Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add more linters to our CI pipeline #326

Merged
merged 4 commits into from Feb 25, 2022
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
11 changes: 8 additions & 3 deletions .golangci.yml
Expand Up @@ -15,9 +15,9 @@ linters:
- stylecheck #https://github.com/dominikh/go-tools/tree/master/stylecheck
- revive #golint is deprecated and golangci-lint recommends to use revive instead https://github.com/mgechev/revive
#other deprecated lint libraries: maligned, scopelint, interfacer
- gocritic
- unparam
- misspell
- gocritic #https://github.com/go-critic/go-critic
- unparam #https://github.com/mvdan/unparam
- misspell #https://github.com/client9/misspell
issues:
exclude-rules:
- path: _test\.go
Expand All @@ -38,6 +38,11 @@ linters-settings:
- diagnostic
- opinionated
- performance
disabled-checks:
- unnamedResult
- hugeParam
sebasslash marked this conversation as resolved.
Show resolved Hide resolved
- singleCaseSwitch
- ifElseChain
revive:
# see https://github.com/mgechev/revive#available-rules for details.
ignore-generated-header: false #recommended in their configuration
Expand Down
12 changes: 6 additions & 6 deletions admin_organization.go
Expand Up @@ -102,8 +102,8 @@ type AdminOrganizationID struct {

// List all the organizations visible to the current user.
func (s *adminOrganizations) List(ctx context.Context, options *AdminOrganizationListOptions) (*AdminOrganizationList, error) {
url := "admin/organizations"
req, err := s.client.newRequest("GET", url, options)
u := "admin/organizations"
req, err := s.client.newRequest("GET", u, options)
if err != nil {
return nil, err
}
Expand All @@ -122,9 +122,9 @@ func (s *adminOrganizations) ListModuleConsumers(ctx context.Context, organizati
return nil, ErrInvalidOrg
}

url := fmt.Sprintf("admin/organizations/%s/relationships/module-consumers", url.QueryEscape(organization))
u := fmt.Sprintf("admin/organizations/%s/relationships/module-consumers", url.QueryEscape(organization))

req, err := s.client.newRequest("GET", url, nil)
req, err := s.client.newRequest("GET", u, nil)
if err != nil {
return nil, err
}
Expand Down Expand Up @@ -183,7 +183,7 @@ func (s *adminOrganizations) UpdateModuleConsumers(ctx context.Context, organiza
return ErrInvalidOrg
}

url := fmt.Sprintf("admin/organizations/%s/relationships/module-consumers", url.QueryEscape(organization))
u := fmt.Sprintf("admin/organizations/%s/relationships/module-consumers", url.QueryEscape(organization))

var organizations []*AdminOrganizationID
for _, id := range consumerOrganizationIDs {
Expand All @@ -193,7 +193,7 @@ func (s *adminOrganizations) UpdateModuleConsumers(ctx context.Context, organiza
organizations = append(organizations, &AdminOrganizationID{ID: id})
}

req, err := s.client.newRequest("PATCH", url, organizations)
req, err := s.client.newRequest("PATCH", u, organizations)
if err != nil {
return err
}
Expand Down
8 changes: 4 additions & 4 deletions admin_user.go
Expand Up @@ -27,10 +27,10 @@ type AdminUsers interface {
// Unsuspend a user by its ID.
Unsuspend(ctx context.Context, userID string) (*AdminUser, error)

// GrantAdmin grants admin privilages to a user by its ID.
// GrantAdmin grants admin privileges to a user by its ID.
GrantAdmin(ctx context.Context, userID string) (*AdminUser, error)

// RevokeAdmin revokees admin privilages to a user by its ID.
// RevokeAdmin revokees admin privileges to a user by its ID.
RevokeAdmin(ctx context.Context, userID string) (*AdminUser, error)

// Disable2FA disables a user's two-factor authentication in the situation
Expand Down Expand Up @@ -163,7 +163,7 @@ func (a *adminUsers) Unsuspend(ctx context.Context, userID string) (*AdminUser,
return au, nil
}

// GrantAdmin grants admin privilages to a user by its ID.
// GrantAdmin grants admin privileges to a user by its ID.
func (a *adminUsers) GrantAdmin(ctx context.Context, userID string) (*AdminUser, error) {
if !validStringID(&userID) {
return nil, ErrInvalidUserValue
Expand All @@ -184,7 +184,7 @@ func (a *adminUsers) GrantAdmin(ctx context.Context, userID string) (*AdminUser,
return au, nil
}

// RevokeAdmin revokes admin privilages to a user by its ID.
// RevokeAdmin revokes admin privileges to a user by its ID.
func (a *adminUsers) RevokeAdmin(ctx context.Context, userID string) (*AdminUser, error) {
if !validStringID(&userID) {
return nil, ErrInvalidUserValue
Expand Down
2 changes: 1 addition & 1 deletion apply.go
Expand Up @@ -31,7 +31,7 @@ type applies struct {
// ApplyStatus represents an apply state.
type ApplyStatus string

//List all available apply statuses.
// List all available apply statuses.
const (
ApplyCanceled ApplyStatus = "canceled"
ApplyCreated ApplyStatus = "created"
Expand Down
6 changes: 3 additions & 3 deletions configuration_version.go
Expand Up @@ -47,7 +47,7 @@ type configurationVersions struct {
// ConfigurationStatus represents a configuration version status.
type ConfigurationStatus string

//List all available configuration version statuses.
// List all available configuration version statuses.
const (
ConfigurationErrored ConfigurationStatus = "errored"
ConfigurationPending ConfigurationStatus = "pending"
Expand Down Expand Up @@ -234,7 +234,7 @@ func (s *configurationVersions) ReadWithOptions(ctx context.Context, cvID string
// Upload packages and uploads Terraform configuration files. It requires the
// upload URL from a configuration version and the path to the configuration
// files on disk.
func (s *configurationVersions) Upload(ctx context.Context, url, path string) error {
func (s *configurationVersions) Upload(ctx context.Context, u, path string) error {
file, err := os.Stat(path)
if err != nil {
return err
Expand All @@ -250,7 +250,7 @@ func (s *configurationVersions) Upload(ctx context.Context, url, path string) er
return err
}

req, err := s.client.newRequest("PUT", url, body)
req, err := s.client.newRequest("PUT", u, body)
if err != nil {
return err
}
Expand Down
4 changes: 2 additions & 2 deletions helper_test.go
Expand Up @@ -23,7 +23,7 @@ var _testAccountDetails *TestAccountDetails

func testClient(t *testing.T) *Client {
client, err := NewClient(nil)
client.RetryServerErrors(true) // because ocasionally we get a 500 internal when deleting an organization's workspace
client.RetryServerErrors(true) // because occasionally we get a 500 internal when deleting an organization's workspace
if err != nil {
t.Fatal(err)
}
Expand Down Expand Up @@ -457,7 +457,7 @@ func createOrganizationToken(t *testing.T, client *Client, org *Organization) (*
}
}

func createRunTrigger(t *testing.T, client *Client, w *Workspace, sourceable *Workspace) (*RunTrigger, func()) {
func createRunTrigger(t *testing.T, client *Client, w, sourceable *Workspace) (*RunTrigger, func()) {
var wCleanup func()
var sourceableCleanup func()

Expand Down
4 changes: 2 additions & 2 deletions organization_tags_integration_test.go
Expand Up @@ -122,7 +122,7 @@ func TestOrganizationTagsDelete(t *testing.T) {
})
require.NoError(t, err)

//sanity check ensure tags were deleted from the organization
// sanity check ensure tags were deleted from the organization
tags, err = client.OrganizationTags.List(ctx, orgTest.Name, nil)
require.NoError(t, err)

Expand Down Expand Up @@ -175,7 +175,7 @@ func TestOrganizationTagsAddWorkspace(t *testing.T) {
})
require.NoError(t, err)

//Ensure the tag was properly associated with the workspaces
// Ensure the tag was properly associated with the workspaces
fetched, err := client.Workspaces.ListTags(ctx, workspaceToAdd1.ID, nil)
require.NoError(t, err)
assert.Equal(t, fetched.Items[0].ID, tagID)
Expand Down
2 changes: 1 addition & 1 deletion plan.go
Expand Up @@ -35,7 +35,7 @@ type plans struct {
// PlanStatus represents a plan state.
type PlanStatus string

//List all available plan statuses.
// List all available plan statuses.
const (
PlanCanceled PlanStatus = "canceled"
PlanCreated PlanStatus = "created"
Expand Down
2 changes: 1 addition & 1 deletion policy_check.go
Expand Up @@ -48,7 +48,7 @@ const (
// PolicyStatus represents a policy check state.
type PolicyStatus string

//List all available policy check statuses.
// List all available policy check statuses.
const (
PolicyCanceled PolicyStatus = "canceled"
PolicyErrored PolicyStatus = "errored"
Expand Down
10 changes: 5 additions & 5 deletions policy_set.go
Expand Up @@ -236,7 +236,7 @@ type PolicySetUpdateOptions struct {
// https://jsonapi.org/format/#crud-creating
Type string `jsonapi:"primary,policy-sets"`

/// The name of the policy set.
// The name of the policy set.
Name *string `jsonapi:"attr,name,omitempty"`

// The description of the policy set.
Expand Down Expand Up @@ -293,7 +293,7 @@ func (s *policySets) Update(ctx context.Context, policySetID string, options Pol
// PolicySetAddPoliciesOptions represents the options for adding policies
// to a policy set.
type PolicySetAddPoliciesOptions struct {
/// The policies to add to the policy set.
// The policies to add to the policy set.
Policies []*Policy
}

Expand Down Expand Up @@ -328,7 +328,7 @@ func (s *policySets) AddPolicies(ctx context.Context, policySetID string, option
// PolicySetRemovePoliciesOptions represents the options for removing
// policies from a policy set.
type PolicySetRemovePoliciesOptions struct {
/// The policies to remove from the policy set.
// The policies to remove from the policy set.
Policies []*Policy
}

Expand Down Expand Up @@ -363,7 +363,7 @@ func (s *policySets) RemovePolicies(ctx context.Context, policySetID string, opt
// PolicySetAddWorkspacesOptions represents the options for adding workspaces
// to a policy set.
type PolicySetAddWorkspacesOptions struct {
/// The workspaces to add to the policy set.
// The workspaces to add to the policy set.
Workspaces []*Workspace
}

Expand Down Expand Up @@ -398,7 +398,7 @@ func (s *policySets) AddWorkspaces(ctx context.Context, policySetID string, opti
// PolicySetRemoveWorkspacesOptions represents the options for removing
// workspaces from a policy set.
type PolicySetRemoveWorkspacesOptions struct {
/// The workspaces to remove from the policy set.
// The workspaces to remove from the policy set.
Workspaces []*Workspace
}

Expand Down
6 changes: 3 additions & 3 deletions policy_set_parameter.go
Expand Up @@ -138,7 +138,7 @@ func (s *policySetParameters) Create(ctx context.Context, policySetID string, op
}

// Read a parameter by its ID.
func (s *policySetParameters) Read(ctx context.Context, policySetID string, parameterID string) (*PolicySetParameter, error) {
func (s *policySetParameters) Read(ctx context.Context, policySetID, parameterID string) (*PolicySetParameter, error) {
if !validStringID(&policySetID) {
return nil, ErrInvalidPolicySetID
}
Expand Down Expand Up @@ -180,7 +180,7 @@ type PolicySetParameterUpdateOptions struct {
}

// Update values of an existing parameter.
func (s *policySetParameters) Update(ctx context.Context, policySetID string, parameterID string, options PolicySetParameterUpdateOptions) (*PolicySetParameter, error) {
func (s *policySetParameters) Update(ctx context.Context, policySetID, parameterID string, options PolicySetParameterUpdateOptions) (*PolicySetParameter, error) {
if !validStringID(&policySetID) {
return nil, ErrInvalidPolicySetID
}
Expand All @@ -204,7 +204,7 @@ func (s *policySetParameters) Update(ctx context.Context, policySetID string, pa
}

// Delete a parameter by its ID.
func (s *policySetParameters) Delete(ctx context.Context, policySetID string, parameterID string) error {
func (s *policySetParameters) Delete(ctx context.Context, policySetID, parameterID string) error {
if !validStringID(&policySetID) {
return ErrInvalidPolicySetID
}
Expand Down
2 changes: 1 addition & 1 deletion policy_set_version.go
Expand Up @@ -47,7 +47,7 @@ const (
// PolicySetVersionStatus represents a policy set version status.
type PolicySetVersionStatus string

//List all available policy set version statuses.
// List all available policy set version statuses.
const (
PolicySetVersionErrored PolicySetVersionStatus = "errored"
PolicySetVersionIngressing PolicySetVersionStatus = "ingressing"
Expand Down
10 changes: 5 additions & 5 deletions registry_module.go
Expand Up @@ -214,7 +214,7 @@ func (o RegistryModuleCreateVersionOptions) valid() error {
}

// Create a new registry module version
func (r *registryModules) CreateVersion(ctx context.Context, organization string, name string, provider string, options RegistryModuleCreateVersionOptions) (*RegistryModuleVersion, error) {
func (r *registryModules) CreateVersion(ctx context.Context, organization, name, provider string, options RegistryModuleCreateVersionOptions) (*RegistryModuleVersion, error) {
if !validStringID(&organization) {
return nil, ErrInvalidOrg
}
Expand Down Expand Up @@ -313,7 +313,7 @@ func (r *registryModules) CreateWithVCSConnection(ctx context.Context, options R
}

// Read a specific registry module
func (r *registryModules) Read(ctx context.Context, organization string, name string, provider string) (*RegistryModule, error) {
func (r *registryModules) Read(ctx context.Context, organization, name, provider string) (*RegistryModule, error) {
if !validStringID(&organization) {
return nil, ErrInvalidOrg
}
Expand Down Expand Up @@ -351,7 +351,7 @@ func (r *registryModules) Read(ctx context.Context, organization string, name st
}

// Delete is used to delete the entire registry module
func (r *registryModules) Delete(ctx context.Context, organization string, name string) error {
func (r *registryModules) Delete(ctx context.Context, organization, name string) error {
if !validStringID(&organization) {
return ErrInvalidOrg
}
Expand All @@ -376,7 +376,7 @@ func (r *registryModules) Delete(ctx context.Context, organization string, name
}

// DeleteProvider is used to delete the specific registry module provider
func (r *registryModules) DeleteProvider(ctx context.Context, organization string, name string, provider string) error {
func (r *registryModules) DeleteProvider(ctx context.Context, organization, name, provider string) error {
if !validStringID(&organization) {
return ErrInvalidOrg
}
Expand Down Expand Up @@ -408,7 +408,7 @@ func (r *registryModules) DeleteProvider(ctx context.Context, organization strin
}

// DeleteVersion is used to delete the specific registry module version
func (r *registryModules) DeleteVersion(ctx context.Context, organization string, name string, provider string, version string) error {
func (r *registryModules) DeleteVersion(ctx context.Context, organization, name, provider, version string) error {
if !validStringID(&organization) {
return ErrInvalidOrg
}
Expand Down
2 changes: 1 addition & 1 deletion run.go
Expand Up @@ -48,7 +48,7 @@ type runs struct {
// RunStatus represents a run state.
type RunStatus string

//List all available run statuses.
// List all available run statuses.
const (
RunApplied RunStatus = "applied"
RunApplyQueued RunStatus = "apply_queued"
Expand Down
2 changes: 1 addition & 1 deletion run_task.go
Expand Up @@ -267,7 +267,7 @@ func (s *runTasks) Delete(ctx context.Context, runTaskID string) error {
}

// Convenient method to attach a run task to a workspace. See: WorkspaceRunTasks.Create()
func (s *runTasks) AttachToWorkspace(ctx context.Context, workspaceID string, runTaskID string, enforcement TaskEnforcementLevel) (*WorkspaceRunTask, error) {
func (s *runTasks) AttachToWorkspace(ctx context.Context, workspaceID, runTaskID string, enforcement TaskEnforcementLevel) (*WorkspaceRunTask, error) {
return s.client.WorkspaceRunTasks.Create(ctx, workspaceID, WorkspaceRunTaskCreateOptions{
EnforcementLevel: enforcement,
RunTask: &RunTask{ID: runTaskID},
Expand Down
5 changes: 2 additions & 3 deletions state_version.go
Expand Up @@ -74,7 +74,6 @@ type StateVersionListOptions struct {
Workspace string `url:"filter[workspace][name]"`
}

//check that StateVersionListOptions fields had valid values
func (o *StateVersionListOptions) valid() error {
if o == nil {
return ErrRequiredStateVerListOps
Expand Down Expand Up @@ -247,8 +246,8 @@ func (s *stateVersions) ReadCurrent(ctx context.Context, workspaceID string) (*S
}

// Download retrieves the actual stored state of a state version
func (s *stateVersions) Download(ctx context.Context, url string) ([]byte, error) {
req, err := s.client.newRequest("GET", url, nil)
func (s *stateVersions) Download(ctx context.Context, u string) ([]byte, error) {
req, err := s.client.newRequest("GET", u, nil)
if err != nil {
return nil, err
}
Expand Down
6 changes: 3 additions & 3 deletions state_version_output.go
Expand Up @@ -9,9 +9,9 @@ import (
// Compile-time proof of interface implementation.
var _ StateVersionOutputs = (*stateVersionOutputs)(nil)

//State version outputs are the output values from a Terraform state file.
//They include the name and value of the output, as well as a sensitive boolean
//if the value should be hidden by default in UIs.
// State version outputs are the output values from a Terraform state file.
// They include the name and value of the output, as well as a sensitive boolean
// if the value should be hidden by default in UIs.
//
// TFE API docs: https://www.terraform.io/docs/cloud/api/state-version-outputs.html
type StateVersionOutputs interface {
Expand Down
4 changes: 2 additions & 2 deletions task_result.go
Expand Up @@ -21,10 +21,10 @@ type taskResults struct {
client *Client
}

//TaskResultStatus is an enum that represents all possible statuses for a task result
// TaskResultStatus is an enum that represents all possible statuses for a task result
type TaskResultStatus string

//TaskEnforcementLevel is an enum that describes the enforcement levels for a run task
// TaskEnforcementLevel is an enum that describes the enforcement levels for a run task
type TaskEnforcementLevel string

const (
Expand Down
2 changes: 1 addition & 1 deletion team_access.go
Expand Up @@ -106,7 +106,7 @@ type TeamAccessListOptions struct {
WorkspaceID string `url:"filter[workspace][id]"`
}

//check that workspaceID field has a valid value
// check that workspaceID field has a valid value
func (o *TeamAccessListOptions) valid() error {
if o == nil {
return ErrRequiredTeamAccessListOps
Expand Down