Compare commits

1 Commits

Author SHA1 Message Date
f0e2455e48 chore(deps): update dependency golangci/golangci-lint to v2.3.1
All checks were successful
Lint Markdown files / Run markdown linter (pull_request) Successful in 11s
2025-08-12 07:24:13 +00:00
10 changed files with 28 additions and 57 deletions

View File

@ -26,4 +26,4 @@ jobs:
go-version: ${{ matrix.go }}
- uses: golangci/golangci-lint-action@v8.0.0
with:
version: v2.4.0 # renovate: datasource=github-releases depName=golangci/golangci-lint
v2.3.1 # renovate: datasource=github-releases depName=golangci/golangci-lint

View File

@ -14,6 +14,6 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4.3.0
- uses: DavidAnson/markdownlint-cli2-action@v20.0.0
- uses: DavidAnson/markdownlint-cli2-action@v19.1.0
with:
globs: '**/*.md'

View File

@ -17,7 +17,7 @@ jobs:
- uses: actions/setup-go@v5.5.0
with:
go-version: stable
- uses: docker/login-action@v3.5.0
- uses: docker/login-action@v3.4.0
with:
registry: git.cryptic.systems
username: ${{ github.repository_owner }}
@ -26,7 +26,7 @@ jobs:
GITEA_TOKEN: ${{ secrets.GIT_CRYPTIC_SYSTEMS_PACKAGE_REGISTRY_TOKEN }}
GONOSUMDB: ${{ vars.GONOSUMDB }}
GOPROXY: ${{ vars.GOPROXY }}
uses: goreleaser/goreleaser-action@v6.4.0
uses: goreleaser/goreleaser-action@v6.3.0
with:
version: v2.11.2 # renovate: datasource=github-releases depName=goreleaser/goreleaser
args: release --clean

View File

@ -2,7 +2,6 @@ package main
import (
"fmt"
"log"
"os"
"path/filepath"
"time"
@ -27,9 +26,7 @@ autharr /etc/lidarr/config.xml`,
}
rootCmd.Flags().Bool("watch", false, "Listens for changes to the configuration and writes the token continuously to the output")
if err := rootCmd.Execute(); err != nil {
log.Fatalln(err)
}
rootCmd.Execute()
}
func runE(cmd *cobra.Command, args []string) error {
@ -87,16 +84,10 @@ func runWatch(cmd *cobra.Command, args []string) error {
select {
case <-cmd.Context().Done():
return nil
case err, open := <-errorChannel:
if !open {
return fmt.Errorf("error channel has been closed")
}
logrus.WithError(err).Errorln("received from config watcher")
case err := <-errorChannel:
logrus.WithError(err).Errorln("Received from config watcher")
case <-timer.C:
err = writeConfig(cachedConfig, dest)
if err != nil {
logrus.WithError(err).Errorln("failed to write config")
}
writeConfig(cachedConfig, dest)
case config := <-configChannel:
cachedConfig = config
timer.Reset(waitFor)
@ -114,23 +105,18 @@ func writeConfig(config *domain.Config, dest string) error {
case len(dest) > 0:
dirname := filepath.Dir(dest)
// #nosec G301
err := os.MkdirAll(dirname, 0755)
if err != nil {
return err
}
// #nosec G304
f, err := os.Create(dest)
if err != nil {
return err
}
defer func() { _ = f.Close() }()
_, err = f.WriteString(config.API.Token)
if err != nil {
return err
}
f.WriteString(config.API.Token)
}
return nil

View File

@ -3,7 +3,6 @@ package main
import (
"context"
"fmt"
"log"
"time"
"git.cryptic.systems/volker.raschek/tarr/pkg/config"
@ -96,10 +95,7 @@ healarr sonarr https://sonarr.example.com:8443 --api-token my-token`,
rootCmd.PersistentFlags().Bool("insecure", false, "Trust insecure TLS certificates")
rootCmd.PersistentFlags().Duration("timeout", time.Minute, "Timeout")
err := rootCmd.Execute()
if err != nil {
log.Fatalln(err)
}
rootCmd.Execute()
}
func runBazarrE(cmd *cobra.Command, args []string) error {
@ -156,7 +152,7 @@ func runE(cmd *cobra.Command, args []string, queryKey string) error {
switch {
case len(apiToken) <= 0 && len(configPath) <= 0:
return fmt.Errorf("at least --api-token oder --config must be defined")
return fmt.Errorf("At least --api-token oder --config must be defined")
case len(apiToken) > 0 && len(configPath) <= 0:
err = health.NewReadinessProbe(args[0]).
QueryAdd(queryKey, apiToken).
@ -179,7 +175,7 @@ func runE(cmd *cobra.Command, args []string, queryKey string) error {
return err
}
default:
return fmt.Errorf("neither --api-token nor --config can be used at the same time")
return fmt.Errorf("Neither --api-token nor --config can be used at the same time.")
}
return nil

2
go.mod
View File

@ -6,7 +6,7 @@ require (
github.com/fsnotify/fsnotify v1.9.0
github.com/sirupsen/logrus v1.9.3
github.com/spf13/cobra v1.9.1
github.com/stretchr/testify v1.11.1
github.com/stretchr/testify v1.10.0
gopkg.in/yaml.v3 v3.0.1
)

4
go.sum
View File

@ -17,8 +17,8 @@ github.com/spf13/pflag v1.0.6 h1:jFzHGLGAlb3ruxLB8MhbI6A8+AQX/2eW4qeyNZXNp2o=
github.com/spf13/pflag v1.0.6/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
golang.org/x/sys v0.13.0 h1:Af8nKPmuFypiUBjVoU9V20FiaFXOcuZI21p0ycVYYGE=
golang.org/x/sys v0.13.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=

View File

@ -46,12 +46,11 @@ type YAMLConfig struct {
// Read reads the config struct from a file. The decoding format will be determined by the file extension like
// `xml` or `yaml`.
func ReadConfig(name string) (*domain.Config, error) {
// #nosec G304
f, err := os.Open(name)
if err != nil {
return nil, err
}
defer func() { _ = f.Close() }()
defer f.Close()
switch {
case strings.HasSuffix(name, "xml"):
@ -59,7 +58,7 @@ func ReadConfig(name string) (*domain.Config, error) {
case strings.HasSuffix(name, "yml") || strings.HasSuffix(name, "yaml"):
return readYAMLConfig(f)
default:
return nil, fmt.Errorf("unsupported file extension")
return nil, fmt.Errorf("Unsupported file extension")
}
}
@ -98,8 +97,8 @@ func readYAMLConfig(r io.Reader) (*domain.Config, error) {
}
func WatchConfig(ctx context.Context, name string) (<-chan *domain.Config, <-chan error) {
configChannel := make(chan *domain.Config)
errorChannel := make(chan error)
configChannel := make(chan *domain.Config, 0)
errorChannel := make(chan error, 0)
go func() {
wait := time.Second * 3
@ -111,18 +110,14 @@ func WatchConfig(ctx context.Context, name string) (<-chan *domain.Config, <-cha
errorChannel <- err
return
}
err = watcher.Add(name)
if err != nil {
errorChannel <- err
return
}
watcher.Add(name)
for {
select {
case <-ctx.Done():
close(configChannel)
close(errorChannel)
return
break
case event, open := <-watcher.Events:
if !open {
errorChannel <- fmt.Errorf("FSWatcher closed channel: %w", err)
@ -150,12 +145,11 @@ func WatchConfig(ctx context.Context, name string) (<-chan *domain.Config, <-cha
// WriteConfig writes the config struct into the file. The encoding format will be determined by the file extension like
// `xml` or `yaml`.
func WriteConfig(name string, config *domain.Config) error {
// #nosec G304
f, err := os.Create(name)
if err != nil {
return err
}
defer func() { _ = f.Close() }()
defer f.Close()
switch {
case strings.HasSuffix(name, "xml"):
@ -163,13 +157,13 @@ func WriteConfig(name string, config *domain.Config) error {
case strings.HasSuffix(name, "yml") || strings.HasSuffix(name, "yaml"):
return writeYAMLConfig(f, config)
default:
return fmt.Errorf("unsupported file extension")
return fmt.Errorf("Unsupported file extension")
}
}
func writeXMLConfig(w io.Writer, config *domain.Config) error {
xmlEncoder := xml.NewEncoder(w)
defer func() { _ = xmlEncoder.Close() }()
defer xmlEncoder.Close()
xmlConfig := &XMLConfig{
APIToken: config.API.Token,
@ -186,7 +180,7 @@ func writeXMLConfig(w io.Writer, config *domain.Config) error {
func writeYAMLConfig(w io.Writer, config *domain.Config) error {
yamlEncoder := yaml.NewEncoder(w)
defer func() { _ = yamlEncoder.Close() }()
defer yamlEncoder.Close()
yamlConfig := &YAMLConfig{
Auth: YAMLConfigAuth{

View File

@ -24,7 +24,6 @@ func TestReadWriteConfig_XML(t *testing.T) {
t.Cleanup(func() { _ = os.RemoveAll(tmpDir) })
expectedXMLConfigName := filepath.Join(tmpDir, "expected_config.xml")
// #nosec G304
f, err := os.Create(expectedXMLConfigName)
require.NoError(err)
@ -39,7 +38,6 @@ func TestReadWriteConfig_XML(t *testing.T) {
err = config.WriteConfig(actualXMLConfigName, actualConfig)
require.NoError(err)
// #nosec G304
b, err := os.ReadFile(actualXMLConfigName)
require.NoError(err)
require.Equal(expectedXMLConfig, string(b))
@ -53,7 +51,6 @@ func TestReadWriteConfig_YAML(t *testing.T) {
t.Cleanup(func() { _ = os.RemoveAll(tmpDir) })
expectedYAMLConfigName := filepath.Join(tmpDir, "expected_config.yaml")
// #nosec G304
f, err := os.Create(expectedYAMLConfigName)
require.NoError(err)
@ -68,7 +65,6 @@ func TestReadWriteConfig_YAML(t *testing.T) {
err = config.WriteConfig(actualYAMLConfigName, actualConfig)
require.NoError(err)
// #nosec G304
b, err := os.ReadFile(actualYAMLConfigName)
require.NoError(err)
require.Equal(expectedYAMLConfig, string(b))

View File

@ -9,8 +9,8 @@ import (
"net/url"
)
var ErrNoAPIToken error = errors.New("no API token defined")
var ErrNoURL error = errors.New("no API token defined")
var ErrNoAPIToken error = errors.New("No API token defined")
var ErrNoURL error = errors.New("No API token defined")
type ReadinessProbe struct {
additionalQueryValues url.Values
@ -40,7 +40,6 @@ func (rp *ReadinessProbe) Run(ctx context.Context) error {
httpClient := &http.Client{
Transport: &http.Transport{
TLSClientConfig: &tls.Config{
// #nosec G402
InsecureSkipVerify: rp.insecure,
},
},
@ -65,7 +64,7 @@ func (rp *ReadinessProbe) Run(ctx context.Context) error {
}
if resp.StatusCode != http.StatusOK {
return fmt.Errorf("received unexpected HTTP status code %v", resp.StatusCode)
return fmt.Errorf("Received unexpected HTTP status code %v", resp.StatusCode)
}
return nil