@@ -82,15 +82,19 @@ func TestOSXKeychainHelperRetrieveAliases(t *testing.T) {
82
82
}
83
83
84
84
helper := Osxkeychain {}
85
- defer func () {
85
+ t . Cleanup ( func () {
86
86
for _ , tc := range tests {
87
- helper .Delete (tc .storeURL )
87
+ if err := helper .Delete (tc .storeURL ); err != nil && ! credentials .IsErrCredentialsNotFound (err ) {
88
+ t .Errorf ("cleanup: failed to delete '%s': %v" , tc .storeURL , err )
89
+ }
88
90
}
89
- }( )
91
+ })
90
92
91
93
// Clean store before testing.
92
94
for _ , tc := range tests {
93
- helper .Delete (tc .storeURL )
95
+ if err := helper .Delete (tc .storeURL ); err != nil && ! credentials .IsErrCredentialsNotFound (err ) {
96
+ t .Errorf ("prepare: failed to delete '%s': %v" , tc .storeURL , err )
97
+ }
94
98
}
95
99
96
100
for _ , tc := range tests {
@@ -102,7 +106,9 @@ func TestOSXKeychainHelperRetrieveAliases(t *testing.T) {
102
106
if _ , _ , err := helper .Get (tc .readURL ); err != nil {
103
107
t .Errorf ("Error: failed to read secret for URL %q using %q" , tc .storeURL , tc .readURL )
104
108
}
105
- helper .Delete (tc .storeURL )
109
+ if err := helper .Delete (tc .storeURL ); err != nil {
110
+ t .Error (err )
111
+ }
106
112
}
107
113
}
108
114
@@ -149,15 +155,19 @@ func TestOSXKeychainHelperRetrieveStrict(t *testing.T) {
149
155
}
150
156
151
157
helper := Osxkeychain {}
152
- defer func () {
158
+ t . Cleanup ( func () {
153
159
for _ , tc := range tests {
154
- helper .Delete (tc .storeURL )
160
+ if err := helper .Delete (tc .storeURL ); err != nil && ! credentials .IsErrCredentialsNotFound (err ) {
161
+ t .Errorf ("cleanup: failed to delete '%s': %v" , tc .storeURL , err )
162
+ }
155
163
}
156
- }( )
164
+ })
157
165
158
166
// Clean store before testing.
159
167
for _ , tc := range tests {
160
- helper .Delete (tc .storeURL )
168
+ if err := helper .Delete (tc .storeURL ); err != nil && ! credentials .IsErrCredentialsNotFound (err ) {
169
+ t .Errorf ("prepare: failed to delete '%s': %v" , tc .storeURL , err )
170
+ }
161
171
}
162
172
163
173
for _ , tc := range tests {
@@ -169,7 +179,9 @@ func TestOSXKeychainHelperRetrieveStrict(t *testing.T) {
169
179
if _ , _ , err := helper .Get (tc .readURL ); err == nil {
170
180
t .Errorf ("Error: managed to read secret for URL %q using %q, but should not be able to" , tc .storeURL , tc .readURL )
171
181
}
172
- helper .Delete (tc .storeURL )
182
+ if err := helper .Delete (tc .storeURL ); err != nil {
183
+ t .Error (err )
184
+ }
173
185
}
174
186
}
175
187
@@ -190,15 +202,19 @@ func TestOSXKeychainHelperStoreRetrieve(t *testing.T) {
190
202
}
191
203
192
204
helper := Osxkeychain {}
193
- defer func () {
205
+ t . Cleanup ( func () {
194
206
for _ , tc := range tests {
195
- helper .Delete (tc .url )
207
+ if err := helper .Delete (tc .url ); err != nil && ! credentials .IsErrCredentialsNotFound (err ) {
208
+ t .Errorf ("cleanup: failed to delete '%s': %v" , tc .url , err )
209
+ }
196
210
}
197
- }( )
211
+ })
198
212
199
213
// Clean store before testing.
200
214
for _ , tc := range tests {
201
- helper .Delete (tc .url )
215
+ if err := helper .Delete (tc .url ); err != nil && ! credentials .IsErrCredentialsNotFound (err ) {
216
+ t .Errorf ("prepare: failed to delete '%s': %v" , tc .url , err )
217
+ }
202
218
}
203
219
204
220
// Note that we don't delete between individual tests here, to verify that
0 commit comments