Skip to content

Commit 9a5574f

Browse files
authored
Fix new semgrep issues (#350)
* Fix some semgrep issues. * Fix semgrep issue in 'vault.go'.
1 parent 05c107b commit 9a5574f

File tree

5 files changed

+12
-9
lines changed

5 files changed

+12
-9
lines changed

cmd/bots/discord/discord.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ package main
22

33
import (
44
"context"
5+
stderrs "errors"
56
"flag"
67
"log"
78
"os"
@@ -89,7 +90,7 @@ func runDiscordBot() error {
8990
logger, atom, err := tools.SetupZapLogger(cfg.logLevel, cfg.development)
9091
if err != nil {
9192
log.Printf("Failed to setup zap logger: %v", err)
92-
return common.ErrInvalidParameters
93+
return stderrs.Join(common.ErrInvalidParameters, err)
9394
}
9495

9596
defer func(zap *zap.Logger) {
@@ -156,8 +157,7 @@ func runDiscordBot() error {
156157
return err
157158
}
158159
defer func() {
159-
closeErr := discordBotEnv.Bot.Close()
160-
if err != nil {
160+
if closeErr := discordBotEnv.Bot.Close(); closeErr != nil {
161161
logger.Error("failed to close discord bot web socket", zap.Error(closeErr))
162162
}
163163
}()

cmd/bots/internal/common/environment.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -487,7 +487,7 @@ func (tgEnv *TelegramBotEnvironment) UnsubscribeFromAlert(alertType entities.Ale
487487
}
488488
err := alertSub.subscription.Unsubscribe()
489489
if err != nil {
490-
return errors.New("failed to unsubscribe from alert")
490+
return errors.Wrap(err, "failed to unsubscribe from alert")
491491
}
492492
ok = tgEnv.IsAlreadySubscribed(alertType)
493493
if !ok {

cmd/bots/telegram/telegram.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ func runTelegramBot() error {
104104
logger, atom, err := tools.SetupZapLogger(cfg.logLevel, cfg.development)
105105
if err != nil {
106106
log.Printf("Failed to setup zap logger: %v", err)
107-
return common.ErrInvalidParameters
107+
return errors.Join(common.ErrInvalidParameters, err)
108108
}
109109

110110
defer func(zap *zap.Logger) {

cmd/nodemon/nodemon.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ func (c *nodemonL2Config) validate(logger *zap.Logger) error {
127127
}
128128
if err := validateURLs(urls); err != nil {
129129
logger.Error("Invalid L2 node URL", zap.Error(err))
130-
return errInvalidParameters
130+
return stderrs.Join(errInvalidParameters, err)
131131
}
132132
for i, nodeName := range names {
133133
if nodeName == "" {
@@ -321,7 +321,7 @@ func run() error {
321321
logger, atom, err := tools.SetupZapLogger(cfg.logLevel, cfg.development)
322322
if err != nil {
323323
log.Printf("Failed to setup zap logger: %v", err)
324-
return errInvalidParameters
324+
return stderrs.Join(errInvalidParameters, err)
325325
}
326326
defer func(zap *zap.Logger) {
327327
if syncErr := zap.Sync(); syncErr != nil {

pkg/clients/vault.go

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ package clients
22

33
import (
44
"context"
5+
stderrs "errors"
56

67
vault "github.com/hashicorp/vault/api"
78
auth "github.com/hashicorp/vault/api/auth/userpass"
@@ -34,6 +35,8 @@ func NewVaultSimpleClient(ctx context.Context, logger *zap.Logger, addr, user, p
3435
return client, nil
3536
}
3637

38+
var errWatcherRenewFailed = errors.New("token renewal failed")
39+
3740
// Once you've set the token for your Vault client, you will need to
3841
// periodically renew its lease.
3942
//
@@ -58,7 +61,7 @@ func renewToken(ctx context.Context, logger *zap.Logger, client *vault.Client, u
5861
}
5962
logger.Info("Successfully authenticated to Vault", zap.String("request_id", vaultLoginResp.RequestID))
6063
tokenErr := manageTokenLifecycle(ctx, logger, client, vaultLoginResp)
61-
if tokenErr != nil && !errors.Is(tokenErr, context.Canceled) {
64+
if tokenErr != nil && !errors.Is(tokenErr, context.Canceled) && !errors.Is(tokenErr, errWatcherRenewFailed) {
6265
logger.Fatal("unable to start managing token lifecycle", zap.Error(tokenErr))
6366
}
6467
}
@@ -99,7 +102,7 @@ func manageTokenLifecycle(ctx context.Context, logger *zap.Logger, client *vault
99102
case renewErr := <-watcher.DoneCh():
100103
if renewErr != nil {
101104
logger.Error("Failed to renew vault token. Re-attempting login.", zap.Error(renewErr))
102-
return nil
105+
return stderrs.Join(errWatcherRenewFailed, renewErr)
103106
}
104107
// This occurs once the token has reached max TTL.
105108
logger.Info("Vault token can no longer be renewed. Re-attempting login.")

0 commit comments

Comments
 (0)