Skip to content
This repository was archived by the owner on Aug 24, 2024. It is now read-only.

Commit 7a0c002

Browse files
committed
update vendor
this commit updates the vendored files to the newest versions, incorporating the removal of bare identities
1 parent 27b82c0 commit 7a0c002

25 files changed

+904
-435
lines changed

migration2/after/bridge/core/auth/credential.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ import (
1616
const (
1717
keyringKeyPrefix = "auth-"
1818
keyringKeyKind = "kind"
19-
keyringKeyTarget = "target"
19+
keyringKeyTarget = "TargetT"
2020
keyringKeyCreateTime = "createtime"
21-
keyringKeySalt = "salt"
22-
keyringKeyPrefixMeta = "meta."
21+
keyringKeySalt = "SaltT"
22+
keyringKeyPrefixMeta = "MetaT."
2323

2424
MetaKeyLogin = "login"
2525
MetaKeyBaseURL = "base-url"

migration2/after/bridge/core/auth/credential_base.go

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,6 @@ type CredentialBase struct {
1717
MetaT map[string]string `json:"meta"`
1818
}
1919

20-
func NewCredentialBase(target string, createTime time.Time, salt []byte, meta map[string]string) *CredentialBase {
21-
return &CredentialBase{TargetT: target, CreateTimeT: createTime, SaltT: salt, MetaT: meta}
22-
}
23-
2420
func newCredentialBase(target string) *CredentialBase {
2521
return &CredentialBase{
2622
TargetT: target,

migration2/after/bridge/core/auth/credential_test.go

Lines changed: 30 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ package auth
33
import (
44
"testing"
55

6+
"github.com/stretchr/testify/assert"
67
"github.com/stretchr/testify/require"
78

89
"github.com/MichaelMure/git-bug-migration/migration2/after/entity"
@@ -23,66 +24,66 @@ func TestCredential(t *testing.T) {
2324

2425
// Store + Load
2526
err := Store(repo, token)
26-
require.NoError(t, err)
27+
assert.NoError(t, err)
2728

2829
token2, err := LoadWithId(repo, token.ID())
29-
require.NoError(t, err)
30-
require.Equal(t, token.CreateTimeT.Unix(), token2.CreateTime().Unix())
30+
assert.NoError(t, err)
31+
assert.Equal(t, token.CreateTimeT.Unix(), token2.CreateTime().Unix())
3132
token.CreateTimeT = token2.CreateTime()
32-
require.Equal(t, token, token2)
33+
assert.Equal(t, token, token2)
3334

3435
prefix := string(token.ID())[:10]
3536

3637
// LoadWithPrefix
3738
token3, err := LoadWithPrefix(repo, prefix)
38-
require.NoError(t, err)
39-
require.Equal(t, token.CreateTimeT.Unix(), token3.CreateTime().Unix())
39+
assert.NoError(t, err)
40+
assert.Equal(t, token.CreateTimeT.Unix(), token3.CreateTime().Unix())
4041
token.CreateTimeT = token3.CreateTime()
41-
require.Equal(t, token, token3)
42+
assert.Equal(t, token, token3)
4243

4344
token4 := storeToken("foo", "gitlab")
4445
token5 := storeToken("bar", "github")
4546

4647
// List + options
4748
creds, err := List(repo, WithTarget("github"))
48-
require.NoError(t, err)
49+
assert.NoError(t, err)
4950
sameIds(t, creds, []Credential{token, token5})
5051

5152
creds, err = List(repo, WithTarget("gitlab"))
52-
require.NoError(t, err)
53+
assert.NoError(t, err)
5354
sameIds(t, creds, []Credential{token4})
5455

5556
creds, err = List(repo, WithKind(KindToken))
56-
require.NoError(t, err)
57+
assert.NoError(t, err)
5758
sameIds(t, creds, []Credential{token, token4, token5})
5859

5960
creds, err = List(repo, WithKind(KindLoginPassword))
60-
require.NoError(t, err)
61+
assert.NoError(t, err)
6162
sameIds(t, creds, []Credential{})
6263

6364
// Metadata
6465

6566
token4.SetMetadata("key", "value")
6667
err = Store(repo, token4)
67-
require.NoError(t, err)
68+
assert.NoError(t, err)
6869

6970
creds, err = List(repo, WithMeta("key", "value"))
70-
require.NoError(t, err)
71+
assert.NoError(t, err)
7172
sameIds(t, creds, []Credential{token4})
7273

7374
// Exist
7475
exist := IdExist(repo, token.ID())
75-
require.True(t, exist)
76+
assert.True(t, exist)
7677

7778
exist = PrefixExist(repo, prefix)
78-
require.True(t, exist)
79+
assert.True(t, exist)
7980

8081
// Remove
8182
err = Remove(repo, token.ID())
82-
require.NoError(t, err)
83+
assert.NoError(t, err)
8384

8485
creds, err = List(repo)
85-
require.NoError(t, err)
86+
assert.NoError(t, err)
8687
sameIds(t, creds, []Credential{token4, token5})
8788
}
8889

@@ -97,27 +98,27 @@ func sameIds(t *testing.T, a []Credential, b []Credential) {
9798
return result
9899
}
99100

100-
require.ElementsMatch(t, ids(a), ids(b))
101+
assert.ElementsMatch(t, ids(a), ids(b))
101102
}
102103

103104
func testCredentialSerial(t *testing.T, original Credential) Credential {
104105
repo := repository.NewMockRepoForTest()
105106

106107
original.SetMetadata("test", "value")
107108

108-
require.NotEmpty(t, original.ID().String())
109-
require.NotEmpty(t, original.Salt())
110-
require.NoError(t, Store(repo, original))
109+
assert.NotEmpty(t, original.ID().String())
110+
assert.NotEmpty(t, original.Salt())
111+
assert.NoError(t, Store(repo, original))
111112

112113
loaded, err := LoadWithId(repo, original.ID())
113-
require.NoError(t, err)
114-
115-
require.Equal(t, original.ID(), loaded.ID())
116-
require.Equal(t, original.Kind(), loaded.Kind())
117-
require.Equal(t, original.Target(), loaded.Target())
118-
require.Equal(t, original.CreateTime().Unix(), loaded.CreateTime().Unix())
119-
require.Equal(t, original.Salt(), loaded.Salt())
120-
require.Equal(t, original.Metadata(), loaded.Metadata())
114+
assert.NoError(t, err)
115+
116+
assert.Equal(t, original.ID(), loaded.ID())
117+
assert.Equal(t, original.Kind(), loaded.Kind())
118+
assert.Equal(t, original.Target(), loaded.Target())
119+
assert.Equal(t, original.CreateTime().Unix(), loaded.CreateTime().Unix())
120+
assert.Equal(t, original.Salt(), loaded.Salt())
121+
assert.Equal(t, original.Metadata(), loaded.Metadata())
121122

122123
return loaded
123124
}

migration2/after/bridge/core/auth/login_password_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ package auth
33
import (
44
"testing"
55

6-
"github.com/stretchr/testify/require"
6+
"github.com/stretchr/testify/assert"
77
)
88

99
func TestLoginPasswordSerial(t *testing.T) {
1010
original := NewLoginPassword("github", "jean", "jacques")
1111
loaded := testCredentialSerial(t, original)
12-
require.Equal(t, original.Login, loaded.(*LoginPassword).Login)
13-
require.Equal(t, original.Password, loaded.(*LoginPassword).Password)
12+
assert.Equal(t, original.Login, loaded.(*LoginPassword).Login)
13+
assert.Equal(t, original.Password, loaded.(*LoginPassword).Password)
1414
}

migration2/after/bridge/core/auth/login_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ package auth
33
import (
44
"testing"
55

6-
"github.com/stretchr/testify/require"
6+
"github.com/stretchr/testify/assert"
77
)
88

99
func TestLoginSerial(t *testing.T) {
1010
original := NewLogin("github", "jean")
1111
loaded := testCredentialSerial(t, original)
12-
require.Equal(t, original.Login, loaded.(*Login).Login)
12+
assert.Equal(t, original.Login, loaded.(*Login).Login)
1313
}

migration2/after/bridge/core/auth/token_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ package auth
33
import (
44
"testing"
55

6-
"github.com/stretchr/testify/require"
6+
"github.com/stretchr/testify/assert"
77
)
88

99
func TestTokenSerial(t *testing.T) {
1010
original := NewToken("github", "value")
1111
loaded := testCredentialSerial(t, original)
12-
require.Equal(t, original.Value, loaded.(*Token).Value)
12+
assert.Equal(t, original.Value, loaded.(*Token).Value)
1313
}

migration2/after/repository/config.go

Lines changed: 99 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,11 @@ var (
1313

1414
// Config represent the common function interacting with the repository config storage
1515
type Config interface {
16-
// Store writes a single key/value pair in the config
17-
StoreString(key, value string) error
18-
19-
// Store writes a key and timestamp value to the config
20-
StoreTimestamp(key string, value time.Time) error
21-
22-
// Store writes a key and boolean value to the config
23-
StoreBool(key string, value bool) error
16+
ConfigRead
17+
ConfigWrite
18+
}
2419

20+
type ConfigRead interface {
2521
// ReadAll reads all key/value pair matching the key prefix
2622
ReadAll(keyPrefix string) (map[string]string, error)
2723

@@ -39,6 +35,17 @@ type Config interface {
3935
// Return ErrNoConfigEntry or ErrMultipleConfigEntry if
4036
// there is zero or more than one entry for this key
4137
ReadTimestamp(key string) (time.Time, error)
38+
}
39+
40+
type ConfigWrite interface {
41+
// Store writes a single key/value pair in the config
42+
StoreString(key, value string) error
43+
44+
// Store writes a key and timestamp value to the config
45+
StoreTimestamp(key string, value time.Time) error
46+
47+
// Store writes a key and boolean value to the config
48+
StoreBool(key string, value bool) error
4249

4350
// RemoveAll removes all key/value pair matching the key prefix
4451
RemoveAll(keyPrefix string) error
@@ -52,3 +59,87 @@ func ParseTimestamp(s string) (time.Time, error) {
5259

5360
return time.Unix(int64(timestamp), 0), nil
5461
}
62+
63+
// mergeConfig is a helper to easily support RepoConfig.AnyConfig()
64+
// from two separate local and global Config
65+
func mergeConfig(local ConfigRead, global ConfigRead) *mergedConfig {
66+
return &mergedConfig{
67+
local: local,
68+
global: global,
69+
}
70+
}
71+
72+
var _ ConfigRead = &mergedConfig{}
73+
74+
type mergedConfig struct {
75+
local ConfigRead
76+
global ConfigRead
77+
}
78+
79+
func (m *mergedConfig) ReadAll(keyPrefix string) (map[string]string, error) {
80+
values, err := m.global.ReadAll(keyPrefix)
81+
if err != nil {
82+
return nil, err
83+
}
84+
locals, err := m.local.ReadAll(keyPrefix)
85+
if err != nil {
86+
return nil, err
87+
}
88+
for k, val := range locals {
89+
values[k] = val
90+
}
91+
return values, nil
92+
}
93+
94+
func (m *mergedConfig) ReadBool(key string) (bool, error) {
95+
v, err := m.local.ReadBool(key)
96+
if err == nil {
97+
return v, nil
98+
}
99+
if err != ErrNoConfigEntry && err != ErrMultipleConfigEntry {
100+
return false, err
101+
}
102+
return m.global.ReadBool(key)
103+
}
104+
105+
func (m *mergedConfig) ReadString(key string) (string, error) {
106+
val, err := m.local.ReadString(key)
107+
if err == nil {
108+
return val, nil
109+
}
110+
if err != ErrNoConfigEntry && err != ErrMultipleConfigEntry {
111+
return "", err
112+
}
113+
return m.global.ReadString(key)
114+
}
115+
116+
func (m *mergedConfig) ReadTimestamp(key string) (time.Time, error) {
117+
val, err := m.local.ReadTimestamp(key)
118+
if err == nil {
119+
return val, nil
120+
}
121+
if err != ErrNoConfigEntry && err != ErrMultipleConfigEntry {
122+
return time.Time{}, err
123+
}
124+
return m.global.ReadTimestamp(key)
125+
}
126+
127+
var _ ConfigWrite = &configPanicWriter{}
128+
129+
type configPanicWriter struct{}
130+
131+
func (c configPanicWriter) StoreString(key, value string) error {
132+
panic("not implemented")
133+
}
134+
135+
func (c configPanicWriter) StoreTimestamp(key string, value time.Time) error {
136+
panic("not implemented")
137+
}
138+
139+
func (c configPanicWriter) StoreBool(key string, value bool) error {
140+
panic("not implemented")
141+
}
142+
143+
func (c configPanicWriter) RemoveAll(keyPrefix string) error {
144+
panic("not implemented")
145+
}
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
package repository
2+
3+
import (
4+
"testing"
5+
"time"
6+
7+
"github.com/stretchr/testify/require"
8+
)
9+
10+
func TestMergedConfig(t *testing.T) {
11+
local := NewMemConfig()
12+
global := NewMemConfig()
13+
merged := mergeConfig(local, global)
14+
15+
require.NoError(t, global.StoreBool("bool", true))
16+
require.NoError(t, global.StoreString("string", "foo"))
17+
require.NoError(t, global.StoreTimestamp("timestamp", time.Unix(1234, 0)))
18+
19+
val1, err := merged.ReadBool("bool")
20+
require.NoError(t, err)
21+
require.Equal(t, val1, true)
22+
23+
val2, err := merged.ReadString("string")
24+
require.NoError(t, err)
25+
require.Equal(t, val2, "foo")
26+
27+
val3, err := merged.ReadTimestamp("timestamp")
28+
require.NoError(t, err)
29+
require.Equal(t, val3, time.Unix(1234, 0))
30+
31+
require.NoError(t, local.StoreBool("bool", false))
32+
require.NoError(t, local.StoreString("string", "bar"))
33+
require.NoError(t, local.StoreTimestamp("timestamp", time.Unix(5678, 0)))
34+
35+
val1, err = merged.ReadBool("bool")
36+
require.NoError(t, err)
37+
require.Equal(t, val1, false)
38+
39+
val2, err = merged.ReadString("string")
40+
require.NoError(t, err)
41+
require.Equal(t, val2, "bar")
42+
43+
val3, err = merged.ReadTimestamp("timestamp")
44+
require.NoError(t, err)
45+
require.Equal(t, val3, time.Unix(5678, 0))
46+
47+
all, err := merged.ReadAll("")
48+
require.NoError(t, err)
49+
require.Equal(t, all, map[string]string{
50+
"bool": "false",
51+
"string": "bar",
52+
"timestamp": "5678",
53+
})
54+
}

0 commit comments

Comments
 (0)