mirror of
https://github.com/portainer/portainer.git
synced 2025-07-18 21:09:40 +02:00
fix(linter): enable ineffassign BE-10204 (#669)
This commit is contained in:
parent
342549b546
commit
e319a7a5ae
4 changed files with 26 additions and 11 deletions
|
@ -12,6 +12,7 @@ linters:
|
||||||
- copyloopvar
|
- copyloopvar
|
||||||
- intrange
|
- intrange
|
||||||
- perfsprint
|
- perfsprint
|
||||||
|
- ineffassign
|
||||||
|
|
||||||
linters-settings:
|
linters-settings:
|
||||||
depguard:
|
depguard:
|
||||||
|
|
|
@ -18,8 +18,7 @@ func (m *Migrator) updateResourceControlsToDBVersion22() error {
|
||||||
for _, resourceControl := range legacyResourceControls {
|
for _, resourceControl := range legacyResourceControls {
|
||||||
resourceControl.AdministratorsOnly = false
|
resourceControl.AdministratorsOnly = false
|
||||||
|
|
||||||
err := m.resourceControlService.Update(resourceControl.ID, &resourceControl)
|
if err := m.resourceControlService.Update(resourceControl.ID, &resourceControl); err != nil {
|
||||||
if err != nil {
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -42,8 +41,8 @@ func (m *Migrator) updateUsersAndRolesToDBVersion22() error {
|
||||||
|
|
||||||
for _, user := range legacyUsers {
|
for _, user := range legacyUsers {
|
||||||
user.PortainerAuthorizations = authorization.DefaultPortainerAuthorizations()
|
user.PortainerAuthorizations = authorization.DefaultPortainerAuthorizations()
|
||||||
err = m.userService.Update(user.ID, &user)
|
|
||||||
if err != nil {
|
if err := m.userService.Update(user.ID, &user); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -52,38 +51,47 @@ func (m *Migrator) updateUsersAndRolesToDBVersion22() error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
endpointAdministratorRole.Priority = 1
|
endpointAdministratorRole.Priority = 1
|
||||||
endpointAdministratorRole.Authorizations = authorization.DefaultEndpointAuthorizationsForEndpointAdministratorRole()
|
endpointAdministratorRole.Authorizations = authorization.DefaultEndpointAuthorizationsForEndpointAdministratorRole()
|
||||||
|
|
||||||
err = m.roleService.Update(endpointAdministratorRole.ID, endpointAdministratorRole)
|
if err := m.roleService.Update(endpointAdministratorRole.ID, endpointAdministratorRole); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
helpDeskRole, err := m.roleService.Read(portainer.RoleID(2))
|
helpDeskRole, err := m.roleService.Read(portainer.RoleID(2))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
helpDeskRole.Priority = 2
|
helpDeskRole.Priority = 2
|
||||||
helpDeskRole.Authorizations = authorization.DefaultEndpointAuthorizationsForHelpDeskRole(settings.AllowVolumeBrowserForRegularUsers)
|
helpDeskRole.Authorizations = authorization.DefaultEndpointAuthorizationsForHelpDeskRole(settings.AllowVolumeBrowserForRegularUsers)
|
||||||
|
|
||||||
err = m.roleService.Update(helpDeskRole.ID, helpDeskRole)
|
if err := m.roleService.Update(helpDeskRole.ID, helpDeskRole); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
standardUserRole, err := m.roleService.Read(portainer.RoleID(3))
|
standardUserRole, err := m.roleService.Read(portainer.RoleID(3))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
standardUserRole.Priority = 3
|
standardUserRole.Priority = 3
|
||||||
standardUserRole.Authorizations = authorization.DefaultEndpointAuthorizationsForStandardUserRole(settings.AllowVolumeBrowserForRegularUsers)
|
standardUserRole.Authorizations = authorization.DefaultEndpointAuthorizationsForStandardUserRole(settings.AllowVolumeBrowserForRegularUsers)
|
||||||
|
|
||||||
err = m.roleService.Update(standardUserRole.ID, standardUserRole)
|
if err := m.roleService.Update(standardUserRole.ID, standardUserRole); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
readOnlyUserRole, err := m.roleService.Read(portainer.RoleID(4))
|
readOnlyUserRole, err := m.roleService.Read(portainer.RoleID(4))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
readOnlyUserRole.Priority = 4
|
readOnlyUserRole.Priority = 4
|
||||||
readOnlyUserRole.Authorizations = authorization.DefaultEndpointAuthorizationsForReadOnlyUserRole(settings.AllowVolumeBrowserForRegularUsers)
|
readOnlyUserRole.Authorizations = authorization.DefaultEndpointAuthorizationsForReadOnlyUserRole(settings.AllowVolumeBrowserForRegularUsers)
|
||||||
|
|
||||||
err = m.roleService.Update(readOnlyUserRole.ID, readOnlyUserRole)
|
if err := m.roleService.Update(readOnlyUserRole.ID, readOnlyUserRole); err != nil {
|
||||||
if err != nil {
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -36,11 +36,14 @@ func deprecatedNamespaceParser(w http.ResponseWriter, r *http.Request) (string,
|
||||||
|
|
||||||
// Restore the original body for further use
|
// Restore the original body for further use
|
||||||
bodyBytes, err := io.ReadAll(r.Body)
|
bodyBytes, err := io.ReadAll(r.Body)
|
||||||
|
if err != nil {
|
||||||
|
return "", httperror.InternalServerError("Unable to read request body", err)
|
||||||
|
}
|
||||||
|
|
||||||
r.Body = io.NopCloser(bytes.NewBuffer(bodyBytes))
|
r.Body = io.NopCloser(bytes.NewBuffer(bodyBytes))
|
||||||
|
|
||||||
payload := models.K8sNamespaceDetails{}
|
payload := models.K8sNamespaceDetails{}
|
||||||
err = request.DecodeAndValidateJSONPayload(r, &payload)
|
if err := request.DecodeAndValidateJSONPayload(r, &payload); err != nil {
|
||||||
if err != nil {
|
|
||||||
return "", httperror.BadRequest("Invalid request. Unable to parse namespace payload", err)
|
return "", httperror.BadRequest("Invalid request. Unable to parse namespace payload", err)
|
||||||
}
|
}
|
||||||
namespaceName := payload.Name
|
namespaceName := payload.Name
|
||||||
|
|
|
@ -344,6 +344,7 @@ func Test_apiKeyLookup(t *testing.T) {
|
||||||
req.Header.Add("x-api-key", rawAPIKey)
|
req.Header.Add("x-api-key", rawAPIKey)
|
||||||
|
|
||||||
token, err := bouncer.apiKeyLookup(req)
|
token, err := bouncer.apiKeyLookup(req)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
expectedToken := &portainer.TokenData{ID: user.ID, Username: user.Username, Role: portainer.StandardUserRole}
|
expectedToken := &portainer.TokenData{ID: user.ID, Username: user.Username, Role: portainer.StandardUserRole}
|
||||||
is.Equal(expectedToken, token)
|
is.Equal(expectedToken, token)
|
||||||
|
@ -358,6 +359,7 @@ func Test_apiKeyLookup(t *testing.T) {
|
||||||
req.Header.Add("x-api-key", rawAPIKey)
|
req.Header.Add("x-api-key", rawAPIKey)
|
||||||
|
|
||||||
token, err := bouncer.apiKeyLookup(req)
|
token, err := bouncer.apiKeyLookup(req)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
expectedToken := &portainer.TokenData{ID: user.ID, Username: user.Username, Role: portainer.StandardUserRole}
|
expectedToken := &portainer.TokenData{ID: user.ID, Username: user.Username, Role: portainer.StandardUserRole}
|
||||||
is.Equal(expectedToken, token)
|
is.Equal(expectedToken, token)
|
||||||
|
@ -372,6 +374,7 @@ func Test_apiKeyLookup(t *testing.T) {
|
||||||
req.Header.Add("x-api-key", rawAPIKey)
|
req.Header.Add("x-api-key", rawAPIKey)
|
||||||
|
|
||||||
token, err := bouncer.apiKeyLookup(req)
|
token, err := bouncer.apiKeyLookup(req)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
expectedToken := &portainer.TokenData{ID: user.ID, Username: user.Username, Role: portainer.StandardUserRole}
|
expectedToken := &portainer.TokenData{ID: user.ID, Username: user.Username, Role: portainer.StandardUserRole}
|
||||||
is.Equal(expectedToken, token)
|
is.Equal(expectedToken, token)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue