Merge pull request #31878 from mmorel-35/perfsprint-pkg-3-39f7a9f

chore(pkg): fix perfsprint linter issues part 3
pull/31895/head
George Jenkins 1 week ago committed by GitHub
commit df8e0301ed
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

@ -19,7 +19,6 @@ package action
import (
"context"
"errors"
"fmt"
"io"
"testing"
@ -115,7 +114,7 @@ func TestUninstallRelease_Wait(t *testing.T) {
}`
require.NoError(t, unAction.cfg.Releases.Create(rel))
failer := unAction.cfg.KubeClient.(*kubefake.FailingKubeClient)
failer.WaitForDeleteError = fmt.Errorf("U timed out")
failer.WaitForDeleteError = errors.New("U timed out")
unAction.cfg.KubeClient = failer
resi, err := unAction.Run(rel.Name)
is.Error(err)
@ -149,7 +148,7 @@ func TestUninstallRelease_Cascade(t *testing.T) {
}`
require.NoError(t, unAction.cfg.Releases.Create(rel))
failer := unAction.cfg.KubeClient.(*kubefake.FailingKubeClient)
failer.DeleteError = fmt.Errorf("Uninstall with cascade failed")
failer.DeleteError = errors.New("Uninstall with cascade failed")
failer.BuildDummy = true
unAction.cfg.KubeClient = failer
_, err := unAction.Run(rel.Name)

@ -173,8 +173,8 @@ func newCapabilities(kubeVersionMajor, kubeVersionMinor uint64) (*Capabilities,
KubeVersion: KubeVersion{
Version: version,
normalizedVersion: version,
Major: fmt.Sprintf("%d", kubeVersionMajor),
Minor: fmt.Sprintf("%d", kubeVersionMinor),
Major: strconv.FormatUint(kubeVersionMajor, 10),
Minor: strconv.FormatUint(kubeVersionMinor, 10),
},
APIVersions: DefaultVersionSet,
HelmVersion: helmversion.Get(),

@ -19,7 +19,6 @@ package rules
import (
"bytes"
"errors"
"fmt"
"io"
"io/fs"
"os"
@ -102,14 +101,14 @@ func validateCrdsDir(crdsPath string) error {
func validateCrdAPIVersion(obj *k8sYamlStruct) error {
if !strings.HasPrefix(obj.APIVersion, "apiextensions.k8s.io") {
return fmt.Errorf("apiVersion is not in 'apiextensions.k8s.io'")
return errors.New("apiVersion is not in 'apiextensions.k8s.io'")
}
return nil
}
func validateCrdKind(obj *k8sYamlStruct) error {
if obj.Kind != "CustomResourceDefinition" {
return fmt.Errorf("object kind is not 'CustomResourceDefinition'")
return errors.New("object kind is not 'CustomResourceDefinition'")
}
return nil
}

@ -21,8 +21,8 @@ import (
"bytes"
"compress/gzip"
"crypto/sha256"
"encoding/hex"
"errors"
"fmt"
"io"
"os"
"path"
@ -357,5 +357,5 @@ func sha256Sum(filePath string) (string, error) {
return "", err
}
return fmt.Sprintf("%x", h.Sum(nil)), nil
return hex.EncodeToString(h.Sum(nil)), nil
}

@ -16,6 +16,7 @@ limitations under the License.
package cmd
import (
"errors"
"fmt"
"io"
"os"
@ -75,12 +76,12 @@ func (o *pluginVerifyOptions) run(out io.Writer) error {
// Only support tarball verification
if fi.IsDir() {
return fmt.Errorf("directory verification not supported - only plugin tarballs can be verified")
return errors.New("directory verification not supported - only plugin tarballs can be verified")
}
// Verify it's a tarball
if !plugin.IsTarball(o.pluginPath) {
return fmt.Errorf("plugin file must be a gzipped tarball (.tar.gz or .tgz)")
return errors.New("plugin file must be a gzipped tarball (.tar.gz or .tgz)")
}
// Look for provenance file

@ -197,9 +197,9 @@ func (s statusPrinter) WriteTable(out io.Writer) error {
}
_, _ = fmt.Fprintf(out, "TEST SUITE: %s\n%s\n%s\n%s\n",
h.Name,
fmt.Sprintf("Last Started: %s", h.LastRun.StartedAt.Format(time.ANSIC)),
fmt.Sprintf("Last Completed: %s", h.LastRun.CompletedAt.Format(time.ANSIC)),
fmt.Sprintf("Phase: %s", h.LastRun.Phase),
"Last Started: "+h.LastRun.StartedAt.Format(time.ANSIC),
"Last Completed: "+h.LastRun.CompletedAt.Format(time.ANSIC),
"Phase: "+h.LastRun.Phase,
)
}
}

@ -17,7 +17,7 @@ limitations under the License.
package kube
import (
"fmt"
"errors"
"net/http"
"strings"
"testing"
@ -451,7 +451,7 @@ func TestLegacyWaiter_isRetryableError(t *testing.T) {
},
{
name: "non-status error",
err: fmt.Errorf("some generic error"),
err: errors.New("some generic error"),
wantRetry: true,
},
}

@ -17,8 +17,8 @@ limitations under the License.
package v1
import (
"fmt"
"math/rand"
"strconv"
"time"
"helm.sh/helm/v4/pkg/chart/common"
@ -57,7 +57,7 @@ func Mock(opts *MockReleaseOptions) *Release {
name := opts.Name
if name == "" {
name = "testrelease-" + fmt.Sprint(rand.Intn(100))
name = "testrelease-" + strconv.Itoa(rand.Intn(100))
}
version := 1

@ -171,7 +171,7 @@ func (cfgmaps *ConfigMaps) Create(key string, rls release.Releaser) error {
lbs.init()
lbs.fromMap(rac.Labels())
lbs.set("createdAt", fmt.Sprintf("%v", time.Now().Unix()))
lbs.set("createdAt", strconv.FormatInt(time.Now().Unix(), 10))
rel, err := releaserToV1Release(rls)
if err != nil {
@ -209,7 +209,7 @@ func (cfgmaps *ConfigMaps) Update(key string, rel release.Releaser) error {
lbs.init()
lbs.fromMap(rls.Labels)
lbs.set("modifiedAt", fmt.Sprintf("%v", time.Now().Unix()))
lbs.set("modifiedAt", strconv.FormatInt(time.Now().Unix(), 10))
// create a new configmap object to hold the release
obj, err := newConfigMapsObject(key, rls, lbs)

@ -171,7 +171,7 @@ func (secrets *Secrets) Create(key string, rel release.Releaser) error {
lbs.init()
lbs.fromMap(rls.Labels)
lbs.set("createdAt", fmt.Sprintf("%v", time.Now().Unix()))
lbs.set("createdAt", strconv.FormatInt(time.Now().Unix(), 10))
// create a new secret to hold the release
obj, err := newSecretsObject(key, rls, lbs)
@ -202,7 +202,7 @@ func (secrets *Secrets) Update(key string, rel release.Releaser) error {
lbs.init()
lbs.fromMap(rls.Labels)
lbs.set("modifiedAt", fmt.Sprintf("%v", time.Now().Unix()))
lbs.set("modifiedAt", strconv.FormatInt(time.Now().Unix(), 10))
// create a new secret object to hold the release
obj, err := newSecretsObject(key, rls, lbs)

Loading…
Cancel
Save