Skip to content

Commit d820410

Browse files
committed
Rename RequestProcessorTests with the ApplicationPassword prefix
1 parent 22c6ef0 commit d820410

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

Networking/Networking.xcodeproj/project.pbxproj

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -780,7 +780,7 @@
780780
EE6FDCFC2966A70400E1CECF /* product-without-data.json in Resources */ = {isa = PBXBuildFile; fileRef = EE6FDCFB2966A70400E1CECF /* product-without-data.json */; };
781781
EE71CC3D2951A8EA0074D908 /* ApplicationPasswordStorage.swift in Sources */ = {isa = PBXBuildFile; fileRef = EE71CC3C2951A8EA0074D908 /* ApplicationPasswordStorage.swift */; };
782782
EE71CC412951CE700074D908 /* generate-application-password-using-wporg-creds-success.json in Resources */ = {isa = PBXBuildFile; fileRef = EE71CC402951CE700074D908 /* generate-application-password-using-wporg-creds-success.json */; };
783-
EE76762F2962B85E000066FA /* RequestProcessorTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = EE76762E2962B85E000066FA /* RequestProcessorTests.swift */; };
783+
EE76762F2962B85E000066FA /* ApplicationPasswordRequestProcessorTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = EE76762E2962B85E000066FA /* ApplicationPasswordRequestProcessorTests.swift */; };
784784
EE80A24729547F8B003591E4 /* coupons-all-without-data.json in Resources */ = {isa = PBXBuildFile; fileRef = EE80A24529547F8B003591E4 /* coupons-all-without-data.json */; };
785785
EE80A24829547F8B003591E4 /* coupon-without-data.json in Resources */ = {isa = PBXBuildFile; fileRef = EE80A24629547F8B003591E4 /* coupon-without-data.json */; };
786786
EE80A25029556FBD003591E4 /* coupon-reports-without-data.json in Resources */ = {isa = PBXBuildFile; fileRef = EE80A24F29556FBD003591E4 /* coupon-reports-without-data.json */; };
@@ -1610,7 +1610,7 @@
16101610
EE6FDCFB2966A70400E1CECF /* product-without-data.json */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.json; path = "product-without-data.json"; sourceTree = "<group>"; };
16111611
EE71CC3C2951A8EA0074D908 /* ApplicationPasswordStorage.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ApplicationPasswordStorage.swift; sourceTree = "<group>"; };
16121612
EE71CC402951CE700074D908 /* generate-application-password-using-wporg-creds-success.json */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.json; path = "generate-application-password-using-wporg-creds-success.json"; sourceTree = "<group>"; };
1613-
EE76762E2962B85E000066FA /* RequestProcessorTests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RequestProcessorTests.swift; sourceTree = "<group>"; };
1613+
EE76762E2962B85E000066FA /* ApplicationPasswordRequestProcessorTests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ApplicationPasswordRequestProcessorTests.swift; sourceTree = "<group>"; };
16141614
EE80A24529547F8B003591E4 /* coupons-all-without-data.json */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.json; path = "coupons-all-without-data.json"; sourceTree = "<group>"; };
16151615
EE80A24629547F8B003591E4 /* coupon-without-data.json */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.json; path = "coupon-without-data.json"; sourceTree = "<group>"; };
16161616
EE80A24F29556FBD003591E4 /* coupon-reports-without-data.json */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.json; path = "coupon-reports-without-data.json"; sourceTree = "<group>"; };
@@ -2841,7 +2841,7 @@
28412841
isa = PBXGroup;
28422842
children = (
28432843
EE8DE431294B17CD005054E7 /* DefaultApplicationPasswordUseCaseTests.swift */,
2844-
EE76762E2962B85E000066FA /* RequestProcessorTests.swift */,
2844+
EE76762E2962B85E000066FA /* ApplicationPasswordRequestProcessorTests.swift */,
28452845
);
28462846
path = ApplicationPassword;
28472847
sourceTree = "<group>";
@@ -3765,7 +3765,7 @@
37653765
D800DA0A25EFEB9C001E13CE /* WCPayRemoteTests.swift in Sources */,
37663766
E13BAD5328F8625600217769 /* InAppPurchasesRemoteTests.swift in Sources */,
37673767
CC851D1425E52AB500249E9C /* Decimal+ExtensionsTests.swift in Sources */,
3768-
EE76762F2962B85E000066FA /* RequestProcessorTests.swift in Sources */,
3768+
EE76762F2962B85E000066FA /* ApplicationPasswordRequestProcessorTests.swift in Sources */,
37693769
B554FA8B2180B1D500C54DFF /* NotificationsRemoteTests.swift in Sources */,
37703770
B518662A20A09C6F00037A38 /* OrdersRemoteTests.swift in Sources */,
37713771
02EF166E292F0C5800D90AD6 /* PaymentRemoteTests.swift in Sources */,

Networking/NetworkingTests/ApplicationPassword/RequestProcessorTests.swift renamed to Networking/NetworkingTests/ApplicationPassword/ApplicationPasswordRequestProcessorTests.swift

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ import XCTest
44

55
/// RequestProcessor Unit Tests
66
///
7-
final class RequestProcessorTests: XCTestCase {
7+
final class ApplicationPasswordRequestProcessorTests: XCTestCase {
88
private var mockRequestAuthenticator: MockRequestAuthenticator!
99
private var sut: ApplicationPasswordRequestProcessor!
1010
private var sessionManager: Alamofire.SessionManager!
@@ -209,7 +209,7 @@ final class RequestProcessorTests: XCTestCase {
209209

210210
// MARK: Helpers
211211
//
212-
private extension RequestProcessorTests {
212+
private extension ApplicationPasswordRequestProcessorTests {
213213
func mockRequest() throws -> Alamofire.Request {
214214
let originalTask = MockTaskConvertible()
215215
let task = try originalTask.task(session: sessionManager.session, adapter: nil, queue: .main)

0 commit comments

Comments
 (0)