Skip to content

Commit 7b287e6

Browse files
committed
refactor: anonymize internal references in test fixtures
1 parent 6d73a87 commit 7b287e6

2 files changed

Lines changed: 38 additions & 38 deletions

File tree

config_test.go

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -139,12 +139,12 @@ envs:
139139
dev:
140140
provider: vault
141141
mapping:
142-
AKAMAI_TOKEN:
143-
path: shared/akamai
144-
key: AKAMAI_TOKEN
145-
OPENAI_APIKEY:
146-
path: ccmcms
147-
key: OPENAI_API_KEY
142+
CDN_TOKEN:
143+
path: shared/cdn
144+
key: CDN_TOKEN
145+
API_KEY:
146+
path: myapp
147+
key: API_SECRET_KEY
148148
`
149149
if err := os.WriteFile(cfgPath, []byte(content), 0644); err != nil {
150150
t.Fatal(err)
@@ -160,20 +160,20 @@ envs:
160160
t.Fatalf("len(Mapping) = %d, want 2", len(devCfg.Mapping))
161161
}
162162

163-
akamaiMapping := devCfg.Mapping["AKAMAI_TOKEN"]
164-
if akamaiMapping.Path != "shared/akamai" {
165-
t.Errorf("AKAMAI_TOKEN.Path = %q, want %q", akamaiMapping.Path, "shared/akamai")
163+
cdnMapping := devCfg.Mapping["CDN_TOKEN"]
164+
if cdnMapping.Path != "shared/cdn" {
165+
t.Errorf("CDN_TOKEN.Path = %q, want %q", cdnMapping.Path, "shared/cdn")
166166
}
167-
if akamaiMapping.Key != "AKAMAI_TOKEN" {
168-
t.Errorf("AKAMAI_TOKEN.Key = %q, want %q", akamaiMapping.Key, "AKAMAI_TOKEN")
167+
if cdnMapping.Key != "CDN_TOKEN" {
168+
t.Errorf("CDN_TOKEN.Key = %q, want %q", cdnMapping.Key, "CDN_TOKEN")
169169
}
170170

171-
openaiMapping := devCfg.Mapping["OPENAI_APIKEY"]
172-
if openaiMapping.Path != "ccmcms" {
173-
t.Errorf("OPENAI_APIKEY.Path = %q, want %q", openaiMapping.Path, "ccmcms")
171+
apiMapping := devCfg.Mapping["API_KEY"]
172+
if apiMapping.Path != "myapp" {
173+
t.Errorf("API_KEY.Path = %q, want %q", apiMapping.Path, "myapp")
174174
}
175-
if openaiMapping.Key != "OPENAI_API_KEY" {
176-
t.Errorf("OPENAI_APIKEY.Key = %q, want %q", openaiMapping.Key, "OPENAI_API_KEY")
175+
if apiMapping.Key != "API_SECRET_KEY" {
176+
t.Errorf("API_KEY.Key = %q, want %q", apiMapping.Key, "API_SECRET_KEY")
177177
}
178178

179179
// Verify it propagates to provider config

provider/mapping_test.go

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -22,25 +22,25 @@ func (m *mockMultiKeyProvider) ReadSecret(_ context.Context, path string) (map[s
2222
func TestCollectMappedSecrets(t *testing.T) {
2323
mock := &mockMultiKeyProvider{
2424
secrets: map[string]map[string]string{
25-
"shared/pgsql": {
26-
"PRIMARY_MEDIA_PGSQL_USER": "dbuser",
27-
"PRIMARY_MEDIA_PGSQL_PASSWORD": "dbpass",
25+
"shared/database": {
26+
"DB_USER": "dbuser",
27+
"DB_PASSWORD": "dbpass",
2828
},
29-
"shared/akamai": {
30-
"AKAMAI_TOKEN": "tok123",
31-
"AKAMAI_HEADER": "hdr456",
29+
"shared/cdn": {
30+
"CDN_TOKEN": "tok123",
31+
"CDN_HEADER": "hdr456",
3232
},
33-
"ccmcms": {
34-
"OPENAI_API_KEY": "sk-abc",
33+
"myapp": {
34+
"API_SECRET_KEY": "sk-abc",
3535
},
3636
},
3737
}
3838

3939
mapping := map[string]SecretMapping{
40-
"PRIMARY_MEDIA_PGSQL_USER": {Path: "shared/pgsql", Key: "PRIMARY_MEDIA_PGSQL_USER"},
41-
"PRIMARY_MEDIA_PGSQL_PASSWORD": {Path: "shared/pgsql", Key: "PRIMARY_MEDIA_PGSQL_PASSWORD"},
42-
"AKAMAI_TOKEN": {Path: "shared/akamai", Key: "AKAMAI_TOKEN"},
43-
"OPENAI_APIKEY": {Path: "ccmcms", Key: "OPENAI_API_KEY"}, // env var differs from vault key
40+
"DB_USER": {Path: "shared/database", Key: "DB_USER"},
41+
"DB_PASSWORD": {Path: "shared/database", Key: "DB_PASSWORD"},
42+
"CDN_TOKEN": {Path: "shared/cdn", Key: "CDN_TOKEN"},
43+
"API_KEY": {Path: "myapp", Key: "API_SECRET_KEY"}, // env var differs from vault key
4444
}
4545

4646
records, err := CollectMappedSecrets(context.Background(), mock, mapping)
@@ -49,10 +49,10 @@ func TestCollectMappedSecrets(t *testing.T) {
4949
}
5050

5151
expected := map[string]string{
52-
"PRIMARY_MEDIA_PGSQL_USER": "dbuser",
53-
"PRIMARY_MEDIA_PGSQL_PASSWORD": "dbpass",
54-
"AKAMAI_TOKEN": "tok123",
55-
"OPENAI_APIKEY": "sk-abc",
52+
"DB_USER": "dbuser",
53+
"DB_PASSWORD": "dbpass",
54+
"CDN_TOKEN": "tok123",
55+
"API_KEY": "sk-abc",
5656
}
5757

5858
if len(records) != len(expected) {
@@ -74,14 +74,14 @@ func TestCollectMappedSecrets(t *testing.T) {
7474
func TestCollectMappedSecrets_MissingKey(t *testing.T) {
7575
mock := &mockMultiKeyProvider{
7676
secrets: map[string]map[string]string{
77-
"shared/akamai": {
78-
"AKAMAI_TOKEN": "tok123",
77+
"shared/cdn": {
78+
"CDN_TOKEN": "tok123",
7979
},
8080
},
8181
}
8282

8383
mapping := map[string]SecretMapping{
84-
"MISSING_VAR": {Path: "shared/akamai", Key: "NONEXISTENT_KEY"},
84+
"MISSING_VAR": {Path: "shared/cdn", Key: "NONEXISTENT_KEY"},
8585
}
8686

8787
_, err := CollectMappedSecrets(context.Background(), mock, mapping)
@@ -123,7 +123,7 @@ func TestCollectMappedSecrets_DeduplicatesPaths(t *testing.T) {
123123
callCount := 0
124124
mock := &countingMultiKeyProvider{
125125
secrets: map[string]map[string]string{
126-
"shared/pgsql": {
126+
"shared/database": {
127127
"USER": "u",
128128
"PASS": "p",
129129
},
@@ -132,8 +132,8 @@ func TestCollectMappedSecrets_DeduplicatesPaths(t *testing.T) {
132132
}
133133

134134
mapping := map[string]SecretMapping{
135-
"DB_USER": {Path: "shared/pgsql", Key: "USER"},
136-
"DB_PASS": {Path: "shared/pgsql", Key: "PASS"},
135+
"DB_USER": {Path: "shared/database", Key: "USER"},
136+
"DB_PASS": {Path: "shared/database", Key: "PASS"},
137137
}
138138

139139
_, err := CollectMappedSecrets(context.Background(), mock, mapping)

0 commit comments

Comments
 (0)