Skip to content

Commit c271182

Browse files
committed
Fix lint
1 parent 574dbbb commit c271182

File tree

2 files changed

+20
-20
lines changed

2 files changed

+20
-20
lines changed

internal/api/handlers/v0/publish_integration_test.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -98,15 +98,15 @@ func TestPublishIntegration(t *testing.T) {
9898
require.NoError(t, err)
9999

100100
assert.NotEmpty(t, response.ID, "Server ID should be generated")
101-
assert.Equal(t, publishReq.ServerDetail.Name, response.Name)
102-
assert.Equal(t, publishReq.ServerDetail.Description, response.Description)
101+
assert.Equal(t, publishReq.Name, response.Name)
102+
assert.Equal(t, publishReq.Description, response.Description)
103103

104104
// Verify the server was actually published by retrieving it
105105
publishedServer, err := registryService.GetByID(response.ID)
106106
require.NoError(t, err)
107-
assert.Equal(t, publishReq.ServerDetail.Name, publishedServer.Name)
108-
assert.Equal(t, publishReq.ServerDetail.Description, publishedServer.Description)
109-
assert.Equal(t, publishReq.ServerDetail.VersionDetail.Version, publishedServer.VersionDetail.Version)
107+
assert.Equal(t, publishReq.Name, publishedServer.Name)
108+
assert.Equal(t, publishReq.Description, publishedServer.Description)
109+
assert.Equal(t, publishReq.VersionDetail.Version, publishedServer.VersionDetail.Version)
110110
assert.Len(t, publishedServer.Packages, 1)
111111
assert.Len(t, publishedServer.Remotes, 1)
112112
})
@@ -326,8 +326,8 @@ func TestPublishIntegration(t *testing.T) {
326326
// Verify that only the first server was actually stored
327327
retrievedServer, err := registryService.GetByID(firstServerID)
328328
require.NoError(t, err)
329-
assert.Equal(t, firstServerDetail.ServerDetail.Name, retrievedServer.Name)
330-
assert.Equal(t, firstServerDetail.ServerDetail.Description, retrievedServer.Description)
329+
assert.Equal(t, firstServerDetail.Name, retrievedServer.Name)
330+
assert.Equal(t, firstServerDetail.Description, retrievedServer.Description)
331331
})
332332

333333
t.Run("publish succeeds with same name but different version", func(t *testing.T) {
@@ -551,15 +551,15 @@ func TestPublishIntegrationEndToEnd(t *testing.T) {
551551
// Step 4: Verify the server can be retrieved by ID
552552
retrievedServer, err := registryService.GetByID(serverID)
553553
require.NoError(t, err)
554-
assert.Equal(t, publishReq.ServerDetail.Name, retrievedServer.Name)
555-
assert.Equal(t, publishReq.ServerDetail.Description, retrievedServer.Description)
554+
assert.Equal(t, publishReq.Name, retrievedServer.Name)
555+
assert.Equal(t, publishReq.Description, retrievedServer.Description)
556556

557557
// Step 5: Verify the server appears in the list
558558
found := false
559559
for _, server := range updatedServers {
560560
if server.ID == serverID {
561561
found = true
562-
assert.Equal(t, publishReq.ServerDetail.Name, server.Name)
562+
assert.Equal(t, publishReq.Name, server.Name)
563563
break
564564
}
565565
}

internal/api/handlers/v0/publish_test.go

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -138,15 +138,15 @@ func TestPublishEndpoint(t *testing.T) {
138138
name: "missing authorization header",
139139
requestBody: model.PublishRequest{},
140140
authHeader: "",
141-
setupMocks: func(registry *MockRegistryService, authSvc *MockAuthService) {},
141+
setupMocks: func(_ *MockRegistryService, _ *MockAuthService) {},
142142
expectedStatus: http.StatusUnprocessableEntity,
143143
expectedError: "required header parameter is missing",
144144
},
145145
{
146146
name: "invalid authorization header format",
147147
requestBody: model.PublishRequest{},
148148
authHeader: "InvalidFormat",
149-
setupMocks: func(registry *MockRegistryService, authSvc *MockAuthService) {},
149+
setupMocks: func(_ *MockRegistryService, _ *MockAuthService) {},
150150
expectedStatus: http.StatusUnauthorized,
151151
expectedError: "Invalid Authorization header format",
152152
},
@@ -167,7 +167,7 @@ func TestPublishEndpoint(t *testing.T) {
167167
},
168168
},
169169
authHeader: "Bearer token",
170-
setupMocks: func(registry *MockRegistryService, authSvc *MockAuthService) {},
170+
setupMocks: func(_ *MockRegistryService, _ *MockAuthService) {},
171171
expectedStatus: http.StatusBadRequest,
172172
expectedError: "Name is required",
173173
},
@@ -188,7 +188,7 @@ func TestPublishEndpoint(t *testing.T) {
188188
},
189189
},
190190
authHeader: "Bearer token",
191-
setupMocks: func(registry *MockRegistryService, authSvc *MockAuthService) {},
191+
setupMocks: func(_ *MockRegistryService, _ *MockAuthService) {},
192192
expectedStatus: http.StatusBadRequest,
193193
expectedError: "Version is required",
194194
},
@@ -209,7 +209,7 @@ func TestPublishEndpoint(t *testing.T) {
209209
},
210210
},
211211
authHeader: "Bearer token",
212-
setupMocks: func(registry *MockRegistryService, authSvc *MockAuthService) {
212+
setupMocks: func(_ *MockRegistryService, authSvc *MockAuthService) {
213213
authSvc.On("ValidateAuth", mock.Anything, mock.Anything).Return(false, auth.ErrAuthRequired)
214214
},
215215
expectedStatus: http.StatusUnauthorized,
@@ -232,7 +232,7 @@ func TestPublishEndpoint(t *testing.T) {
232232
},
233233
},
234234
authHeader: "Bearer invalid_token",
235-
setupMocks: func(registry *MockRegistryService, authSvc *MockAuthService) {
235+
setupMocks: func(_ *MockRegistryService, authSvc *MockAuthService) {
236236
authSvc.On("ValidateAuth", mock.Anything, mock.Anything).Return(false, nil)
237237
},
238238
expectedStatus: http.StatusUnauthorized,
@@ -266,7 +266,7 @@ func TestPublishEndpoint(t *testing.T) {
266266
name: "method not allowed",
267267
requestBody: nil,
268268
authHeader: "",
269-
setupMocks: func(registry *MockRegistryService, authSvc *MockAuthService) {},
269+
setupMocks: func(_ *MockRegistryService, _ *MockAuthService) {},
270270
expectedStatus: http.StatusMethodNotAllowed,
271271
expectedError: "Method Not Allowed",
272272
},
@@ -366,7 +366,7 @@ func TestPublishEndpoint(t *testing.T) {
366366
if tc.name == "method not allowed" {
367367
method = http.MethodGet
368368
}
369-
req, err := http.NewRequest(method, "/v0/publish", bytes.NewBuffer(requestBody))
369+
req, err := http.NewRequestWithContext(context.Background(), method, "/v0/publish", bytes.NewBuffer(requestBody))
370370
assert.NoError(t, err)
371371
if method == http.MethodPost {
372372
req.Header.Set("Content-Type", "application/json")
@@ -454,7 +454,7 @@ func TestPublishEndpointBearerTokenParsing(t *testing.T) {
454454
requestBody, err := json.Marshal(serverDetail)
455455
assert.NoError(t, err)
456456

457-
req, err := http.NewRequest(http.MethodPost, "/v0/publish", bytes.NewBuffer(requestBody))
457+
req, err := http.NewRequestWithContext(context.Background(), http.MethodPost, "/v0/publish", bytes.NewBuffer(requestBody))
458458
assert.NoError(t, err)
459459
req.Header.Set("Authorization", tc.authHeader)
460460
req.Header.Set("Content-Type", "application/json")
@@ -524,7 +524,7 @@ func TestPublishEndpointAuthMethodSelection(t *testing.T) {
524524
requestBody, err := json.Marshal(serverDetail)
525525
assert.NoError(t, err)
526526

527-
req, err := http.NewRequest(http.MethodPost, "/v0/publish", bytes.NewBuffer(requestBody))
527+
req, err := http.NewRequestWithContext(context.Background(), http.MethodPost, "/v0/publish", bytes.NewBuffer(requestBody))
528528
assert.NoError(t, err)
529529
req.Header.Set("Authorization", "Bearer test_token")
530530
req.Header.Set("Content-Type", "application/json")

0 commit comments

Comments
 (0)