Skip to content

Commit d0eace8

Browse files
committed
linting.
1 parent 496111e commit d0eace8

2 files changed

Lines changed: 18 additions & 11 deletions

File tree

hcloud/runtime_credentials.go

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
package hcloud
22

33
import (
4+
"errors"
45
"fmt"
56
"net/http"
67
"sync"
@@ -60,8 +61,11 @@ func newRuntimeCredentials() (*runtimeCredentials, error) {
6061

6162
for _, dir := range files.Directories() {
6263
if err := watcher.Add(dir); err != nil {
63-
watcher.Close()
64-
return nil, fmt.Errorf("watch credentials directory %q: %w", dir, err)
64+
addErr := fmt.Errorf("watch credentials directory %q: %w", dir, err)
65+
if closeErr := watcher.Close(); closeErr != nil {
66+
return nil, errors.Join(addErr, fmt.Errorf("close credentials watcher: %w", closeErr))
67+
}
68+
return nil, addErr
6569
}
6670
}
6771

@@ -76,7 +80,7 @@ func (c *runtimeCredentials) loadInitial() error {
7680
return err
7781
}
7882
if token != "" && !httpguts.ValidHeaderFieldValue(token) {
79-
return fmt.Errorf(invalidAuthorizationTokenError)
83+
return errors.New(invalidAuthorizationTokenError)
8084
}
8185

8286
user, password, err := config.LookupRobotCredentials()
@@ -152,7 +156,7 @@ func (c *runtimeCredentials) reload() {
152156
case err != nil:
153157
klog.ErrorS(err, "reloading HCLOUD_TOKEN from mounted secret")
154158
case token != "" && !httpguts.ValidHeaderFieldValue(token):
155-
klog.ErrorS(fmt.Errorf(invalidAuthorizationTokenError), "reloading HCLOUD_TOKEN from mounted secret")
159+
klog.ErrorS(errors.New(invalidAuthorizationTokenError), "reloading HCLOUD_TOKEN from mounted secret")
156160
default:
157161
c.mu.Lock()
158162
c.hcloudToken = token

hcloud/runtime_credentials_test.go

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -267,21 +267,23 @@ func TestCredentialReloadersClearAuthorizationHeadersWhenCredentialsAreEmpty(t *
267267
}, nil
268268
})
269269

270-
req, err := http.NewRequest(http.MethodGet, "https://example.com", nil)
270+
req, err := http.NewRequestWithContext(t.Context(), http.MethodGet, "https://example.com", nil)
271271
assert.NoError(t, err)
272272
req.Header.Set("Authorization", "stale")
273273

274-
_, err = newHCloudCredentialReloader(&runtimeCredentials{}, next).RoundTrip(req)
274+
resp, err := newHCloudCredentialReloader(&runtimeCredentials{}, next).RoundTrip(req)
275275
assert.NoError(t, err)
276-
assert.Equal(t, "", <-captured)
276+
assert.NoError(t, resp.Body.Close())
277+
assert.Empty(t, <-captured)
277278

278-
req, err = http.NewRequest(http.MethodGet, "https://example.com", nil)
279+
req, err = http.NewRequestWithContext(t.Context(), http.MethodGet, "https://example.com", nil)
279280
assert.NoError(t, err)
280281
req.Header.Set("Authorization", "stale")
281282

282-
_, err = newRobotCredentialReloader(&runtimeCredentials{}, next).RoundTrip(req)
283+
resp, err = newRobotCredentialReloader(&runtimeCredentials{}, next).RoundTrip(req)
283284
assert.NoError(t, err)
284-
assert.Equal(t, "", <-captured)
285+
assert.NoError(t, resp.Body.Close())
286+
assert.Empty(t, <-captured)
285287
}
286288

287289
func TestTransportOrDefault(t *testing.T) {
@@ -296,11 +298,12 @@ func TestTransportOrDefault(t *testing.T) {
296298

297299
assert.Same(t, http.DefaultTransport, transportOrDefault(nil))
298300

299-
req, err := http.NewRequest(http.MethodGet, "https://example.com", nil)
301+
req, err := http.NewRequestWithContext(t.Context(), http.MethodGet, "https://example.com", nil)
300302
assert.NoError(t, err)
301303

302304
resp, err := transportOrDefault(custom).RoundTrip(req)
303305
assert.NoError(t, err)
306+
assert.NoError(t, resp.Body.Close())
304307
assert.Equal(t, http.StatusCreated, resp.StatusCode)
305308
}
306309

0 commit comments

Comments
 (0)