// UID for this kind of source.
protector.data.Uid = int64(util.AtoiOrPanic(ctx.TargetUser.Uid))
// Make sure we aren't duplicating protectors
- if err := checkIfUserHasLoginProtector(ctx, protector.data.Uid); err != nil {
+ if err = checkIfUserHasLoginProtector(ctx, protector.data.Uid); err != nil {
return nil, err
}
fallthrough
}
protector.data.ProtectorDescriptor = crypto.ComputeDescriptor(protector.key)
- if err := protector.Rewrap(keyFn); err != nil {
+ if err = protector.Rewrap(keyFn); err != nil {
protector.Lock()
return nil, err
}
}
prompt := fmt.Sprintf("Create new protector on %q", ctx.Mount.Path)
- if err := askConfirmation(prompt, true, ""); err != nil {
+ if err = askConfirmation(prompt, true, ""); err != nil {
return newExitError(c, err)
}
return newExitError(c, err)
}
- if err := checkRequiredFlags(c, []*stringFlag{protectorFlag}); err != nil {
+ if err = checkRequiredFlags(c, []*stringFlag{protectorFlag}); err != nil {
return err
}
protector, err := getProtectorFromFlag(protectorFlag.Value, ctx.TargetUser)
if err != nil {
return newExitError(c, err)
}
- if err := protector.Unlock(existingKeyFn); err != nil {
+ if err = protector.Unlock(existingKeyFn); err != nil {
return newExitError(c, err)
}
defer protector.Lock()
prompt := fmt.Sprintf("Create new policy on %q", ctx.Mount.Path)
- if err := askConfirmation(prompt, true, ""); err != nil {
+ if err = askConfirmation(prompt, true, ""); err != nil {
return newExitError(c, err)
}
for blockStart := blockSize; blockStart < encodedLength; blockStart += blockSize {
r.Read(inputSeparator)
if r.Err() == nil && !bytes.Equal(separator, inputSeparator) {
- err := errors.Wrapf(ErrRecoveryCode, "invalid separator %q", inputSeparator)
+ err = errors.Wrapf(ErrRecoveryCode, "invalid separator %q", inputSeparator)
return nil, err
}
defer file.Close()
var policy unix.FscryptPolicy
- if err := policyIoctl(file, unix.FS_IOC_GET_ENCRYPTION_POLICY, &policy); err != nil {
+ if err = policyIoctl(file, unix.FS_IOC_GET_ENCRYPTION_POLICY, &policy); err != nil {
return nil, errors.Wrapf(err, "get encryption policy %s", path)
}
}
defer file.Close()
- if err := data.CheckValidity(); err != nil {
+ if err = data.CheckValidity(); err != nil {
return errors.Wrap(err, "invalid policy")
}
var pamUsername *C.char
h.status = C.pam_get_user(h.handle, &pamUsername, nil)
- if err := h.err(); err != nil {
+ if err = h.err(); err != nil {
return nil, err
}
if err != nil {
return 0, err
}
- if err := unix.Flock(int(file.Fd()), unix.LOCK_EX); err != nil {
+ if err = unix.Flock(int(file.Fd()), unix.LOCK_EX); err != nil {
return 0, err
}
defer file.Close()