Skip to content

Commit b0d5db6

Browse files
committed
removed not used code
On-behalf-of: @SAP [email protected] Signed-off-by: Artem Shcherbatiuk <[email protected]>
1 parent 6db037a commit b0d5db6

File tree

8 files changed

+16
-566
lines changed

8 files changed

+16
-566
lines changed

listener/reconciler/clusteraccess/config_builder_test.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ import (
1414
"sigs.k8s.io/controller-runtime/pkg/client"
1515

1616
gatewayv1alpha1 "github.com/openmfp/kubernetes-graphql-gateway/common/apis/v1alpha1"
17+
"github.com/openmfp/kubernetes-graphql-gateway/common/auth"
1718
"github.com/openmfp/kubernetes-graphql-gateway/common/mocks"
1819
"github.com/openmfp/kubernetes-graphql-gateway/listener/reconciler/clusteraccess"
1920
)
@@ -304,7 +305,7 @@ func TestExtractCAData(t *testing.T) {
304305
mockClient := mocks.NewMockClient(t)
305306
tt.mockSetup(mockClient)
306307

307-
got, err := clusteraccess.ExtractCAData(t.Context(), tt.ca, mockClient)
308+
got, err := auth.ExtractCAData(t.Context(), tt.ca, mockClient)
308309

309310
if tt.wantErr {
310311
assert.Error(t, err)

listener/reconciler/clusteraccess/export_test.go

Lines changed: 1 addition & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -3,59 +3,13 @@ package clusteraccess
33
import (
44
"context"
55

6-
"k8s.io/client-go/rest"
7-
"k8s.io/client-go/tools/clientcmd/api"
86
"sigs.k8s.io/controller-runtime/pkg/client"
97

108
"github.com/openmfp/golang-commons/logger"
119
gatewayv1alpha1 "github.com/openmfp/kubernetes-graphql-gateway/common/apis/v1alpha1"
12-
"github.com/openmfp/kubernetes-graphql-gateway/common/auth"
1310
)
1411

15-
// Exported functions for testing private functions
16-
17-
// Config builder exports
18-
// ExtractCAData exposes the common auth ExtractCAData function for testing
19-
func ExtractCAData(ctx context.Context, ca *gatewayv1alpha1.CAConfig, k8sClient client.Client) ([]byte, error) {
20-
return auth.ExtractCAData(ctx, ca, k8sClient)
21-
}
22-
23-
// ConfigureAuthentication exposes the common auth ConfigureAuthentication function for testing
24-
func ConfigureAuthentication(ctx context.Context, config *rest.Config, authConfig *gatewayv1alpha1.AuthConfig, k8sClient client.Client) error {
25-
return auth.ConfigureAuthentication(ctx, config, authConfig, k8sClient)
26-
}
27-
28-
func ExtractAuthFromKubeconfig(config *rest.Config, authInfo *api.AuthInfo) error {
29-
return auth.ExtractAuthFromKubeconfig(config, authInfo)
30-
}
31-
3212
// Metadata injector exports - now all delegated to common auth package
33-
func InjectClusterMetadata(ctx context.Context, schemaJSON []byte, clusterAccess gatewayv1alpha1.ClusterAccess, k8sClient client.Client, log logger.Logger) ([]byte, error) {
13+
func InjectClusterMetadata(ctx context.Context, schemaJSON []byte, clusterAccess gatewayv1alpha1.ClusterAccess, k8sClient client.Client, log *logger.Logger) ([]byte, error) {
3414
return injectClusterMetadata(ctx, schemaJSON, clusterAccess, k8sClient, log)
3515
}
36-
37-
// The following functions are now part of the common auth package
38-
// and can be accessed directly from there for testing if needed
39-
40-
// Subroutines exports
41-
type GenerateSchemaSubroutine = generateSchemaSubroutine
42-
43-
func NewGenerateSchemaSubroutine(reconciler *ExportedClusterAccessReconciler) *GenerateSchemaSubroutine {
44-
return &generateSchemaSubroutine{reconciler: reconciler}
45-
}
46-
47-
// Type and constant exports
48-
type ExportedCRDStatus = CRDStatus
49-
type ExportedClusterAccessReconciler = ClusterAccessReconciler
50-
type ClusterAccessReconcilerPublic = ClusterAccessReconciler
51-
52-
const (
53-
ExportedCRDNotRegistered = CRDNotRegistered
54-
ExportedCRDRegistered = CRDRegistered
55-
)
56-
57-
// Error exports
58-
var (
59-
ExportedErrCRDNotRegistered = ErrCRDNotRegistered
60-
ExportedErrCRDCheckFailed = ErrCRDCheckFailed
61-
)

listener/reconciler/clusteraccess/export_test_integration.go

Lines changed: 0 additions & 25 deletions
This file was deleted.

listener/reconciler/clusteraccess/metadata_injector.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ import (
1010
"github.com/openmfp/kubernetes-graphql-gateway/common/auth"
1111
)
1212

13-
func injectClusterMetadata(ctx context.Context, schemaJSON []byte, clusterAccess gatewayv1alpha1.ClusterAccess, k8sClient client.Client, log logger.Logger) ([]byte, error) {
13+
func injectClusterMetadata(ctx context.Context, schemaJSON []byte, clusterAccess gatewayv1alpha1.ClusterAccess, k8sClient client.Client, log *logger.Logger) ([]byte, error) {
1414
// Determine the path
1515
path := clusterAccess.Spec.Path
1616
if path == "" {
@@ -26,5 +26,5 @@ func injectClusterMetadata(ctx context.Context, schemaJSON []byte, clusterAccess
2626
}
2727

2828
// Use the common metadata injection function
29-
return auth.InjectClusterMetadata(ctx, schemaJSON, config, k8sClient, &log)
29+
return auth.InjectClusterMetadata(ctx, schemaJSON, config, k8sClient, log)
3030
}

listener/reconciler/clusteraccess/metadata_injector_test.go

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -217,7 +217,7 @@ func TestInjectClusterMetadata(t *testing.T) {
217217
mockClient := mocks.NewMockClient(t)
218218
tt.mockSetup(mockClient)
219219

220-
result, err := clusteraccess.InjectClusterMetadata(t.Context(), tt.schemaJSON, tt.clusterAccess, mockClient, *mockLogger)
220+
result, err := clusteraccess.InjectClusterMetadata(t.Context(), tt.schemaJSON, tt.clusterAccess, mockClient, mockLogger)
221221

222222
if tt.wantErr {
223223
assert.Error(t, err)
@@ -253,7 +253,8 @@ func TestInjectClusterMetadata(t *testing.T) {
253253
}
254254

255255
func TestInjectClusterMetadata_PathLogic(t *testing.T) {
256-
mockLogger, _ := logger.New(logger.DefaultConfig())
256+
mockLogger, err := logger.New(logger.DefaultConfig())
257+
require.NoError(t, err)
257258
mockClient := mocks.NewMockClient(t)
258259
schemaJSON := []byte(`{"openapi": "3.0.0", "info": {"title": "Test"}}`)
259260

@@ -266,7 +267,7 @@ func TestInjectClusterMetadata_PathLogic(t *testing.T) {
266267
},
267268
}
268269

269-
result, err := clusteraccess.InjectClusterMetadata(t.Context(), schemaJSON, clusterAccess, mockClient, *mockLogger)
270+
result, err := clusteraccess.InjectClusterMetadata(t.Context(), schemaJSON, clusterAccess, mockClient, mockLogger)
270271
require.NoError(t, err)
271272

272273
var resultData map[string]interface{}
@@ -286,7 +287,7 @@ func TestInjectClusterMetadata_PathLogic(t *testing.T) {
286287
},
287288
}
288289

289-
result, err := clusteraccess.InjectClusterMetadata(t.Context(), schemaJSON, clusterAccess, mockClient, *mockLogger)
290+
result, err := clusteraccess.InjectClusterMetadata(t.Context(), schemaJSON, clusterAccess, mockClient, mockLogger)
290291
require.NoError(t, err)
291292

292293
var resultData map[string]interface{}

listener/reconciler/clusteraccess/reconciler_test.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ func TestCheckClusterAccessCRDStatus(t *testing.T) {
2424
tests := []struct {
2525
name string
2626
mockSetup func(*mocks.MockClient)
27-
want clusteraccess.ExportedCRDStatus
27+
want clusteraccess.CRDStatus
2828
wantErr bool
2929
}{
3030
{
@@ -44,7 +44,7 @@ func TestCheckClusterAccessCRDStatus(t *testing.T) {
4444
return nil
4545
}).Once()
4646
},
47-
want: clusteraccess.ExportedCRDRegistered,
47+
want: clusteraccess.CRDRegistered,
4848
wantErr: false,
4949
},
5050

@@ -60,7 +60,7 @@ func TestCheckClusterAccessCRDStatus(t *testing.T) {
6060
},
6161
}).Once()
6262
},
63-
want: clusteraccess.ExportedCRDNotRegistered,
63+
want: clusteraccess.CRDNotRegistered,
6464
wantErr: false,
6565
},
6666
{
@@ -69,7 +69,7 @@ func TestCheckClusterAccessCRDStatus(t *testing.T) {
6969
m.EXPECT().List(mock.Anything, mock.AnythingOfType("*v1alpha1.ClusterAccessList")).
7070
Return(errors.New("API server connection failed")).Once()
7171
},
72-
want: clusteraccess.ExportedCRDNotRegistered,
72+
want: clusteraccess.CRDNotRegistered,
7373
wantErr: false,
7474
},
7575
}
@@ -114,7 +114,7 @@ func TestCreateMultiClusterReconciler(t *testing.T) {
114114

115115
func TestConstants(t *testing.T) {
116116
t.Run("error_variables", func(t *testing.T) {
117-
assert.Equal(t, "ClusterAccess CRD not registered", clusteraccess.ExportedErrCRDNotRegistered.Error())
118-
assert.Equal(t, "failed to check ClusterAccess CRD status", clusteraccess.ExportedErrCRDCheckFailed.Error())
117+
assert.Equal(t, "ClusterAccess CRD not registered", clusteraccess.ErrCRDNotRegistered.Error())
118+
assert.Equal(t, "failed to check ClusterAccess CRD status", clusteraccess.ErrCRDCheckFailed.Error())
119119
})
120120
}

listener/reconciler/clusteraccess/subroutines.go

Lines changed: 0 additions & 105 deletions
This file was deleted.

0 commit comments

Comments
 (0)