@@ -17,7 +17,7 @@ import (
1717)
1818
1919type fakeCredentialResponse struct {
20- token * azcore.AccessToken
20+ token azcore.AccessToken
2121 err error
2222}
2323
@@ -32,19 +32,19 @@ func NewFakeCredential() *fakeCredential {
3232 return & fakeCredential {mut : & sync.Mutex {}}
3333}
3434
35- func (c * fakeCredential ) SetResponse (tk * azcore.AccessToken , err error ) {
35+ func (c * fakeCredential ) SetResponse (tk azcore.AccessToken , err error ) {
3636 c .mut .Lock ()
3737 defer c .mut .Unlock ()
3838 c .static = & fakeCredentialResponse {tk , err }
3939}
4040
41- func (c * fakeCredential ) AppendResponse (tk * azcore.AccessToken , err error ) {
41+ func (c * fakeCredential ) AppendResponse (tk azcore.AccessToken , err error ) {
4242 c .mut .Lock ()
4343 defer c .mut .Unlock ()
4444 c .responses = append (c .responses , fakeCredentialResponse {tk , err })
4545}
4646
47- func (c * fakeCredential ) GetToken (ctx context.Context , opts policy.TokenRequestOptions ) (token * azcore.AccessToken , err error ) {
47+ func (c * fakeCredential ) GetToken (ctx context.Context , opts policy.TokenRequestOptions ) (azcore.AccessToken , error ) {
4848 c .mut .Lock ()
4949 defer c .mut .Unlock ()
5050 c .getTokenCalls += 1
@@ -56,7 +56,7 @@ func (c *fakeCredential) GetToken(ctx context.Context, opts policy.TokenRequestO
5656 return response .token , response .err
5757}
5858
59- func testGoodGetTokenResponse (t * testing.T , token * azcore.AccessToken , err error ) {
59+ func testGoodGetTokenResponse (t * testing.T , token azcore.AccessToken , err error ) {
6060 if err != nil {
6161 t .Fatal (err )
6262 }
@@ -81,9 +81,9 @@ func TestChainedTokenCredential_NilSource(t *testing.T) {
8181
8282func TestChainedTokenCredential_GetTokenSuccess (t * testing.T ) {
8383 c1 := NewFakeCredential ()
84- c1 .SetResponse (nil , newCredentialUnavailableError ("test" , "something went wrong" ))
84+ c1 .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("test" , "something went wrong" ))
8585 c2 := NewFakeCredential ()
86- c2 .SetResponse (& azcore.AccessToken {Token : tokenValue , ExpiresOn : time .Now ().Add (time .Hour )}, nil )
86+ c2 .SetResponse (azcore.AccessToken {Token : tokenValue , ExpiresOn : time .Now ().Add (time .Hour )}, nil )
8787 cred , err := NewChainedTokenCredential ([]azcore.TokenCredential {c1 , c2 }, nil )
8888 if err != nil {
8989 t .Fatal (err )
@@ -108,7 +108,7 @@ func TestChainedTokenCredential_GetTokenSuccess(t *testing.T) {
108108
109109func TestChainedTokenCredential_GetTokenFail (t * testing.T ) {
110110 c := NewFakeCredential ()
111- c .SetResponse (nil , newAuthenticationFailedError ("test" , "something went wrong" , nil ))
111+ c .SetResponse (azcore. AccessToken {} , newAuthenticationFailedError ("test" , "something went wrong" , nil ))
112112 cred , err := NewChainedTokenCredential ([]azcore.TokenCredential {c }, nil )
113113 if err != nil {
114114 t .Fatal (err )
@@ -128,11 +128,11 @@ func TestChainedTokenCredential_GetTokenFail(t *testing.T) {
128128
129129func TestChainedTokenCredential_MultipleCredentialsGetTokenUnavailable (t * testing.T ) {
130130 c1 := NewFakeCredential ()
131- c1 .SetResponse (nil , newCredentialUnavailableError ("unavailableCredential1" , "Unavailable expected error" ))
131+ c1 .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("unavailableCredential1" , "Unavailable expected error" ))
132132 c2 := NewFakeCredential ()
133- c2 .SetResponse (nil , newCredentialUnavailableError ("unavailableCredential2" , "Unavailable expected error" ))
133+ c2 .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("unavailableCredential2" , "Unavailable expected error" ))
134134 c3 := NewFakeCredential ()
135- c3 .SetResponse (nil , newCredentialUnavailableError ("unavailableCredential3" , "Unavailable expected error" ))
135+ c3 .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("unavailableCredential3" , "Unavailable expected error" ))
136136 cred , err := NewChainedTokenCredential ([]azcore.TokenCredential {c1 , c2 , c3 }, nil )
137137 if err != nil {
138138 t .Fatal (err )
@@ -157,11 +157,11 @@ Attempted credentials:
157157
158158func TestChainedTokenCredential_MultipleCredentialsGetTokenAuthenticationFailed (t * testing.T ) {
159159 c1 := NewFakeCredential ()
160- c1 .SetResponse (nil , newCredentialUnavailableError ("unavailableCredential1" , "Unavailable expected error" ))
160+ c1 .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("unavailableCredential1" , "Unavailable expected error" ))
161161 c2 := NewFakeCredential ()
162- c2 .SetResponse (nil , newCredentialUnavailableError ("unavailableCredential2" , "Unavailable expected error" ))
162+ c2 .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("unavailableCredential2" , "Unavailable expected error" ))
163163 c3 := NewFakeCredential ()
164- c3 .SetResponse (nil , newAuthenticationFailedError ("authenticationFailedCredential3" , "Authentication failed expected error" , nil ))
164+ c3 .SetResponse (azcore. AccessToken {} , newAuthenticationFailedError ("authenticationFailedCredential3" , "Authentication failed expected error" , nil ))
165165 cred , err := NewChainedTokenCredential ([]azcore.TokenCredential {c1 , c2 , c3 }, nil )
166166 if err != nil {
167167 t .Fatal (err )
@@ -186,7 +186,7 @@ Attempted credentials:
186186
187187func TestChainedTokenCredential_MultipleCredentialsGetTokenCustomName (t * testing.T ) {
188188 c := NewFakeCredential ()
189- c .SetResponse (nil , newCredentialUnavailableError ("unavailableCredential1" , "Unavailable expected error" ))
189+ c .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("unavailableCredential1" , "Unavailable expected error" ))
190190 cred , err := NewChainedTokenCredential ([]azcore.TokenCredential {c }, nil )
191191 if err != nil {
192192 t .Fatal (err )
@@ -210,9 +210,9 @@ Attempted credentials:
210210
211211func TestChainedTokenCredential_RepeatedGetTokenWithSuccessfulCredential (t * testing.T ) {
212212 failedCredential := NewFakeCredential ()
213- failedCredential .SetResponse (nil , newCredentialUnavailableError ("MockCredential" , "Mocking a credential unavailable error" ))
213+ failedCredential .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("MockCredential" , "Mocking a credential unavailable error" ))
214214 successfulCredential := NewFakeCredential ()
215- successfulCredential .SetResponse (& azcore.AccessToken {Token : tokenValue , ExpiresOn : time .Now ()}, nil )
215+ successfulCredential .SetResponse (azcore.AccessToken {Token : tokenValue , ExpiresOn : time .Now ()}, nil )
216216
217217 cred , err := NewChainedTokenCredential ([]azcore.TokenCredential {failedCredential , successfulCredential }, nil )
218218 if err != nil {
@@ -241,9 +241,9 @@ func TestChainedTokenCredential_RepeatedGetTokenWithSuccessfulCredential(t *test
241241
242242func TestChainedTokenCredential_RepeatedGetTokenWithSuccessfulCredentialWithRetrySources (t * testing.T ) {
243243 failedCredential := NewFakeCredential ()
244- failedCredential .SetResponse (nil , newCredentialUnavailableError ("MockCredential" , "Mocking a credential unavailable error" ))
244+ failedCredential .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("MockCredential" , "Mocking a credential unavailable error" ))
245245 successfulCredential := NewFakeCredential ()
246- successfulCredential .SetResponse (& azcore.AccessToken {Token : tokenValue , ExpiresOn : time .Now ()}, nil )
246+ successfulCredential .SetResponse (azcore.AccessToken {Token : tokenValue , ExpiresOn : time .Now ()}, nil )
247247
248248 cred , err := NewChainedTokenCredential ([]azcore.TokenCredential {failedCredential , successfulCredential }, & ChainedTokenCredentialOptions {RetrySources : true })
249249 if err != nil {
@@ -272,11 +272,11 @@ func TestChainedTokenCredential_RepeatedGetTokenWithSuccessfulCredentialWithRetr
272272
273273func TestChainedTokenCredential_Race (t * testing.T ) {
274274 successFake := NewFakeCredential ()
275- successFake .SetResponse (& azcore.AccessToken {Token : "*" , ExpiresOn : time .Now ().Add (time .Hour )}, nil )
275+ successFake .SetResponse (azcore.AccessToken {Token : "*" , ExpiresOn : time .Now ().Add (time .Hour )}, nil )
276276 authFailFake := NewFakeCredential ()
277- authFailFake .SetResponse (nil , newAuthenticationFailedError ("" , "" , nil ))
277+ authFailFake .SetResponse (azcore. AccessToken {} , newAuthenticationFailedError ("" , "" , nil ))
278278 unavailableFake := NewFakeCredential ()
279- unavailableFake .SetResponse (nil , newCredentialUnavailableError ("" , "" ))
279+ unavailableFake .SetResponse (azcore. AccessToken {} , newCredentialUnavailableError ("" , "" ))
280280 tro := policy.TokenRequestOptions {Scopes : []string {liveTestScope }}
281281
282282 for _ , b := range []bool {true , false } {
0 commit comments