Skip to content

Commit 08fe882

Browse files
authored
fix golangci-lint v2.0.2 warnings (#219)
Signed-off-by: Jonathan Dobson <[email protected]>
1 parent 971fb79 commit 08fe882

File tree

5 files changed

+40
-36
lines changed

5 files changed

+40
-36
lines changed

Diff for: pkg/ibmcsidriver/controller.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ func (csiCS *CSIControllerServer) CreateVolume(ctx context.Context, req *csi.Cre
9494
// Create copy of the requestedVolume
9595
tempReqVol := (*requestedVolume)
9696
// Mask VolumeEncryptionKey
97-
tempReqVol.VPCVolume.VolumeEncryptionKey = &provider.VolumeEncryptionKey{CRN: "********"}
97+
tempReqVol.VolumeEncryptionKey = &provider.VolumeEncryptionKey{CRN: "********"}
9898
ctxLogger.Info("Volume request after masking encryption key", zap.Reflect("Volume", tempReqVol))
9999
}
100100

Diff for: pkg/ibmcsidriver/controller_helper.go

+14-14
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ func getVolumeParameters(logger *zap.Logger, req *csi.CreateVolumeRequest, confi
108108
switch key {
109109
case Profile:
110110
if utils.ListContainsSubstr(SupportedProfile, value) {
111-
volume.VPCVolume.Profile = &provider.Profile{Name: value}
111+
volume.Profile = &provider.Profile{Name: value}
112112
} else {
113113
err = fmt.Errorf("%s:<%v> unsupported profile. Supported profiles are: %v", key, value, SupportedProfile)
114114
}
@@ -127,14 +127,14 @@ func getVolumeParameters(logger *zap.Logger, req *csi.CreateVolumeRequest, confi
127127
case Tag:
128128
if len(value) != 0 {
129129
tagstr := strings.TrimSpace(value)
130-
volume.VPCVolume.Tags = strings.Split(tagstr, ",")
130+
volume.Tags = strings.Split(tagstr, ",")
131131
}
132132

133133
case ResourceGroup:
134134
if len(value) > ResourceGroupIDMaxLen {
135135
err = fmt.Errorf("%s:<%v> exceeds %d chars", key, value, ResourceGroupIDMaxLen)
136136
}
137-
volume.VPCVolume.ResourceGroup = &provider.ResourceGroup{ID: value}
137+
volume.ResourceGroup = &provider.ResourceGroup{ID: value}
138138

139139
case BillingType:
140140
// Its not supported by RIaaS, but this is just information for the user
@@ -150,7 +150,7 @@ func getVolumeParameters(logger *zap.Logger, req *csi.CreateVolumeRequest, confi
150150
err = fmt.Errorf("%s: exceeds %d bytes", key, EncryptionKeyMaxLen)
151151
} else {
152152
if len(value) != 0 {
153-
volume.VPCVolume.VolumeEncryptionKey = &provider.VolumeEncryptionKey{CRN: value}
153+
volume.VolumeEncryptionKey = &provider.VolumeEncryptionKey{CRN: value}
154154
}
155155
}
156156

@@ -179,18 +179,18 @@ func getVolumeParameters(logger *zap.Logger, req *csi.CreateVolumeRequest, confi
179179
}
180180
// If encripted is set to false
181181
if encrypt == FalseStr {
182-
volume.VPCVolume.VolumeEncryptionKey = nil
182+
volume.VolumeEncryptionKey = nil
183183
}
184184

185-
if volume.VPCVolume.Profile == nil {
185+
if volume.Profile == nil {
186186
err = fmt.Errorf("volume profile is empty, you need to pass valid profile name")
187187
logger.Error("getVolumeParameters", zap.NamedError("InvalidRequest", err))
188188
return volume, err
189189
}
190190

191191
// Get the requested capacity from the request
192192
capacityRange := req.GetCapacityRange()
193-
capBytes, err := getRequestedCapacity(capacityRange, volume.VPCVolume.Profile.Name)
193+
capBytes, err := getRequestedCapacity(capacityRange, volume.Profile.Name)
194194
if err != nil {
195195
err = fmt.Errorf("invalid PVC capacity size: '%v'", err)
196196
logger.Error("getVolumeParameters", zap.NamedError("invalid parameter", err))
@@ -239,7 +239,7 @@ func getVolumeParameters(logger *zap.Logger, req *csi.CreateVolumeRequest, confi
239239
return volume, err
240240
}
241241

242-
if volume.VPCVolume.Profile != nil && (volume.VPCVolume.Profile.Name != CustomProfile && volume.VPCVolume.Profile.Name != SDPProfile) {
242+
if volume.Profile != nil && (volume.Profile.Name != CustomProfile && volume.Profile.Name != SDPProfile) {
243243
// Specify IOPS only for custom or SDP class
244244
volume.Iops = nil
245245
}
@@ -273,7 +273,7 @@ func overrideParams(logger *zap.Logger, req *csi.CreateVolumeRequest, config *co
273273
err = fmt.Errorf("%s:<%v> exceeds %d bytes ", key, value, ResourceGroupIDMaxLen)
274274
} else {
275275
logger.Info("override", zap.Any(ResourceGroup, value))
276-
volume.VPCVolume.ResourceGroup = &provider.ResourceGroup{ID: value}
276+
volume.ResourceGroup = &provider.ResourceGroup{ID: value}
277277
}
278278
case Encrypted:
279279
if value != TrueStr && value != FalseStr {
@@ -288,15 +288,15 @@ func overrideParams(logger *zap.Logger, req *csi.CreateVolumeRequest, config *co
288288
} else {
289289
if len(value) != 0 {
290290
logger.Info("override", zap.String("parameter", EncryptionKey))
291-
volume.VPCVolume.VolumeEncryptionKey = &provider.VolumeEncryptionKey{CRN: value}
291+
volume.VolumeEncryptionKey = &provider.VolumeEncryptionKey{CRN: value}
292292
}
293293
}
294294
case Tag:
295295
if len(value) != 0 {
296296
logger.Info("append", zap.Any(Tag, value))
297297
tagstr := strings.TrimSpace(value)
298298
secretTags := strings.Split(tagstr, ",")
299-
volume.VPCVolume.Tags = append(volume.VPCVolume.Tags, secretTags...)
299+
volume.Tags = append(volume.Tags, secretTags...)
300300
}
301301

302302
case Zone:
@@ -327,11 +327,11 @@ func overrideParams(logger *zap.Logger, req *csi.CreateVolumeRequest, config *co
327327
}
328328
}
329329
// Assign ResourceGroupID from config
330-
if volume.VPCVolume.ResourceGroup == nil || len(volume.VPCVolume.ResourceGroup.ID) < 1 {
331-
volume.VPCVolume.ResourceGroup = &provider.ResourceGroup{ID: config.VPC.G2ResourceGroupID}
330+
if volume.ResourceGroup == nil || len(volume.ResourceGroup.ID) < 1 {
331+
volume.ResourceGroup = &provider.ResourceGroup{ID: config.VPC.G2ResourceGroupID}
332332
}
333333
if encrypt == FalseStr {
334-
volume.VPCVolume.VolumeEncryptionKey = nil
334+
volume.VolumeEncryptionKey = nil
335335
}
336336
return nil
337337
}

Diff for: pkg/ibmcsidriver/fileOps_test.go

+5-3
Original file line numberDiff line numberDiff line change
@@ -83,11 +83,13 @@ func TestSetupSidecar(t *testing.T) {
8383
t.Run(tc.name, func(t *testing.T) {
8484
// Set SIDECAR_GROUP_ID environment variable
8585
if tc.groupID != "" {
86-
os.Setenv("SIDECAR_GROUP_ID", tc.groupID)
86+
err := os.Setenv("SIDECAR_GROUP_ID", tc.groupID)
87+
assert.NoError(t, err)
8788
} else {
88-
os.Unsetenv("SIDECAR_GROUP_ID")
89+
err := os.Unsetenv("SIDECAR_GROUP_ID")
90+
assert.NoError(t, err)
8991
}
90-
defer os.Unsetenv("SIDECAR_GROUP_ID")
92+
defer os.Unsetenv("SIDECAR_GROUP_ID") // nolint:errcheck
9193

9294
// Create the fake object generated by counterfeiter
9395
fakeSocketPermission := new(ibmcsidriverfakes.FakeSocketPermission)

Diff for: pkg/ibmcsidriver/server.go

+14-12
Original file line numberDiff line numberDiff line change
@@ -19,17 +19,18 @@ package ibmcsidriver
1919

2020
import (
2121
"errors"
22-
csi "github.com/container-storage-interface/spec/lib/go/csi"
23-
"github.com/golang/glog"
24-
"go.uber.org/zap"
25-
"golang.org/x/net/context"
26-
"google.golang.org/grpc"
2722
"net"
2823
"net/url"
2924
"os"
3025
"os/signal"
3126
"sync"
3227
"syscall"
28+
29+
csi "github.com/container-storage-interface/spec/lib/go/csi"
30+
"github.com/golang/glog"
31+
"go.uber.org/zap"
32+
"golang.org/x/net/context"
33+
"google.golang.org/grpc"
3334
)
3435

3536
// NonBlockingGRPCServer Defines Non blocking GRPC server interfaces
@@ -89,22 +90,23 @@ func (s *nonBlockingGRPCServer) Setup(endpoint string, ids csi.IdentityServer, c
8990
u, err := url.Parse(endpoint)
9091

9192
if err != nil {
92-
msg := "Failed to parse endpoint"
93+
msg := "failed to parse endpoint"
9394
s.logger.Error(msg, zap.Error(err))
9495
return nil, err
9596
}
9697

9798
var addr string
98-
if u.Scheme == "unix" {
99+
switch u.Scheme {
100+
case "unix":
99101
addr = u.Path
100102
if err := os.Remove(addr); err != nil && !os.IsNotExist(err) {
101-
s.logger.Error("Failed to remove", zap.Reflect("addr", addr), zap.Error(err))
103+
s.logger.Error("failed to remove", zap.Reflect("addr", addr), zap.Error(err))
102104
return nil, err
103105
}
104-
} else if u.Scheme == "tcp" {
106+
case "tcp":
105107
addr = u.Host
106-
} else {
107-
msg := "Endpoint scheme not supported"
108+
case "default":
109+
msg := "endpoint scheme not supported"
108110
s.logger.Error(msg, zap.Reflect("Scheme", u.Scheme))
109111
return nil, errors.New(msg)
110112
}
@@ -113,7 +115,7 @@ func (s *nonBlockingGRPCServer) Setup(endpoint string, ids csi.IdentityServer, c
113115

114116
listener, err := net.Listen(u.Scheme, addr)
115117
if err != nil {
116-
msg := "Failed to listen GRPC Server"
118+
msg := "failed to listen GRPC Server"
117119
s.logger.Error(msg, zap.Reflect("Error", err))
118120
return nil, errors.New(msg)
119121
}

Diff for: tests/sanity/sanity_test.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -336,7 +336,7 @@ func (c *fakeProviderSession) CreateVolumeFromSnapshot(snapshot provider.Snapsho
336336
// Delete the volume
337337
func (c *fakeProviderSession) DeleteVolume(vol *provider.Volume) error {
338338
for volName, f := range c.volumes {
339-
if f.Volume.VolumeID == vol.VolumeID {
339+
if f.VolumeID == vol.VolumeID {
340340
delete(c.volumes, volName)
341341
return nil
342342
}
@@ -363,7 +363,7 @@ func (c *fakeProviderSession) ExpandVolume(expandVolumeRequest provider.ExpandVo
363363
}
364364

365365
for _, f := range c.volumes {
366-
if f.Volume.VolumeID == volumeID {
366+
if f.VolumeID == volumeID {
367367
return capacity, nil
368368
}
369369
}
@@ -373,7 +373,7 @@ func (c *fakeProviderSession) ExpandVolume(expandVolumeRequest provider.ExpandVo
373373
// Get the volume by using ID //
374374
func (c *fakeProviderSession) GetVolume(id string) (*provider.Volume, error) {
375375
for _, f := range c.volumes {
376-
if f.Volume.VolumeID == id {
376+
if f.VolumeID == id {
377377
return f.Volume, nil
378378
}
379379
}
@@ -388,7 +388,7 @@ func (c *fakeProviderSession) GetVolume(id string) (*provider.Volume, error) {
388388
// Get the volume by using Name
389389
func (c *fakeProviderSession) GetVolumeByName(name string) (*provider.Volume, error) {
390390
for _, f := range c.volumes {
391-
if *f.Volume.Name == name {
391+
if *f.Name == name {
392392
return f.Volume, nil
393393
}
394394
}
@@ -505,7 +505,7 @@ func (c *fakeProviderSession) GetVolumeAttachment(attachRequest provider.VolumeA
505505
func (c *fakeProviderSession) CreateSnapshot(sourceVolumeID string, snapshotParameters provider.SnapshotParameters) (*provider.Snapshot, error) {
506506
snapshotID := fmt.Sprintf("vol-uuid-test-vol-%s", uuid.New().String()[:10])
507507
for _, existingSnapshot := range c.snapshots {
508-
if existingSnapshot.Snapshot.SnapshotID == snapshotID && existingSnapshot.Snapshot.VolumeID == sourceVolumeID {
508+
if existingSnapshot.SnapshotID == snapshotID && existingSnapshot.VolumeID == sourceVolumeID {
509509
return nil, errors.New("snapshot already present for same volume")
510510
}
511511
}
@@ -550,7 +550,7 @@ func (c *fakeProviderSession) ListSnapshots(maxResults int, nextToken string, ta
550550
var snapshots []*provider.Snapshot
551551
var retToken string
552552
for _, fakeSnapshot := range c.snapshots {
553-
if fakeSnapshot.Snapshot.VolumeID == tags["source_volume.id"] || len(tags["source_volume.id"]) == 0 {
553+
if fakeSnapshot.VolumeID == tags["source_volume.id"] || len(tags["source_volume.id"]) == 0 {
554554
snapshots = append(snapshots, fakeSnapshot.Snapshot)
555555
}
556556
}

0 commit comments

Comments
 (0)