Skip to content

Commit e72c2c4

Browse files
committed
*: fix nakedret lint
Signed-off-by: Wei Fu <[email protected]>
1 parent fb8a315 commit e72c2c4

File tree

9 files changed

+60
-45
lines changed

9 files changed

+60
-45
lines changed

client/pkg/transport/keepalive_listener.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -101,10 +101,10 @@ type tlsKeepaliveListener struct {
101101

102102
// Accept waits for and returns the next incoming TLS connection.
103103
// The returned connection c is a *tls.Conn.
104-
func (l *tlsKeepaliveListener) Accept() (c net.Conn, err error) {
105-
c, err = l.Listener.Accept()
104+
func (l *tlsKeepaliveListener) Accept() (net.Conn, error) {
105+
c, err := l.Listener.Accept()
106106
if err != nil {
107-
return
107+
return nil, err
108108
}
109109

110110
c = tls.Server(c, l.config)

client/pkg/transport/listener.go

+20-15
Original file line numberDiff line numberDiff line change
@@ -103,14 +103,17 @@ func newListener(addr, scheme string, opts ...ListenerOption) (net.Listener, err
103103
return wrapTLS(scheme, lnOpts.tlsInfo, lnOpts.Listener)
104104
}
105105

106-
func newKeepAliveListener(cfg *net.ListenConfig, addr string) (ln net.Listener, err error) {
106+
func newKeepAliveListener(cfg *net.ListenConfig, addr string) (net.Listener, error) {
107+
var ln net.Listener
108+
var err error
109+
107110
if cfg != nil {
108111
ln, err = cfg.Listen(context.TODO(), "tcp", addr)
109112
} else {
110113
ln, err = net.Listen("tcp", addr)
111114
}
112115
if err != nil {
113-
return
116+
return nil, err
114117
}
115118

116119
return NewKeepAliveListener(ln, "tcp", nil)
@@ -204,16 +207,18 @@ func (info TLSInfo) Empty() bool {
204207
return info.CertFile == "" && info.KeyFile == ""
205208
}
206209

207-
func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertValidity uint, additionalUsages ...x509.ExtKeyUsage) (info TLSInfo, err error) {
210+
func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertValidity uint, additionalUsages ...x509.ExtKeyUsage) (TLSInfo, error) {
208211
verify.Assert(lg != nil, "nil log isn't allowed")
209-
info.Logger = lg
212+
213+
var err error
214+
info := TLSInfo{Logger: lg}
210215
if selfSignedCertValidity == 0 {
211216
err = errors.New("selfSignedCertValidity is invalid,it should be greater than 0")
212217
info.Logger.Warn(
213218
"cannot generate cert",
214219
zap.Error(err),
215220
)
216-
return
221+
return info, err
217222
}
218223
err = fileutil.TouchDirAll(lg, dirpath)
219224
if err != nil {
@@ -223,16 +228,16 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
223228
zap.Error(err),
224229
)
225230
}
226-
return
231+
return info, err
227232
}
228233

229234
certPath, err := filepath.Abs(filepath.Join(dirpath, "cert.pem"))
230235
if err != nil {
231-
return
236+
return info, err
232237
}
233238
keyPath, err := filepath.Abs(filepath.Join(dirpath, "key.pem"))
234239
if err != nil {
235-
return
240+
return info, err
236241
}
237242
_, errcert := os.Stat(certPath)
238243
_, errkey := os.Stat(keyPath)
@@ -242,7 +247,7 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
242247
info.ClientCertFile = certPath
243248
info.ClientKeyFile = keyPath
244249
info.selfCert = true
245-
return
250+
return info, err
246251
}
247252

248253
serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
@@ -254,7 +259,7 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
254259
zap.Error(err),
255260
)
256261
}
257-
return
262+
return info, err
258263
}
259264

260265
tmpl := x509.Certificate{
@@ -292,7 +297,7 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
292297
zap.Error(err),
293298
)
294299
}
295-
return
300+
return info, err
296301
}
297302

298303
derBytes, err := x509.CreateCertificate(rand.Reader, &tmpl, &tmpl, &priv.PublicKey, priv)
@@ -303,7 +308,7 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
303308
zap.Error(err),
304309
)
305310
}
306-
return
311+
return info, err
307312
}
308313

309314
certOut, err := os.Create(certPath)
@@ -313,7 +318,7 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
313318
zap.String("path", certPath),
314319
zap.Error(err),
315320
)
316-
return
321+
return info, err
317322
}
318323
pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
319324
certOut.Close()
@@ -323,7 +328,7 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
323328

324329
b, err := x509.MarshalECPrivateKey(priv)
325330
if err != nil {
326-
return
331+
return info, err
327332
}
328333
keyOut, err := os.OpenFile(keyPath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
329334
if err != nil {
@@ -334,7 +339,7 @@ func SelfCert(lg *zap.Logger, dirpath string, hosts []string, selfSignedCertVali
334339
zap.Error(err),
335340
)
336341
}
337-
return
342+
return info, err
338343
}
339344
pem.Encode(keyOut, &pem.Block{Type: "EC PRIVATE KEY", Bytes: b})
340345
keyOut.Close()

etcdctl/main_test.go

+4-2
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,9 @@ import (
2121
"testing"
2222
)
2323

24-
func SplitTestArgs(args []string) (testArgs, appArgs []string) {
24+
func SplitTestArgs(args []string) ([]string, []string) {
25+
var testArgs, appArgs []string
26+
2527
for i, arg := range args {
2628
switch {
2729
case strings.HasPrefix(arg, "-test."):
@@ -33,7 +35,7 @@ func SplitTestArgs(args []string) (testArgs, appArgs []string) {
3335
appArgs = append(appArgs, arg)
3436
}
3537
}
36-
return
38+
return testArgs, appArgs
3739
}
3840

3941
// TestEmpty is an empty test to avoid no-tests warning.

etcdutl/main_test.go

+4-2
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,9 @@ import (
2121
"testing"
2222
)
2323

24-
func SplitTestArgs(args []string) (testArgs, appArgs []string) {
24+
func SplitTestArgs(args []string) ([]string, []string) {
25+
var testArgs, appArgs []string
26+
2527
for i, arg := range args {
2628
switch {
2729
case strings.HasPrefix(arg, "-test."):
@@ -33,7 +35,7 @@ func SplitTestArgs(args []string) (testArgs, appArgs []string) {
3335
appArgs = append(appArgs, arg)
3436
}
3537
}
36-
return
38+
return testArgs, appArgs
3739
}
3840

3941
// TestEmpty is empty test to avoid no-tests warning.

scripts/test.sh

+1-2
Original file line numberDiff line numberDiff line change
@@ -424,8 +424,7 @@ function ineffassign_pass {
424424
}
425425

426426
function nakedret_pass {
427-
# TODO: nakedret should work with -set_exit_status
428-
run_for_modules generic_checker run_go_tool "github.com/alexkohler/nakedret"
427+
run_for_modules generic_checker run_go_tool "github.com/alexkohler/nakedret/cmd/nakedret"
429428
}
430429

431430
function license_header_per_module {

server/etcdserver/bootstrap_test.go

+20-13
Original file line numberDiff line numberDiff line change
@@ -216,27 +216,32 @@ func TestBootstrapBackend(t *testing.T) {
216216
}
217217
}
218218

219-
func createDataDir(t *testing.T) (dataDir string, err error) {
219+
func createDataDir(t *testing.T) (string, error) {
220+
var err error
221+
220222
// create the temporary data dir
221-
dataDir = t.TempDir()
223+
dataDir := t.TempDir()
222224

223225
// create ${dataDir}/member/snap
224226
if err = os.MkdirAll(datadir.ToSnapDir(dataDir), 0700); err != nil {
225-
return
227+
return "", err
226228
}
227229

228230
// create ${dataDir}/member/wal
229231
err = os.MkdirAll(datadir.ToWalDir(dataDir), 0700)
232+
if err != nil {
233+
return "", err
234+
}
230235

231-
return
236+
return dataDir, nil
232237
}
233238

234239
// prepare data for the test case
235-
func prepareData(cfg config.ServerConfig) (err error) {
240+
func prepareData(cfg config.ServerConfig) error {
236241
var snapshotTerm, snapshotIndex uint64 = 2, 5
237242

238-
if err = createWALFileWithSnapshotRecord(cfg, snapshotTerm, snapshotIndex); err != nil {
239-
return
243+
if err := createWALFileWithSnapshotRecord(cfg, snapshotTerm, snapshotIndex); err != nil {
244+
return err
240245
}
241246

242247
return createSnapshotAndBackendDB(cfg, snapshotTerm, snapshotIndex)
@@ -245,7 +250,7 @@ func prepareData(cfg config.ServerConfig) (err error) {
245250
func createWALFileWithSnapshotRecord(cfg config.ServerConfig, snapshotTerm, snapshotIndex uint64) (err error) {
246251
var w *wal.WAL
247252
if w, err = wal.Create(cfg.Logger, cfg.WALDir(), []byte("somedata")); err != nil {
248-
return
253+
return err
249254
}
250255

251256
defer func() {
@@ -262,13 +267,15 @@ func createWALFileWithSnapshotRecord(cfg config.ServerConfig, snapshotTerm, snap
262267
}
263268

264269
if err = w.SaveSnapshot(walSnap); err != nil {
265-
return
270+
return err
266271
}
267272

268273
return w.Save(raftpb.HardState{Term: snapshotTerm, Vote: 3, Commit: snapshotIndex}, nil)
269274
}
270275

271-
func createSnapshotAndBackendDB(cfg config.ServerConfig, snapshotTerm, snapshotIndex uint64) (err error) {
276+
func createSnapshotAndBackendDB(cfg config.ServerConfig, snapshotTerm, snapshotIndex uint64) error {
277+
var err error
278+
272279
confState := raftpb.ConfState{
273280
Voters: []uint64{1, 2, 3},
274281
}
@@ -283,7 +290,7 @@ func createSnapshotAndBackendDB(cfg config.ServerConfig, snapshotTerm, snapshotI
283290
Term: snapshotTerm,
284291
},
285292
}); err != nil {
286-
return
293+
return err
287294
}
288295

289296
// create snapshot db file: "%016x.snap.db"
@@ -292,11 +299,11 @@ func createSnapshotAndBackendDB(cfg config.ServerConfig, snapshotTerm, snapshotI
292299
schema.UnsafeUpdateConsistentIndex(be.BatchTx(), snapshotIndex, snapshotTerm)
293300
schema.MustUnsafeSaveConfStateToBackend(cfg.Logger, be.BatchTx(), &confState)
294301
if err = be.Close(); err != nil {
295-
return
302+
return err
296303
}
297304
sdb := filepath.Join(cfg.SnapDir(), fmt.Sprintf("%016x.snap.db", snapshotIndex))
298305
if err = os.Rename(cfg.BackendPath(), sdb); err != nil {
299-
return
306+
return err
300307
}
301308

302309
// create backend db file

server/main_test.go

+4-2
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,9 @@ import (
2525
"go.etcd.io/etcd/server/v3/etcdmain"
2626
)
2727

28-
func SplitTestArgs(args []string) (testArgs, appArgs []string) {
28+
func SplitTestArgs(args []string) ([]string, []string) {
29+
var testArgs, appArgs []string
30+
2931
for i, arg := range args {
3032
switch {
3133
case strings.HasPrefix(arg, "-test."):
@@ -37,7 +39,7 @@ func SplitTestArgs(args []string) (testArgs, appArgs []string) {
3739
appArgs = append(appArgs, arg)
3840
}
3941
}
40-
return
42+
return testArgs, appArgs
4143
}
4244

4345
func TestEmpty(t *testing.T) {}

server/storage/wal/wal.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -553,7 +553,7 @@ func (w *WAL) ReadAll() (metadata []byte, state raftpb.HardState, ents []raftpb.
553553
// create encoder (chain crc with the decoder), enable appending
554554
w.encoder, err = newFileEncoder(w.tail().File, w.decoder.LastCRC())
555555
if err != nil {
556-
return
556+
return nil, state, nil, err
557557
}
558558
}
559559
w.decoder = nil

tests/robustness/validate/operations.go

+3-5
Original file line numberDiff line numberDiff line change
@@ -28,24 +28,22 @@ import (
2828
"go.etcd.io/etcd/tests/v3/robustness/model"
2929
)
3030

31-
func validateOperationsAndVisualize(t *testing.T, lg *zap.Logger, operations []porcupine.Operation, eventHistory []model.WatchEvent) (visualize func(basepath string) error) {
31+
func validateOperationsAndVisualize(t *testing.T, lg *zap.Logger, operations []porcupine.Operation, eventHistory []model.WatchEvent) func(basepath string) error {
3232
const timeout = 5 * time.Minute
3333
lg.Info("Validating linearizable operations", zap.Duration("timeout", timeout))
3434
result, visualize := validateLinearizableOperationAndVisualize(lg, operations, timeout)
3535
switch result {
3636
case porcupine.Illegal:
3737
t.Error("Linearization failed")
38-
return
3938
case porcupine.Unknown:
4039
t.Error("Linearization has timed out")
41-
return
4240
case porcupine.Ok:
4341
t.Log("Linearization success")
42+
lg.Info("Validating serializable operations")
43+
validateSerializableOperations(t, operations, eventHistory)
4444
default:
4545
t.Fatalf("Unknown Linearization")
4646
}
47-
lg.Info("Validating serializable operations")
48-
validateSerializableOperations(t, operations, eventHistory)
4947
return visualize
5048
}
5149

0 commit comments

Comments
 (0)