Skip to content

Commit ac17e9b

Browse files
authored
Merge pull request #1519 from saschagrunert/importShadow
Fix `importshadow` linter
2 parents d6569d3 + ab9029e commit ac17e9b

File tree

5 files changed

+45
-46
lines changed

5 files changed

+45
-46
lines changed

Diff for: .golangci.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -147,11 +147,13 @@ linters-settings:
147147
- filepathJoin
148148
- hexLiteral
149149
- httpNoBody
150+
- importShadow
150151
- indexAlloc
151152
- initClause
152153
- methodExprCall
153154
- nestingReduce
154155
- nilValReturn
156+
- octalLiteral
155157
- preferDecodeRune
156158
- preferFilepathJoin
157159
- preferFprint
@@ -188,8 +190,6 @@ linters-settings:
188190
- weakCond
189191
- yodaStyleExpr
190192
# - hugeParam
191-
# - importShadow
192-
# - octalLiteral
193193
# - paramTypeCombine
194194
# - unnamedResult
195195
# - whyNoLint

Diff for: cmd/crictl/exec.go

+5-5
Original file line numberDiff line numberDiff line change
@@ -185,8 +185,8 @@ func Exec(ctx context.Context, client internalapi.RuntimeService, opts execOptio
185185
return stream(ctx, opts.stdin, opts.tty, opts.transport, URL)
186186
}
187187

188-
func stream(ctx context.Context, in, tty bool, transport string, url *url.URL) error {
189-
executor, err := getExecutor(transport, url)
188+
func stream(ctx context.Context, in, tty bool, transport string, parsedURL *url.URL) error {
189+
executor, err := getExecutor(transport, parsedURL)
190190
if err != nil {
191191
return fmt.Errorf("get executor: %w", err)
192192
}
@@ -227,15 +227,15 @@ func stream(ctx context.Context, in, tty bool, transport string, url *url.URL) e
227227
return t.Safe(func() error { return executor.StreamWithContext(ctx, streamOptions) })
228228
}
229229

230-
func getExecutor(transport string, url *url.URL) (exec remoteclient.Executor, err error) {
230+
func getExecutor(transport string, parsedURL *url.URL) (exec remoteclient.Executor, err error) {
231231
config := &rest.Config{TLSClientConfig: rest.TLSClientConfig{Insecure: true}}
232232

233233
switch transport {
234234
case transportSpdy:
235-
return remoteclient.NewSPDYExecutor(config, "POST", url)
235+
return remoteclient.NewSPDYExecutor(config, "POST", parsedURL)
236236

237237
case transportWebsocket:
238-
return remoteclient.NewWebSocketExecutor(config, "GET", url.String())
238+
return remoteclient.NewWebSocketExecutor(config, "GET", parsedURL.String())
239239

240240
default:
241241
return nil, fmt.Errorf("unknown transport: %s", transport)

Diff for: cmd/crictl/portforward.go

+10-11
Original file line numberDiff line numberDiff line change
@@ -84,23 +84,22 @@ func PortForward(client internalapi.RuntimeService, opts portforwardOptions) err
8484
if err != nil {
8585
return err
8686
}
87-
portforwardURL := r.Url
8887

89-
URL, err := url.Parse(portforwardURL)
88+
parsedURL, err := url.Parse(r.Url)
9089
if err != nil {
9190
return err
9291
}
9392

94-
if URL.Host == "" {
95-
URL.Host = kubeletURLHost
93+
if parsedURL.Host == "" {
94+
parsedURL.Host = kubeletURLHost
9695
}
9796

98-
if URL.Scheme == "" {
99-
URL.Scheme = kubeletURLSchema
97+
if parsedURL.Scheme == "" {
98+
parsedURL.Scheme = kubeletURLSchema
10099
}
101100

102-
logrus.Debugf("PortForward URL: %v", URL)
103-
dialer, err := getDialer(opts.transport, URL)
101+
logrus.Debugf("PortForward URL: %v", parsedURL)
102+
dialer, err := getDialer(opts.transport, parsedURL)
104103
if err != nil {
105104
return fmt.Errorf("get dialer: %w", err)
106105
}
@@ -115,7 +114,7 @@ func PortForward(client internalapi.RuntimeService, opts portforwardOptions) err
115114
return pf.ForwardPorts()
116115
}
117116

118-
func getDialer(transport string, url *url.URL) (exec httpstream.Dialer, err error) {
117+
func getDialer(transport string, parsedURL *url.URL) (exec httpstream.Dialer, err error) {
119118
config := &rest.Config{TLSClientConfig: rest.TLSClientConfig{Insecure: true}}
120119

121120
switch transport {
@@ -124,10 +123,10 @@ func getDialer(transport string, url *url.URL) (exec httpstream.Dialer, err erro
124123
if err != nil {
125124
return nil, fmt.Errorf("get SPDY round tripper: %w", err)
126125
}
127-
return spdy.NewDialer(upgrader, &http.Client{Transport: tr}, "POST", url), nil
126+
return spdy.NewDialer(upgrader, &http.Client{Transport: tr}, "POST", parsedURL), nil
128127

129128
case transportWebsocket:
130-
return portforward.NewSPDYOverWebsocketDialer(url, config)
129+
return portforward.NewSPDYOverWebsocketDialer(parsedURL, config)
131130

132131
default:
133132
return nil, fmt.Errorf("unknown transport: %s", transport)

Diff for: pkg/validate/image.go

+7-7
Original file line numberDiff line numberDiff line change
@@ -192,8 +192,8 @@ func testRemoveImage(c internalapi.ImageManagerService, imageName string) {
192192
removeImage(c, imageName)
193193

194194
By("Check image list empty")
195-
status := framework.ImageStatus(c, imageName)
196-
Expect(status).To(BeNil(), "Should have none image in list")
195+
imageStatus := framework.ImageStatus(c, imageName)
196+
Expect(imageStatus).To(BeNil(), "Should have none image in list")
197197
}
198198

199199
// testPullPublicImage pulls the image named imageName, make sure it success and remove the image.
@@ -204,12 +204,12 @@ func testPullPublicImage(c internalapi.ImageManagerService, imageName string, po
204204
framework.PullPublicImage(c, imageName, podConfig)
205205

206206
By("Check image list to make sure pulling image success : " + imageName)
207-
status := framework.ImageStatus(c, imageName)
208-
Expect(status).NotTo(BeNil(), "Should have one image in list")
209-
Expect(status.Id).NotTo(BeNil(), "Image Id should not be nil")
210-
Expect(status.Size_).NotTo(BeNil(), "Image Size should not be nil")
207+
imageStatus := framework.ImageStatus(c, imageName)
208+
Expect(imageStatus).NotTo(BeNil(), "Should have one image in list")
209+
Expect(imageStatus.Id).NotTo(BeNil(), "Image Id should not be nil")
210+
Expect(imageStatus.Size_).NotTo(BeNil(), "Image Size should not be nil")
211211
if statusCheck != nil {
212-
statusCheck(status)
212+
statusCheck(imageStatus)
213213
}
214214

215215
testRemoveImage(c, imageName)

Diff for: pkg/validate/streaming.go

+21-21
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ func createExec(c internalapi.RuntimeService, execReq *runtimeapi.ExecRequest) s
153153
By("exec given command in container: " + execReq.ContainerId)
154154
resp, err := c.Exec(context.TODO(), execReq)
155155
framework.ExpectNoError(err, "failed to exec in container %q", execReq.ContainerId)
156-
framework.Logf("Get exec url: " + resp.Url)
156+
framework.Logf("Get exec URL: " + resp.Url)
157157
return resp.Url
158158
}
159159

@@ -184,8 +184,8 @@ func checkExec(c internalapi.RuntimeService, execServerURL, stdout string, stdou
184184

185185
// Only http is supported now.
186186
// TODO: support streaming APIs via tls.
187-
url := parseURL(c, execServerURL)
188-
e, err := remoteclient.NewSPDYExecutor(&rest.Config{TLSClientConfig: rest.TLSClientConfig{Insecure: true}}, "POST", url)
187+
parsedURL := parseURL(c, execServerURL)
188+
e, err := remoteclient.NewSPDYExecutor(&rest.Config{TLSClientConfig: rest.TLSClientConfig{Insecure: true}}, "POST", parsedURL)
189189
framework.ExpectNoError(err, "failed to create executor for %q", execServerURL)
190190

191191
streamOptions := remoteclient.StreamOptions{
@@ -210,26 +210,26 @@ func checkExec(c internalapi.RuntimeService, execServerURL, stdout string, stdou
210210
Expect(localOut.String()).To(ContainSubstring(stdout), "The stdout of exec should contain "+stdout)
211211
}
212212
Expect(localErr.String()).To(BeEmpty(), "The stderr of exec should be empty")
213-
framework.Logf("Check exec url %q succeed", execServerURL)
213+
framework.Logf("Check exec URL %q succeed", execServerURL)
214214
}
215215

216216
func parseURL(c internalapi.RuntimeService, serverURL string) *url.URL {
217-
url, err := url.Parse(serverURL)
218-
framework.ExpectNoError(err, "failed to parse url: %q", serverURL)
217+
parsedURL, err := url.Parse(serverURL)
218+
framework.ExpectNoError(err, "failed to parse URL: %q", serverURL)
219219

220220
version := getVersion(c)
221221
if version.RuntimeName == "docker" {
222-
if url.Host == "" {
223-
url.Host = defaultStreamServerAddress
222+
if parsedURL.Host == "" {
223+
parsedURL.Host = defaultStreamServerAddress
224224
}
225-
if url.Scheme == "" {
226-
url.Scheme = defaultStreamServerScheme
225+
if parsedURL.Scheme == "" {
226+
parsedURL.Scheme = defaultStreamServerScheme
227227
}
228228
}
229229

230-
Expect(url.Host).NotTo(BeEmpty(), "The host of url should not be empty")
231-
framework.Logf("Parse url %q succeed", serverURL)
232-
return url
230+
Expect(parsedURL.Host).NotTo(BeEmpty(), "The host of URL should not be empty")
231+
framework.Logf("Parse URL %q succeed", serverURL)
232+
return parsedURL
233233
}
234234

235235
func createDefaultAttach(c internalapi.RuntimeService, containerID string) string {
@@ -244,7 +244,7 @@ func createDefaultAttach(c internalapi.RuntimeService, containerID string) strin
244244

245245
resp, err := c.Attach(context.TODO(), req)
246246
framework.ExpectNoError(err, "failed to attach in container %q", containerID)
247-
framework.Logf("Get attach url: " + resp.Url)
247+
framework.Logf("Get attach URL: " + resp.Url)
248248
return resp.Url
249249
}
250250

@@ -295,8 +295,8 @@ func checkAttach(c internalapi.RuntimeService, attachServerURL string) {
295295

296296
// Only http is supported now.
297297
// TODO: support streaming APIs via tls.
298-
url := parseURL(c, attachServerURL)
299-
e, err := remoteclient.NewSPDYExecutor(&rest.Config{TLSClientConfig: rest.TLSClientConfig{Insecure: true}}, "POST", url)
298+
parsedURL := parseURL(c, attachServerURL)
299+
e, err := remoteclient.NewSPDYExecutor(&rest.Config{TLSClientConfig: rest.TLSClientConfig{Insecure: true}}, "POST", parsedURL)
300300
framework.ExpectNoError(err, "failed to create executor for %q", attachServerURL)
301301

302302
ctx, cancel := context.WithCancel(context.Background())
@@ -311,7 +311,7 @@ func checkAttach(c internalapi.RuntimeService, attachServerURL string) {
311311
framework.ExpectNoError(err, "failed to open streamer for %q", attachServerURL)
312312

313313
Expect(localErr.String()).To(BeEmpty(), "The stderr of attach should be empty")
314-
framework.Logf("Check attach url %q succeed", attachServerURL)
314+
framework.Logf("Check attach URL %q succeed", attachServerURL)
315315
}
316316

317317
func createDefaultPortForward(c internalapi.RuntimeService, podID string) string {
@@ -322,7 +322,7 @@ func createDefaultPortForward(c internalapi.RuntimeService, podID string) string
322322

323323
resp, err := c.PortForward(context.TODO(), req)
324324
framework.ExpectNoError(err, "failed to port forward PodSandbox %q", podID)
325-
framework.Logf("Get port forward url: " + resp.Url)
325+
framework.Logf("Get port forward URL: " + resp.Url)
326326
return resp.Url
327327
}
328328

@@ -333,8 +333,8 @@ func checkPortForward(c internalapi.RuntimeService, portForwardSeverURL string,
333333

334334
transport, upgrader, err := spdy.RoundTripperFor(&rest.Config{TLSClientConfig: rest.TLSClientConfig{Insecure: true}})
335335
framework.ExpectNoError(err, "failed to create spdy round tripper")
336-
url := parseURL(c, portForwardSeverURL)
337-
dialer := spdy.NewDialer(upgrader, &http.Client{Transport: transport}, "POST", url)
336+
parsedURL := parseURL(c, portForwardSeverURL)
337+
dialer := spdy.NewDialer(upgrader, &http.Client{Transport: transport}, "POST", parsedURL)
338338
pf, err := portforward.New(dialer, []string{fmt.Sprintf("%d:%d", hostPort, containerPort)}, stopChan, readyChan, os.Stdout, os.Stderr)
339339
framework.ExpectNoError(err, "failed to create port forward for %q", portForwardSeverURL)
340340

@@ -347,5 +347,5 @@ func checkPortForward(c internalapi.RuntimeService, portForwardSeverURL string,
347347

348348
By(fmt.Sprintf("check if we can get nginx main page via localhost:%d", hostPort))
349349
checkMainPage(c, "", hostPort, 0)
350-
framework.Logf("Check port forward url %q succeed", portForwardSeverURL)
350+
framework.Logf("Check port forward URL %q succeed", portForwardSeverURL)
351351
}

0 commit comments

Comments
 (0)