@@ -230,7 +230,7 @@ func Test_buildSourceBundle(t *testing.T) {
230230 KeySelector : trustapi.KeySelector {
231231 Key : jksKey ,
232232 },
233- Password : ptr .To (DefaultJKSPassword ),
233+ Password : ptr .To (trustapi . DefaultJKSPassword ),
234234 },
235235 },
236236 objects : []runtime.Object {& corev1.ConfigMap {
@@ -269,7 +269,7 @@ func Test_buildSourceBundle(t *testing.T) {
269269 KeySelector : trustapi.KeySelector {
270270 Key : pkcs12Key ,
271271 },
272- Password : ptr .To (DefaultPKCS12Password ),
272+ Password : ptr .To (trustapi . DefaultPKCS12Password ),
273273 },
274274 },
275275 objects : []runtime.Object {& corev1.ConfigMap {
@@ -326,14 +326,14 @@ func Test_buildSourceBundle(t *testing.T) {
326326 if test .expPassword != nil {
327327 password = * test .expPassword
328328 } else {
329- password = DefaultJKSPassword
329+ password = trustapi . DefaultJKSPassword
330330 }
331331 }
332332 if test .expPKCS12 {
333333 if test .expPassword != nil {
334334 password = * test .expPassword
335335 } else {
336- password = DefaultPKCS12Password
336+ password = trustapi . DefaultPKCS12Password
337337 }
338338 }
339339
@@ -398,7 +398,7 @@ func Test_encodeJKSAliases(t *testing.T) {
398398 // Using different dummy certs would allow this test to pass but wouldn't actually test anything useful!
399399 bundle := dummy .JoinCerts (dummy .TestCertificate1 , dummy .TestCertificate2 )
400400
401- jksFile , err := jksEncoder {password : DefaultJKSPassword }.encode (bundle )
401+ jksFile , err := jksEncoder {password : trustapi . DefaultJKSPassword }.encode (bundle )
402402 if err != nil {
403403 t .Fatalf ("didn't expect an error but got: %s" , err )
404404 }
@@ -407,7 +407,7 @@ func Test_encodeJKSAliases(t *testing.T) {
407407
408408 ks := jks .New ()
409409
410- err = ks .Load (reader , []byte (DefaultJKSPassword ))
410+ err = ks .Load (reader , []byte (trustapi . DefaultJKSPassword ))
411411 if err != nil {
412412 t .Fatalf ("failed to parse generated JKS file: %s" , err )
413413 }
0 commit comments