Skip to content

Commit 7fd88c2

Browse files
committed
Fix pre-existing lint errors in fileloader_test.go
1 parent 01626f7 commit 7fd88c2

1 file changed

Lines changed: 36 additions & 35 deletions

File tree

api/internal/loader/fileloader_test.go

Lines changed: 36 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ type testData struct {
6666
expectedContent string
6767
}
6868

69-
var testCases = []testData{
69+
var testCases = []testData{ //nolint:gochecknoglobals
7070
{
7171
path: "foo/project/fileA.yaml",
7272
expectedContent: "fileA content",
@@ -88,7 +88,7 @@ var testCases = []testData{
8888
func MakeFakeFs(td []testData) filesys.FileSystem {
8989
fSys := filesys.MakeFsInMemory()
9090
for _, x := range td {
91-
fSys.WriteFile(x.path, []byte(x.expectedContent))
91+
_ = fSys.WriteFile(x.path, []byte(x.expectedContent))
9292
}
9393
return fSys
9494
}
@@ -161,31 +161,31 @@ func TestLoaderBadRelative(t *testing.T) {
161161
require.Equal("/foo/project/subdir1", l1.Root())
162162

163163
// Cannot cd into a file.
164-
l2, err := l1.New("fileB.yaml")
164+
_, err = l1.New("fileB.yaml")
165165
require.Error(err)
166166

167167
// It's not okay to stay at the same place.
168-
l2, err = l1.New(filesys.SelfDir)
168+
_, err = l1.New(filesys.SelfDir)
169169
require.Error(err)
170170

171171
// It's not okay to go up and back down into same place.
172-
l2, err = l1.New("../subdir1")
172+
_, err = l1.New("../subdir1")
173173
require.Error(err)
174174

175175
// It's not okay to go up via a relative path.
176-
l2, err = l1.New("..")
176+
_, err = l1.New("..")
177177
require.Error(err)
178178

179179
// It's not okay to go up via an absolute path.
180-
l2, err = l1.New("/foo/project")
180+
_, err = l1.New("/foo/project")
181181
require.Error(err)
182182

183183
// It's not okay to go to the root.
184-
l2, err = l1.New("/")
184+
_, err = l1.New("/")
185185
require.Error(err)
186186

187187
// It's okay to go up and down to a sibling.
188-
l2, err = l1.New("../subdir2")
188+
l2, err := l1.New("../subdir2")
189189
require.NoError(err)
190190
require.Equal("/foo/project/subdir2", l2.Root())
191191

@@ -198,7 +198,7 @@ func TestLoaderBadRelative(t *testing.T) {
198198

199199
// It's not OK to go over to a previously visited directory.
200200
// Must disallow going back and forth in a cycle.
201-
l1, err = l2.New("../subdir1")
201+
_, err = l2.New("../subdir1")
202202
require.Error(err)
203203
}
204204

@@ -319,23 +319,24 @@ const (
319319
// └── exteriorData
320320
func commonSetupForLoaderRestrictionTest(t *testing.T) (string, filesys.FileSystem) {
321321
t.Helper()
322+
require := require.New(t)
322323
fSys, tmpDir := setupOnDisk(t)
323324
dir := tmpDir.String()
324325

325-
fSys.Mkdir(filepath.Join(dir, "base"))
326+
require.NoError(fSys.Mkdir(filepath.Join(dir, "base")))
326327

327-
fSys.WriteFile(
328-
filepath.Join(dir, "base", "okayData"), []byte(contentOk))
328+
require.NoError(fSys.WriteFile(
329+
filepath.Join(dir, "base", "okayData"), []byte(contentOk)))
329330

330-
fSys.WriteFile(
331-
filepath.Join(dir, "exteriorData"), []byte(contentExteriorData))
331+
require.NoError(fSys.WriteFile(
332+
filepath.Join(dir, "exteriorData"), []byte(contentExteriorData)))
332333

333-
os.Symlink(
334+
require.NoError(os.Symlink(
334335
filepath.Join(dir, "base", "okayData"),
335-
filepath.Join(dir, "base", "symLinkToOkayData"))
336-
os.Symlink(
336+
filepath.Join(dir, "base", "symLinkToOkayData")))
337+
require.NoError(os.Symlink(
337338
filepath.Join(dir, "exteriorData"),
338-
filepath.Join(dir, "base", "symLinkToExteriorData"))
339+
filepath.Join(dir, "base", "symLinkToExteriorData")))
339340
return dir, fSys
340341
}
341342

@@ -445,14 +446,14 @@ func TestNewLoaderAtGitClone(t *testing.T) {
445446
url := rootURL + "/" + pathInRepo
446447
coRoot := "/tmp"
447448
fSys := filesys.MakeFsInMemory()
448-
fSys.MkdirAll(coRoot)
449-
fSys.MkdirAll(coRoot + "/" + pathInRepo)
450-
fSys.WriteFile(
449+
require.NoError(fSys.MkdirAll(coRoot))
450+
require.NoError(fSys.MkdirAll(coRoot + "/" + pathInRepo))
451+
require.NoError(fSys.WriteFile(
451452
coRoot+"/"+pathInRepo+"/"+
452453
konfig.DefaultKustomizationFileName(),
453454
[]byte(`
454455
whatever
455-
`))
456+
`)))
456457

457458
repoSpec, err := git.NewRepoSpecFromURL(url)
458459
require.NoError(err)
@@ -472,7 +473,7 @@ whatever
472473
require.Error(err)
473474

474475
pathInRepo = "foo/overlay"
475-
fSys.MkdirAll(coRoot + "/" + pathInRepo)
476+
require.NoError(fSys.MkdirAll(coRoot + "/" + pathInRepo))
476477
url = rootURL + "/" + pathInRepo
477478
l2, err := l.New(url)
478479
require.NoError(err)
@@ -489,9 +490,9 @@ func TestLoaderDisallowsLocalBaseFromRemoteOverlay(t *testing.T) {
489490
topDir := "/whatever"
490491
cloneRoot := topDir + "/someClone"
491492
fSys := filesys.MakeFsInMemory()
492-
fSys.MkdirAll(topDir + "/highBase")
493-
fSys.MkdirAll(cloneRoot + "/foo/base")
494-
fSys.MkdirAll(cloneRoot + "/foo/overlay")
493+
require.NoError(fSys.MkdirAll(topDir + "/highBase"))
494+
require.NoError(fSys.MkdirAll(cloneRoot + "/foo/base"))
495+
require.NoError(fSys.MkdirAll(cloneRoot + "/foo/overlay"))
495496

496497
var l1 ifc.Loader
497498

@@ -502,7 +503,7 @@ func TestLoaderDisallowsLocalBaseFromRemoteOverlay(t *testing.T) {
502503
require.Equal(cloneRoot+"/foo/overlay", l1.Root())
503504

504505
l2, err := l1.New("../base")
505-
require.NoError(nil)
506+
require.NoError(err)
506507
require.Equal(cloneRoot+"/foo/base", l2.Root())
507508

508509
l3, err := l2.New("../../../highBase")
@@ -567,8 +568,8 @@ func TestLocalLoaderReferencingGitBase(t *testing.T) {
567568
topDir := "/whatever"
568569
cloneRoot := topDir + "/someClone"
569570
fSys := filesys.MakeFsInMemory()
570-
fSys.MkdirAll(topDir)
571-
fSys.MkdirAll(cloneRoot + "/foo/base")
571+
require.NoError(fSys.MkdirAll(topDir))
572+
require.NoError(fSys.MkdirAll(cloneRoot + "/foo/base"))
572573

573574
l1 := newLoaderAtConfirmedDir(
574575
RestrictionRootOnly, filesys.ConfirmedDir(topDir), fSys, nil,
@@ -588,8 +589,8 @@ func TestRepoDirectCycleDetection(t *testing.T) {
588589
topDir := "/cycles"
589590
cloneRoot := topDir + "/someClone"
590591
fSys := filesys.MakeFsInMemory()
591-
fSys.MkdirAll(topDir)
592-
fSys.MkdirAll(cloneRoot)
592+
require.NoError(fSys.MkdirAll(topDir))
593+
require.NoError(fSys.MkdirAll(cloneRoot))
593594

594595
l1 := newLoaderAtConfirmedDir(
595596
RestrictionRootOnly, filesys.ConfirmedDir(topDir), fSys, nil,
@@ -610,8 +611,8 @@ func TestRepoIndirectCycleDetection(t *testing.T) {
610611
topDir := "/cycles"
611612
cloneRoot := topDir + "/someClone"
612613
fSys := filesys.MakeFsInMemory()
613-
fSys.MkdirAll(topDir)
614-
fSys.MkdirAll(cloneRoot)
614+
require.NoError(fSys.MkdirAll(topDir))
615+
require.NoError(fSys.MkdirAll(cloneRoot))
615616

616617
l0 := newLoaderAtConfirmedDir(
617618
RestrictionRootOnly, filesys.ConfirmedDir(topDir), fSys, nil,
@@ -683,7 +684,7 @@ func TestLoaderHTTP(t *testing.T) {
683684
u := req.URL.String()
684685
require.Equal(x.path, u)
685686
return &http.Response{
686-
StatusCode: 200,
687+
StatusCode: http.StatusOK,
687688
Body: io.NopCloser(bytes.NewBufferString(x.expectedContent)),
688689
Header: make(http.Header),
689690
}

0 commit comments

Comments
 (0)