Skip to content

Commit 5c5b09e

Browse files
committed
osxkeychain: use sub-tests
Signed-off-by: Sebastiaan van Stijn <[email protected]>
1 parent 8282d33 commit 5c5b09e

File tree

1 file changed

+47
-42
lines changed

1 file changed

+47
-42
lines changed

osxkeychain/osxkeychain_darwin_test.go

Lines changed: 47 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -98,17 +98,19 @@ func TestOSXKeychainHelperRetrieveAliases(t *testing.T) {
9898
}
9999

100100
for _, tc := range tests {
101-
c := &credentials.Credentials{ServerURL: tc.storeURL, Username: "hello", Secret: "world"}
102-
if err := helper.Add(c); err != nil {
103-
t.Errorf("Error: failed to store secret for URL %q: %s", tc.storeURL, err)
104-
continue
105-
}
106-
if _, _, err := helper.Get(tc.readURL); err != nil {
107-
t.Errorf("Error: failed to read secret for URL %q using %q", tc.storeURL, tc.readURL)
108-
}
109-
if err := helper.Delete(tc.storeURL); err != nil {
110-
t.Error(err)
111-
}
101+
tc := tc
102+
t.Run(tc.doc, func(t *testing.T) {
103+
c := &credentials.Credentials{ServerURL: tc.storeURL, Username: "hello", Secret: "world"}
104+
if err := helper.Add(c); err != nil {
105+
t.Fatalf("Error: failed to store secret for URL %q: %s", tc.storeURL, err)
106+
}
107+
if _, _, err := helper.Get(tc.readURL); err != nil {
108+
t.Errorf("Error: failed to read secret for URL %q using %q", tc.storeURL, tc.readURL)
109+
}
110+
if err := helper.Delete(tc.storeURL); err != nil {
111+
t.Error(err)
112+
}
113+
})
112114
}
113115
}
114116

@@ -171,17 +173,19 @@ func TestOSXKeychainHelperRetrieveStrict(t *testing.T) {
171173
}
172174

173175
for _, tc := range tests {
174-
c := &credentials.Credentials{ServerURL: tc.storeURL, Username: "hello", Secret: "world"}
175-
if err := helper.Add(c); err != nil {
176-
t.Errorf("Error: failed to store secret for URL %q: %s", tc.storeURL, err)
177-
continue
178-
}
179-
if _, _, err := helper.Get(tc.readURL); err == nil {
180-
t.Errorf("Error: managed to read secret for URL %q using %q, but should not be able to", tc.storeURL, tc.readURL)
181-
}
182-
if err := helper.Delete(tc.storeURL); err != nil {
183-
t.Error(err)
184-
}
176+
tc := tc
177+
t.Run(tc.doc, func(t *testing.T) {
178+
c := &credentials.Credentials{ServerURL: tc.storeURL, Username: "hello", Secret: "world"}
179+
if err := helper.Add(c); err != nil {
180+
t.Fatalf("Error: failed to store secret for URL %q: %s", tc.storeURL, err)
181+
}
182+
if _, _, err := helper.Get(tc.readURL); err == nil {
183+
t.Errorf("Error: managed to read secret for URL %q using %q, but should not be able to", tc.storeURL, tc.readURL)
184+
}
185+
if err := helper.Delete(tc.storeURL); err != nil {
186+
t.Error(err)
187+
}
188+
})
185189
}
186190
}
187191

@@ -220,27 +224,28 @@ func TestOSXKeychainHelperStoreRetrieve(t *testing.T) {
220224
// Note that we don't delete between individual tests here, to verify that
221225
// subsequent stores/overwrites don't affect storing / retrieving secrets.
222226
for i, tc := range tests {
223-
c := &credentials.Credentials{
224-
ServerURL: tc.url,
225-
Username: fmt.Sprintf("user-%d", i),
226-
Secret: fmt.Sprintf("secret-%d", i),
227-
}
227+
tc := tc
228+
t.Run(tc.url, func(t *testing.T) {
229+
c := &credentials.Credentials{
230+
ServerURL: tc.url,
231+
Username: fmt.Sprintf("user-%d", i),
232+
Secret: fmt.Sprintf("secret-%d", i),
233+
}
228234

229-
if err := helper.Add(c); err != nil {
230-
t.Errorf("Error: failed to store secret for URL: %s: %s", tc.url, err)
231-
continue
232-
}
233-
user, secret, err := helper.Get(tc.url)
234-
if err != nil {
235-
t.Errorf("Error: failed to read secret for URL %q: %s", tc.url, err)
236-
continue
237-
}
238-
if user != c.Username {
239-
t.Errorf("Error: expected username %s, got username %s for URL: %s", c.Username, user, tc.url)
240-
}
241-
if secret != c.Secret {
242-
t.Errorf("Error: expected secret %s, got secret %s for URL: %s", c.Secret, secret, tc.url)
243-
}
235+
if err := helper.Add(c); err != nil {
236+
t.Fatalf("Error: failed to store secret for URL: %s: %s", tc.url, err)
237+
}
238+
user, secret, err := helper.Get(tc.url)
239+
if err != nil {
240+
t.Fatalf("Error: failed to read secret for URL %q: %s", tc.url, err)
241+
}
242+
if user != c.Username {
243+
t.Errorf("Error: expected username %s, got username %s for URL: %s", c.Username, user, tc.url)
244+
}
245+
if secret != c.Secret {
246+
t.Errorf("Error: expected secret %s, got secret %s for URL: %s", c.Secret, secret, tc.url)
247+
}
248+
})
244249
}
245250
}
246251

0 commit comments

Comments
 (0)