mirror of
https://github.com/vmware-tanzu/pinniped.git
synced 2026-01-05 04:56:11 +00:00
Move all mock files into internal/mocks and use mock prefix
This commit is contained in:
@@ -11,7 +11,7 @@ import (
|
||||
"github.com/stretchr/testify/require"
|
||||
"go.uber.org/mock/gomock"
|
||||
|
||||
"go.pinniped.dev/internal/mocks/issuermocks"
|
||||
"go.pinniped.dev/internal/mocks/mockissuer"
|
||||
)
|
||||
|
||||
func TestName(t *testing.T) {
|
||||
@@ -30,7 +30,7 @@ func TestName(t *testing.T) {
|
||||
{
|
||||
name: "foo issuer",
|
||||
buildIssuerMocks: func() ClientCertIssuers {
|
||||
fooClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
fooClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
fooClientCertIssuer.EXPECT().Name().Return("foo")
|
||||
|
||||
return ClientCertIssuers{fooClientCertIssuer}
|
||||
@@ -40,10 +40,10 @@ func TestName(t *testing.T) {
|
||||
{
|
||||
name: "foo and bar issuers",
|
||||
buildIssuerMocks: func() ClientCertIssuers {
|
||||
fooClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
fooClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
fooClientCertIssuer.EXPECT().Name().Return("foo")
|
||||
|
||||
barClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
barClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
barClientCertIssuer.EXPECT().Name().Return("bar")
|
||||
|
||||
return ClientCertIssuers{fooClientCertIssuer, barClientCertIssuer}
|
||||
@@ -81,7 +81,7 @@ func TestIssueClientCertPEM(t *testing.T) {
|
||||
{
|
||||
name: "issuers with error",
|
||||
buildIssuerMocks: func() ClientCertIssuers {
|
||||
errClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
errClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
errClientCertIssuer.EXPECT().Name().Return("error cert issuer")
|
||||
errClientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM("username", []string{"group1", "group2"}, 32*time.Second).
|
||||
@@ -93,7 +93,7 @@ func TestIssueClientCertPEM(t *testing.T) {
|
||||
{
|
||||
name: "valid issuer",
|
||||
buildIssuerMocks: func() ClientCertIssuers {
|
||||
validClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
validClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
validClientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM("username", []string{"group1", "group2"}, 32*time.Second).
|
||||
Return([]byte("cert"), []byte("key"), nil)
|
||||
@@ -105,13 +105,13 @@ func TestIssueClientCertPEM(t *testing.T) {
|
||||
{
|
||||
name: "fallthrough issuer",
|
||||
buildIssuerMocks: func() ClientCertIssuers {
|
||||
errClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
errClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
errClientCertIssuer.EXPECT().Name().Return("error cert issuer")
|
||||
errClientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM("username", []string{"group1", "group2"}, 32*time.Second).
|
||||
Return(nil, nil, errors.New("error from wrapped cert issuer"))
|
||||
|
||||
validClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
validClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
validClientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM("username", []string{"group1", "group2"}, 32*time.Second).
|
||||
Return([]byte("cert"), []byte("key"), nil)
|
||||
@@ -126,13 +126,13 @@ func TestIssueClientCertPEM(t *testing.T) {
|
||||
{
|
||||
name: "multiple error issuers",
|
||||
buildIssuerMocks: func() ClientCertIssuers {
|
||||
err1ClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
err1ClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
err1ClientCertIssuer.EXPECT().Name().Return("error1 cert issuer")
|
||||
err1ClientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM("username", []string{"group1", "group2"}, 32*time.Second).
|
||||
Return(nil, nil, errors.New("error1 from wrapped cert issuer"))
|
||||
|
||||
err2ClientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
err2ClientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
err2ClientCertIssuer.EXPECT().Name().Return("error2 cert issuer")
|
||||
err2ClientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM("username", []string{"group1", "group2"}, 32*time.Second).
|
||||
|
||||
@@ -32,11 +32,11 @@ import (
|
||||
conciergeconfigv1alpha1 "go.pinniped.dev/generated/latest/apis/concierge/config/v1alpha1"
|
||||
conciergefake "go.pinniped.dev/generated/latest/client/concierge/clientset/versioned/fake"
|
||||
conciergeinformers "go.pinniped.dev/generated/latest/client/concierge/informers/externalversions"
|
||||
"go.pinniped.dev/internal/controller/kubecertagent/mocks"
|
||||
"go.pinniped.dev/internal/controllerinit"
|
||||
"go.pinniped.dev/internal/controllerlib"
|
||||
"go.pinniped.dev/internal/here"
|
||||
"go.pinniped.dev/internal/kubeclient"
|
||||
mocks "go.pinniped.dev/internal/mocks/mockkubecertagent"
|
||||
"go.pinniped.dev/internal/plog"
|
||||
"go.pinniped.dev/internal/testutil"
|
||||
"go.pinniped.dev/test/testlib"
|
||||
|
||||
@@ -26,8 +26,8 @@ import (
|
||||
|
||||
loginapi "go.pinniped.dev/generated/latest/apis/concierge/login"
|
||||
"go.pinniped.dev/internal/clientcertissuer"
|
||||
"go.pinniped.dev/internal/mocks/credentialrequestmocks"
|
||||
"go.pinniped.dev/internal/mocks/issuermocks"
|
||||
"go.pinniped.dev/internal/mocks/mockcredentialrequest"
|
||||
"go.pinniped.dev/internal/mocks/mockissuer"
|
||||
"go.pinniped.dev/internal/testutil"
|
||||
)
|
||||
|
||||
@@ -89,14 +89,14 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateSucceedsWhenGivenATokenAndTheWebhookAuthenticatesTheToken", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req).
|
||||
Return(&user.DefaultInfo{
|
||||
Name: "test-user",
|
||||
Groups: []string{"test-group-1", "test-group-2"},
|
||||
}, nil)
|
||||
|
||||
clientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
clientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
clientCertIssuer.EXPECT().IssueClientCertPEM(
|
||||
"test-user",
|
||||
[]string{"test-group-1", "test-group-2"},
|
||||
@@ -130,14 +130,14 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateFailsWithValidTokenWhenCertIssuerFails", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req).
|
||||
Return(&user.DefaultInfo{
|
||||
Name: "test-user",
|
||||
Groups: []string{"test-group-1", "test-group-2"},
|
||||
}, nil)
|
||||
|
||||
clientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
clientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
clientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM(gomock.Any(), gomock.Any(), gomock.Any()).
|
||||
Return(nil, nil, fmt.Errorf("some certificate authority error"))
|
||||
@@ -152,7 +152,7 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateSucceedsWithAnUnauthenticatedStatusWhenGivenATokenAndTheWebhookReturnsNilUser", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req).Return(nil, nil)
|
||||
|
||||
storage := NewREST(requestAuthenticator, nil, schema.GroupResource{})
|
||||
@@ -166,7 +166,7 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateSucceedsWithAnUnauthenticatedStatusWhenWebhookFails", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req).
|
||||
Return(nil, errors.New("some webhook error"))
|
||||
|
||||
@@ -181,7 +181,7 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateSucceedsWithAnUnauthenticatedStatusWhenWebhookReturnsAnEmptyUsername", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req).
|
||||
Return(&user.DefaultInfo{Name: ""}, nil)
|
||||
|
||||
@@ -196,7 +196,7 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateSucceedsWithAnUnauthenticatedStatusWhenWebhookReturnsAUserWithUID", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req).
|
||||
Return(&user.DefaultInfo{
|
||||
Name: "test-user",
|
||||
@@ -215,7 +215,7 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateSucceedsWithAnUnauthenticatedStatusWhenWebhookReturnsAUserWithExtra", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req).
|
||||
Return(&user.DefaultInfo{
|
||||
Name: "test-user",
|
||||
@@ -271,7 +271,7 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateDoesNotAllowValidationFunctionToMutateRequest", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req.DeepCopy()).
|
||||
Return(&user.DefaultInfo{Name: "test-user"}, nil)
|
||||
|
||||
@@ -292,7 +292,7 @@ func TestCreate(t *testing.T) {
|
||||
it("CreateDoesNotAllowValidationFunctionToSeeTheActualRequestToken", func() {
|
||||
req := validCredentialRequest()
|
||||
|
||||
requestAuthenticator := credentialrequestmocks.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator := mockcredentialrequest.NewMockTokenCredentialRequestAuthenticator(ctrl)
|
||||
requestAuthenticator.EXPECT().AuthenticateTokenCredentialRequest(gomock.Any(), req.DeepCopy()).
|
||||
Return(&user.DefaultInfo{Name: "test-user"}, nil)
|
||||
|
||||
@@ -398,7 +398,7 @@ func requireSuccessfulResponseWithAuthenticationFailureMessage(t *testing.T, err
|
||||
}
|
||||
|
||||
func successfulIssuer(ctrl *gomock.Controller) clientcertissuer.ClientCertIssuer {
|
||||
clientCertIssuer := issuermocks.NewMockClientCertIssuer(ctrl)
|
||||
clientCertIssuer := mockissuer.NewMockClientCertIssuer(ctrl)
|
||||
clientCertIssuer.EXPECT().
|
||||
IssueClientCertPEM(gomock.Any(), gomock.Any(), gomock.Any()).
|
||||
Return([]byte("test-cert"), []byte("test-key"), nil)
|
||||
|
||||
Reference in New Issue
Block a user