mirror of
https://github.com/outbackdingo/certificates.git
synced 2026-01-27 02:18:27 +00:00
Fix govet non-constant error format string issues
This commit is contained in:
@@ -180,7 +180,7 @@ func isAccountAuthorized(_ context.Context, dbCert *acme.Certificate, certToBeRe
|
||||
func wrapRevokeErr(err error) *acme.Error {
|
||||
t := err.Error()
|
||||
if strings.Contains(t, "is already revoked") {
|
||||
return acme.NewError(acme.ErrorAlreadyRevokedType, t)
|
||||
return acme.NewError(acme.ErrorAlreadyRevokedType, "%s", t)
|
||||
}
|
||||
return acme.WrapErrorISE(err, "error when revoking certificate")
|
||||
}
|
||||
@@ -190,9 +190,9 @@ func wrapRevokeErr(err error) *acme.Error {
|
||||
func wrapUnauthorizedError(cert *x509.Certificate, unauthorizedIdentifiers []acme.Identifier, msg string, err error) *acme.Error {
|
||||
var acmeErr *acme.Error
|
||||
if err == nil {
|
||||
acmeErr = acme.NewError(acme.ErrorUnauthorizedType, msg)
|
||||
acmeErr = acme.NewError(acme.ErrorUnauthorizedType, "%s", msg)
|
||||
} else {
|
||||
acmeErr = acme.WrapError(acme.ErrorUnauthorizedType, err, msg)
|
||||
acmeErr = acme.WrapError(acme.ErrorUnauthorizedType, err, "%s", msg)
|
||||
}
|
||||
acmeErr.Status = http.StatusForbidden // RFC8555 7.6 shows example with 403
|
||||
|
||||
|
||||
@@ -309,7 +309,7 @@ func (o *Order) Finalize(ctx context.Context, db DB, csr *x509.CertificateReques
|
||||
// Add subproblem for webhook errors, others can be added later.
|
||||
var webhookErr *webhook.Error
|
||||
if errors.As(err, &webhookErr) {
|
||||
acmeError := NewDetailedError(ErrorUnauthorizedType, webhookErr.Error())
|
||||
acmeError := NewDetailedError(ErrorUnauthorizedType, "%s", webhookErr.Error())
|
||||
acmeError.AddSubproblems(Subproblem{
|
||||
Type: fmt.Sprintf("urn:smallstep:acme:error:%s", webhookErr.Code),
|
||||
Detail: webhookErr.Message,
|
||||
|
||||
@@ -202,7 +202,7 @@ func (war *webhookAdminResponder) UpdateProvisionerWebhook(w http.ResponseWriter
|
||||
}
|
||||
if !found {
|
||||
msg := fmt.Sprintf("provisioner %q has no webhook with the name %q", prov.Name, newWebhook.Name)
|
||||
err := admin.NewError(admin.ErrorNotFoundType, msg)
|
||||
err := admin.NewError(admin.ErrorNotFoundType, "%s", msg)
|
||||
render.Error(w, r, err)
|
||||
return
|
||||
}
|
||||
|
||||
@@ -250,7 +250,7 @@ func (p *JWK) AuthorizeSSHSign(_ context.Context, token string) ([]SignOption, e
|
||||
// Use options in the token.
|
||||
if opts.CertType != "" {
|
||||
if certType, err = sshutil.CertTypeFromString(opts.CertType); err != nil {
|
||||
return nil, errs.BadRequestErr(err, err.Error())
|
||||
return nil, errs.BadRequestErr(err, "%s", err.Error())
|
||||
}
|
||||
}
|
||||
if opts.KeyID != "" {
|
||||
|
||||
@@ -93,7 +93,7 @@ func signSSHCertificate(key crypto.PublicKey, opts SignSSHOptions, signOpts []Si
|
||||
var templErr *sshutil.TemplateError
|
||||
if errors.As(err, &templErr) {
|
||||
return nil, errs.NewErr(http.StatusBadRequest, templErr,
|
||||
errs.WithMessage(templErr.Error()),
|
||||
errs.WithMessage("%s", templErr.Error()),
|
||||
errs.WithKeyVal("signOptions", signOpts),
|
||||
)
|
||||
}
|
||||
|
||||
@@ -302,7 +302,7 @@ func (p *X5C) AuthorizeSSHSign(_ context.Context, token string) ([]SignOption, e
|
||||
// Use options in the token.
|
||||
if opts.CertType != "" {
|
||||
if certType, err = sshutil.CertTypeFromString(opts.CertType); err != nil {
|
||||
return nil, errs.BadRequestErr(err, err.Error())
|
||||
return nil, errs.BadRequestErr(err, "%s", err.Error())
|
||||
}
|
||||
}
|
||||
if opts.KeyID != "" {
|
||||
|
||||
@@ -215,7 +215,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
|
||||
for _, v := range keyValidators {
|
||||
if err := v.Valid(key); err != nil {
|
||||
return nil, nil, errs.ApplyOptions(
|
||||
errs.ForbiddenErr(err, err.Error()),
|
||||
errs.ForbiddenErr(err, "%s", err.Error()),
|
||||
errs.WithKeyVal("signOptions", signOpts),
|
||||
)
|
||||
}
|
||||
@@ -232,7 +232,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
|
||||
// Call enriching webhooks
|
||||
if err := a.callEnrichingWebhooksSSH(ctx, prov, webhookCtl, cr); err != nil {
|
||||
return nil, prov, errs.ApplyOptions(
|
||||
errs.ForbiddenErr(err, err.Error()),
|
||||
errs.ForbiddenErr(err, "%s", err.Error()),
|
||||
errs.WithKeyVal("signOptions", signOpts),
|
||||
)
|
||||
}
|
||||
@@ -244,7 +244,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
|
||||
switch {
|
||||
case errors.As(err, &te):
|
||||
return nil, prov, errs.ApplyOptions(
|
||||
errs.BadRequestErr(err, err.Error()),
|
||||
errs.BadRequestErr(err, "%s", err.Error()),
|
||||
errs.WithKeyVal("signOptions", signOpts),
|
||||
)
|
||||
case strings.HasPrefix(err.Error(), "error unmarshaling certificate"):
|
||||
@@ -264,7 +264,7 @@ func (a *Authority) signSSH(ctx context.Context, key ssh.PublicKey, opts provisi
|
||||
// Use SignSSHOptions to modify the certificate validity. It will be later
|
||||
// checked or set if not defined.
|
||||
if err := opts.ModifyValidity(certTpl); err != nil {
|
||||
return nil, prov, errs.BadRequestErr(err, err.Error())
|
||||
return nil, prov, errs.BadRequestErr(err, "%s", err.Error())
|
||||
}
|
||||
|
||||
// Use provisioner modifiers.
|
||||
|
||||
@@ -197,7 +197,7 @@ func (a *Authority) signX509(ctx context.Context, csr *x509.CertificateRequest,
|
||||
|
||||
if err := a.callEnrichingWebhooksX509(ctx, prov, webhookCtl, attData, csr); err != nil {
|
||||
return nil, prov, errs.ApplyOptions(
|
||||
errs.ForbiddenErr(err, err.Error()),
|
||||
errs.ForbiddenErr(err, "%s", err.Error()),
|
||||
errs.WithKeyVal("csr", csr),
|
||||
errs.WithKeyVal("signOptions", signOpts),
|
||||
)
|
||||
@@ -209,7 +209,7 @@ func (a *Authority) signX509(ctx context.Context, csr *x509.CertificateRequest,
|
||||
switch {
|
||||
case errors.As(err, &te):
|
||||
return nil, prov, errs.ApplyOptions(
|
||||
errs.BadRequestErr(err, err.Error()),
|
||||
errs.BadRequestErr(err, "%s", err.Error()),
|
||||
errs.WithKeyVal("csr", csr),
|
||||
errs.WithKeyVal("signOptions", signOpts),
|
||||
)
|
||||
|
||||
Reference in New Issue
Block a user