| Conditions | 20 | 
| Total Lines | 125 | 
| Code Lines | 93 | 
| Lines | 0 | 
| Ratio | 0 % | 
| Changes | 0 | ||
Small methods make your code easier to understand, in particular if combined with a good name. Besides, if your method is small, finding a good name is usually much easier.
For example, if you find yourself adding comments to a method's body, this is usually a good sign to extract the commented part to a new method, and use the comment as a starting point when coming up with a good name for this new method.
Commonly applied refactorings include:
If many parameters/temporary variables are present:
Complex classes like credentials.Test_EcsRAmRoleCredentialEnableIMDSv2 often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
| 1 | package credentials | ||
| 146 | func Test_EcsRAmRoleCredentialEnableIMDSv2(t *testing.T) { | ||
| 147 | 	auth := newEcsRAMRoleCredentialWithEnableIMDSv2("go sdk", false, 0, 0.5, nil) | ||
| 148 | origTestHookDo := hookDo | ||
| 149 | 	defer func() { hookDo = origTestHookDo }() | ||
| 150 | |||
| 151 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 152 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 153 | 			return mockResponse(300, ``, errors.New("sdk test")) | ||
| 154 | } | ||
| 155 | } | ||
| 156 | accesskeyId, err := auth.GetAccessKeyId() | ||
| 157 | assert.NotNil(t, err) | ||
| 158 | assert.Equal(t, "refresh Ecs sts token err: sdk test", err.Error()) | ||
| 159 | assert.Nil(t, accesskeyId) | ||
| 160 | |||
| 161 | 	auth = newEcsRAMRoleCredentialWithEnableIMDSv2("go sdk", true, 0, 0.5, nil) | ||
| 162 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 163 | assert.NotNil(t, err) | ||
| 164 | assert.Equal(t, "failed to get token from ECS Metadata Service: sdk test", err.Error()) | ||
| 165 | assert.Nil(t, accesskeyId) | ||
| 166 | |||
| 167 | 	auth = newEcsRAMRoleCredentialWithEnableIMDSv2("go sdk", true, 180, 0.5, nil) | ||
| 168 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 169 | assert.NotNil(t, err) | ||
| 170 | assert.Equal(t, "failed to get token from ECS Metadata Service: sdk test", err.Error()) | ||
| 171 | assert.Nil(t, accesskeyId) | ||
| 172 | |||
| 173 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 174 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 175 | return mockResponse(300, ``, nil) | ||
| 176 | } | ||
| 177 | } | ||
| 178 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 179 | assert.NotNil(t, err) | ||
| 180 | assert.Equal(t, "failed to get token from ECS Metadata Service: httpStatus: 300, message = ", err.Error()) | ||
| 181 | assert.Nil(t, accesskeyId) | ||
| 182 | |||
| 183 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 184 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 185 | return mockResponse(400, `role`, nil) | ||
| 186 | } | ||
| 187 | } | ||
| 188 | auth.RoleName = "" | ||
| 189 | _, err = auth.GetAccessKeyId() | ||
| 190 | assert.NotNil(t, err) | ||
| 191 | assert.Equal(t, "refresh Ecs sts token err: httpStatus: 400, message = role", err.Error()) | ||
| 192 | |||
| 193 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 194 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 195 | return mockResponse(200, `role`, nil) | ||
| 196 | } | ||
| 197 | } | ||
| 198 | _, err = auth.GetAccessKeyId() | ||
| 199 | assert.NotNil(t, err) | ||
| 200 | assert.Equal(t, "refresh Ecs sts token err: Json Unmarshal fail: invalid character 'r' looking for beginning of value", err.Error()) | ||
| 201 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 202 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 203 | return mockResponse(200, `"AccessKeyId":"accessKeyId","AccessKeySecret":"accessKeySecret","SecurityToken":"securitytoken","Expiration":"expiration"`, nil) | ||
| 204 | } | ||
| 205 | } | ||
| 206 | auth.RoleName = "role" | ||
| 207 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 208 | assert.NotNil(t, err) | ||
| 209 | assert.Equal(t, "refresh Ecs sts token err: Json Unmarshal fail: invalid character ':' after top-level value", err.Error()) | ||
| 210 | assert.Nil(t, accesskeyId) | ||
| 211 | |||
| 212 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 213 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 214 | 			return mockResponse(200, `{"AccessKeySecret":"accessKeySecret","SecurityToken":"securitytoken","Expiration":"expiration","Code":"fail"}`, nil) | ||
| 215 | } | ||
| 216 | } | ||
| 217 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 218 | assert.NotNil(t, err) | ||
| 219 | assert.Equal(t, "refresh Ecs sts token err: Code is not Success", err.Error()) | ||
| 220 | assert.Nil(t, accesskeyId) | ||
| 221 | |||
| 222 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 223 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 224 | 			return mockResponse(200, `{"AccessKeySecret":"accessKeySecret","SecurityToken":"securitytoken","Expiration":"expiration","Code":"Success"}`, nil) | ||
| 225 | } | ||
| 226 | } | ||
| 227 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 228 | assert.NotNil(t, err) | ||
| 229 | assert.Equal(t, "refresh Ecs sts token err: AccessKeyId: , AccessKeySecret: accessKeySecret, SecurityToken: securitytoken, Expiration: expiration", err.Error()) | ||
| 230 | assert.Nil(t, accesskeyId) | ||
| 231 | |||
| 232 | 	hookDo = func(fn func(req *http.Request) (*http.Response, error)) func(req *http.Request) (*http.Response, error) { | ||
| 233 | 		return func(req *http.Request) (*http.Response, error) { | ||
| 234 | 			return mockResponse(200, `{"AccessKeyId":"accessKeyId","AccessKeySecret":"accessKeySecret","SecurityToken":"securitytoken","Expiration":"2018-01-02T15:04:05Z","Code":"Success"}`, nil) | ||
| 235 | } | ||
| 236 | } | ||
| 237 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 238 | assert.Nil(t, err) | ||
| 239 | assert.Equal(t, "accessKeyId", *accesskeyId) | ||
| 240 | |||
| 241 | accesskeySecret, err := auth.GetAccessKeySecret() | ||
| 242 | assert.Nil(t, err) | ||
| 243 | assert.Equal(t, "accessKeySecret", *accesskeySecret) | ||
| 244 | |||
| 245 | ststoken, err := auth.GetSecurityToken() | ||
| 246 | assert.Nil(t, err) | ||
| 247 | assert.Equal(t, "securitytoken", *ststoken) | ||
| 248 | |||
| 249 | 	err = errors.New("credentials") | ||
| 250 | err = hookParse(err) | ||
| 251 | assert.Equal(t, "credentials", err.Error()) | ||
| 252 | |||
| 253 | cred, err := auth.GetCredential() | ||
| 254 | assert.Nil(t, err) | ||
| 255 | assert.Equal(t, "accessKeyId", *cred.AccessKeyId) | ||
| 256 | assert.Equal(t, "accessKeySecret", *cred.AccessKeySecret) | ||
| 257 | assert.Equal(t, "securitytoken", *cred.SecurityToken) | ||
| 258 | assert.Nil(t, cred.BearerToken) | ||
| 259 | assert.Equal(t, "ecs_ram_role", *cred.Type) | ||
| 260 | |||
| 261 | originHookParse := hookParse | ||
| 262 | 	hookParse = func(err error) error { | ||
| 263 | 		return errors.New("error parse") | ||
| 264 | } | ||
| 265 | 	defer func() { | ||
| 266 | hookParse = originHookParse | ||
| 267 | }() | ||
| 268 | accesskeyId, err = auth.GetAccessKeyId() | ||
| 269 | assert.Equal(t, "refresh Ecs sts token err: error parse", err.Error()) | ||
| 270 | assert.Nil(t, accesskeyId) | ||
| 271 | } | ||
| 272 |