mirror of
https://github.com/kubernetes/client-go.git
synced 2025-07-06 03:36:26 +00:00
Cleanup staticcheck issues for package in client-go.
Kubernetes-commit: c8c055b3163dd2661b3f9dd1b0ffb718a61aba24
This commit is contained in:
parent
8248d0a0e6
commit
532b6f676e
@ -439,8 +439,8 @@ func (a ActionImpl) GetSubresource() string {
|
|||||||
return a.Subresource
|
return a.Subresource
|
||||||
}
|
}
|
||||||
func (a ActionImpl) Matches(verb, resource string) bool {
|
func (a ActionImpl) Matches(verb, resource string) bool {
|
||||||
return strings.ToLower(verb) == strings.ToLower(a.Verb) &&
|
return strings.EqualFold(verb, a.Verb) &&
|
||||||
strings.ToLower(resource) == strings.ToLower(a.Resource.Resource)
|
strings.EqualFold(resource, a.Resource.Resource)
|
||||||
}
|
}
|
||||||
func (a ActionImpl) DeepCopy() Action {
|
func (a ActionImpl) DeepCopy() Action {
|
||||||
ret := a
|
ret := a
|
||||||
|
@ -204,7 +204,8 @@ func TestWatchCallMultipleInvocation(t *testing.T) {
|
|||||||
event := <-w.ResultChan()
|
event := <-w.ResultChan()
|
||||||
accessor, err := meta.Accessor(event.Object)
|
accessor, err := meta.Accessor(event.Object)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("unexpected error: %v", err)
|
t.Errorf("unexpected error: %v", err)
|
||||||
|
break
|
||||||
}
|
}
|
||||||
assert.Equal(t, c.op, event.Type, "watch event mismatched")
|
assert.Equal(t, c.op, event.Type, "watch event mismatched")
|
||||||
assert.Equal(t, c.name, accessor.GetName(), "watched object mismatch")
|
assert.Equal(t, c.name, accessor.GetName(), "watched object mismatch")
|
||||||
|
@ -458,7 +458,6 @@ func TestCreateCleanDefaultCluster(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestCreateMissingContextNoDefault(t *testing.T) {
|
func TestCreateMissingContextNoDefault(t *testing.T) {
|
||||||
const expectedErrorContains = "Context was not found for specified context"
|
|
||||||
config := createValidTestConfig()
|
config := createValidTestConfig()
|
||||||
clientBuilder := NewNonInteractiveClientConfig(*config, "not-present", &ConfigOverrides{}, nil)
|
clientBuilder := NewNonInteractiveClientConfig(*config, "not-present", &ConfigOverrides{}, nil)
|
||||||
|
|
||||||
|
@ -24,19 +24,6 @@ import (
|
|||||||
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
|
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
|
||||||
)
|
)
|
||||||
|
|
||||||
type testLoader struct {
|
|
||||||
ClientConfigLoader
|
|
||||||
|
|
||||||
called bool
|
|
||||||
config *clientcmdapi.Config
|
|
||||||
err error
|
|
||||||
}
|
|
||||||
|
|
||||||
func (l *testLoader) Load() (*clientcmdapi.Config, error) {
|
|
||||||
l.called = true
|
|
||||||
return l.config, l.err
|
|
||||||
}
|
|
||||||
|
|
||||||
type testClientConfig struct {
|
type testClientConfig struct {
|
||||||
rawconfig *clientcmdapi.Config
|
rawconfig *clientcmdapi.Config
|
||||||
config *restclient.Config
|
config *restclient.Config
|
||||||
|
@ -185,9 +185,10 @@ func validateClusterInfo(clusterName string, clusterInfo clientcmdapi.Cluster) [
|
|||||||
}
|
}
|
||||||
if len(clusterInfo.CertificateAuthority) != 0 {
|
if len(clusterInfo.CertificateAuthority) != 0 {
|
||||||
clientCertCA, err := os.Open(clusterInfo.CertificateAuthority)
|
clientCertCA, err := os.Open(clusterInfo.CertificateAuthority)
|
||||||
defer clientCertCA.Close()
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
validationErrors = append(validationErrors, fmt.Errorf("unable to read certificate-authority %v for %v due to %v", clusterInfo.CertificateAuthority, clusterName, err))
|
validationErrors = append(validationErrors, fmt.Errorf("unable to read certificate-authority %v for %v due to %v", clusterInfo.CertificateAuthority, clusterName, err))
|
||||||
|
} else {
|
||||||
|
defer clientCertCA.Close()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -223,16 +224,18 @@ func validateAuthInfo(authInfoName string, authInfo clientcmdapi.AuthInfo) []err
|
|||||||
|
|
||||||
if len(authInfo.ClientCertificate) != 0 {
|
if len(authInfo.ClientCertificate) != 0 {
|
||||||
clientCertFile, err := os.Open(authInfo.ClientCertificate)
|
clientCertFile, err := os.Open(authInfo.ClientCertificate)
|
||||||
defer clientCertFile.Close()
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-cert %v for %v due to %v", authInfo.ClientCertificate, authInfoName, err))
|
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-cert %v for %v due to %v", authInfo.ClientCertificate, authInfoName, err))
|
||||||
|
} else {
|
||||||
|
defer clientCertFile.Close()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if len(authInfo.ClientKey) != 0 {
|
if len(authInfo.ClientKey) != 0 {
|
||||||
clientKeyFile, err := os.Open(authInfo.ClientKey)
|
clientKeyFile, err := os.Open(authInfo.ClientKey)
|
||||||
defer clientKeyFile.Close()
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-key %v for %v due to %v", authInfo.ClientKey, authInfoName, err))
|
validationErrors = append(validationErrors, fmt.Errorf("unable to read client-key %v for %v due to %v", authInfo.ClientKey, authInfoName, err))
|
||||||
|
} else {
|
||||||
|
defer clientKeyFile.Close()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -376,6 +376,9 @@ func TestGetPortsReturnsDynamicallyAssignedLocalPort(t *testing.T) {
|
|||||||
<-pf.Ready
|
<-pf.Ready
|
||||||
|
|
||||||
ports, err := pf.GetPorts()
|
ports, err := pf.GetPorts()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to get ports. error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
if len(ports) != 1 {
|
if len(ports) != 1 {
|
||||||
t.Fatalf("expected 1 port, got %d", len(ports))
|
t.Fatalf("expected 1 port, got %d", len(ports))
|
||||||
|
@ -35,7 +35,6 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type fakePod struct {
|
type fakePod struct {
|
||||||
name string
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (obj *fakePod) GetObjectKind() schema.ObjectKind { return schema.EmptyObjectKind }
|
func (obj *fakePod) GetObjectKind() schema.ObjectKind { return schema.EmptyObjectKind }
|
||||||
|
@ -37,7 +37,6 @@ type Parser struct {
|
|||||||
Name string
|
Name string
|
||||||
Root *ListNode
|
Root *ListNode
|
||||||
input string
|
input string
|
||||||
cur *ListNode
|
|
||||||
pos int
|
pos int
|
||||||
start int
|
start int
|
||||||
width int
|
width int
|
||||||
@ -186,8 +185,7 @@ func (p *Parser) parseInsideAction(cur *ListNode) error {
|
|||||||
func (p *Parser) parseRightDelim(cur *ListNode) error {
|
func (p *Parser) parseRightDelim(cur *ListNode) error {
|
||||||
p.pos += len(rightDelim)
|
p.pos += len(rightDelim)
|
||||||
p.consumeText()
|
p.consumeText()
|
||||||
cur = p.Root
|
return p.parseText(p.Root)
|
||||||
return p.parseText(cur)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// parseIdentifier scans build-in keywords, like "range" "end"
|
// parseIdentifier scans build-in keywords, like "range" "end"
|
||||||
@ -231,7 +229,7 @@ func (p *Parser) parseRecursive(cur *ListNode) error {
|
|||||||
func (p *Parser) parseNumber(cur *ListNode) error {
|
func (p *Parser) parseNumber(cur *ListNode) error {
|
||||||
r := p.peek()
|
r := p.peek()
|
||||||
if r == '+' || r == '-' {
|
if r == '+' || r == '-' {
|
||||||
r = p.next()
|
p.next()
|
||||||
}
|
}
|
||||||
for {
|
for {
|
||||||
r = p.next()
|
r = p.next()
|
||||||
|
Loading…
Reference in New Issue
Block a user