Skip to content

Commit 1e295b6

Browse files
authored
upgrade gofumpt (#7420)
Signed-off-by: fabian4 <[email protected]>
1 parent 84672ca commit 1e295b6

File tree

17 files changed

+65
-63
lines changed

17 files changed

+65
-63
lines changed

internal/cmd/certgen.go

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -170,43 +170,43 @@ func patchTopologyInjectorWebhook(ctx context.Context, cli client.Client, cfg *c
170170
}
171171

172172
// outputCertsForLocal outputs the provided certs to the local directory as files.
173-
func outputCertsForLocal(localPath string, certs *crypto.Certificates) (err error) {
173+
func outputCertsForLocal(localPath string, certs *crypto.Certificates) error {
174174
egDir := path.Join(localPath, "envoy-gateway")
175-
if err = file.WriteDir(certs.CACertificate, egDir, "ca.crt"); err != nil {
175+
if err := file.WriteDir(certs.CACertificate, egDir, "ca.crt"); err != nil {
176176
return err
177177
}
178-
if err = file.WriteDir(certs.EnvoyGatewayCertificate, egDir, "tls.crt"); err != nil {
178+
if err := file.WriteDir(certs.EnvoyGatewayCertificate, egDir, "tls.crt"); err != nil {
179179
return err
180180
}
181-
if err = file.WriteDir(certs.EnvoyGatewayPrivateKey, egDir, "tls.key"); err != nil {
181+
if err := file.WriteDir(certs.EnvoyGatewayPrivateKey, egDir, "tls.key"); err != nil {
182182
return err
183183
}
184184

185185
envoyDir := path.Join(localPath, "envoy")
186-
if err = file.WriteDir(certs.CACertificate, envoyDir, "ca.crt"); err != nil {
186+
if err := file.WriteDir(certs.CACertificate, envoyDir, "ca.crt"); err != nil {
187187
return err
188188
}
189-
if err = file.WriteDir(certs.EnvoyCertificate, envoyDir, "tls.crt"); err != nil {
189+
if err := file.WriteDir(certs.EnvoyCertificate, envoyDir, "tls.crt"); err != nil {
190190
return err
191191
}
192-
if err = file.WriteDir(certs.EnvoyPrivateKey, envoyDir, "tls.key"); err != nil {
192+
if err := file.WriteDir(certs.EnvoyPrivateKey, envoyDir, "tls.key"); err != nil {
193193
return err
194194
}
195195

196196
rlDir := path.Join(localPath, "envoy-rate-limit")
197-
if err = file.WriteDir(certs.CACertificate, rlDir, "ca.crt"); err != nil {
197+
if err := file.WriteDir(certs.CACertificate, rlDir, "ca.crt"); err != nil {
198198
return err
199199
}
200-
if err = file.WriteDir(certs.EnvoyRateLimitCertificate, rlDir, "tls.crt"); err != nil {
200+
if err := file.WriteDir(certs.EnvoyRateLimitCertificate, rlDir, "tls.crt"); err != nil {
201201
return err
202202
}
203-
if err = file.WriteDir(certs.EnvoyRateLimitPrivateKey, rlDir, "tls.key"); err != nil {
203+
if err := file.WriteDir(certs.EnvoyRateLimitPrivateKey, rlDir, "tls.key"); err != nil {
204204
return err
205205
}
206206

207-
if err = file.WriteDir(certs.OIDCHMACSecret, path.Join(localPath, "envoy-oidc-hmac"), "hmac-secret"); err != nil {
207+
if err := file.WriteDir(certs.OIDCHMACSecret, path.Join(localPath, "envoy-oidc-hmac"), "hmac-secret"); err != nil {
208208
return err
209209
}
210210

211-
return
211+
return nil
212212
}

internal/filewatcher/filewatcher.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -175,12 +175,12 @@ func (fw *fileWatcher) findWorker(path string) (*workerState, string, error) {
175175
return ws, cleanedPath, nil
176176
}
177177

178-
func getPath(path string) (cleanedPath, parentPath string) {
179-
cleanedPath = filepath.Clean(path)
180-
parentPath, _ = filepath.Split(cleanedPath)
178+
func getPath(path string) (string, string) {
179+
cleanedPath := filepath.Clean(path)
180+
parentPath, _ := filepath.Split(cleanedPath)
181181
if f, err := os.Lstat(cleanedPath); err == nil && f.IsDir() {
182182
parentPath = cleanedPath
183183
}
184184

185-
return
185+
return cleanedPath, parentPath
186186
}

internal/gatewayapi/runner/runner.go

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ func (r *Runner) Name() string {
7878
}
7979

8080
// Start starts the gateway-api translator runner
81-
func (r *Runner) Start(ctx context.Context) (err error) {
81+
func (r *Runner) Start(ctx context.Context) error {
8282
r.Logger = r.Logger.WithName(r.Name()).WithValues("runner", r.Name())
8383

8484
go r.startWasmCache(ctx)
@@ -88,7 +88,7 @@ func (r *Runner) Start(ctx context.Context) (err error) {
8888

8989
go r.subscribeAndTranslate(c)
9090
r.Logger.Info("started")
91-
return
91+
return nil
9292
}
9393

9494
func (r *Runner) startWasmCache(ctx context.Context) {
@@ -362,18 +362,19 @@ func (r *Runner) subscribeAndTranslate(sub <-chan watchable.Snapshot[string, *re
362362
r.Logger.Info("shutting down")
363363
}
364364

365-
func (r *Runner) loadTLSConfig(ctx context.Context) (tlsConfig *tls.Config, salt []byte, err error) {
365+
func (r *Runner) loadTLSConfig(ctx context.Context) (*tls.Config, []byte, error) {
366366
switch {
367367
case r.EnvoyGateway.Provider.IsRunningOnKubernetes():
368-
salt, err = hmac(ctx, r.ControllerNamespace)
368+
salt, err := hmac(ctx, r.ControllerNamespace)
369369
if err != nil {
370370
return nil, nil, fmt.Errorf("failed to get hmac secret: %w", err)
371371
}
372372

373-
tlsConfig, err = crypto.LoadTLSConfig(serveTLSCertFilepath, serveTLSKeyFilepath, serveTLSCaFilepath)
373+
tlsConfig, err := crypto.LoadTLSConfig(serveTLSCertFilepath, serveTLSKeyFilepath, serveTLSCaFilepath)
374374
if err != nil {
375375
return nil, nil, fmt.Errorf("failed to create tls config: %w", err)
376376
}
377+
return tlsConfig, salt, nil
377378

378379
case r.EnvoyGateway.Provider.IsRunningOnHost():
379380
// Get config
@@ -390,7 +391,7 @@ func (r *Runner) loadTLSConfig(ctx context.Context) (tlsConfig *tls.Config, salt
390391

391392
// Read HMAC secret
392393
hmacPath := filepath.Join(paths.CertDir("envoy-oidc-hmac"), "hmac-secret")
393-
salt, err = os.ReadFile(hmacPath)
394+
salt, err := os.ReadFile(hmacPath)
394395
if err != nil {
395396
return nil, nil, fmt.Errorf("failed to get hmac secret: %w", err)
396397
}
@@ -400,15 +401,15 @@ func (r *Runner) loadTLSConfig(ctx context.Context) (tlsConfig *tls.Config, salt
400401
keyPath := filepath.Join(certDir, "tls.key")
401402
caPath := filepath.Join(certDir, "ca.crt")
402403

403-
tlsConfig, err = crypto.LoadTLSConfig(certPath, keyPath, caPath)
404+
tlsConfig, err := crypto.LoadTLSConfig(certPath, keyPath, caPath)
404405
if err != nil {
405406
return nil, nil, fmt.Errorf("failed to create tls config: %w", err)
406407
}
408+
return tlsConfig, salt, nil
407409

408410
default:
409411
return nil, nil, fmt.Errorf("no valid tls certificates")
410412
}
411-
return
412413
}
413414

414415
func unstructuredToPolicyStatus(policyStatus map[string]any) gwapiv1.PolicyStatus {
@@ -684,7 +685,7 @@ func (r *Runner) deleteKeys(kc *KeyCache) {
684685

685686
// hmac returns the HMAC secret generated by the CertGen job.
686687
// hmac will be used as a hash salt to generate unguessable downloading paths for Wasm modules.
687-
func hmac(ctx context.Context, namespace string) (hmac []byte, err error) {
688+
func hmac(ctx context.Context, namespace string) ([]byte, error) {
688689
// Get the HMAC secret.
689690
// HMAC secret is generated by the CertGen job and stored in a secret
690691
cfg, err := ctrl.GetConfig()
@@ -707,5 +708,5 @@ func hmac(ctx context.Context, namespace string) (hmac []byte, err error) {
707708
return nil, fmt.Errorf(
708709
"HMAC secret not found in secret %s/%s", namespace, hmacSecretName)
709710
}
710-
return
711+
return hmac, err
711712
}

internal/gatewayapi/status/gateway_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ func TestUpdateGatewayStatusProgrammedCondition(t *testing.T) {
171171
for i := 0; i < 20; i++ {
172172
addr.IPv4 = append(addr.IPv4, strconv.Itoa(i))
173173
}
174-
return
174+
return addr
175175
}(),
176176
svc: &corev1.Service{
177177
TypeMeta: metav1.TypeMeta{},
@@ -192,7 +192,7 @@ func TestUpdateGatewayStatusProgrammedCondition(t *testing.T) {
192192
Value: strconv.Itoa(i),
193193
})
194194
}
195-
return
195+
return addr
196196
}(),
197197
},
198198
{

internal/gatewayapi/translator.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -347,7 +347,7 @@ func (t *Translator) GetRelevantGateways(resources *resource.Resources) (
347347
status.SetGatewayClassAccepted(resources.GatewayClass,
348348
false, string(gwapiv1.GatewayClassReasonInvalidParameters),
349349
fmt.Sprintf("%s: %v", status.MsgGatewayClassInvalidParams, err))
350-
return
350+
return acceptedGateways, failedGateways
351351
}
352352

353353
// TODO: remove this nil check after we update all the testdata.
@@ -413,7 +413,7 @@ func (t *Translator) GetRelevantGateways(resources *resource.Resources) (
413413
gCtx.ResetListeners(resources, envoyproxyMap)
414414
acceptedGateways = append(acceptedGateways, gCtx)
415415
}
416-
return
416+
return acceptedGateways, failedGateways
417417
}
418418

419419
func validateEnvoyProxy(ep *egv1a1.EnvoyProxy) error {

internal/globalratelimit/runner/runner.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ func New(cfg *Config) *Runner {
7272
}
7373

7474
// Start starts the infrastructure runner
75-
func (r *Runner) Start(ctx context.Context) (err error) {
75+
func (r *Runner) Start(ctx context.Context) error {
7676
r.Logger = r.Logger.WithName(r.Name()).WithValues("runner", r.Name())
7777

7878
// Set up the gRPC server and register the xDS handler.
@@ -101,7 +101,7 @@ func (r *Runner) Start(ctx context.Context) (err error) {
101101
go r.translateFromSubscription(ctx, c)
102102

103103
r.Logger.Info("started")
104-
return
104+
return err
105105
}
106106

107107
func (r *Runner) serveXdsConfigServer(ctx context.Context) {
@@ -211,7 +211,7 @@ func (r *Runner) addNewSnapshot(ctx context.Context, resource types.XdsResources
211211
return nil
212212
}
213213

214-
func (r *Runner) loadTLSConfig() (tlsConfig *tls.Config, err error) {
214+
func (r *Runner) loadTLSConfig() (*tls.Config, error) {
215215
var certPath, keyPath, caPath string
216216

217217
switch {
@@ -240,9 +240,9 @@ func (r *Runner) loadTLSConfig() (tlsConfig *tls.Config, err error) {
240240
return nil, fmt.Errorf("no valid tls certificates")
241241
}
242242

243-
tlsConfig, err = crypto.LoadTLSConfig(certPath, keyPath, caPath)
243+
tlsConfig, err := crypto.LoadTLSConfig(certPath, keyPath, caPath)
244244
if err != nil {
245245
return nil, fmt.Errorf("failed to create tls config: %w", err)
246246
}
247-
return
247+
return tlsConfig, err
248248
}

internal/infrastructure/runner/runner.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ func (r *Runner) Start(ctx context.Context) (err error) {
9999
// Since leader election is disabled subscribe to infraIR to initialize the infrastructure and Close when the context is done.
100100
go subscribeInitInfraAndCloseInfraIRMessage()
101101
}
102-
return
102+
return err
103103
}
104104

105105
func (r *Runner) updateProxyInfraFromSubscription(ctx context.Context, sub <-chan watchable.Snapshot[string, *ir.Infra]) {

internal/kubernetes/client.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,5 +188,5 @@ func (c *client) PodExec(namespacedName types.NamespacedName, container, command
188188

189189
stdout = stdoutBuf.String()
190190
stderr = stderrBuf.String()
191-
return
191+
return stdout, stderr, err
192192
}

internal/provider/runner/runner.go

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -87,17 +87,16 @@ func (r *Runner) createKubernetesProvider(ctx context.Context) (*kubernetes.Prov
8787
return p, err
8888
}
8989

90-
func (r *Runner) createCustomResourceProvider(ctx context.Context) (p provider.Provider, err error) {
90+
func (r *Runner) createCustomResourceProvider(ctx context.Context) (provider.Provider, error) {
9191
switch r.EnvoyGateway.Provider.Custom.Resource.Type {
9292
case egv1a1.ResourceProviderTypeFile:
93-
p, err = file.New(ctx, &r.Server, r.ProviderResources)
93+
p, err := file.New(ctx, &r.Server, r.ProviderResources)
9494
if err != nil {
9595
return nil, fmt.Errorf("failed to create provider %s: %w", egv1a1.ProviderTypeCustom, err)
9696
}
97+
return p, err
9798

9899
default:
99100
return nil, fmt.Errorf("unsupported resource provider type")
100101
}
101-
102-
return
103102
}

internal/utils/path/path.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ func ValidateOutputPath(outputPath string) (string, error) {
2626
}
2727

2828
// ListDirsAndFiles return a list of directories and files from a list of paths recursively.
29-
func ListDirsAndFiles(paths []string) (dirs, files sets.Set[string]) {
30-
dirs, files = sets.New[string](), sets.New[string]()
29+
func ListDirsAndFiles(paths []string) (sets.Set[string], sets.Set[string]) {
30+
dirs, files := sets.New[string](), sets.New[string]()
3131
// Separate paths by whether is a directory or not.
3232
paths = sets.NewString(paths...).UnsortedList()
3333
for _, path := range paths {
@@ -54,7 +54,7 @@ func ListDirsAndFiles(paths []string) (dirs, files sets.Set[string]) {
5454
}
5555
files.Delete(ignoreFiles...)
5656

57-
return
57+
return dirs, files
5858
}
5959

6060
// GetParentDirs returns all the parent directories of given files.

0 commit comments

Comments
 (0)