diff --git a/staging/src/k8s.io/apiserver/pkg/authorization/union/union.go b/staging/src/k8s.io/apiserver/pkg/authorization/union/union.go index 89d68ffed10..460d9a4ab57 100644 --- a/staging/src/k8s.io/apiserver/pkg/authorization/union/union.go +++ b/staging/src/k8s.io/apiserver/pkg/authorization/union/union.go @@ -88,7 +88,7 @@ func (authzHandler unionAuthzRulesHandler) RulesFor(user user.Info, namespace st for _, currAuthzHandler := range authzHandler { resourceRules, nonResourceRules, incomplete, err := currAuthzHandler.RulesFor(user, namespace) - if incomplete == true { + if incomplete { incompleteStatus = true } if err != nil { diff --git a/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go b/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go index 0e2650ae9ac..892aaf4a0d2 100644 --- a/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go +++ b/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/delete.go @@ -141,7 +141,7 @@ func DeleteResource(r rest.GracefulDeleter, allowsOptions bool, scope *RequestSc // that will break existing clients. // Other cases where resource is not instantly deleted are: namespace deletion // and pod graceful deletion. - if !wasDeleted && options.OrphanDependents != nil && *options.OrphanDependents == false { + if !wasDeleted && options.OrphanDependents != nil && !*options.OrphanDependents { status = http.StatusAccepted } // if the rest.Deleter returns a nil object, fill out a status. Callers may return a valid diff --git a/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/fieldmanager/capmanagers.go b/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/fieldmanager/capmanagers.go index ae91bf0b9e1..c3184e24154 100644 --- a/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/fieldmanager/capmanagers.go +++ b/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/fieldmanager/capmanagers.go @@ -67,7 +67,7 @@ func (f *capManagersManager) capUpdateManagers(managed Managed) (newManaged Mana // Gather all entries from updates updaters := []string{} for manager, fields := range managed.Fields() { - if fields.Applied() == false { + if !fields.Applied() { updaters = append(updaters, manager) } } diff --git a/staging/src/k8s.io/apiserver/pkg/registry/generic/registry/store.go b/staging/src/k8s.io/apiserver/pkg/registry/generic/registry/store.go index c1464de6457..2e0f7d9ecd4 100644 --- a/staging/src/k8s.io/apiserver/pkg/registry/generic/registry/store.go +++ b/staging/src/k8s.io/apiserver/pkg/registry/generic/registry/store.go @@ -683,10 +683,7 @@ func shouldOrphanDependents(ctx context.Context, e *Store, accessor metav1.Objec } // Get default orphan policy from this REST object type if it exists - if defaultGCPolicy == rest.OrphanDependents { - return true - } - return false + return defaultGCPolicy == rest.OrphanDependents } // shouldDeleteDependents returns true if the finalizer for foreground deletion should be set diff --git a/staging/src/k8s.io/apiserver/pkg/registry/rest/resttest/resttest.go b/staging/src/k8s.io/apiserver/pkg/registry/rest/resttest/resttest.go index ccf6c74b91d..592733c38f0 100644 --- a/staging/src/k8s.io/apiserver/pkg/registry/rest/resttest/resttest.go +++ b/staging/src/k8s.io/apiserver/pkg/registry/rest/resttest/resttest.go @@ -1115,7 +1115,7 @@ func (t *Tester) testDeleteGracefulImmediate(obj runtime.Object, createFn Create if err != nil { t.Errorf("unexpected error: %v", err) } - if wasDeleted != true { + if !wasDeleted { t.Errorf("unexpected, object %s should have been deleted immediately", objectMeta.GetName()) } _, err = t.storage.(rest.Getter).Get(ctx, objectMeta.GetName(), &metav1.GetOptions{}) diff --git a/staging/src/k8s.io/apiserver/pkg/server/egressselector/config.go b/staging/src/k8s.io/apiserver/pkg/server/egressselector/config.go index b8b1d67a57a..e608565c076 100644 --- a/staging/src/k8s.io/apiserver/pkg/server/egressselector/config.go +++ b/staging/src/k8s.io/apiserver/pkg/server/egressselector/config.go @@ -199,7 +199,7 @@ func validateTLSConfig(tlsConfig *apiserver.TLSConfig, fldPath *field.Path) fiel return allErrs } if tlsConfig.CABundle != "" { - if exists, err := path.Exists(path.CheckFollowSymlink, tlsConfig.CABundle); exists == false || err != nil { + if exists, err := path.Exists(path.CheckFollowSymlink, tlsConfig.CABundle); !exists || err != nil { allErrs = append(allErrs, field.Invalid( fldPath.Child("tlsConfig", "caBundle"), tlsConfig.CABundle, @@ -211,7 +211,7 @@ func validateTLSConfig(tlsConfig *apiserver.TLSConfig, fldPath *field.Path) fiel fldPath.Child("tlsConfig", "clientCert"), "nil", "Using TLS requires clientCert")) - } else if exists, err := path.Exists(path.CheckFollowSymlink, tlsConfig.ClientCert); exists == false || err != nil { + } else if exists, err := path.Exists(path.CheckFollowSymlink, tlsConfig.ClientCert); !exists || err != nil { allErrs = append(allErrs, field.Invalid( fldPath.Child("tlsConfig", "clientCert"), tlsConfig.ClientCert, @@ -222,7 +222,7 @@ func validateTLSConfig(tlsConfig *apiserver.TLSConfig, fldPath *field.Path) fiel fldPath.Child("tlsConfig", "clientKey"), "nil", "Using TLS requires requires clientKey")) - } else if exists, err := path.Exists(path.CheckFollowSymlink, tlsConfig.ClientKey); exists == false || err != nil { + } else if exists, err := path.Exists(path.CheckFollowSymlink, tlsConfig.ClientKey); !exists || err != nil { allErrs = append(allErrs, field.Invalid( fldPath.Child("tlsConfig", "clientKey"), tlsConfig.ClientKey, diff --git a/staging/src/k8s.io/apiserver/pkg/server/filters/goaway.go b/staging/src/k8s.io/apiserver/pkg/server/filters/goaway.go index 8b1b5e8ea4d..065bd22bbc9 100644 --- a/staging/src/k8s.io/apiserver/pkg/server/filters/goaway.go +++ b/staging/src/k8s.io/apiserver/pkg/server/filters/goaway.go @@ -80,9 +80,5 @@ type probabilisticGoawayDecider struct { // Goaway implement GoawayDecider func (p *probabilisticGoawayDecider) Goaway(r *http.Request) bool { - if p.next() < p.chance { - return true - } - - return false + return p.next() < p.chance } diff --git a/staging/src/k8s.io/apiserver/pkg/server/filters/goaway_test.go b/staging/src/k8s.io/apiserver/pkg/server/filters/goaway_test.go index ff35f30b9c6..330093e2aae 100644 --- a/staging/src/k8s.io/apiserver/pkg/server/filters/goaway_test.go +++ b/staging/src/k8s.io/apiserver/pkg/server/filters/goaway_test.go @@ -113,17 +113,15 @@ func TestClientReceivedGOAWAY(t *testing.T) { count := 0 for { - select { - case <-timer.C: - n, err := w.Write([]byte("w")) - if err != nil { - return - } - flusher.Flush() - count += n - if count == watchExpectSendBytes { - return - } + <-timer.C + n, err := w.Write([]byte("w")) + if err != nil { + return + } + flusher.Flush() + count += n + if count == watchExpectSendBytes { + return } } }) diff --git a/staging/src/k8s.io/apiserver/pkg/server/options/egress_selector.go b/staging/src/k8s.io/apiserver/pkg/server/options/egress_selector.go index c5e579c3cfb..07999cab116 100644 --- a/staging/src/k8s.io/apiserver/pkg/server/options/egress_selector.go +++ b/staging/src/k8s.io/apiserver/pkg/server/options/egress_selector.go @@ -18,6 +18,7 @@ package options import ( "fmt" + "github.com/spf13/pflag" "k8s.io/utils/path" @@ -84,7 +85,7 @@ func (o *EgressSelectorOptions) Validate() []error { errs := []error{} - if exists, err := path.Exists(path.CheckFollowSymlink, o.ConfigFile); exists == false || err != nil { + if exists, err := path.Exists(path.CheckFollowSymlink, o.ConfigFile); !exists || err != nil { errs = append(errs, fmt.Errorf("egress-selector-config-file %s does not exist", o.ConfigFile)) } diff --git a/staging/src/k8s.io/apiserver/pkg/server/storage/resource_config.go b/staging/src/k8s.io/apiserver/pkg/server/storage/resource_config.go index 0f2d45c9e78..bd85ac230b2 100644 --- a/staging/src/k8s.io/apiserver/pkg/server/storage/resource_config.go +++ b/staging/src/k8s.io/apiserver/pkg/server/storage/resource_config.go @@ -85,11 +85,7 @@ func (o *ResourceConfig) EnableVersions(versions ...schema.GroupVersion) { func (o *ResourceConfig) VersionEnabled(version schema.GroupVersion) bool { enabled, _ := o.GroupVersionConfigs[version] - if enabled { - return true - } - - return false + return enabled } func (o *ResourceConfig) DisableResources(resources ...schema.GroupVersionResource) { diff --git a/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/queueset/queueset_test.go b/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/queueset/queueset_test.go index 86c086ad574..7b26569924a 100644 --- a/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/queueset/queueset_test.go +++ b/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/queueset/queueset_test.go @@ -348,9 +348,7 @@ func ClockWait(clk *testclock.FakeEventClock, counter counter.GoRoutineCounter, close(dunch) }, duration) counter.Add(-1) - select { - case <-dunch: - } + <-dunch } func init() { diff --git a/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/testing/clock/event_clock.go b/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/testing/clock/event_clock.go index 376405433b9..c5464986f48 100644 --- a/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/testing/clock/event_clock.go +++ b/staging/src/k8s.io/apiserver/pkg/util/flowcontrol/fairqueuing/testing/clock/event_clock.go @@ -51,10 +51,8 @@ type RealEventClock struct { func (RealEventClock) EventAfterDuration(f EventFunc, d time.Duration) { ch := time.After(d) go func() { - select { - case t := <-ch: - f(t) - } + t := <-ch + f(t) }() }