diff options
| author | Amir Zarrinkafsh <nightah@me.com> | 2020-04-09 11:05:17 +1000 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2020-04-09 11:05:17 +1000 |
| commit | de2c5836fd8a2b99260b555173fcd3023292da0f (patch) | |
| tree | 6af2c37c31a8d439dbb0432ec54b8cb7f7978bd9 /internal/handlers/handler_extended_configuration_test.go | |
| parent | 2fed503e5e538cbbdcdc09ff52a1ddad94218400 (diff) | |
[Buildkite] Introduce CI linting with golangci-lint and reviewdog (#832)
* [Buildkite] Introduce CI linting with golangci-lint and reviewdog
* Initial pass of golangci-lint
* Add gosimple (megacheck) recommendations
* Add golint recommendations
* [BUGFIX] Migrate authentication traces from v3 mongodb
* Add deadcode recommendations
* [BUGFIX] Fix ShortTimeouts suite when run in dev workflow
* Add unused recommendations
* Add unparam recommendations
* Disable linting on unfixable errors instead of skipping files
* Adjust nolint notation for unparam
* Fix ineffectual assignment to err raised by linter.
* Export environment variable in agent hook
* Add ineffassign recommendations
* Add staticcheck recommendations
* Add gocyclo recommendations
* Adjust ineffassign recommendations
Co-authored-by: Clement Michaud <clement.michaud34@gmail.com>
Diffstat (limited to 'internal/handlers/handler_extended_configuration_test.go')
| -rw-r--r-- | internal/handlers/handler_extended_configuration_test.go | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/internal/handlers/handler_extended_configuration_test.go b/internal/handlers/handler_extended_configuration_test.go index 9f41b3ecf..1065899b8 100644 --- a/internal/handlers/handler_extended_configuration_test.go +++ b/internal/handlers/handler_extended_configuration_test.go @@ -67,15 +67,15 @@ func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsDisab s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{ DefaultPolicy: "bypass", Rules: []schema.ACLRule{ - schema.ACLRule{ + { Domain: "example.com", Policy: "deny", }, - schema.ACLRule{ + { Domain: "abc.example.com", Policy: "single_factor", }, - schema.ACLRule{ + { Domain: "def.example.com", Policy: "bypass", }, @@ -98,15 +98,15 @@ func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsEnabl s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{ DefaultPolicy: "two_factor", Rules: []schema.ACLRule{ - schema.ACLRule{ + { Domain: "example.com", Policy: "deny", }, - schema.ACLRule{ + { Domain: "abc.example.com", Policy: "single_factor", }, - schema.ACLRule{ + { Domain: "def.example.com", Policy: "bypass", }, @@ -129,15 +129,15 @@ func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsEnabl s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{ DefaultPolicy: "bypass", Rules: []schema.ACLRule{ - schema.ACLRule{ + { Domain: "example.com", Policy: "deny", }, - schema.ACLRule{ + { Domain: "abc.example.com", Policy: "two_factor", }, - schema.ACLRule{ + { Domain: "def.example.com", Policy: "bypass", }, |
