Browse Source

*: clean up code format

Signed-off-by: Gyuho Lee <gyuhox@gmail.com>
Gyuho Lee 7 years ago
parent
commit
42bef8460c

+ 4 - 4
client/client_test.go

@@ -472,7 +472,7 @@ func TestHTTPClusterClientDoDeadlineExceedContext(t *testing.T) {
 
 
 type fakeCancelContext struct{}
 type fakeCancelContext struct{}
 
 
-var fakeCancelContextError = errors.New("fake context canceled")
+var errFakeCancelContext = errors.New("fake context canceled")
 
 
 func (f fakeCancelContext) Deadline() (time.Time, bool) { return time.Time{}, false }
 func (f fakeCancelContext) Deadline() (time.Time, bool) { return time.Time{}, false }
 func (f fakeCancelContext) Done() <-chan struct{} {
 func (f fakeCancelContext) Done() <-chan struct{} {
@@ -480,7 +480,7 @@ func (f fakeCancelContext) Done() <-chan struct{} {
 	d <- struct{}{}
 	d <- struct{}{}
 	return d
 	return d
 }
 }
-func (f fakeCancelContext) Err() error                        { return fakeCancelContextError }
+func (f fakeCancelContext) Err() error                        { return errFakeCancelContext }
 func (f fakeCancelContext) Value(key interface{}) interface{} { return 1 }
 func (f fakeCancelContext) Value(key interface{}) interface{} { return 1 }
 
 
 func withTimeout(parent context.Context, timeout time.Duration) (
 func withTimeout(parent context.Context, timeout time.Duration) (
@@ -512,8 +512,8 @@ func TestHTTPClusterClientDoCanceledContext(t *testing.T) {
 
 
 	select {
 	select {
 	case err := <-errc:
 	case err := <-errc:
-		if err != fakeCancelContextError {
-			t.Errorf("err = %+v, want %+v", err, fakeCancelContextError)
+		if err != errFakeCancelContext {
+			t.Errorf("err = %+v, want %+v", err, errFakeCancelContext)
 		}
 		}
 	case <-time.After(time.Second):
 	case <-time.After(time.Second):
 		t.Fatalf("unexpected timeout when waiting for request to fake context canceled")
 		t.Fatalf("unexpected timeout when waiting for request to fake context canceled")

+ 7 - 7
client/integration/client_test.go

@@ -46,7 +46,7 @@ func TestV2NoRetryEOF(t *testing.T) {
 			conn.Close()
 			conn.Close()
 		}
 		}
 	}()
 	}()
-	eofURL := integration.UrlScheme + "://" + lEOF.Addr().String()
+	eofURL := integration.URLScheme + "://" + lEOF.Addr().String()
 	cli := integration.MustNewHTTPClient(t, []string{eofURL, eofURL}, nil)
 	cli := integration.MustNewHTTPClient(t, []string{eofURL, eofURL}, nil)
 	kapi := client.NewKeysAPI(cli)
 	kapi := client.NewKeysAPI(cli)
 	for i, f := range noRetryList(kapi) {
 	for i, f := range noRetryList(kapi) {
@@ -64,16 +64,16 @@ func TestV2NoRetryEOF(t *testing.T) {
 // TestV2NoRetryNoLeader tests destructive api calls won't retry if given an error code.
 // TestV2NoRetryNoLeader tests destructive api calls won't retry if given an error code.
 func TestV2NoRetryNoLeader(t *testing.T) {
 func TestV2NoRetryNoLeader(t *testing.T) {
 	defer testutil.AfterTest(t)
 	defer testutil.AfterTest(t)
-	lHttp := integration.NewListenerWithAddr(t, fmt.Sprintf("127.0.0.1:%05d", os.Getpid()))
+	lHTTP := integration.NewListenerWithAddr(t, fmt.Sprintf("127.0.0.1:%05d", os.Getpid()))
 	eh := &errHandler{errCode: http.StatusServiceUnavailable}
 	eh := &errHandler{errCode: http.StatusServiceUnavailable}
 	srv := httptest.NewUnstartedServer(eh)
 	srv := httptest.NewUnstartedServer(eh)
-	defer lHttp.Close()
+	defer lHTTP.Close()
 	defer srv.Close()
 	defer srv.Close()
-	srv.Listener = lHttp
+	srv.Listener = lHTTP
 	go srv.Start()
 	go srv.Start()
-	lHttpURL := integration.UrlScheme + "://" + lHttp.Addr().String()
+	lHTTPURL := integration.URLScheme + "://" + lHTTP.Addr().String()
 
 
-	cli := integration.MustNewHTTPClient(t, []string{lHttpURL, lHttpURL}, nil)
+	cli := integration.MustNewHTTPClient(t, []string{lHTTPURL, lHTTPURL}, nil)
 	kapi := client.NewKeysAPI(cli)
 	kapi := client.NewKeysAPI(cli)
 	// test error code
 	// test error code
 	for i, f := range noRetryList(kapi) {
 	for i, f := range noRetryList(kapi) {
@@ -94,7 +94,7 @@ func TestV2RetryRefuse(t *testing.T) {
 	cl.Launch(t)
 	cl.Launch(t)
 	defer cl.Terminate(t)
 	defer cl.Terminate(t)
 	// test connection refused; expect no error failover
 	// test connection refused; expect no error failover
-	cli := integration.MustNewHTTPClient(t, []string{integration.UrlScheme + "://refuseconn:123", cl.URL(0)}, nil)
+	cli := integration.MustNewHTTPClient(t, []string{integration.URLScheme + "://refuseconn:123", cl.URL(0)}, nil)
 	kapi := client.NewKeysAPI(cli)
 	kapi := client.NewKeysAPI(cli)
 	if _, err := kapi.Set(context.Background(), "/delkey", "def", nil); err != nil {
 	if _, err := kapi.Set(context.Background(), "/delkey", "def", nil); err != nil {
 		t.Fatal(err)
 		t.Fatal(err)

+ 2 - 2
contrib/raftexample/raft.go

@@ -393,7 +393,7 @@ func (rc *raftNode) serveChannels() {
 
 
 	// send proposals over raft
 	// send proposals over raft
 	go func() {
 	go func() {
-		var confChangeCount uint64 = 0
+		confChangeCount := uint64(0)
 
 
 		for rc.proposeC != nil && rc.confChangeC != nil {
 		for rc.proposeC != nil && rc.confChangeC != nil {
 			select {
 			select {
@@ -409,7 +409,7 @@ func (rc *raftNode) serveChannels() {
 				if !ok {
 				if !ok {
 					rc.confChangeC = nil
 					rc.confChangeC = nil
 				} else {
 				} else {
-					confChangeCount += 1
+					confChangeCount++
 					cc.ID = confChangeCount
 					cc.ID = confChangeCount
 					rc.node.ProposeConfChange(context.TODO(), cc)
 					rc.node.ProposeConfChange(context.TODO(), cc)
 				}
 				}

+ 2 - 2
etcdctl/ctlv3/command/printer_simple.go

@@ -86,11 +86,11 @@ func (s *simplePrinter) Grant(resp v3.LeaseGrantResponse) {
 	fmt.Printf("lease %016x granted with TTL(%ds)\n", resp.ID, resp.TTL)
 	fmt.Printf("lease %016x granted with TTL(%ds)\n", resp.ID, resp.TTL)
 }
 }
 
 
-func (p *simplePrinter) Revoke(id v3.LeaseID, r v3.LeaseRevokeResponse) {
+func (s *simplePrinter) Revoke(id v3.LeaseID, r v3.LeaseRevokeResponse) {
 	fmt.Printf("lease %016x revoked\n", id)
 	fmt.Printf("lease %016x revoked\n", id)
 }
 }
 
 
-func (p *simplePrinter) KeepAlive(resp v3.LeaseKeepAliveResponse) {
+func (s *simplePrinter) KeepAlive(resp v3.LeaseKeepAliveResponse) {
 	fmt.Printf("lease %016x keepalived with TTL(%d)\n", resp.ID, resp.TTL)
 	fmt.Printf("lease %016x keepalived with TTL(%d)\n", resp.ID, resp.TTL)
 }
 }
 
 

+ 5 - 5
integration/cluster.go

@@ -68,8 +68,8 @@ const (
 
 
 	clusterName  = "etcd"
 	clusterName  = "etcd"
 	basePort     = 21000
 	basePort     = 21000
-	UrlScheme    = "unix"
-	UrlSchemeTLS = "unixs"
+	URLScheme    = "unix"
+	URLSchemeTLS = "unixs"
 )
 )
 
 
 var (
 var (
@@ -77,7 +77,7 @@ var (
 
 
 	// integration test uses unique ports, counting up, to listen for each
 	// integration test uses unique ports, counting up, to listen for each
 	// member, ensuring restarted members can listen on the same port again.
 	// member, ensuring restarted members can listen on the same port again.
-	localListenCount int64 = 0
+	localListenCount = int64(0)
 
 
 	testTLSInfo = transport.TLSInfo{
 	testTLSInfo = transport.TLSInfo{
 		KeyFile:        "./fixtures/server.key.insecure",
 		KeyFile:        "./fixtures/server.key.insecure",
@@ -157,9 +157,9 @@ type cluster struct {
 
 
 func schemeFromTLSInfo(tls *transport.TLSInfo) string {
 func schemeFromTLSInfo(tls *transport.TLSInfo) string {
 	if tls == nil {
 	if tls == nil {
-		return UrlScheme
+		return URLScheme
 	}
 	}
-	return UrlSchemeTLS
+	return URLSchemeTLS
 }
 }
 
 
 func (c *cluster) fillClusterForMembers() error {
 func (c *cluster) fillClusterForMembers() error {

+ 1 - 1
proxy/grpcproxy/util.go

@@ -34,7 +34,7 @@ func getAuthTokenFromClient(ctx context.Context) string {
 	return ""
 	return ""
 }
 }
 
 
-func withClientAuthToken(ctx context.Context, ctxWithToken context.Context) context.Context {
+func withClientAuthToken(ctx, ctxWithToken context.Context) context.Context {
 	token := getAuthTokenFromClient(ctxWithToken)
 	token := getAuthTokenFromClient(ctxWithToken)
 	if token != "" {
 	if token != "" {
 		ctx = context.WithValue(ctx, rpctypes.TokenFieldNameGRPC, token)
 		ctx = context.WithValue(ctx, rpctypes.TokenFieldNameGRPC, token)

+ 1 - 4
tests/e2e/ctl_v3_lease_test.go

@@ -148,10 +148,7 @@ func leaseTestGrantLeasesList(cx ctlCtx) error {
 	if err != nil {
 	if err != nil {
 		return fmt.Errorf("lease id not in returned list (%v)", err)
 		return fmt.Errorf("lease id not in returned list (%v)", err)
 	}
 	}
-	if err = proc.Close(); err != nil {
-		return err
-	}
-	return nil
+	return proc.Close()
 }
 }
 
 
 func leaseTestTimeToLiveExpired(cx ctlCtx) {
 func leaseTestTimeToLiveExpired(cx ctlCtx) {