Skip to content

Commit 251fdad

Browse files
committed
resolved comments
1 parent ee136df commit 251fdad

File tree

1 file changed

+16
-13
lines changed

1 file changed

+16
-13
lines changed

confmap/provider/googlesecretmanagerprovider/provider_test.go

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,16 +15,13 @@ import (
1515
"google.golang.org/grpc/codes"
1616
)
1717

18-
var validSecrets = map[string]string{
19-
"projects/my-project/secrets/secret-1/versions/1": "secret-1",
20-
"projects/my-project/secrets/secret-2/versions/1": "secret-2",
21-
}
22-
2318
// Define a mock secretsManagerClient for testing
24-
type mockSecretsManagerClient struct{}
19+
type mockSecretsManagerClient struct {
20+
validSecrets map[string]string
21+
}
2522

2623
func (m *mockSecretsManagerClient) AccessSecretVersion(ctx context.Context, req *secretmanagerpb.AccessSecretVersionRequest, opts ...gax.CallOption) (*secretmanagerpb.AccessSecretVersionResponse, error) {
27-
secretString, ok := validSecrets[req.Name]
24+
secretString, ok := m.validSecrets[req.Name]
2825
if !ok {
2926
return nil, fmt.Errorf("secrets entry does not exist, error code: %v", codes.NotFound)
3027
}
@@ -47,10 +44,12 @@ func TestProvider_Retrieve_Success(t *testing.T) {
4744
wantSecret string
4845
}{
4946
{
50-
name: "Happy path: valid uri, secret entry exists and is accessible",
51-
uri: schemeName + ":projects/my-project/secrets/secret-1/versions/1",
52-
testSecretManager: &mockSecretsManagerClient{},
53-
wantSecret: "secret-1",
47+
name: "Happy path: valid uri, secret entry exists and is accessible",
48+
uri: schemeName + ":projects/my-project/secrets/secret-1/versions/1",
49+
testSecretManager: &mockSecretsManagerClient{validSecrets: map[string]string{
50+
"projects/my-project/secrets/secret-1/versions/1": "secret-1",
51+
}},
52+
wantSecret: "secret-1",
5453
},
5554
}
5655

@@ -76,7 +75,7 @@ func TestProvider_Retrieve_Failure(t *testing.T) {
7675
}{
7776
{
7877
name: "Invalid scheme",
79-
uri: "invalidscheme" + ":projects/my-project/secrets/test-secret-id/versions/1",
78+
uri: "invalidscheme:projects/my-project/secrets/test-secret-id/versions/1",
8079
},
8180
{
8281
name: "secret entry does not exist in the secret manager",
@@ -91,7 +90,11 @@ func TestProvider_Retrieve_Failure(t *testing.T) {
9190
for _, tc := range tests {
9291
t.Run(tc.name, func(t *testing.T) {
9392
testProvider := &provider{
94-
client: &mockSecretsManagerClient{},
93+
client: &mockSecretsManagerClient{
94+
validSecrets: map[string]string{
95+
"projects/my-project/secrets/secret-1/versions/1": "secret-1",
96+
},
97+
},
9598
}
9699
_, err := testProvider.Retrieve(context.Background(), tc.uri, nil)
97100
require.Error(t, err)

0 commit comments

Comments
 (0)