Skip to content

Commit d2ce845

Browse files
committed
Update tests to use new List signature
Now that the fake client no longer needs Raw, these tests can use typed instead of untyped List objects.
1 parent 96fd153 commit d2ce845

File tree

2 files changed

+15
-76
lines changed

2 files changed

+15
-76
lines changed

pkg/builder/example_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ func (a *ReplicaSetReconciler) Reconcile(req reconcile.Request) (reconcile.Resul
7777

7878
// List the Pods matching the PodTemplate Labels
7979
pods := &corev1.PodList{}
80-
err = a.List(context.TODO(), client.InNamespace(req.Namespace).MatchingLabels(rs.Spec.Template.Labels), pods)
80+
err = a.List(context.TODO(), pods, client.InNamespace(req.Namespace), client.MatchingLabels(rs.Spec.Template.Labels))
8181
if err != nil {
8282
return reconcile.Result{}, err
8383
}

pkg/webhook/internal/cert/writer/secret_test.go

Lines changed: 14 additions & 75 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,11 @@ limitations under the License.
1717
package writer
1818

1919
import (
20-
"encoding/json"
21-
2220
. "github.com/onsi/ginkgo"
2321
. "github.com/onsi/gomega"
2422

2523
corev1 "k8s.io/api/core/v1"
2624
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
27-
"k8s.io/apimachinery/pkg/runtime"
2825
"k8s.io/apimachinery/pkg/types"
2926
"sigs.k8s.io/controller-runtime/pkg/client"
3027
"sigs.k8s.io/controller-runtime/pkg/client/fake"
@@ -38,7 +35,6 @@ var _ = Describe("secretCertWriter", func() {
3835
var certWriter CertWriter
3936
var sCertWriter *secretCertWriter
4037
var secret *corev1.Secret
41-
var expectedSecret runtime.RawExtension
4238

4339
BeforeEach(func(done Done) {
4440
var err error
@@ -105,43 +101,21 @@ var _ = Describe("secretCertWriter", func() {
105101
It("should default it and return no error", func() {
106102
_, _, err := certWriter.EnsureCert(dnsName, false)
107103
Expect(err).NotTo(HaveOccurred())
108-
list := &corev1.List{}
109-
err = sCertWriter.Client.List(nil, &client.ListOptions{
110-
Namespace: "namespace-bar",
111-
Raw: &metav1.ListOptions{
112-
TypeMeta: metav1.TypeMeta{
113-
APIVersion: "v1",
114-
Kind: "Secret",
115-
},
116-
},
117-
}, list)
104+
list := &corev1.SecretList{}
105+
err = sCertWriter.Client.List(nil, list, client.InNamespace("namespace-bar"))
118106
Expect(err).NotTo(HaveOccurred())
119107
Expect(list.Items).To(HaveLen(1))
120108
})
121109
})
122110

123111
Context("no existing secret", func() {
124-
BeforeEach(func(done Done) {
125-
j, _ := json.Marshal(secret)
126-
expectedSecret = runtime.RawExtension{Raw: j}
127-
close(done)
128-
})
129-
130112
It("should create new secrets with certs", func() {
131113
_, changed, err := certWriter.EnsureCert(dnsName, false)
132114
Expect(err).NotTo(HaveOccurred())
133-
list := &corev1.List{}
134-
err = sCertWriter.Client.List(nil, &client.ListOptions{
135-
Namespace: "namespace-bar",
136-
Raw: &metav1.ListOptions{
137-
TypeMeta: metav1.TypeMeta{
138-
APIVersion: "v1",
139-
Kind: "Secret",
140-
},
141-
},
142-
}, list)
115+
list := &corev1.SecretList{}
116+
err = sCertWriter.Client.List(nil, list, client.InNamespace("namespace-bar"))
143117
Expect(err).NotTo(HaveOccurred())
144-
Expect(list.Items).To(ConsistOf(expectedSecret))
118+
Expect(list.Items).To(ConsistOf(*secret))
145119
Expect(list.Items).To(HaveLen(1))
146120
Expect(changed).To(BeTrue())
147121
})
@@ -151,12 +125,6 @@ var _ = Describe("secretCertWriter", func() {
151125
var oldSecret *corev1.Secret
152126

153127
Context("cert is invalid", func() {
154-
BeforeEach(func(done Done) {
155-
j, _ := json.Marshal(secret)
156-
expectedSecret = runtime.RawExtension{Raw: j}
157-
close(done)
158-
})
159-
160128
Describe("cert in secret is incomplete", func() {
161129
BeforeEach(func(done Done) {
162130
oldSecret = secret.DeepCopy()
@@ -168,18 +136,10 @@ var _ = Describe("secretCertWriter", func() {
168136
It("should replace with new certs", func() {
169137
_, changed, err := certWriter.EnsureCert(dnsName, false)
170138
Expect(err).NotTo(HaveOccurred())
171-
list := &corev1.List{}
172-
err = sCertWriter.Client.List(nil, &client.ListOptions{
173-
Namespace: "namespace-bar",
174-
Raw: &metav1.ListOptions{
175-
TypeMeta: metav1.TypeMeta{
176-
APIVersion: "v1",
177-
Kind: "Secret",
178-
},
179-
},
180-
}, list)
139+
list := &corev1.SecretList{}
140+
err = sCertWriter.Client.List(nil, list, client.InNamespace("namespace-bar"))
181141
Expect(err).NotTo(HaveOccurred())
182-
Expect(list.Items).To(ConsistOf(expectedSecret))
142+
Expect(list.Items).To(ConsistOf(*secret))
183143
Expect(list.Items).To(HaveLen(1))
184144
Expect(changed).To(BeTrue())
185145
})
@@ -200,18 +160,10 @@ var _ = Describe("secretCertWriter", func() {
200160
It("should replace with new certs", func() {
201161
_, changed, err := certWriter.EnsureCert(dnsName, false)
202162
Expect(err).NotTo(HaveOccurred())
203-
list := &corev1.List{}
204-
err = sCertWriter.Client.List(nil, &client.ListOptions{
205-
Namespace: "namespace-bar",
206-
Raw: &metav1.ListOptions{
207-
TypeMeta: metav1.TypeMeta{
208-
APIVersion: "v1",
209-
Kind: "Secret",
210-
},
211-
},
212-
}, list)
163+
list := &corev1.SecretList{}
164+
err = sCertWriter.Client.List(nil, list, client.InNamespace("namespace-bar"))
213165
Expect(err).NotTo(HaveOccurred())
214-
Expect(list.Items).To(ConsistOf(expectedSecret))
166+
Expect(list.Items).To(ConsistOf(*secret))
215167
Expect(list.Items).To(HaveLen(1))
216168
Expect(changed).To(BeTrue())
217169
})
@@ -225,8 +177,6 @@ var _ = Describe("secretCertWriter", func() {
225177
ServerKeyName: []byte(certs2.Key),
226178
ServerCertName: []byte(certs2.Cert),
227179
}
228-
j, _ := json.Marshal(oldSecret)
229-
expectedSecret = runtime.RawExtension{Raw: j}
230180
sCertWriter.Client = fake.NewFakeClient(oldSecret)
231181
close(done)
232182
})
@@ -239,28 +189,17 @@ var _ = Describe("secretCertWriter", func() {
239189
ServerKeyName: []byte(certs2.Key),
240190
ServerCertName: []byte(certs2.Cert),
241191
}
242-
j, _ := json.Marshal(oldSecret)
243-
expectedSecret = runtime.RawExtension{Raw: j}
244-
245192
sCertWriter.Client = fake.NewFakeClient(oldSecret)
246193
close(done)
247194
})
248195
It("should keep the secret", func() {
249196
_, changed, err := certWriter.EnsureCert(dnsName, false)
250197
Expect(err).NotTo(HaveOccurred())
251-
list := &corev1.List{}
252-
err = sCertWriter.Client.List(nil, &client.ListOptions{
253-
Namespace: "namespace-bar",
254-
Raw: &metav1.ListOptions{
255-
TypeMeta: metav1.TypeMeta{
256-
APIVersion: "v1",
257-
Kind: "Secret",
258-
},
259-
},
260-
}, list)
198+
list := &corev1.SecretList{}
199+
err = sCertWriter.Client.List(nil, list, client.InNamespace("namespace-bar"))
261200
Expect(err).NotTo(HaveOccurred())
262201
Expect(list.Items).To(HaveLen(1))
263-
Expect(list.Items[0]).To(Equal(expectedSecret))
202+
Expect(list.Items).To(ConsistOf(*oldSecret))
264203
Expect(changed).To(BeFalse())
265204
})
266205
})

0 commit comments

Comments
 (0)