unnecessary use of fmt.Sprint (S1039) (#10049)
This commit is contained in:
parent
114ae77fb7
commit
7043f6ae29
11 changed files with 58 additions and 62 deletions
|
@ -109,7 +109,7 @@ func TestNginxCheck(t *testing.T) {
|
|||
})
|
||||
|
||||
// pollute pid file
|
||||
pidFile.Write([]byte(fmt.Sprint("999999")))
|
||||
pidFile.Write([]byte("999999"))
|
||||
pidFile.Close()
|
||||
|
||||
t.Run("bad pid", func(t *testing.T) {
|
||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
|||
package annotations
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"net/http"
|
||||
"strings"
|
||||
|
||||
|
@ -52,6 +51,6 @@ var _ = framework.DescribeAnnotation("connection-proxy-header", func() {
|
|||
WithHeader("Host", host).
|
||||
Expect().
|
||||
Status(http.StatusOK).
|
||||
Body().Contains(fmt.Sprintf("connection=keep-alive"))
|
||||
Body().Contains("connection=keep-alive")
|
||||
})
|
||||
})
|
||||
|
|
|
@ -160,7 +160,7 @@ func (f *Framework) AfterEach() {
|
|||
return
|
||||
}
|
||||
|
||||
cmd := fmt.Sprintf("cat /etc/nginx/nginx.conf")
|
||||
cmd := "cat /etc/nginx/nginx.conf"
|
||||
o, err := f.ExecCommand(f.pod, cmd)
|
||||
if err != nil {
|
||||
Logf("Unexpected error obtaining nginx.conf file: %v", err)
|
||||
|
@ -277,7 +277,7 @@ func (f *Framework) matchNginxConditions(name string, matcher func(cfg string) b
|
|||
return func() (bool, error) {
|
||||
var cmd string
|
||||
if name == "" {
|
||||
cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf")
|
||||
cmd = "cat /etc/nginx/nginx.conf"
|
||||
} else {
|
||||
cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf | awk '/## start server %v/,/## end server %v/'", name, name)
|
||||
}
|
||||
|
|
|
@ -64,15 +64,15 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
|
|||
Body().
|
||||
Raw()
|
||||
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=%s", host))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||
})
|
||||
|
||||
ginkgo.It("should not trust X-Forwarded-For header when setting is false", func() {
|
||||
|
@ -101,13 +101,13 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
|
|||
Raw()
|
||||
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-original-forwarded-for=1.2.3.4"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||
})
|
||||
})
|
||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
|||
package settings
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"net/http"
|
||||
"strings"
|
||||
|
||||
|
@ -65,12 +64,12 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
|
|||
Body().
|
||||
Raw()
|
||||
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=myproto"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=myproto")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||
|
||||
ginkgo.By("ensuring that first entry in X-Forwarded-Host is used as the best host")
|
||||
body = f.HTTPTestClient().
|
||||
|
@ -85,8 +84,8 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
|
|||
Body().
|
||||
Raw()
|
||||
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost.com"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost.com"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "host=myhost.com")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost.com")
|
||||
})
|
||||
|
||||
ginkgo.It("should not trust X-Forwarded headers when setting is false", func() {
|
||||
|
@ -115,16 +114,16 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
|
|||
Body().
|
||||
Raw()
|
||||
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=forwarded-headers"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=http"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-original-forwarded-for=1.2.3.4"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=myproto"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "host=forwarded-headers")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=http")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=myproto")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||
assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
|
||||
})
|
||||
})
|
||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
|||
package settings
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"regexp"
|
||||
"strings"
|
||||
|
||||
|
@ -41,7 +40,7 @@ var _ = framework.DescribeSetting("keep-alive keep-alive-requests", func() {
|
|||
f.UpdateNginxConfigMapData("keep-alive", "140")
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return strings.Contains(server, fmt.Sprintf(`keepalive_timeout 140s;`))
|
||||
return strings.Contains(server, `keepalive_timeout 140s;`)
|
||||
})
|
||||
})
|
||||
|
||||
|
@ -49,7 +48,7 @@ var _ = framework.DescribeSetting("keep-alive keep-alive-requests", func() {
|
|||
f.UpdateNginxConfigMapData("keep-alive-requests", "200")
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return strings.Contains(server, fmt.Sprintf(`keepalive_requests 200;`))
|
||||
return strings.Contains(server, `keepalive_requests 200;`)
|
||||
})
|
||||
|
||||
})
|
||||
|
|
|
@ -92,7 +92,7 @@ var _ = framework.IngressNginxDescribe("[Flag] custom HTTP and HTTPS ports", fun
|
|||
Expect().
|
||||
Status(http.StatusOK).
|
||||
Body().
|
||||
Contains(fmt.Sprintf("x-forwarded-port=443"))
|
||||
Contains("x-forwarded-port=443")
|
||||
})
|
||||
|
||||
ginkgo.Context("when external authentication is configured", func() {
|
||||
|
@ -141,7 +141,7 @@ var _ = framework.IngressNginxDescribe("[Flag] custom HTTP and HTTPS ports", fun
|
|||
Expect().
|
||||
Status(http.StatusOK).
|
||||
Body().
|
||||
Contains(fmt.Sprintf("x-forwarded-port=443"))
|
||||
Contains("x-forwarded-port=443")
|
||||
})
|
||||
})
|
||||
})
|
||||
|
|
|
@ -17,7 +17,6 @@ limitations under the License.
|
|||
package settings
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"strings"
|
||||
|
||||
"github.com/onsi/ginkgo/v2"
|
||||
|
@ -34,7 +33,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
|
|||
f.EnsureIngress(ing)
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return !strings.Contains(server, fmt.Sprintf("force_no_ssl_redirect = true,"))
|
||||
return !strings.Contains(server, "force_no_ssl_redirect = true,")
|
||||
})
|
||||
|
||||
wlKey := "no-tls-redirect-locations"
|
||||
|
@ -43,7 +42,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
|
|||
f.UpdateNginxConfigMapData(wlKey, wlValue)
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return strings.Contains(server, fmt.Sprintf("force_no_ssl_redirect = true,"))
|
||||
return strings.Contains(server, "force_no_ssl_redirect = true,")
|
||||
})
|
||||
|
||||
})
|
||||
|
|
|
@ -66,7 +66,7 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
|
|||
f.WaitForNginxConfiguration(
|
||||
func(server string) bool {
|
||||
return strings.Contains(server, fmt.Sprintf("server_name %v", test)) &&
|
||||
strings.Contains(server, fmt.Sprintf("set $proxy_host $proxy_upstream_name"))
|
||||
strings.Contains(server, "set $proxy_host $proxy_upstream_name")
|
||||
})
|
||||
|
||||
f.HTTPTestClient().
|
||||
|
|
|
@ -71,9 +71,9 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
|
|||
|
||||
body := string(data)
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
|
||||
})
|
||||
|
||||
ginkgo.It("should respect proto passed by the PROXY Protocol server port", func() {
|
||||
|
@ -104,9 +104,9 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
|
|||
|
||||
body := string(data)
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=443"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=https"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=443")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=https")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
|
||||
})
|
||||
|
||||
ginkgo.It("should enable PROXY Protocol for HTTPS", func() {
|
||||
|
@ -146,10 +146,10 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
|
|||
|
||||
body := string(data)
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=https"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-scheme=https"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1"))
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=https")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-scheme=https")
|
||||
assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
|
||||
})
|
||||
|
||||
ginkgo.It("should enable PROXY Protocol for TCP", func() {
|
||||
|
|
|
@ -112,7 +112,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
|
|||
f.UpdateNginxConfigMapData(hstsMaxAge, "86400")
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return strings.Contains(server, fmt.Sprintf(`hsts_max_age = 86400,`))
|
||||
return strings.Contains(server, `hsts_max_age = 86400,`)
|
||||
})
|
||||
|
||||
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
||||
|
@ -131,7 +131,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
|
|||
})
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return strings.Contains(server, fmt.Sprintf(`hsts_include_subdomains = false,`))
|
||||
return strings.Contains(server, `hsts_include_subdomains = false,`)
|
||||
})
|
||||
|
||||
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
||||
|
@ -151,7 +151,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
|
|||
})
|
||||
|
||||
f.WaitForNginxConfiguration(func(server string) bool {
|
||||
return strings.Contains(server, fmt.Sprintf(`hsts_preload = true,`))
|
||||
return strings.Contains(server, `hsts_preload = true,`)
|
||||
})
|
||||
|
||||
f.HTTPTestClientWithTLSConfig(tlsConfig).
|
||||
|
|
Loading…
Reference in a new issue