@@ -17,7 +17,6 @@ limitations under the License.
17
17
package writer
18
18
19
19
import (
20
- "encoding/json"
21
20
"fmt"
22
21
23
22
. "github.com/onsi/ginkgo"
@@ -26,7 +25,6 @@ import (
26
25
admissionregistration "k8s.io/api/admissionregistration/v1beta1"
27
26
corev1 "k8s.io/api/core/v1"
28
27
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
29
- "k8s.io/apimachinery/pkg/runtime"
30
28
"k8s.io/apimachinery/pkg/types"
31
29
"sigs.k8s.io/controller-runtime/pkg/admission/cert/generator"
32
30
fakegenerator "sigs.k8s.io/controller-runtime/pkg/admission/cert/generator/fake"
@@ -108,7 +106,6 @@ var _ = Describe("SecretCertWriter", func() {
108
106
var certWriter CertWriter
109
107
var secretCertWriter * SecretCertWriter
110
108
var secret * corev1.Secret
111
- var expectedSecret runtime.RawExtension
112
109
113
110
Context ("Failed to EnsureCerts" , func () {
114
111
BeforeEach (func (done Done ) {
@@ -201,43 +198,21 @@ var _ = Describe("SecretCertWriter", func() {
201
198
It ("should default it and return no error" , func () {
202
199
err := certWriter .EnsureCerts (mwc )
203
200
Expect (err ).NotTo (HaveOccurred ())
204
- list := & corev1.List {}
205
- err = cl .List (nil , & client.ListOptions {
206
- Namespace : "namespace-bar" ,
207
- Raw : & metav1.ListOptions {
208
- TypeMeta : metav1.TypeMeta {
209
- APIVersion : "v1" ,
210
- Kind : "Secret" ,
211
- },
212
- },
213
- }, list )
201
+ list := & corev1.SecretList {}
202
+ err = cl .List (nil , list , client .InNamespace ("namespace-bar" ))
214
203
Expect (err ).NotTo (HaveOccurred ())
215
204
Expect (list .Items ).To (HaveLen (1 ))
216
205
})
217
206
})
218
207
219
208
Context ("no existing secret" , func () {
220
- BeforeEach (func (done Done ) {
221
- j , _ := json .Marshal (secret )
222
- expectedSecret = runtime.RawExtension {Raw : j }
223
- close (done )
224
- })
225
-
226
209
It ("should create new secrets with certs" , func () {
227
210
err := certWriter .EnsureCerts (mwc )
228
211
Expect (err ).NotTo (HaveOccurred ())
229
- list := & corev1.List {}
230
- err = cl .List (nil , & client.ListOptions {
231
- Namespace : "namespace-bar" ,
232
- Raw : & metav1.ListOptions {
233
- TypeMeta : metav1.TypeMeta {
234
- APIVersion : "v1" ,
235
- Kind : "Secret" ,
236
- },
237
- },
238
- }, list )
212
+ list := & corev1.SecretList {}
213
+ err = cl .List (nil , list , client .InNamespace ("namespace-bar" ))
239
214
Expect (err ).NotTo (HaveOccurred ())
240
- Expect (list .Items ).To (ConsistOf (expectedSecret ))
215
+ Expect (list .Items ).To (ConsistOf (* secret ))
241
216
Expect (list .Items ).To (HaveLen (1 ))
242
217
})
243
218
})
@@ -246,12 +221,6 @@ var _ = Describe("SecretCertWriter", func() {
246
221
var oldSecret * corev1.Secret
247
222
248
223
Context ("cert is invalid" , func () {
249
- BeforeEach (func (done Done ) {
250
- j , _ := json .Marshal (secret )
251
- expectedSecret = runtime.RawExtension {Raw : j }
252
- close (done )
253
- })
254
-
255
224
Describe ("cert in secret is incomplete" , func () {
256
225
BeforeEach (func (done Done ) {
257
226
oldSecret = secret .DeepCopy ()
@@ -264,18 +233,10 @@ var _ = Describe("SecretCertWriter", func() {
264
233
It ("should replace with new certs" , func () {
265
234
err := certWriter .EnsureCerts (mwc )
266
235
Expect (err ).NotTo (HaveOccurred ())
267
- list := & corev1.List {}
268
- err = cl .List (nil , & client.ListOptions {
269
- Namespace : "namespace-bar" ,
270
- Raw : & metav1.ListOptions {
271
- TypeMeta : metav1.TypeMeta {
272
- APIVersion : "v1" ,
273
- Kind : "Secret" ,
274
- },
275
- },
276
- }, list )
236
+ list := & corev1.SecretList {}
237
+ err = cl .List (nil , list , client .InNamespace ("namespace-bar" ))
277
238
Expect (err ).NotTo (HaveOccurred ())
278
- Expect (list .Items ).To (ConsistOf (expectedSecret ))
239
+ Expect (list .Items ).To (ConsistOf (* secret ))
279
240
Expect (list .Items ).To (HaveLen (1 ))
280
241
})
281
242
})
@@ -296,18 +257,10 @@ var _ = Describe("SecretCertWriter", func() {
296
257
It ("should replace with new certs" , func () {
297
258
err := certWriter .EnsureCerts (mwc )
298
259
Expect (err ).NotTo (HaveOccurred ())
299
- list := & corev1.List {}
300
- err = cl .List (nil , & client.ListOptions {
301
- Namespace : "namespace-bar" ,
302
- Raw : & metav1.ListOptions {
303
- TypeMeta : metav1.TypeMeta {
304
- APIVersion : "v1" ,
305
- Kind : "Secret" ,
306
- },
307
- },
308
- }, list )
260
+ list := & corev1.SecretList {}
261
+ err = cl .List (nil , list , client .InNamespace ("namespace-bar" ))
309
262
Expect (err ).NotTo (HaveOccurred ())
310
- Expect (list .Items ).To (ConsistOf (expectedSecret ))
263
+ Expect (list .Items ).To (ConsistOf (* secret ))
311
264
Expect (list .Items ).To (HaveLen (1 ))
312
265
})
313
266
})
@@ -320,8 +273,6 @@ var _ = Describe("SecretCertWriter", func() {
320
273
ServerKeyName : []byte (certs2 .Key ),
321
274
ServerCertName : []byte (certs2 .Cert ),
322
275
}
323
- j , _ := json .Marshal (oldSecret )
324
- expectedSecret = runtime.RawExtension {Raw : j }
325
276
cl = fake .NewFakeClient (oldSecret )
326
277
secretCertWriter .Client = cl
327
278
close (done )
@@ -335,8 +286,6 @@ var _ = Describe("SecretCertWriter", func() {
335
286
ServerKeyName : []byte (certs2 .Key ),
336
287
ServerCertName : []byte (certs2 .Cert ),
337
288
}
338
- j , _ := json .Marshal (oldSecret )
339
- expectedSecret = runtime.RawExtension {Raw : j }
340
289
341
290
cl = fake .NewFakeClient (oldSecret )
342
291
secretCertWriter .Client = cl
@@ -345,19 +294,11 @@ var _ = Describe("SecretCertWriter", func() {
345
294
It ("should keep the secret" , func () {
346
295
err := certWriter .EnsureCerts (mwc )
347
296
Expect (err ).NotTo (HaveOccurred ())
348
- list := & corev1.List {}
349
- err = cl .List (nil , & client.ListOptions {
350
- Namespace : "namespace-bar" ,
351
- Raw : & metav1.ListOptions {
352
- TypeMeta : metav1.TypeMeta {
353
- APIVersion : "v1" ,
354
- Kind : "Secret" ,
355
- },
356
- },
357
- }, list )
297
+ list := & corev1.SecretList {}
298
+ err = cl .List (nil , list , client .InNamespace ("namespace-bar" ))
358
299
Expect (err ).NotTo (HaveOccurred ())
359
300
Expect (list .Items ).To (HaveLen (1 ))
360
- Expect (list .Items [ 0 ] ).To (Equal ( expectedSecret ))
301
+ Expect (list .Items ).To (ConsistOf ( * oldSecret ))
361
302
})
362
303
})
363
304
@@ -370,8 +311,6 @@ var _ = Describe("SecretCertWriter", func() {
370
311
//ServerKeyName: []byte(expiringKeyPEM),
371
312
//ServerCertName: []byte(expiringCertPEM),
372
313
}
373
- //j, _ := json.Marshal(someNewValidSecret)
374
- //expectedSecret = runtime.RawExtension{Raw: j}
375
314
376
315
cl = fake .NewFakeClient (oldSecret )
377
316
secretCertWriter .Client = cl
0 commit comments