Conditions | 1 |
Total Lines | 103 |
Code Lines | 73 |
Lines | 0 |
Ratio | 0 % |
Changes | 0 |
Small methods make your code easier to understand, in particular if combined with a good name. Besides, if your method is small, finding a good name is usually much easier.
For example, if you find yourself adding comments to a method's body, this is usually a good sign to extract the commented part to a new method, and use the comment as a starting point when coming up with a good name for this new method.
Commonly applied refactorings include:
If many parameters/temporary variables are present:
1 | package providers |
||
86 | func TestCLIProfileCredentialsProvider_getCredentialsProvider(t *testing.T) { |
||
87 | conf := &configuration{ |
||
88 | Current: "AK", |
||
89 | Profiles: []*profile{ |
||
90 | { |
||
91 | Mode: "AK", |
||
92 | Name: "AK", |
||
93 | AccessKeyID: "akid", |
||
94 | AccessKeySecret: "secret", |
||
95 | }, |
||
96 | { |
||
97 | Mode: "RamRoleArn", |
||
98 | Name: "RamRoleArn", |
||
99 | AccessKeyID: "akid", |
||
100 | AccessKeySecret: "secret", |
||
101 | RoleArn: "arn", |
||
102 | StsRegion: "cn-hangzhou", |
||
103 | EnableVpc: true, |
||
104 | Policy: "policy", |
||
105 | ExternalId: "externalId", |
||
106 | }, |
||
107 | { |
||
108 | Mode: "RamRoleArn", |
||
109 | Name: "Invalid_RamRoleArn", |
||
110 | }, |
||
111 | { |
||
112 | Mode: "EcsRamRole", |
||
113 | Name: "EcsRamRole", |
||
114 | RoleName: "rolename", |
||
115 | }, |
||
116 | { |
||
117 | Mode: "OIDC", |
||
118 | Name: "OIDC", |
||
119 | RoleArn: "role_arn", |
||
120 | OIDCTokenFile: "path/to/oidc/file", |
||
121 | OIDCProviderARN: "provider_arn", |
||
122 | StsRegion: "cn-hangzhou", |
||
123 | EnableVpc: true, |
||
124 | Policy: "policy", |
||
125 | }, |
||
126 | { |
||
127 | Mode: "ChainableRamRoleArn", |
||
128 | Name: "ChainableRamRoleArn", |
||
129 | RoleArn: "arn", |
||
130 | SourceProfile: "AK", |
||
131 | }, |
||
132 | { |
||
133 | Mode: "ChainableRamRoleArn", |
||
134 | Name: "ChainableRamRoleArn2", |
||
135 | SourceProfile: "InvalidSource", |
||
136 | }, |
||
137 | { |
||
138 | Mode: "Unsupported", |
||
139 | Name: "Unsupported", |
||
140 | }, |
||
141 | }, |
||
142 | } |
||
143 | |||
144 | provider, err := NewCLIProfileCredentialsProviderBuilder().Build() |
||
145 | assert.Nil(t, err) |
||
146 | _, err = provider.getCredentialsProvider(conf, "inexist") |
||
147 | assert.EqualError(t, err, "unable to get profile with 'inexist'") |
||
148 | |||
149 | // AK |
||
150 | cp, err := provider.getCredentialsProvider(conf, "AK") |
||
151 | assert.Nil(t, err) |
||
152 | akcp, ok := cp.(*StaticAKCredentialsProvider) |
||
153 | assert.True(t, ok) |
||
154 | cc, err := akcp.GetCredentials() |
||
155 | assert.Nil(t, err) |
||
156 | assert.Equal(t, cc, &Credentials{AccessKeyId: "akid", AccessKeySecret: "secret", SecurityToken: "", ProviderName: "static_ak"}) |
||
157 | // RamRoleArn |
||
158 | cp, err = provider.getCredentialsProvider(conf, "RamRoleArn") |
||
159 | assert.Nil(t, err) |
||
160 | _, ok = cp.(*RAMRoleARNCredentialsProvider) |
||
161 | assert.True(t, ok) |
||
162 | // RamRoleArn invalid ak |
||
163 | _, err = provider.getCredentialsProvider(conf, "Invalid_RamRoleArn") |
||
164 | assert.EqualError(t, err, "the access key id is empty") |
||
165 | // EcsRamRole |
||
166 | cp, err = provider.getCredentialsProvider(conf, "EcsRamRole") |
||
167 | assert.Nil(t, err) |
||
168 | _, ok = cp.(*ECSRAMRoleCredentialsProvider) |
||
169 | assert.True(t, ok) |
||
170 | // OIDC |
||
171 | cp, err = provider.getCredentialsProvider(conf, "OIDC") |
||
172 | assert.Nil(t, err) |
||
173 | _, ok = cp.(*OIDCCredentialsProvider) |
||
174 | assert.True(t, ok) |
||
175 | |||
176 | // ChainableRamRoleArn |
||
177 | cp, err = provider.getCredentialsProvider(conf, "ChainableRamRoleArn") |
||
178 | assert.Nil(t, err) |
||
179 | _, ok = cp.(*RAMRoleARNCredentialsProvider) |
||
180 | assert.True(t, ok) |
||
181 | |||
182 | // ChainableRamRoleArn with invalid source profile |
||
183 | _, err = provider.getCredentialsProvider(conf, "ChainableRamRoleArn2") |
||
184 | assert.EqualError(t, err, "get source profile failed: unable to get profile with 'InvalidSource'") |
||
185 | |||
186 | // Unsupported |
||
187 | _, err = provider.getCredentialsProvider(conf, "Unsupported") |
||
188 | assert.EqualError(t, err, "unsupported profile mode 'Unsupported'") |
||
189 | } |
||
270 |