mirror of https://github.com/status-im/consul.git
Remove unused return values
This commit is contained in:
parent
010a609912
commit
f65e21e6dc
|
@ -6,6 +6,7 @@ linters:
|
||||||
- unconvert
|
- unconvert
|
||||||
- staticcheck
|
- staticcheck
|
||||||
- ineffassign
|
- ineffassign
|
||||||
|
- unparam
|
||||||
|
|
||||||
issues:
|
issues:
|
||||||
# Disable the default exclude list so that all excludes are explicitly
|
# Disable the default exclude list so that all excludes are explicitly
|
||||||
|
@ -16,7 +17,36 @@ issues:
|
||||||
# Temp Ignore SA9004: only the first constant in this group has an explicit type
|
# Temp Ignore SA9004: only the first constant in this group has an explicit type
|
||||||
# https://staticcheck.io/docs/checks#SA9004
|
# https://staticcheck.io/docs/checks#SA9004
|
||||||
- linters: [staticcheck]
|
- linters: [staticcheck]
|
||||||
text: "SA9004:"
|
text: 'SA9004:'
|
||||||
|
|
||||||
|
# An argument that always receives the same value is often not a problem.
|
||||||
|
- linters: [unparam]
|
||||||
|
text: 'always receives'
|
||||||
|
|
||||||
|
# Often functions will implement an interface that returns an error without
|
||||||
|
# needing to return an error. Sometimes the error return value is unnecessary
|
||||||
|
# but a linter can not tell the difference.
|
||||||
|
- linters: [unparam]
|
||||||
|
text: 'result \d+ \(error\) is always nil'
|
||||||
|
|
||||||
|
# Allow unused parameters to start with an underscore. Arguments with a name
|
||||||
|
# of '_' are already ignored.
|
||||||
|
# Ignoring longer names that start with underscore allow for better
|
||||||
|
# self-documentation than a single underscore by itself. Underscore arguments
|
||||||
|
# should generally only be used when a function is implementing an interface.
|
||||||
|
- linters: [unparam]
|
||||||
|
text: '`_[^`]*` is unused'
|
||||||
|
|
||||||
|
# Temp ignore some common unused parameters so that unparam can be added
|
||||||
|
# incrementally.
|
||||||
|
- linters: [unparam]
|
||||||
|
text: '`(t|resp|req|entMeta)` is unused'
|
||||||
|
|
||||||
|
# Temp ignore everything in _oss(_test).go and _ent(_test).go. Many of these
|
||||||
|
# could use underscore to ignore the unused arguments, but the "always returns"
|
||||||
|
# issue will likely remain in oss, and will need to be excluded.
|
||||||
|
- linters: [unparam]
|
||||||
|
path: '(_oss.go|_oss_test.go|_ent.go|_ent_test.go)'
|
||||||
|
|
||||||
linters-settings:
|
linters-settings:
|
||||||
gofmt:
|
gofmt:
|
||||||
|
|
|
@ -139,7 +139,7 @@ func (c *ConsulProvider) State() (map[string]string, error) {
|
||||||
|
|
||||||
// ActiveRoot returns the active root CA certificate.
|
// ActiveRoot returns the active root CA certificate.
|
||||||
func (c *ConsulProvider) ActiveRoot() (string, error) {
|
func (c *ConsulProvider) ActiveRoot() (string, error) {
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -150,7 +150,7 @@ func (c *ConsulProvider) ActiveRoot() (string, error) {
|
||||||
// GenerateRoot initializes a new root certificate and private key
|
// GenerateRoot initializes a new root certificate and private key
|
||||||
// if needed.
|
// if needed.
|
||||||
func (c *ConsulProvider) GenerateRoot() error {
|
func (c *ConsulProvider) GenerateRoot() error {
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -205,7 +205,7 @@ func (c *ConsulProvider) GenerateRoot() error {
|
||||||
// GenerateIntermediateCSR creates a private key and generates a CSR
|
// GenerateIntermediateCSR creates a private key and generates a CSR
|
||||||
// for another datacenter's root to sign.
|
// for another datacenter's root to sign.
|
||||||
func (c *ConsulProvider) GenerateIntermediateCSR() (string, error) {
|
func (c *ConsulProvider) GenerateIntermediateCSR() (string, error) {
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -249,7 +249,7 @@ func (c *ConsulProvider) GenerateIntermediateCSR() (string, error) {
|
||||||
// SetIntermediate validates that the given intermediate is for the right private key
|
// SetIntermediate validates that the given intermediate is for the right private key
|
||||||
// and writes the given intermediate and root certificates to the state.
|
// and writes the given intermediate and root certificates to the state.
|
||||||
func (c *ConsulProvider) SetIntermediate(intermediatePEM, rootPEM string) error {
|
func (c *ConsulProvider) SetIntermediate(intermediatePEM, rootPEM string) error {
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -289,7 +289,7 @@ func (c *ConsulProvider) ActiveIntermediate() (string, error) {
|
||||||
return c.ActiveRoot()
|
return c.ActiveRoot()
|
||||||
}
|
}
|
||||||
|
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -325,7 +325,7 @@ func (c *ConsulProvider) Sign(csr *x509.CertificateRequest) (string, error) {
|
||||||
defer c.Unlock()
|
defer c.Unlock()
|
||||||
|
|
||||||
// Get the provider state
|
// Get the provider state
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -437,7 +437,7 @@ func (c *ConsulProvider) Sign(csr *x509.CertificateRequest) (string, error) {
|
||||||
// are met. It should return a signed CA certificate with a path length constraint
|
// are met. It should return a signed CA certificate with a path length constraint
|
||||||
// of 0 to ensure that the certificate cannot be used to generate further CA certs.
|
// of 0 to ensure that the certificate cannot be used to generate further CA certs.
|
||||||
func (c *ConsulProvider) SignIntermediate(csr *x509.CertificateRequest) (string, error) {
|
func (c *ConsulProvider) SignIntermediate(csr *x509.CertificateRequest) (string, error) {
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -520,7 +520,7 @@ func (c *ConsulProvider) CrossSignCA(cert *x509.Certificate) (string, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get the provider state
|
// Get the provider state
|
||||||
_, providerState, err := c.getState()
|
providerState, err := c.getState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -586,18 +586,18 @@ func (c *ConsulProvider) SupportsCrossSigning() (bool, error) {
|
||||||
|
|
||||||
// getState returns the current provider state from the state delegate, and returns
|
// getState returns the current provider state from the state delegate, and returns
|
||||||
// ErrNotInitialized if no entry is found.
|
// ErrNotInitialized if no entry is found.
|
||||||
func (c *ConsulProvider) getState() (uint64, *structs.CAConsulProviderState, error) {
|
func (c *ConsulProvider) getState() (*structs.CAConsulProviderState, error) {
|
||||||
stateStore := c.Delegate.State()
|
stateStore := c.Delegate.State()
|
||||||
idx, providerState, err := stateStore.CAProviderState(c.id)
|
_, providerState, err := stateStore.CAProviderState(c.id)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return 0, nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
if providerState == nil {
|
if providerState == nil {
|
||||||
return 0, nil, ErrNotInitialized
|
return nil, ErrNotInitialized
|
||||||
}
|
}
|
||||||
|
|
||||||
return idx, providerState, nil
|
return providerState, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *ConsulProvider) incrementAndGetNextSerialNumber() (uint64, error) {
|
func (c *ConsulProvider) incrementAndGetNextSerialNumber() (uint64, error) {
|
||||||
|
|
|
@ -1138,7 +1138,8 @@ func trimUDPResponse(req, resp *dns.Msg, udpAnswerLimit int) (trimmed bool) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// trimDNSResponse will trim the response for UDP and TCP
|
// trimDNSResponse will trim the response for UDP and TCP
|
||||||
func (d *DNSServer) trimDNSResponse(cfg *dnsConfig, network string, req, resp *dns.Msg) (trimmed bool) {
|
func (d *DNSServer) trimDNSResponse(cfg *dnsConfig, network string, req, resp *dns.Msg) {
|
||||||
|
var trimmed bool
|
||||||
if network != "tcp" {
|
if network != "tcp" {
|
||||||
trimmed = trimUDPResponse(req, resp, cfg.UDPAnswerLimit)
|
trimmed = trimUDPResponse(req, resp, cfg.UDPAnswerLimit)
|
||||||
} else {
|
} else {
|
||||||
|
@ -1148,7 +1149,6 @@ func (d *DNSServer) trimDNSResponse(cfg *dnsConfig, network string, req, resp *d
|
||||||
if trimmed && cfg.EnableTruncate {
|
if trimmed && cfg.EnableTruncate {
|
||||||
resp.Truncated = true
|
resp.Truncated = true
|
||||||
}
|
}
|
||||||
return trimmed
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// lookupServiceNodes returns nodes with a given service.
|
// lookupServiceNodes returns nodes with a given service.
|
||||||
|
|
Loading…
Reference in New Issue