@@ -66,7 +66,7 @@ type testData struct {
6666 expectedContent string
6767}
6868
69- var testCases = []testData {
69+ var testCases = []testData { //nolint:gochecknoglobals
7070 {
7171 path : "foo/project/fileA.yaml" ,
7272 expectedContent : "fileA content" ,
@@ -88,7 +88,7 @@ var testCases = []testData{
8888func MakeFakeFs (td []testData ) filesys.FileSystem {
8989 fSys := filesys .MakeFsInMemory ()
9090 for _ , x := range td {
91- fSys .WriteFile (x .path , []byte (x .expectedContent ))
91+ _ = fSys .WriteFile (x .path , []byte (x .expectedContent ))
9292 }
9393 return fSys
9494}
@@ -161,31 +161,31 @@ func TestLoaderBadRelative(t *testing.T) {
161161 require .Equal ("/foo/project/subdir1" , l1 .Root ())
162162
163163 // Cannot cd into a file.
164- l2 , err : = l1 .New ("fileB.yaml" )
164+ _ , err = l1 .New ("fileB.yaml" )
165165 require .Error (err )
166166
167167 // It's not okay to stay at the same place.
168- l2 , err = l1 .New (filesys .SelfDir )
168+ _ , err = l1 .New (filesys .SelfDir )
169169 require .Error (err )
170170
171171 // It's not okay to go up and back down into same place.
172- l2 , err = l1 .New ("../subdir1" )
172+ _ , err = l1 .New ("../subdir1" )
173173 require .Error (err )
174174
175175 // It's not okay to go up via a relative path.
176- l2 , err = l1 .New (".." )
176+ _ , err = l1 .New (".." )
177177 require .Error (err )
178178
179179 // It's not okay to go up via an absolute path.
180- l2 , err = l1 .New ("/foo/project" )
180+ _ , err = l1 .New ("/foo/project" )
181181 require .Error (err )
182182
183183 // It's not okay to go to the root.
184- l2 , err = l1 .New ("/" )
184+ _ , err = l1 .New ("/" )
185185 require .Error (err )
186186
187187 // It's okay to go up and down to a sibling.
188- l2 , err = l1 .New ("../subdir2" )
188+ l2 , err : = l1 .New ("../subdir2" )
189189 require .NoError (err )
190190 require .Equal ("/foo/project/subdir2" , l2 .Root ())
191191
@@ -198,7 +198,7 @@ func TestLoaderBadRelative(t *testing.T) {
198198
199199 // It's not OK to go over to a previously visited directory.
200200 // Must disallow going back and forth in a cycle.
201- l1 , err = l2 .New ("../subdir1" )
201+ _ , err = l2 .New ("../subdir1" )
202202 require .Error (err )
203203}
204204
@@ -319,23 +319,24 @@ const (
319319// └── exteriorData
320320func commonSetupForLoaderRestrictionTest (t * testing.T ) (string , filesys.FileSystem ) {
321321 t .Helper ()
322+ require := require .New (t )
322323 fSys , tmpDir := setupOnDisk (t )
323324 dir := tmpDir .String ()
324325
325- fSys .Mkdir (filepath .Join (dir , "base" ))
326+ require . NoError ( fSys .Mkdir (filepath .Join (dir , "base" ) ))
326327
327- fSys .WriteFile (
328- filepath .Join (dir , "base" , "okayData" ), []byte (contentOk ))
328+ require . NoError ( fSys .WriteFile (
329+ filepath .Join (dir , "base" , "okayData" ), []byte (contentOk )))
329330
330- fSys .WriteFile (
331- filepath .Join (dir , "exteriorData" ), []byte (contentExteriorData ))
331+ require . NoError ( fSys .WriteFile (
332+ filepath .Join (dir , "exteriorData" ), []byte (contentExteriorData )))
332333
333- os .Symlink (
334+ require . NoError ( os .Symlink (
334335 filepath .Join (dir , "base" , "okayData" ),
335- filepath .Join (dir , "base" , "symLinkToOkayData" ))
336- os .Symlink (
336+ filepath .Join (dir , "base" , "symLinkToOkayData" )))
337+ require . NoError ( os .Symlink (
337338 filepath .Join (dir , "exteriorData" ),
338- filepath .Join (dir , "base" , "symLinkToExteriorData" ))
339+ filepath .Join (dir , "base" , "symLinkToExteriorData" )))
339340 return dir , fSys
340341}
341342
@@ -445,14 +446,14 @@ func TestNewLoaderAtGitClone(t *testing.T) {
445446 url := rootURL + "/" + pathInRepo
446447 coRoot := "/tmp"
447448 fSys := filesys .MakeFsInMemory ()
448- fSys .MkdirAll (coRoot )
449- fSys .MkdirAll (coRoot + "/" + pathInRepo )
450- fSys .WriteFile (
449+ require . NoError ( fSys .MkdirAll (coRoot ) )
450+ require . NoError ( fSys .MkdirAll (coRoot + "/" + pathInRepo ) )
451+ require . NoError ( fSys .WriteFile (
451452 coRoot + "/" + pathInRepo + "/" +
452453 konfig .DefaultKustomizationFileName (),
453454 []byte (`
454455whatever
455- ` ))
456+ ` )))
456457
457458 repoSpec , err := git .NewRepoSpecFromURL (url )
458459 require .NoError (err )
@@ -472,7 +473,7 @@ whatever
472473 require .Error (err )
473474
474475 pathInRepo = "foo/overlay"
475- fSys .MkdirAll (coRoot + "/" + pathInRepo )
476+ require . NoError ( fSys .MkdirAll (coRoot + "/" + pathInRepo ) )
476477 url = rootURL + "/" + pathInRepo
477478 l2 , err := l .New (url )
478479 require .NoError (err )
@@ -489,9 +490,9 @@ func TestLoaderDisallowsLocalBaseFromRemoteOverlay(t *testing.T) {
489490 topDir := "/whatever"
490491 cloneRoot := topDir + "/someClone"
491492 fSys := filesys .MakeFsInMemory ()
492- fSys .MkdirAll (topDir + "/highBase" )
493- fSys .MkdirAll (cloneRoot + "/foo/base" )
494- fSys .MkdirAll (cloneRoot + "/foo/overlay" )
493+ require . NoError ( fSys .MkdirAll (topDir + "/highBase" ) )
494+ require . NoError ( fSys .MkdirAll (cloneRoot + "/foo/base" ) )
495+ require . NoError ( fSys .MkdirAll (cloneRoot + "/foo/overlay" ) )
495496
496497 var l1 ifc.Loader
497498
@@ -502,7 +503,7 @@ func TestLoaderDisallowsLocalBaseFromRemoteOverlay(t *testing.T) {
502503 require .Equal (cloneRoot + "/foo/overlay" , l1 .Root ())
503504
504505 l2 , err := l1 .New ("../base" )
505- require .NoError (nil )
506+ require .NoError (err )
506507 require .Equal (cloneRoot + "/foo/base" , l2 .Root ())
507508
508509 l3 , err := l2 .New ("../../../highBase" )
@@ -567,8 +568,8 @@ func TestLocalLoaderReferencingGitBase(t *testing.T) {
567568 topDir := "/whatever"
568569 cloneRoot := topDir + "/someClone"
569570 fSys := filesys .MakeFsInMemory ()
570- fSys .MkdirAll (topDir )
571- fSys .MkdirAll (cloneRoot + "/foo/base" )
571+ require . NoError ( fSys .MkdirAll (topDir ) )
572+ require . NoError ( fSys .MkdirAll (cloneRoot + "/foo/base" ) )
572573
573574 l1 := newLoaderAtConfirmedDir (
574575 RestrictionRootOnly , filesys .ConfirmedDir (topDir ), fSys , nil ,
@@ -588,8 +589,8 @@ func TestRepoDirectCycleDetection(t *testing.T) {
588589 topDir := "/cycles"
589590 cloneRoot := topDir + "/someClone"
590591 fSys := filesys .MakeFsInMemory ()
591- fSys .MkdirAll (topDir )
592- fSys .MkdirAll (cloneRoot )
592+ require . NoError ( fSys .MkdirAll (topDir ) )
593+ require . NoError ( fSys .MkdirAll (cloneRoot ) )
593594
594595 l1 := newLoaderAtConfirmedDir (
595596 RestrictionRootOnly , filesys .ConfirmedDir (topDir ), fSys , nil ,
@@ -610,8 +611,8 @@ func TestRepoIndirectCycleDetection(t *testing.T) {
610611 topDir := "/cycles"
611612 cloneRoot := topDir + "/someClone"
612613 fSys := filesys .MakeFsInMemory ()
613- fSys .MkdirAll (topDir )
614- fSys .MkdirAll (cloneRoot )
614+ require . NoError ( fSys .MkdirAll (topDir ) )
615+ require . NoError ( fSys .MkdirAll (cloneRoot ) )
615616
616617 l0 := newLoaderAtConfirmedDir (
617618 RestrictionRootOnly , filesys .ConfirmedDir (topDir ), fSys , nil ,
@@ -683,7 +684,7 @@ func TestLoaderHTTP(t *testing.T) {
683684 u := req .URL .String ()
684685 require .Equal (x .path , u )
685686 return & http.Response {
686- StatusCode : 200 ,
687+ StatusCode : http . StatusOK ,
687688 Body : io .NopCloser (bytes .NewBufferString (x .expectedContent )),
688689 Header : make (http.Header ),
689690 }
0 commit comments