Skip to content

Commit 6883308

Browse files
authored
Merge pull request #18800 from mmorel-35/testifylint/require-error
fix: enable require-error rule from testifylint in client, pkg and server packages
2 parents c2bfbe8 + 3a31151 commit 6883308

File tree

13 files changed

+60
-53
lines changed

13 files changed

+60
-53
lines changed

client/pkg/testutil/before.go

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ import (
2020
"testing"
2121

2222
"github.com/stretchr/testify/assert"
23+
"github.com/stretchr/testify/require"
2324

2425
"go.etcd.io/etcd/client/pkg/v3/verify"
2526
)
@@ -31,9 +32,9 @@ func BeforeTest(tb testing.TB) {
3132
revertVerifyFunc := verify.EnableAllVerifications()
3233

3334
path, err := os.Getwd()
34-
assert.NoError(tb, err)
35+
require.NoError(tb, err)
3536
tempDir := tb.TempDir()
36-
assert.NoError(tb, os.Chdir(tempDir))
37+
require.NoError(tb, os.Chdir(tempDir))
3738
tb.Logf("Changing working directory to: %s", tempDir)
3839

3940
tb.Cleanup(func() {

pkg/proxy/server_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ import (
3030
"testing"
3131
"time"
3232

33-
"github.com/stretchr/testify/assert"
33+
"github.com/stretchr/testify/require"
3434
"go.uber.org/zap"
3535
"go.uber.org/zap/zaptest"
3636

@@ -559,7 +559,7 @@ func testServerHTTP(t *testing.T, secure, delayTx bool) {
559559
now := time.Now()
560560
if secure {
561561
tp, terr := transport.NewTransport(tlsInfo, 3*time.Second)
562-
assert.NoError(t, terr)
562+
require.NoError(t, terr)
563563
cli := &http.Client{Transport: tp}
564564
resp, err = cli.Post("https://"+srcAddr+"/hello", "", strings.NewReader(data))
565565
defer cli.CloseIdleConnections()
@@ -568,7 +568,7 @@ func testServerHTTP(t *testing.T, secure, delayTx bool) {
568568
resp, err = http.Post("http://"+srcAddr+"/hello", "", strings.NewReader(data))
569569
defer http.DefaultClient.CloseIdleConnections()
570570
}
571-
assert.NoError(t, err)
571+
require.NoError(t, err)
572572
d, err := io.ReadAll(resp.Body)
573573
if err != nil {
574574
t.Fatal(err)

server/etcdserver/api/membership/storev2_test.go

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ import (
1919

2020
"github.com/coreos/go-semver/semver"
2121
"github.com/stretchr/testify/assert"
22+
"github.com/stretchr/testify/require"
2223
"go.uber.org/zap/zaptest"
2324

2425
"go.etcd.io/etcd/server/v3/etcdserver/api/v2store"
@@ -29,23 +30,23 @@ func TestIsMetaStoreOnly(t *testing.T) {
2930
s := v2store.New("/0", "/1")
3031

3132
metaOnly, err := IsMetaStoreOnly(s)
32-
assert.NoError(t, err)
33+
require.NoError(t, err)
3334
assert.Truef(t, metaOnly, "Just created v2store should be meta-only")
3435

3536
mustSaveClusterVersionToStore(lg, s, semver.New("3.5.17"))
3637
metaOnly, err = IsMetaStoreOnly(s)
37-
assert.NoError(t, err)
38+
require.NoError(t, err)
3839
assert.Truef(t, metaOnly, "Just created v2store should be meta-only")
3940

4041
mustSaveMemberToStore(lg, s, &Member{ID: 0x00abcd})
4142
metaOnly, err = IsMetaStoreOnly(s)
42-
assert.NoError(t, err)
43+
require.NoError(t, err)
4344
assert.Truef(t, metaOnly, "Just created v2store should be meta-only")
4445

4546
_, err = s.Create("/1/foo", false, "v1", false, v2store.TTLOptionSet{ExpireTime: v2store.Permanent})
46-
assert.NoError(t, err)
47+
require.NoError(t, err)
4748
metaOnly, err = IsMetaStoreOnly(s)
48-
assert.NoError(t, err)
49+
require.NoError(t, err)
4950
assert.Falsef(t, metaOnly, "Just created v2store should be meta-only")
5051

5152
_, err = s.Delete("/1/foo", false, false)

server/etcdserver/api/v2store/store_ttl_test.go

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ func TestMinExpireTime(t *testing.T) {
3838
s.DeleteExpiredKeys(fc.Now())
3939
var eidx uint64 = 1
4040
e, err := s.Get("/foo", true, false)
41-
assert.NoError(t, err)
41+
require.NoError(t, err)
4242
assert.Equal(t, eidx, e.EtcdIndex)
4343
assert.Equal(t, "get", e.Action)
4444
assert.Equal(t, "/foo", e.Node.Key)
@@ -60,7 +60,7 @@ func TestStoreGetDirectory(t *testing.T) {
6060
s.Create("/foo/baz/ttl", false, "Y", false, TTLOptionSet{ExpireTime: fc.Now().Add(time.Second * 3)})
6161
var eidx uint64 = 7
6262
e, err := s.Get("/foo", true, false)
63-
assert.NoError(t, err)
63+
require.NoError(t, err)
6464
assert.Equal(t, eidx, e.EtcdIndex)
6565
assert.Equal(t, "get", e.Action)
6666
assert.Equal(t, "/foo", e.Node.Key)
@@ -103,7 +103,7 @@ func TestStoreUpdateValueTTL(t *testing.T) {
103103
var eidx uint64 = 2
104104
s.Create("/foo", false, "bar", false, TTLOptionSet{ExpireTime: Permanent})
105105
_, err := s.Update("/foo", "baz", TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond)})
106-
assert.NoError(t, err)
106+
require.NoError(t, err)
107107
e, _ := s.Get("/foo", false, false)
108108
assert.Equal(t, "baz", *e.Node.Value)
109109
assert.Equal(t, eidx, e.EtcdIndex)
@@ -124,11 +124,11 @@ func TestStoreUpdateDirTTL(t *testing.T) {
124124

125125
var eidx uint64 = 3
126126
_, err := s.Create("/foo", true, "", false, TTLOptionSet{ExpireTime: Permanent})
127-
assert.NoError(t, err)
127+
require.NoError(t, err)
128128
_, err = s.Create("/foo/bar", false, "baz", false, TTLOptionSet{ExpireTime: Permanent})
129-
assert.NoError(t, err)
129+
require.NoError(t, err)
130130
e, err := s.Update("/foo/bar", "", TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond)})
131-
assert.NoError(t, err)
131+
require.NoError(t, err)
132132
assert.False(t, e.Node.Dir)
133133
assert.Equal(t, eidx, e.EtcdIndex)
134134
e, _ = s.Get("/foo/bar", false, false)
@@ -279,13 +279,13 @@ func TestStoreRefresh(t *testing.T) {
279279
s.Create("/bar", true, "bar", false, TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond)})
280280
s.Create("/bar/z", false, "bar", false, TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond)})
281281
_, err := s.Update("/foo", "", TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond), Refresh: true})
282-
assert.NoError(t, err)
282+
require.NoError(t, err)
283283

284284
_, err = s.Set("/foo", false, "", TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond), Refresh: true})
285-
assert.NoError(t, err)
285+
require.NoError(t, err)
286286

287287
_, err = s.Update("/bar/z", "", TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond), Refresh: true})
288-
assert.NoError(t, err)
288+
require.NoError(t, err)
289289

290290
_, err = s.CompareAndSwap("/foo", "bar", 0, "", TTLOptionSet{ExpireTime: fc.Now().Add(500 * time.Millisecond), Refresh: true})
291291
assert.NoError(t, err)
@@ -303,7 +303,7 @@ func TestStoreRecoverWithExpiration(t *testing.T) {
303303
s.Create("/foo/x", false, "bar", false, TTLOptionSet{ExpireTime: Permanent})
304304
s.Create("/foo/y", false, "baz", false, TTLOptionSet{ExpireTime: fc.Now().Add(5 * time.Millisecond)})
305305
b, err := s.Save()
306-
assert.NoError(t, err)
306+
require.NoError(t, err)
307307

308308
time.Sleep(10 * time.Millisecond)
309309

@@ -316,7 +316,7 @@ func TestStoreRecoverWithExpiration(t *testing.T) {
316316
s.DeleteExpiredKeys(fc.Now())
317317

318318
e, err := s.Get("/foo/x", false, false)
319-
assert.NoError(t, err)
319+
require.NoError(t, err)
320320
assert.Equal(t, eidx, e.EtcdIndex)
321321
assert.Equal(t, "bar", *e.Node.Value)
322322

server/etcdserver/apply/apply_auth_test.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -782,28 +782,28 @@ func TestAuthApplierV3_RoleGet(t *testing.T) {
782782

783783
func TestCheckLeasePutsKeys(t *testing.T) {
784784
aa := defaultAuthApplierV3(t)
785-
assert.NoErrorf(t, aa.checkLeasePutsKeys(lease.NewLease(lease.LeaseID(1), 3600)), "auth is disabled, should allow puts")
785+
require.NoErrorf(t, aa.checkLeasePutsKeys(lease.NewLease(lease.LeaseID(1), 3600)), "auth is disabled, should allow puts")
786786
mustCreateRolesAndEnableAuth(t, aa)
787787
aa.authInfo = auth.AuthInfo{Username: "root"}
788-
assert.NoErrorf(t, aa.checkLeasePutsKeys(lease.NewLease(lease.LeaseID(1), 3600)), "auth is enabled, should allow puts for root")
788+
require.NoErrorf(t, aa.checkLeasePutsKeys(lease.NewLease(lease.LeaseID(1), 3600)), "auth is enabled, should allow puts for root")
789789

790790
l := lease.NewLease(lease.LeaseID(1), 3600)
791791
l.SetLeaseItem(lease.LeaseItem{Key: "a"})
792792
aa.authInfo = auth.AuthInfo{Username: "bob", Revision: 0}
793-
assert.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrUserEmpty, "auth is enabled, should not allow bob, non existing at rev 0")
793+
require.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrUserEmpty, "auth is enabled, should not allow bob, non existing at rev 0")
794794
aa.authInfo = auth.AuthInfo{Username: "bob", Revision: 1}
795-
assert.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrAuthOldRevision, "auth is enabled, old revision")
795+
require.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrAuthOldRevision, "auth is enabled, old revision")
796796

797797
aa.authInfo = auth.AuthInfo{Username: "bob", Revision: aa.as.Revision()}
798-
assert.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrPermissionDenied, "auth is enabled, bob does not have permissions, bob does not exist")
798+
require.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrPermissionDenied, "auth is enabled, bob does not have permissions, bob does not exist")
799799
_, err := aa.as.UserAdd(&pb.AuthUserAddRequest{Name: "bob", Options: &authpb.UserAddOptions{NoPassword: true}})
800-
assert.NoErrorf(t, err, "bob should be added without error")
800+
require.NoErrorf(t, err, "bob should be added without error")
801801
aa.authInfo = auth.AuthInfo{Username: "bob", Revision: aa.as.Revision()}
802-
assert.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrPermissionDenied, "auth is enabled, bob exists yet does not have permissions")
802+
require.ErrorIsf(t, aa.checkLeasePutsKeys(l), auth.ErrPermissionDenied, "auth is enabled, bob exists yet does not have permissions")
803803

804804
// allow bob to access "a"
805805
_, err = aa.as.RoleAdd(&pb.AuthRoleAddRequest{Name: "bobsrole"})
806-
assert.NoErrorf(t, err, "bobsrole should be added without error")
806+
require.NoErrorf(t, err, "bobsrole should be added without error")
807807
_, err = aa.as.RoleGrantPermission(&pb.AuthRoleGrantPermissionRequest{
808808
Name: "bobsrole",
809809
Perm: &authpb.Permission{
@@ -812,12 +812,12 @@ func TestCheckLeasePutsKeys(t *testing.T) {
812812
RangeEnd: nil,
813813
},
814814
})
815-
assert.NoErrorf(t, err, "bobsrole should be granted permissions without error")
815+
require.NoErrorf(t, err, "bobsrole should be granted permissions without error")
816816
_, err = aa.as.UserGrantRole(&pb.AuthUserGrantRoleRequest{
817817
User: "bob",
818818
Role: "bobsrole",
819819
})
820-
assert.NoErrorf(t, err, "bob should be granted bobsrole without error")
820+
require.NoErrorf(t, err, "bob should be granted bobsrole without error")
821821

822822
aa.authInfo = auth.AuthInfo{Username: "bob", Revision: aa.as.Revision()}
823823
assert.NoErrorf(t, aa.checkLeasePutsKeys(l), "bob should be able to access key 'a'")

server/etcdserver/version/version_test.go

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import (
2222

2323
"github.com/coreos/go-semver/semver"
2424
"github.com/stretchr/testify/assert"
25+
"github.com/stretchr/testify/require"
2526
"go.uber.org/zap"
2627
"go.uber.org/zap/zaptest"
2728

@@ -64,7 +65,7 @@ func TestDowngradeSingleNode(t *testing.T) {
6465
c.StepMonitors()
6566
assert.Equal(t, newCluster(lg, 1, version.V3_6), c)
6667

67-
assert.NoError(t, c.Version().DowngradeEnable(context.Background(), &version.V3_5))
68+
require.NoError(t, c.Version().DowngradeEnable(context.Background(), &version.V3_5))
6869
c.StepMonitors()
6970
assert.Equal(t, version.V3_5, c.clusterVersion)
7071

@@ -80,7 +81,7 @@ func TestDowngradeThreeNode(t *testing.T) {
8081
c.StepMonitors()
8182
assert.Equal(t, newCluster(lg, 3, version.V3_6), c)
8283

83-
assert.NoError(t, c.Version().DowngradeEnable(context.Background(), &version.V3_5))
84+
require.NoError(t, c.Version().DowngradeEnable(context.Background(), &version.V3_5))
8485
c.StepMonitors()
8586
assert.Equal(t, version.V3_5, c.clusterVersion)
8687

@@ -100,7 +101,7 @@ func TestNewerMemberCanReconnectDuringDowngrade(t *testing.T) {
100101
c.StepMonitors()
101102
assert.Equal(t, newCluster(lg, 3, version.V3_6), c)
102103

103-
assert.NoError(t, c.Version().DowngradeEnable(context.Background(), &version.V3_5))
104+
require.NoError(t, c.Version().DowngradeEnable(context.Background(), &version.V3_5))
104105
c.StepMonitors()
105106
assert.Equal(t, version.V3_5, c.clusterVersion)
106107

server/storage/backend/backend_bench_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ import (
1919
"testing"
2020
"time"
2121

22-
"github.com/stretchr/testify/assert"
22+
"github.com/stretchr/testify/require"
2323

2424
betesting "go.etcd.io/etcd/server/v3/storage/backend/testing"
2525
"go.etcd.io/etcd/server/v3/storage/schema"
@@ -34,11 +34,11 @@ func BenchmarkBackendPut(b *testing.B) {
3434
for i := 0; i < b.N; i++ {
3535
keys[i] = make([]byte, 64)
3636
_, err := rand.Read(keys[i])
37-
assert.NoError(b, err)
37+
require.NoError(b, err)
3838
}
3939
value := make([]byte, 128)
4040
_, err := rand.Read(value)
41-
assert.NoError(b, err)
41+
require.NoError(b, err)
4242

4343
batchTx := backend.BatchTx()
4444

server/storage/backend/backend_test.go

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import (
2222
"time"
2323

2424
"github.com/stretchr/testify/assert"
25+
"github.com/stretchr/testify/require"
2526
"go.uber.org/zap/zaptest"
2627

2728
bolt "go.etcd.io/bbolt"
@@ -70,7 +71,7 @@ func TestBackendSnapshot(t *testing.T) {
7071
if _, err := snap.WriteTo(f); err != nil {
7172
t.Fatal(err)
7273
}
73-
assert.NoError(t, f.Close())
74+
require.NoError(t, f.Close())
7475

7576
// bootstrap new backend from the snapshot
7677
bcfg := backend.DefaultBackendConfig(zaptest.NewLogger(t))
@@ -332,7 +333,7 @@ func TestBackendWritebackForEach(t *testing.T) {
332333
}
333334
rtx := b.ReadTx()
334335
rtx.RLock()
335-
assert.NoError(t, rtx.UnsafeForEach(schema.Key, getSeq))
336+
require.NoError(t, rtx.UnsafeForEach(schema.Key, getSeq))
336337
rtx.RUnlock()
337338

338339
partialSeq := seq
@@ -341,7 +342,7 @@ func TestBackendWritebackForEach(t *testing.T) {
341342
b.ForceCommit()
342343

343344
tx.Lock()
344-
assert.NoError(t, tx.UnsafeForEach(schema.Key, getSeq))
345+
require.NoError(t, tx.UnsafeForEach(schema.Key, getSeq))
345346
tx.Unlock()
346347

347348
if seq != partialSeq {

server/storage/mvcc/hash_test.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ import (
2020
"testing"
2121

2222
"github.com/stretchr/testify/assert"
23+
"github.com/stretchr/testify/require"
2324
"go.uber.org/zap/zaptest"
2425

2526
"go.etcd.io/etcd/pkg/v3/traceutil"
@@ -124,7 +125,7 @@ func testHashByRev(t *testing.T, s *store, rev int64) KeyValueHash {
124125
rev = s.Rev()
125126
}
126127
hash, _, err := s.hashByRev(rev)
127-
assert.NoErrorf(t, err, "error on rev %v", rev)
128+
require.NoErrorf(t, err, "error on rev %v", rev)
128129
_, err = s.Compact(traceutil.TODO(), rev)
129130
assert.NoErrorf(t, err, "error on compact %v", rev)
130131
return hash

server/storage/mvcc/kvstore_bench_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ import (
1818
"context"
1919
"testing"
2020

21-
"github.com/stretchr/testify/assert"
21+
"github.com/stretchr/testify/require"
2222
"go.uber.org/zap/zaptest"
2323

2424
"go.etcd.io/etcd/pkg/v3/traceutil"
@@ -152,7 +152,7 @@ func benchmarkStoreRestore(revsPerKey int, b *testing.B) {
152152
txn.End()
153153
}
154154
}
155-
assert.NoError(b, s.Close())
155+
require.NoError(b, s.Close())
156156

157157
b.ReportAllocs()
158158
b.ResetTimer()

0 commit comments

Comments
 (0)