342

343-
func (c *MockFakeClient) PushSecret(ctx context.Context, value []byte, remoteRef esv1beta1.PushRemoteRef) error {
343+
func (c *MockFakeClient) PushSecret(_ context.Context, _ []byte, _ esv1beta1.PushRemoteRef) error {
344344
return nil
345345
}
346346

347-
func (c *MockFakeClient) DeleteSecret(ctx context.Context, remoteRef esv1beta1.PushRemoteRef) error {
347+
func (c *MockFakeClient) DeleteSecret(_ context.Context, _ esv1beta1.PushRemoteRef) error {
348348
return nil
349349
}
350350

351-
func (c *MockFakeClient) GetSecret(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
351+
func (c *MockFakeClient) GetSecret(_ context.Context, _ esv1beta1.ExternalSecretDataRemoteRef) ([]byte, error) {
352352
return nil, nil
353353
}
354354

@@ -357,16 +357,16 @@ func (c *MockFakeClient) Validate() (esv1beta1.ValidationResult, error) {
357357
}
358358

359359
// GetSecretMap returns multiple k/v pairs from the provider.
360-
func (c *MockFakeClient) GetSecretMap(ctx context.Context, ref esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
360+
func (c *MockFakeClient) GetSecretMap(_ context.Context, _ esv1beta1.ExternalSecretDataRemoteRef) (map[string][]byte, error) {
361361
return nil, nil
362362
}
363363

364364
// GetAllSecrets returns multiple k/v pairs from the provider.
365-
func (c *MockFakeClient) GetAllSecrets(ctx context.Context, ref esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
365+
func (c *MockFakeClient) GetAllSecrets(_ context.Context, _ esv1beta1.ExternalSecretFind) (map[string][]byte, error) {
366366
return nil, nil
367367
}
368368

369-
func (c *MockFakeClient) Close(ctx context.Context) error {
369+
func (c *MockFakeClient) Close(_ context.Context) error {
370370
c.closeCalled = true
371371
return nil
372372
}

pkg/generator/acr/acr.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ func (g *Generator) generate(
162162

163163
type accessTokenFetcher func(acrRefreshToken, tenantID, registryURL, scope string) (string, error)
164164

165-
func fetchACRAccessToken(acrRefreshToken, tenantID, registryURL, scope string) (string, error) {
165+
func fetchACRAccessToken(acrRefreshToken, _, registryURL, scope string) (string, error) {
166166
formData := url.Values{
167167
"grant_type": {"refresh_token"},
168168
"service": {registryURL},

pkg/generator/acr/acr_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,6 @@ type FakeTokenGetter struct {
213213
err error
214214
}
215215

216-
func (f *FakeTokenGetter) GetToken(ctx context.Context, opts policy.TokenRequestOptions) (azcore.AccessToken, error) {
216+
func (f *FakeTokenGetter) GetToken(_ context.Context, _ policy.TokenRequestOptions) (azcore.AccessToken, error) {
217217
return f.token, f.err
218218
}

0 commit comments

Comments
 (0)