diff --git a/internal/jail/jail.go b/internal/jail/jail.go index ec64805b341877fc40e315a53b37f3ed1c5685d7..13b393745d82ab551e77eb5160d236d3862a2fd6 100644 --- a/internal/jail/jail.go +++ b/internal/jail/jail.go @@ -80,14 +80,14 @@ func (j *Jail) Build() error { for _, dir := range j.directories { if err := os.Mkdir(dir.path, dir.mode); err != nil { j.removeAll() - return fmt.Errorf("Can't create directory %q. %s", dir.path, err) + return fmt.Errorf("can't create directory %q. %s", dir.path, err) } } for dest, src := range j.files { if err := handleFile(dest, src); err != nil { j.removeAll() - return fmt.Errorf("Can't copy %q -> %q. %s", src.path, dest, err) + return fmt.Errorf("can't copy %q -> %q. %s", src.path, dest, err) } } @@ -106,12 +106,12 @@ func (j *Jail) removeAll() error { // to traverse files and directories if j.deleteRoot { if err := os.RemoveAll(j.Path()); err != nil { - return fmt.Errorf("Can't delete jail %q. %s", j.Path(), err) + return fmt.Errorf("can't delete jail %q. %s", j.Path(), err) } } else { for path := range j.files { if err := os.Remove(path); err != nil { - return fmt.Errorf("Can't delete file in jail %q: %s", path, err) + return fmt.Errorf("can't delete file in jail %q: %s", path, err) } } @@ -119,7 +119,7 @@ func (j *Jail) removeAll() error { for i := len(j.directories) - 1; i >= 0; i-- { dest := j.directories[i] if err := os.Remove(dest.path); err != nil { - return fmt.Errorf("Can't delete directory in jail %q: %s", dest.path, err) + return fmt.Errorf("can't delete directory in jail %q: %s", dest.path, err) } } } @@ -134,7 +134,7 @@ func (j *Jail) Dispose() error { } if err := j.removeAll(); err != nil { - return fmt.Errorf("Can't delete jail %q. %s", j.Path(), err) + return fmt.Errorf("can't delete jail %q. %s", j.Path(), err) } return nil @@ -150,17 +150,17 @@ func (j *Jail) MkDir(path string, perm os.FileMode) { func (j *Jail) CharDev(path string) error { fi, err := os.Stat(path) if err != nil { - return fmt.Errorf("Can't stat %q: %s", path, err) + return fmt.Errorf("can't stat %q: %s", path, err) } if (fi.Mode() & os.ModeCharDevice) == 0 { - return fmt.Errorf("Can't mknod %q: not a character device", path) + return fmt.Errorf("can't mknod %q: not a character device", path) } // Read the device number from the underlying unix implementation of stat() sys, ok := fi.Sys().(*syscall.Stat_t) if !ok { - return fmt.Errorf("Couldn't determine rdev for %q", path) + return fmt.Errorf("couldn't determine rdev for %q", path) } jailedDest := j.ExternalPath(path) @@ -177,11 +177,11 @@ func (j *Jail) CharDev(path string) error { func (j *Jail) CopyTo(dest, src string) error { fi, err := os.Stat(src) if err != nil { - return fmt.Errorf("Can't stat %q. %s", src, err) + return fmt.Errorf("can't stat %q. %s", src, err) } if fi.IsDir() { - return fmt.Errorf("Can't copy directories. %s", src) + return fmt.Errorf("can't copy directories. %s", src) } jailedDest := j.ExternalPath(dest) diff --git a/internal/jail/mount_linux.go b/internal/jail/mount_linux.go index 7b3eb56ef51df30e58468e728b6d0ae4871f4d18..54093c401db9538ec53c08dd7349fc3fc3b25c34 100644 --- a/internal/jail/mount_linux.go +++ b/internal/jail/mount_linux.go @@ -33,7 +33,7 @@ func (j *Jail) mount() error { for dest, src := range j.bindMounts { var opts uintptr = unix.MS_BIND | unix.MS_REC if err := unix.Mount(src, dest, "none", opts, ""); err != nil { - return fmt.Errorf("Failed to bind mount %s on %s. %s", src, dest, err) + return fmt.Errorf("failed to bind mount %s on %s. %s", src, dest, err) } } @@ -46,7 +46,7 @@ func (j *Jail) unmount() error { // A second invocation on unmount with MNT_DETACH flag will return EINVAL // there's no need to abort with an error if bind mountpoint is already unmounted if err != unix.EINVAL { - return fmt.Errorf("Failed to unmount %s. %s", dest, err) + return fmt.Errorf("failed to unmount %s. %s", dest, err) } } } diff --git a/internal/jail/mount_not_supported.go b/internal/jail/mount_not_supported.go index 0ab0f5f0ebe8c2dead5e19ffa51b69000ff29e11..b4d3e3488cc33d1dc28f1d118c13b67ca85b19e0 100644 --- a/internal/jail/mount_not_supported.go +++ b/internal/jail/mount_not_supported.go @@ -8,12 +8,12 @@ import ( ) func (j *Jail) Unshare() error { - return fmt.Errorf("Unshare not supported on %s", runtime.GOOS) + return fmt.Errorf("unshare not supported on %s", runtime.GOOS) } func (j *Jail) notSupported() error { if len(j.bindMounts) > 0 { - return fmt.Errorf("Bind mount not supported on %s", runtime.GOOS) + return fmt.Errorf("bind mount not supported on %s", runtime.GOOS) } return nil diff --git a/internal/source/gitlab/client/client_test.go b/internal/source/gitlab/client/client_test.go index c888a059fd695f187d6486ec2e160f52e97c30e7..6d4ce814043fcc7deaa8e442371cbc1550f0ec62 100644 --- a/internal/source/gitlab/client/client_test.go +++ b/internal/source/gitlab/client/client_test.go @@ -319,7 +319,7 @@ func validateToken(t *testing.T, tokenString string) { t.Helper() token, err := jwt.Parse(tokenString, func(token *jwt.Token) (interface{}, error) { if _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok { - return nil, fmt.Errorf("Unexpected signing method: %v", token.Header["alg"]) + return nil, fmt.Errorf("unexpected signing method: %v", token.Header["alg"]) } return secretKey(t), nil diff --git a/internal/tlsconfig/tlsconfig.go b/internal/tlsconfig/tlsconfig.go index 5d26ed520bd5033294e22c22803b7efd61391a16..9babf3744fdc13100c4593f5765c7ceca7678fdc 100644 --- a/internal/tlsconfig/tlsconfig.go +++ b/internal/tlsconfig/tlsconfig.go @@ -73,13 +73,13 @@ func ValidateTLSVersions(min, max string) error { tlsMax, tlsMaxOk := AllTLSVersions[max] if !tlsMinOk { - return fmt.Errorf("Invalid minimum TLS version: %s", min) + return fmt.Errorf("invalid minimum TLS version: %s", min) } if !tlsMaxOk { - return fmt.Errorf("Invalid maximum TLS version: %s", max) + return fmt.Errorf("invalid maximum TLS version: %s", max) } if tlsMin > tlsMax && tlsMax > 0 { - return fmt.Errorf("Invalid maximum TLS version: %s; Should be at least %s", max, min) + return fmt.Errorf("invalid maximum TLS version: %s; should be at least %s", max, min) } return nil diff --git a/internal/tlsconfig/tlsconfig_test.go b/internal/tlsconfig/tlsconfig_test.go index e37ab51bf4f643fb67d55baa0ba61764dcfcc560..00a0806678a4364dc325eddc2b6cb676cc186a9e 100644 --- a/internal/tlsconfig/tlsconfig_test.go +++ b/internal/tlsconfig/tlsconfig_test.go @@ -35,9 +35,9 @@ func TestValidateTLSVersions(t *testing.T) { tlsMax string err string }{ - "invalid minimum TLS version": {tlsMin: "tls123", tlsMax: "", err: "Invalid minimum TLS version: tls123"}, - "invalid maximum TLS version": {tlsMin: "", tlsMax: "tls123", err: "Invalid maximum TLS version: tls123"}, - "TLS versions conflict": {tlsMin: "tls1.2", tlsMax: "tls1.1", err: "Invalid maximum TLS version: tls1.1; Should be at least tls1.2"}, + "invalid minimum TLS version": {tlsMin: "tls123", tlsMax: "", err: "invalid minimum TLS version: tls123"}, + "invalid maximum TLS version": {tlsMin: "", tlsMax: "tls123", err: "invalid maximum TLS version: tls123"}, + "TLS versions conflict": {tlsMin: "tls1.2", tlsMax: "tls1.1", err: "invalid maximum TLS version: tls1.1; should be at least tls1.2"}, } for name, tc := range tests { @@ -53,7 +53,7 @@ func TestInvalidKeyPair(t *testing.T) { require.EqualError(t, err, "tls: failed to find any PEM data in certificate input") } -func TestInsecureCihers(t *testing.T) { +func TestInsecureCiphers(t *testing.T) { tlsConfig, err := Create(cert, key, getCertificate, true, tls.VersionTLS11, tls.VersionTLS12) require.NoError(t, err) require.False(t, tlsConfig.PreferServerCipherSuites) diff --git a/main.go b/main.go index 7defd281c2b242bc61bab7a970151f5a2d3156df..95805b25b7ff7483ed4b78ce0ef0013d352ea7a6 100644 --- a/main.go +++ b/main.go @@ -155,7 +155,7 @@ func setGitLabAPISecretKey(secretFile string, config *appConfig) { } if secretLength != 32 { - log.WithError(fmt.Errorf("Expected 32 bytes GitLab API secret but got %d bytes", secretLength)).Fatal("Failed to decode GitLab API secret") + log.WithError(fmt.Errorf("expected 32 bytes GitLab API secret but got %d bytes", secretLength)).Fatal("Failed to decode GitLab API secret") } config.GitLabAPISecretKey = decoded