summaryrefslogtreecommitdiff
path: root/internal/handlers/handler_extended_configuration_test.go
diff options
context:
space:
mode:
authorAmir Zarrinkafsh <nightah@me.com>2020-04-09 11:05:17 +1000
committerGitHub <noreply@github.com>2020-04-09 11:05:17 +1000
commitde2c5836fd8a2b99260b555173fcd3023292da0f (patch)
tree6af2c37c31a8d439dbb0432ec54b8cb7f7978bd9 /internal/handlers/handler_extended_configuration_test.go
parent2fed503e5e538cbbdcdc09ff52a1ddad94218400 (diff)
[Buildkite] Introduce CI linting with golangci-lint and reviewdog (#832)
* [Buildkite] Introduce CI linting with golangci-lint and reviewdog * Initial pass of golangci-lint * Add gosimple (megacheck) recommendations * Add golint recommendations * [BUGFIX] Migrate authentication traces from v3 mongodb * Add deadcode recommendations * [BUGFIX] Fix ShortTimeouts suite when run in dev workflow * Add unused recommendations * Add unparam recommendations * Disable linting on unfixable errors instead of skipping files * Adjust nolint notation for unparam * Fix ineffectual assignment to err raised by linter. * Export environment variable in agent hook * Add ineffassign recommendations * Add staticcheck recommendations * Add gocyclo recommendations * Adjust ineffassign recommendations Co-authored-by: Clement Michaud <clement.michaud34@gmail.com>
Diffstat (limited to 'internal/handlers/handler_extended_configuration_test.go')
-rw-r--r--internal/handlers/handler_extended_configuration_test.go18
1 files changed, 9 insertions, 9 deletions
diff --git a/internal/handlers/handler_extended_configuration_test.go b/internal/handlers/handler_extended_configuration_test.go
index 9f41b3ecf..1065899b8 100644
--- a/internal/handlers/handler_extended_configuration_test.go
+++ b/internal/handlers/handler_extended_configuration_test.go
@@ -67,15 +67,15 @@ func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsDisab
s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{
DefaultPolicy: "bypass",
Rules: []schema.ACLRule{
- schema.ACLRule{
+ {
Domain: "example.com",
Policy: "deny",
},
- schema.ACLRule{
+ {
Domain: "abc.example.com",
Policy: "single_factor",
},
- schema.ACLRule{
+ {
Domain: "def.example.com",
Policy: "bypass",
},
@@ -98,15 +98,15 @@ func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsEnabl
s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{
DefaultPolicy: "two_factor",
Rules: []schema.ACLRule{
- schema.ACLRule{
+ {
Domain: "example.com",
Policy: "deny",
},
- schema.ACLRule{
+ {
Domain: "abc.example.com",
Policy: "single_factor",
},
- schema.ACLRule{
+ {
Domain: "def.example.com",
Policy: "bypass",
},
@@ -129,15 +129,15 @@ func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsEnabl
s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{
DefaultPolicy: "bypass",
Rules: []schema.ACLRule{
- schema.ACLRule{
+ {
Domain: "example.com",
Policy: "deny",
},
- schema.ACLRule{
+ {
Domain: "abc.example.com",
Policy: "two_factor",
},
- schema.ACLRule{
+ {
Domain: "def.example.com",
Policy: "bypass",
},