@@ -98,17 +98,19 @@ func TestOSXKeychainHelperRetrieveAliases(t *testing.T) {
98
98
}
99
99
100
100
for _ , tc := range tests {
101
- c := & credentials.Credentials {ServerURL : tc .storeURL , Username : "hello" , Secret : "world" }
102
- if err := helper .Add (c ); err != nil {
103
- t .Errorf ("Error: failed to store secret for URL %q: %s" , tc .storeURL , err )
104
- continue
105
- }
106
- if _ , _ , err := helper .Get (tc .readURL ); err != nil {
107
- t .Errorf ("Error: failed to read secret for URL %q using %q" , tc .storeURL , tc .readURL )
108
- }
109
- if err := helper .Delete (tc .storeURL ); err != nil {
110
- t .Error (err )
111
- }
101
+ tc := tc
102
+ t .Run (tc .doc , func (t * testing.T ) {
103
+ c := & credentials.Credentials {ServerURL : tc .storeURL , Username : "hello" , Secret : "world" }
104
+ if err := helper .Add (c ); err != nil {
105
+ t .Fatalf ("Error: failed to store secret for URL %q: %s" , tc .storeURL , err )
106
+ }
107
+ if _ , _ , err := helper .Get (tc .readURL ); err != nil {
108
+ t .Errorf ("Error: failed to read secret for URL %q using %q" , tc .storeURL , tc .readURL )
109
+ }
110
+ if err := helper .Delete (tc .storeURL ); err != nil {
111
+ t .Error (err )
112
+ }
113
+ })
112
114
}
113
115
}
114
116
@@ -171,17 +173,19 @@ func TestOSXKeychainHelperRetrieveStrict(t *testing.T) {
171
173
}
172
174
173
175
for _ , tc := range tests {
174
- c := & credentials.Credentials {ServerURL : tc .storeURL , Username : "hello" , Secret : "world" }
175
- if err := helper .Add (c ); err != nil {
176
- t .Errorf ("Error: failed to store secret for URL %q: %s" , tc .storeURL , err )
177
- continue
178
- }
179
- if _ , _ , err := helper .Get (tc .readURL ); err == nil {
180
- t .Errorf ("Error: managed to read secret for URL %q using %q, but should not be able to" , tc .storeURL , tc .readURL )
181
- }
182
- if err := helper .Delete (tc .storeURL ); err != nil {
183
- t .Error (err )
184
- }
176
+ tc := tc
177
+ t .Run (tc .doc , func (t * testing.T ) {
178
+ c := & credentials.Credentials {ServerURL : tc .storeURL , Username : "hello" , Secret : "world" }
179
+ if err := helper .Add (c ); err != nil {
180
+ t .Fatalf ("Error: failed to store secret for URL %q: %s" , tc .storeURL , err )
181
+ }
182
+ if _ , _ , err := helper .Get (tc .readURL ); err == nil {
183
+ t .Errorf ("Error: managed to read secret for URL %q using %q, but should not be able to" , tc .storeURL , tc .readURL )
184
+ }
185
+ if err := helper .Delete (tc .storeURL ); err != nil {
186
+ t .Error (err )
187
+ }
188
+ })
185
189
}
186
190
}
187
191
@@ -220,27 +224,28 @@ func TestOSXKeychainHelperStoreRetrieve(t *testing.T) {
220
224
// Note that we don't delete between individual tests here, to verify that
221
225
// subsequent stores/overwrites don't affect storing / retrieving secrets.
222
226
for i , tc := range tests {
223
- c := & credentials.Credentials {
224
- ServerURL : tc .url ,
225
- Username : fmt .Sprintf ("user-%d" , i ),
226
- Secret : fmt .Sprintf ("secret-%d" , i ),
227
- }
227
+ tc := tc
228
+ t .Run (tc .url , func (t * testing.T ) {
229
+ c := & credentials.Credentials {
230
+ ServerURL : tc .url ,
231
+ Username : fmt .Sprintf ("user-%d" , i ),
232
+ Secret : fmt .Sprintf ("secret-%d" , i ),
233
+ }
228
234
229
- if err := helper .Add (c ); err != nil {
230
- t .Errorf ("Error: failed to store secret for URL: %s: %s" , tc .url , err )
231
- continue
232
- }
233
- user , secret , err := helper .Get (tc .url )
234
- if err != nil {
235
- t .Errorf ("Error: failed to read secret for URL %q: %s" , tc .url , err )
236
- continue
237
- }
238
- if user != c .Username {
239
- t .Errorf ("Error: expected username %s, got username %s for URL: %s" , c .Username , user , tc .url )
240
- }
241
- if secret != c .Secret {
242
- t .Errorf ("Error: expected secret %s, got secret %s for URL: %s" , c .Secret , secret , tc .url )
243
- }
235
+ if err := helper .Add (c ); err != nil {
236
+ t .Fatalf ("Error: failed to store secret for URL: %s: %s" , tc .url , err )
237
+ }
238
+ user , secret , err := helper .Get (tc .url )
239
+ if err != nil {
240
+ t .Fatalf ("Error: failed to read secret for URL %q: %s" , tc .url , err )
241
+ }
242
+ if user != c .Username {
243
+ t .Errorf ("Error: expected username %s, got username %s for URL: %s" , c .Username , user , tc .url )
244
+ }
245
+ if secret != c .Secret {
246
+ t .Errorf ("Error: expected secret %s, got secret %s for URL: %s" , c .Secret , secret , tc .url )
247
+ }
248
+ })
244
249
}
245
250
}
246
251
0 commit comments