unnecessary use of fmt.Sprint (S1039) (#10049)

This commit is contained in:
guangwu 2023-06-12 02:49:54 +08:00 committed by GitHub
parent 114ae77fb7
commit 7043f6ae29
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
11 changed files with 58 additions and 62 deletions

View file

@ -109,7 +109,7 @@ func TestNginxCheck(t *testing.T) {
}) })
// pollute pid file // pollute pid file
pidFile.Write([]byte(fmt.Sprint("999999"))) pidFile.Write([]byte("999999"))
pidFile.Close() pidFile.Close()
t.Run("bad pid", func(t *testing.T) { t.Run("bad pid", func(t *testing.T) {

View file

@ -17,7 +17,6 @@ limitations under the License.
package annotations package annotations
import ( import (
"fmt"
"net/http" "net/http"
"strings" "strings"
@ -52,6 +51,6 @@ var _ = framework.DescribeAnnotation("connection-proxy-header", func() {
WithHeader("Host", host). WithHeader("Host", host).
Expect(). Expect().
Status(http.StatusOK). Status(http.StatusOK).
Body().Contains(fmt.Sprintf("connection=keep-alive")) Body().Contains("connection=keep-alive")
}) })
}) })

View file

@ -160,7 +160,7 @@ func (f *Framework) AfterEach() {
return return
} }
cmd := fmt.Sprintf("cat /etc/nginx/nginx.conf") cmd := "cat /etc/nginx/nginx.conf"
o, err := f.ExecCommand(f.pod, cmd) o, err := f.ExecCommand(f.pod, cmd)
if err != nil { if err != nil {
Logf("Unexpected error obtaining nginx.conf file: %v", err) Logf("Unexpected error obtaining nginx.conf file: %v", err)
@ -277,7 +277,7 @@ func (f *Framework) matchNginxConditions(name string, matcher func(cfg string) b
return func() (bool, error) { return func() (bool, error) {
var cmd string var cmd string
if name == "" { if name == "" {
cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf") cmd = "cat /etc/nginx/nginx.conf"
} else { } else {
cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf | awk '/## start server %v/,/## end server %v/'", name, name) cmd = fmt.Sprintf("cat /etc/nginx/nginx.conf | awk '/## start server %v/,/## end server %v/'", name, name)
} }

View file

@ -64,15 +64,15 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
Body(). Body().
Raw() Raw()
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost")) assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host)) assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=%s", host)) assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=%s", host))
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
}) })
ginkgo.It("should not trust X-Forwarded-For header when setting is false", func() { ginkgo.It("should not trust X-Forwarded-For header when setting is false", func() {
@ -101,13 +101,13 @@ var _ = framework.DescribeSetting("enable-real-ip", func() {
Raw() Raw()
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host)) assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%s", host))
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-original-forwarded-for=1.2.3.4")) assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost")) assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
}) })
}) })

View file

@ -17,7 +17,6 @@ limitations under the License.
package settings package settings
import ( import (
"fmt"
"net/http" "net/http"
"strings" "strings"
@ -65,12 +64,12 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
Body(). Body().
Raw() Raw()
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost")) assert.Contains(ginkgo.GinkgoT(), body, "host=myhost")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=myproto")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=myproto")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
ginkgo.By("ensuring that first entry in X-Forwarded-Host is used as the best host") ginkgo.By("ensuring that first entry in X-Forwarded-Host is used as the best host")
body = f.HTTPTestClient(). body = f.HTTPTestClient().
@ -85,8 +84,8 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
Body(). Body().
Raw() Raw()
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost.com")) assert.Contains(ginkgo.GinkgoT(), body, "host=myhost.com")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost.com")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost.com")
}) })
ginkgo.It("should not trust X-Forwarded headers when setting is false", func() { ginkgo.It("should not trust X-Forwarded headers when setting is false", func() {
@ -115,16 +114,16 @@ var _ = framework.DescribeSetting("use-forwarded-headers", func() {
Body(). Body().
Raw() Raw()
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=forwarded-headers")) assert.Contains(ginkgo.GinkgoT(), body, "host=forwarded-headers")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=80")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=80")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=http")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=http")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-original-forwarded-for=1.2.3.4")) assert.Contains(ginkgo.GinkgoT(), body, "x-original-forwarded-for=1.2.3.4")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=myhost")) assert.NotContains(ginkgo.GinkgoT(), body, "host=myhost")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-host=myhost")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-host=myhost")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=myproto")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-proto=myproto")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-scheme=myproto")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-scheme=myproto")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
assert.NotContains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=1.2.3.4")) assert.NotContains(ginkgo.GinkgoT(), body, "x-forwarded-for=1.2.3.4")
}) })
}) })

View file

@ -17,7 +17,6 @@ limitations under the License.
package settings package settings
import ( import (
"fmt"
"regexp" "regexp"
"strings" "strings"
@ -41,7 +40,7 @@ var _ = framework.DescribeSetting("keep-alive keep-alive-requests", func() {
f.UpdateNginxConfigMapData("keep-alive", "140") f.UpdateNginxConfigMapData("keep-alive", "140")
f.WaitForNginxConfiguration(func(server string) bool { f.WaitForNginxConfiguration(func(server string) bool {
return strings.Contains(server, fmt.Sprintf(`keepalive_timeout 140s;`)) return strings.Contains(server, `keepalive_timeout 140s;`)
}) })
}) })
@ -49,7 +48,7 @@ var _ = framework.DescribeSetting("keep-alive keep-alive-requests", func() {
f.UpdateNginxConfigMapData("keep-alive-requests", "200") f.UpdateNginxConfigMapData("keep-alive-requests", "200")
f.WaitForNginxConfiguration(func(server string) bool { f.WaitForNginxConfiguration(func(server string) bool {
return strings.Contains(server, fmt.Sprintf(`keepalive_requests 200;`)) return strings.Contains(server, `keepalive_requests 200;`)
}) })
}) })

View file

@ -92,7 +92,7 @@ var _ = framework.IngressNginxDescribe("[Flag] custom HTTP and HTTPS ports", fun
Expect(). Expect().
Status(http.StatusOK). Status(http.StatusOK).
Body(). Body().
Contains(fmt.Sprintf("x-forwarded-port=443")) Contains("x-forwarded-port=443")
}) })
ginkgo.Context("when external authentication is configured", func() { ginkgo.Context("when external authentication is configured", func() {
@ -141,7 +141,7 @@ var _ = framework.IngressNginxDescribe("[Flag] custom HTTP and HTTPS ports", fun
Expect(). Expect().
Status(http.StatusOK). Status(http.StatusOK).
Body(). Body().
Contains(fmt.Sprintf("x-forwarded-port=443")) Contains("x-forwarded-port=443")
}) })
}) })
}) })

View file

@ -17,7 +17,6 @@ limitations under the License.
package settings package settings
import ( import (
"fmt"
"strings" "strings"
"github.com/onsi/ginkgo/v2" "github.com/onsi/ginkgo/v2"
@ -34,7 +33,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
f.EnsureIngress(ing) f.EnsureIngress(ing)
f.WaitForNginxConfiguration(func(server string) bool { f.WaitForNginxConfiguration(func(server string) bool {
return !strings.Contains(server, fmt.Sprintf("force_no_ssl_redirect = true,")) return !strings.Contains(server, "force_no_ssl_redirect = true,")
}) })
wlKey := "no-tls-redirect-locations" wlKey := "no-tls-redirect-locations"
@ -43,7 +42,7 @@ var _ = framework.DescribeSetting("Add no tls redirect locations", func() {
f.UpdateNginxConfigMapData(wlKey, wlValue) f.UpdateNginxConfigMapData(wlKey, wlValue)
f.WaitForNginxConfiguration(func(server string) bool { f.WaitForNginxConfiguration(func(server string) bool {
return strings.Contains(server, fmt.Sprintf("force_no_ssl_redirect = true,")) return strings.Contains(server, "force_no_ssl_redirect = true,")
}) })
}) })

View file

@ -66,7 +66,7 @@ var _ = framework.IngressNginxDescribe("Dynamic $proxy_host", func() {
f.WaitForNginxConfiguration( f.WaitForNginxConfiguration(
func(server string) bool { func(server string) bool {
return strings.Contains(server, fmt.Sprintf("server_name %v", test)) && return strings.Contains(server, fmt.Sprintf("server_name %v", test)) &&
strings.Contains(server, fmt.Sprintf("set $proxy_host $proxy_upstream_name")) strings.Contains(server, "set $proxy_host $proxy_upstream_name")
}) })
f.HTTPTestClient(). f.HTTPTestClient().

View file

@ -71,9 +71,9 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
body := string(data) body := string(data)
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol")) assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=http")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=http")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
}) })
ginkgo.It("should respect proto passed by the PROXY Protocol server port", func() { ginkgo.It("should respect proto passed by the PROXY Protocol server port", func() {
@ -104,9 +104,9 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
body := string(data) body := string(data)
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol")) assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=443")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=443")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=https")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=https")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
}) })
ginkgo.It("should enable PROXY Protocol for HTTPS", func() { ginkgo.It("should enable PROXY Protocol for HTTPS", func() {
@ -146,10 +146,10 @@ var _ = framework.DescribeSetting("use-proxy-protocol", func() {
body := string(data) body := string(data)
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol")) assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("host=%v", "proxy-protocol"))
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-port=1234")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-port=1234")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-proto=https")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-proto=https")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-scheme=https")) assert.Contains(ginkgo.GinkgoT(), body, "x-scheme=https")
assert.Contains(ginkgo.GinkgoT(), body, fmt.Sprintf("x-forwarded-for=192.168.0.1")) assert.Contains(ginkgo.GinkgoT(), body, "x-forwarded-for=192.168.0.1")
}) })
ginkgo.It("should enable PROXY Protocol for TCP", func() { ginkgo.It("should enable PROXY Protocol for TCP", func() {

View file

@ -112,7 +112,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
f.UpdateNginxConfigMapData(hstsMaxAge, "86400") f.UpdateNginxConfigMapData(hstsMaxAge, "86400")
f.WaitForNginxConfiguration(func(server string) bool { f.WaitForNginxConfiguration(func(server string) bool {
return strings.Contains(server, fmt.Sprintf(`hsts_max_age = 86400,`)) return strings.Contains(server, `hsts_max_age = 86400,`)
}) })
f.HTTPTestClientWithTLSConfig(tlsConfig). f.HTTPTestClientWithTLSConfig(tlsConfig).
@ -131,7 +131,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
}) })
f.WaitForNginxConfiguration(func(server string) bool { f.WaitForNginxConfiguration(func(server string) bool {
return strings.Contains(server, fmt.Sprintf(`hsts_include_subdomains = false,`)) return strings.Contains(server, `hsts_include_subdomains = false,`)
}) })
f.HTTPTestClientWithTLSConfig(tlsConfig). f.HTTPTestClientWithTLSConfig(tlsConfig).
@ -151,7 +151,7 @@ var _ = framework.DescribeSetting("[SSL] TLS protocols, ciphers and headers)", f
}) })
f.WaitForNginxConfiguration(func(server string) bool { f.WaitForNginxConfiguration(func(server string) bool {
return strings.Contains(server, fmt.Sprintf(`hsts_preload = true,`)) return strings.Contains(server, `hsts_preload = true,`)
}) })
f.HTTPTestClientWithTLSConfig(tlsConfig). f.HTTPTestClientWithTLSConfig(tlsConfig).