@@ -24,15 +24,15 @@ import (
2424 "net/http/httptest"
2525 "testing"
2626
27- "github.com/edgexfoundry/app-functions-sdk-go/internal/security"
28-
29- "github.com/edgexfoundry/app-functions-sdk-go/internal"
30- "github.com/edgexfoundry/app-functions-sdk-go/internal/common"
31- "github.com/edgexfoundry/app-functions-sdk-go/internal/telemetry"
3227 "github.com/edgexfoundry/go-mod-core-contracts/clients"
3328 "github.com/edgexfoundry/go-mod-core-contracts/clients/logger"
3429 "github.com/gorilla/mux"
3530 "github.com/stretchr/testify/assert"
31+
32+ "github.com/edgexfoundry/app-functions-sdk-go/internal"
33+ "github.com/edgexfoundry/app-functions-sdk-go/internal/common"
34+ "github.com/edgexfoundry/app-functions-sdk-go/internal/security"
35+ "github.com/edgexfoundry/app-functions-sdk-go/internal/telemetry"
3636)
3737
3838var logClient logger.LoggingClient
@@ -116,7 +116,7 @@ func TestConfigureAndConfigRoute(t *testing.T) {
116116}
117117
118118func TestConfigureAndMetricsRoute (t * testing.T ) {
119- sp := newMockSecretProvider ( logClient , config )
119+ sp := security . NewSecretProviderMock ( config )
120120 webserver := NewWebServer (config , sp , logClient , mux .NewRouter ())
121121 webserver .ConfigureStandardRoutes ()
122122
@@ -138,7 +138,7 @@ func TestConfigureAndMetricsRoute(t *testing.T) {
138138}
139139
140140func TestSetupTriggerRoute (t * testing.T ) {
141- sp := newMockSecretProvider ( logClient , config )
141+ sp := security . NewSecretProviderMock ( config )
142142 webserver := NewWebServer (config , sp , logClient , mux .NewRouter ())
143143
144144 handlerFunctionNotCalled := true
@@ -162,7 +162,7 @@ func TestSetupTriggerRoute(t *testing.T) {
162162
163163func TestPostSecretRoute (t * testing.T ) {
164164
165- sp := newMockSecretProvider ( logClient , config )
165+ sp := security . NewSecretProviderMock ( config )
166166 webserver := NewWebServer (config , sp , logClient , mux .NewRouter ())
167167 webserver .ConfigureStandardRoutes ()
168168
@@ -214,23 +214,3 @@ func TestValidateSecretRoute(t *testing.T) {
214214 secretDataGoodPath := SecretData {Path : "/foo/bar" , Secrets : []KeyValue {KeyValue {Key : "key" , Value : "val" }}}
215215 assert .NoError (t , secretDataGoodPath .validateSecretData ())
216216}
217-
218- // mockSecretClient is fake vault client
219- type mockSecretClient struct {
220- }
221-
222- // NewMockSecretProvider provides a mocked version of the mockSecretClient to avoiding using vault in our tests
223- func newMockSecretProvider (loggingClient logger.LoggingClient , configuration * common.ConfigurationStruct ) security.SecretProvider {
224- mockSP := security .NewSecretProvider (logClient , config )
225- return mockSP
226- }
227-
228- // GetSecrets mock implementation of GetSecrets
229- func (s * mockSecretClient ) GetSecrets (path string , keys ... string ) (map [string ]string , error ) {
230- return nil , nil
231- }
232-
233- // StoreSecrets mock implementation of StoreSecrets
234- func (s * mockSecretClient ) StoreSecrets (path string , secrets map [string ]string ) error {
235- return nil
236- }
0 commit comments