Ivan Ka
791601e2e3
chore(codebase): add nilnil return check ( #5415 )
...
* chore(code-quality): added nilnil return check
Signed-off-by: ivan katliarchuk <ivan.katliarchuk@gmail.com>
* chore(code-quality): added nilnil return check
---------
Signed-off-by: ivan katliarchuk <ivan.katliarchuk@gmail.com>
2025-05-19 00:19:16 -07:00
Sandor Szücs
dc069cc10f
refactor: use always fmt.Errorf("...: %w", err), instead of %s or %v
...
Signed-off-by: Sandor Szücs <sandor.szuecs@zalando.de>
2023-06-12 10:44:29 +02:00
Raffaele Di Fazio
31e6bb8578
CI linting fixes ( #3205 )
...
* ci linting fixes
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* remove staticcheck
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* disable naming rule
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* disable stylecheck too
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* linter errors fixes
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* re-add staticcheck
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fixes various linting issues
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix imports
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix tlsconfig
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* fix alibabacloud
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* ioutil fixes
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* remove all references to ioutil
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
* ignore linting for azure deprecated sdk
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
Signed-off-by: Raffaele Di Fazio <difazio.raffaele@gmail.com>
2022-12-02 10:57:53 -08:00
Jason Hoch
c40e563292
Simplify flag checks; format
2018-06-21 11:56:36 -04:00
Jason Hoch
8223796ae7
Utilizes tlsutils in pdns
2018-06-20 16:44:13 -04:00
Stan Lagun
7e540d4158
TLS parameters support for OpenStack
...
TLS parameters can be passed through the following environment
variables:
* OPENSTACK_CA_FILE - CA file path
* OPENSTACK_CERT_FILE - cert file path
* OPENSTACK_KEY_FILE - key file path. Either both or none of cert/key
must be specified
* OPENSTACK_TLS_SERVER_NAME - (optional) expected CN of the server
certificate if differs from domain in the URL
* OPENSTACK_TLS_INSECURE - if set to yes|true|1 disables validation of
the server certificate
Code that loads tls.Config from environment variables was extracted
into dedicated package so that it could be reused by different providers
2017-09-22 20:55:08 -07:00