Resolved linting issues

This commit is contained in:
MohitKatare-protean
2025-05-20 12:10:58 +05:30
parent 63e1bc44d9
commit 019b526b6f
3 changed files with 17 additions and 70 deletions

View File

@@ -9,9 +9,7 @@ import (
)
// keyManagerProvider implements the plugin provider for the KeyManager plugin.
type keyManagerProvider struct {
newFunc func(ctx context.Context, cache definition.Cache, registry definition.RegistryLookup, cfg *keymanager.Config) (definition.KeyManager, func() error, error)
}
type keyManagerProvider struct{}
// newKeyManagerFunc is a function type that creates a new KeyManager instance.
var newKeyManagerFunc = keymanager.New

View File

@@ -11,43 +11,6 @@ import (
"github.com/beckn/beckn-onix/pkg/plugin/implementation/keymanager"
)
// Mock KeyManager implementation
type mockKeyManager struct{}
func (m *mockKeyManager) SigningPublicKey(ctx context.Context, subscriberID, keyID string) (string, error) {
return "mock-signing-public-key", nil
}
func (m *mockKeyManager) SigningPrivateKey(ctx context.Context, subscriberID string) (string, string, error) {
return "mock-key-id", "mock-signing-private-key", nil
}
func (m *mockKeyManager) EncrPublicKey(ctx context.Context, subscriberID, keyID string) (string, error) {
return "mock-encryption-public-key", nil
}
func (m *mockKeyManager) EncrPrivateKey(ctx context.Context, subscriberID string) (string, string, error) {
return "mock-key-id", "mock-encryption-private-key", nil
}
func (m *mockKeyManager) DeletePrivateKeys(ctx context.Context, subscriberID string) error {
return nil
}
func (m *mockKeyManager) StorePrivateKeys(ctx context.Context, subscriberID string, keys *model.Keyset) error {
return nil
}
func (m *mockKeyManager) GenerateKeyPairs() (*model.Keyset, error) {
return &model.Keyset{
UniqueKeyID: "mock-key-id",
SigningPrivate: "mock-signing-private-key",
SigningPublic: "mock-signing-public-key",
EncrPrivate: "mock-encryption-private-key",
EncrPublic: "mock-encryption-public-key",
}, nil
}
type mockRegistry struct {
LookupFunc func(ctx context.Context, sub *model.Subscription) ([]model.Subscription, error)
}

View File

@@ -220,33 +220,6 @@ func TestGenerateKeyPairs(t *testing.T) {
}
}
type mockLogical struct {
writeFn func(path string, data map[string]interface{}) (*vault.Secret, error)
}
func (m *mockLogical) Write(path string, data map[string]interface{}) (*vault.Secret, error) {
return m.writeFn(path, data)
}
type mockClient struct {
*vault.Client
setTokenFn func(string)
logicalFn func() *vault.Logical
}
func (m *mockClient) SetToken(token string) {
if m.setTokenFn != nil {
m.setTokenFn(token)
}
}
func (m *mockClient) Logical() *vault.Logical {
if m.logicalFn != nil {
return m.logicalFn()
}
return &vault.Logical{}
}
func TestGetVaultClient_Failures(t *testing.T) {
originalNewVaultClient := NewVaultClient
defer func() { NewVaultClient = originalNewVaultClient }()
@@ -297,7 +270,9 @@ func TestGetVaultClient_Failures(t *testing.T) {
return httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
w.WriteHeader(http.StatusOK)
w.Header().Set("Content-Type", "application/json")
io.WriteString(w, `{ "auth": null }`)
if _, err := io.WriteString(w, `{ "auth": null }`); err != nil {
t.Fatalf("failed to write response: %v", err)
}
}))
},
expectErr: "AppRole login failed: no auth info returned",
@@ -353,6 +328,13 @@ func TestGetVaultClient_Success(t *testing.T) {
"client_token": "mock-token"
}
}`)
if _, err := io.WriteString(w, `{
"auth": {
"client_token": "mock-token"
}
}`); err != nil {
t.Fatalf("failed to write response: %v", err)
}
}))
defer server.Close()
@@ -809,7 +791,9 @@ func setupMockVaultServer(t *testing.T, kvVersion, keyID string, success bool) *
}
}`, keyID)
w.Header().Set("Content-Type", "application/json")
w.Write([]byte(resp))
if _, err := w.Write([]byte(resp)); err != nil {
t.Fatalf("failed to write response: %v", err)
}
} else {
resp := fmt.Sprintf(`{
"data": {
@@ -821,7 +805,9 @@ func setupMockVaultServer(t *testing.T, kvVersion, keyID string, success bool) *
}
}`, keyID)
w.Header().Set("Content-Type", "application/json")
w.Write([]byte(resp))
if _, err := w.Write([]byte(resp)); err != nil {
t.Fatalf("failed to write response: %v", err)
}
}
})