From 14b648d203f3936ad326081ccffbfeaa2e30f646 Mon Sep 17 00:00:00 2001 From: Rohit Date: Wed, 31 Jul 2019 21:02:22 -0700 Subject: [PATCH] fixed golint issues. --- .../legacy-cloud-providers/azure/auth/azure_auth.go | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go b/staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go index 22ef2b170b3..290d9515513 100644 --- a/staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go +++ b/staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go @@ -32,7 +32,7 @@ import ( var ( // ErrorNoAuth indicates that no credentials are provided. ErrorNoAuth = fmt.Errorf("no credentials provided for Azure cloud provider") - // Tenenatid value for Azure Stack ADFS case. + // ADFSIdentitySystem indicates value of tenantId for ADFS on Azure Stack. ADFSIdentitySystem = "ADFS" ) @@ -64,11 +64,11 @@ type AzureAuthConfig struct { // GetServicePrincipalToken creates a new service principal token based on the configuration func GetServicePrincipalToken(config *AzureAuthConfig, env *azure.Environment) (*adal.ServicePrincipalToken, error) { - var tenantId string + var tenantID string if strings.EqualFold(config.IdentitySystem, ADFSIdentitySystem) { - tenantId = "adfs" + tenantID = "adfs" } else { - tenantId = config.TenantID + tenantID = config.TenantID } if config.UseManagedIdentityExtension { @@ -89,7 +89,7 @@ func GetServicePrincipalToken(config *AzureAuthConfig, env *azure.Environment) ( env.ServiceManagementEndpoint) } - oauthConfig, err := adal.NewOAuthConfig(env.ActiveDirectoryEndpoint, tenantId) + oauthConfig, err := adal.NewOAuthConfig(env.ActiveDirectoryEndpoint, tenantID) if err != nil { return nil, fmt.Errorf("creating the OAuth config: %v", err) }