cil/config/credentials: remove newStore() test-utility

This function was names slightly confusing, as it returns a fakeStore,
and it didn't do any constructing, so didn't provide value above just
constructing the type.

I'm planning to add more functionality to the fakeStore, but don't want
to maintain a full-fledged constructor for all of that, so let's remove
this utility.

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
Sebastiaan van Stijn 2024-10-22 10:58:29 +02:00
parent 0ab0eca8bd
commit 0dd6f7f1b3
No known key found for this signature in database
GPG Key ID: 76698F39D527CE8C
2 changed files with 23 additions and 27 deletions

View File

@ -24,12 +24,8 @@ func (f *fakeStore) GetFilename() string {
return "/tmp/docker-fakestore" return "/tmp/docker-fakestore"
} }
func newStore(auths map[string]types.AuthConfig) store {
return &fakeStore{configs: auths}
}
func TestFileStoreAddCredentials(t *testing.T) { func TestFileStoreAddCredentials(t *testing.T) {
f := newStore(make(map[string]types.AuthConfig)) f := &fakeStore{configs: map[string]types.AuthConfig{}}
s := NewFileStore(f) s := NewFileStore(f)
auth := types.AuthConfig{ auth := types.AuthConfig{
@ -47,13 +43,13 @@ func TestFileStoreAddCredentials(t *testing.T) {
} }
func TestFileStoreGet(t *testing.T) { func TestFileStoreGet(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
"https://example.com": { "https://example.com": {
Auth: "super_secret_token", Auth: "super_secret_token",
Email: "foo@example.com", Email: "foo@example.com",
ServerAddress: "https://example.com", ServerAddress: "https://example.com",
}, },
}) }}
s := NewFileStore(f) s := NewFileStore(f)
a, err := s.Get("https://example.com") a, err := s.Get("https://example.com")
@ -71,7 +67,7 @@ func TestFileStoreGet(t *testing.T) {
func TestFileStoreGetAll(t *testing.T) { func TestFileStoreGetAll(t *testing.T) {
s1 := "https://example.com" s1 := "https://example.com"
s2 := "https://example2.example.com" s2 := "https://example2.example.com"
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
s1: { s1: {
Auth: "super_secret_token", Auth: "super_secret_token",
Email: "foo@example.com", Email: "foo@example.com",
@ -82,7 +78,7 @@ func TestFileStoreGetAll(t *testing.T) {
Email: "foo@example2.com", Email: "foo@example2.com",
ServerAddress: "https://example2.example.com", ServerAddress: "https://example2.example.com",
}, },
}) }}
s := NewFileStore(f) s := NewFileStore(f)
as, err := s.GetAll() as, err := s.GetAll()
@ -107,13 +103,13 @@ func TestFileStoreGetAll(t *testing.T) {
} }
func TestFileStoreErase(t *testing.T) { func TestFileStoreErase(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
"https://example.com": { "https://example.com": {
Auth: "super_secret_token", Auth: "super_secret_token",
Email: "foo@example.com", Email: "foo@example.com",
ServerAddress: "https://example.com", ServerAddress: "https://example.com",
}, },
}) }}
s := NewFileStore(f) s := NewFileStore(f)
err := s.Erase("https://example.com") err := s.Erase("https://example.com")

View File

@ -91,7 +91,7 @@ func mockCommandFn(args ...string) client.Program {
} }
func TestNativeStoreAddCredentials(t *testing.T) { func TestNativeStoreAddCredentials(t *testing.T) {
f := newStore(make(map[string]types.AuthConfig)) f := &fakeStore{configs: map[string]types.AuthConfig{}}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
fileStore: NewFileStore(f), fileStore: NewFileStore(f),
@ -116,7 +116,7 @@ func TestNativeStoreAddCredentials(t *testing.T) {
} }
func TestNativeStoreAddInvalidCredentials(t *testing.T) { func TestNativeStoreAddInvalidCredentials(t *testing.T) {
f := newStore(make(map[string]types.AuthConfig)) f := &fakeStore{configs: map[string]types.AuthConfig{}}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
fileStore: NewFileStore(f), fileStore: NewFileStore(f),
@ -132,11 +132,11 @@ func TestNativeStoreAddInvalidCredentials(t *testing.T) {
} }
func TestNativeStoreGet(t *testing.T) { func TestNativeStoreGet(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
validServerAddress: { validServerAddress: {
Email: "foo@example.com", Email: "foo@example.com",
}, },
}) }}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
fileStore: NewFileStore(f), fileStore: NewFileStore(f),
@ -154,11 +154,11 @@ func TestNativeStoreGet(t *testing.T) {
} }
func TestNativeStoreGetIdentityToken(t *testing.T) { func TestNativeStoreGetIdentityToken(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
validServerAddress2: { validServerAddress2: {
Email: "foo@example2.com", Email: "foo@example2.com",
}, },
}) }}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
@ -176,11 +176,11 @@ func TestNativeStoreGetIdentityToken(t *testing.T) {
} }
func TestNativeStoreGetAll(t *testing.T) { func TestNativeStoreGetAll(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
validServerAddress: { validServerAddress: {
Email: "foo@example.com", Email: "foo@example.com",
}, },
}) }}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
@ -217,11 +217,11 @@ func TestNativeStoreGetAll(t *testing.T) {
} }
func TestNativeStoreGetMissingCredentials(t *testing.T) { func TestNativeStoreGetMissingCredentials(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
validServerAddress: { validServerAddress: {
Email: "foo@example.com", Email: "foo@example.com",
}, },
}) }}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
@ -232,11 +232,11 @@ func TestNativeStoreGetMissingCredentials(t *testing.T) {
} }
func TestNativeStoreGetInvalidAddress(t *testing.T) { func TestNativeStoreGetInvalidAddress(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
validServerAddress: { validServerAddress: {
Email: "foo@example.com", Email: "foo@example.com",
}, },
}) }}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
@ -247,11 +247,11 @@ func TestNativeStoreGetInvalidAddress(t *testing.T) {
} }
func TestNativeStoreErase(t *testing.T) { func TestNativeStoreErase(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
validServerAddress: { validServerAddress: {
Email: "foo@example.com", Email: "foo@example.com",
}, },
}) }}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,
@ -263,11 +263,11 @@ func TestNativeStoreErase(t *testing.T) {
} }
func TestNativeStoreEraseInvalidAddress(t *testing.T) { func TestNativeStoreEraseInvalidAddress(t *testing.T) {
f := newStore(map[string]types.AuthConfig{ f := &fakeStore{configs: map[string]types.AuthConfig{
validServerAddress: { validServerAddress: {
Email: "foo@example.com", Email: "foo@example.com",
}, },
}) }}
s := &nativeStore{ s := &nativeStore{
programFunc: mockCommandFn, programFunc: mockCommandFn,