@@ -128,7 +128,7 @@ func TestRest_RunStaticSSLMode(t *testing.T) {
128
128
129
129
client := http.Client {
130
130
// prevent http redirect
131
- CheckRedirect : func (req * http.Request , via []* http.Request ) error {
131
+ CheckRedirect : func (* http.Request , []* http.Request ) error {
132
132
return http .ErrUseLastResponse
133
133
},
134
134
@@ -178,7 +178,7 @@ func TestRest_RunAutocertModeHTTPOnly(t *testing.T) {
178
178
179
179
client := http.Client {
180
180
// prevent http redirect
181
- CheckRedirect : func (req * http.Request , via []* http.Request ) error {
181
+ CheckRedirect : func (* http.Request , []* http.Request ) error {
182
182
return http .ErrUseLastResponse
183
183
},
184
184
}
@@ -194,7 +194,7 @@ func TestRest_RunAutocertModeHTTPOnly(t *testing.T) {
194
194
}
195
195
196
196
func TestRest_rejectAnonUser (t * testing.T ) {
197
- ts := httptest .NewServer (fakeAuth (rejectAnonUser (http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {
197
+ ts := httptest .NewServer (fakeAuth (rejectAnonUser (http .HandlerFunc (func (w http.ResponseWriter , _ * http.Request ) {
198
198
fmt .Fprintln (w , "Hello" )
199
199
}))))
200
200
defer ts .Close ()
@@ -307,7 +307,7 @@ func TestRest_cacheControl(t *testing.T) {
307
307
req := httptest .NewRequest ("GET" , tt .url , http .NoBody )
308
308
w := httptest .NewRecorder ()
309
309
310
- h := cacheControl (tt .exp , tt .version )(http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {}))
310
+ h := cacheControl (tt .exp , tt .version )(http .HandlerFunc (func (http.ResponseWriter , * http.Request ) {}))
311
311
h .ServeHTTP (w , req )
312
312
resp := w .Result ()
313
313
assert .Equal (t , http .StatusOK , resp .StatusCode )
@@ -335,7 +335,7 @@ func TestRest_frameAncestors(t *testing.T) {
335
335
req := httptest .NewRequest ("GET" , "http://example.com" , http .NoBody )
336
336
w := httptest .NewRecorder ()
337
337
338
- h := frameAncestors (tt .hosts )(http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {}))
338
+ h := frameAncestors (tt .hosts )(http .HandlerFunc (func (http.ResponseWriter , * http.Request ) {}))
339
339
h .ServeHTTP (w , req )
340
340
resp := w .Result ()
341
341
assert .Equal (t , http .StatusOK , resp .StatusCode )
@@ -371,7 +371,7 @@ func TestRest_subscribersOnly(t *testing.T) {
371
371
req = token .SetUserInfo (req , tt .user )
372
372
}
373
373
w := httptest .NewRecorder ()
374
- h := subscribersOnly (tt .subsOnly )(http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {}))
374
+ h := subscribersOnly (tt .subsOnly )(http .HandlerFunc (func (http.ResponseWriter , * http.Request ) {}))
375
375
h .ServeHTTP (w , req )
376
376
resp := w .Result ()
377
377
assert .Equal (t , tt .status , resp .StatusCode )
@@ -403,7 +403,7 @@ func Test_validEmailAuth(t *testing.T) {
403
403
t .Run (strconv .Itoa (i ), func (t * testing.T ) {
404
404
req := httptest .NewRequest ("GET" , "http://example.com" + tt .req , http .NoBody )
405
405
w := httptest .NewRecorder ()
406
- h := validEmailAuth ()(http .HandlerFunc (func (w http.ResponseWriter , r * http.Request ) {}))
406
+ h := validEmailAuth ()(http .HandlerFunc (func (http.ResponseWriter , * http.Request ) {}))
407
407
h .ServeHTTP (w , req )
408
408
resp := w .Result ()
409
409
assert .Equal (t , tt .status , resp .StatusCode )
@@ -458,7 +458,7 @@ func startupT(t *testing.T, srvHook ...func(srv *Rest)) (ts *httptest.Server, sr
458
458
DataService : dataStore ,
459
459
Authenticator : auth .NewService (auth.Opts {
460
460
AdminPasswd : "password" ,
461
- SecretReader : token .SecretFunc (func (aud string ) (string , error ) { return "secret" , nil }),
461
+ SecretReader : token .SecretFunc (func (string ) (string , error ) { return "secret" , nil }),
462
462
AvatarStore : avatar .NewLocalFS (tmp + "/ava-remark42" ),
463
463
}),
464
464
Cache : memCache ,
@@ -495,7 +495,7 @@ func startupT(t *testing.T, srvHook ...func(srv *Rest)) (ts *httptest.Server, sr
495
495
// add some providers. Needed because we don't allow users with unlisted providers to authenticate
496
496
providers := []string {"provider1" , "anonymous" , "github" , "email" }
497
497
for _ , p := range providers {
498
- srv .Authenticator .AddDirectProvider (p , provider .CredCheckerFunc (func (user , password string ) (ok bool , err error ) {
498
+ srv .Authenticator .AddDirectProvider (p , provider .CredCheckerFunc (func (_ , _ string ) (ok bool , err error ) {
499
499
return true , nil
500
500
}))
501
501
}
0 commit comments