Skip to content

Commit b606e4b

Browse files
authored
test: add helper function to check if using a Google git provider (#1807)
1 parent 27ef594 commit b606e4b

File tree

4 files changed

+10
-6
lines changed

4 files changed

+10
-6
lines changed

e2e/nomostest/gitproviders/git-provider.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,3 +77,8 @@ func NewGitProvider(t testing.NTB, provider, clusterName string, logger *testlog
7777
return &LocalProvider{}
7878
}
7979
}
80+
81+
// IsGoogleGitProvider returns true if the GitProvider is a Google-hosted Git service.
82+
func IsGoogleGitProvider(provider GitProvider) bool {
83+
return provider.Type() == e2e.CSR || provider.Type() == e2e.SSM
84+
}

e2e/nomostest/ssh.go

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -373,10 +373,9 @@ func downloadSSHKey(nt *NT) (string, error) {
373373
}
374374

375375
// CreateNamespaceSecrets creates secrets in a given namespace using local paths.
376-
// It skips creating the Secret if the GitProvider is CSR because CSR uses either
377-
// 'gcenode' or 'gcpserviceaccount' for authentication, which doesn't require a Secret.
376+
// It skips creating the Secret if the GitProvider is CSR or SSM because neither require a Secret.
378377
func CreateNamespaceSecrets(nt *NT, ns string) error {
379-
if nt.GitProvider.Type() != e2e.CSR && nt.GitProvider.Type() != e2e.SSM {
378+
if !gitproviders.IsGoogleGitProvider(nt.GitProvider) {
380379
privateKeypath := nt.gitPrivateKeyPath
381380
if len(privateKeypath) == 0 {
382381
privateKeypath = privateKeyPath(nt)

e2e/testcases/multi_sync_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ func TestMultiSyncs_Unstructured_MixedControl(t *testing.T) {
225225
// Reconciler-manager doesn't copy the secret of RootSync's secretRef.
226226
validateReconcilerResource(nt, kinds.Secret(), map[string]string{metadata.SyncNamespaceLabel: configsync.ControllerNamespace}, 0)
227227
// CSR and SSM auth type doesn't need to copy the secret
228-
if nt.GitProvider.Type() != e2e.CSR && nt.GitProvider.Type() != e2e.SSM {
228+
if !gitproviders.IsGoogleGitProvider(nt.GitProvider) {
229229
validateReconcilerResource(nt, kinds.Secret(), map[string]string{metadata.SyncNamespaceLabel: testNs}, 5)
230230
validateReconcilerResource(nt, kinds.Secret(), map[string]string{metadata.SyncNamespaceLabel: testNs2}, 1)
231231
validateReconcilerResource(nt, kinds.Secret(), map[string]string{metadata.SyncNameLabel: repoSync1ID.Name}, 2)

e2e/testcases/reconciler_manager_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -445,7 +445,7 @@ func validateRepoSyncDependencies(nt *nomostest.NT, ns, rsName string) []client.
445445

446446
// See nomostest.CreateNamespaceSecrets for creation of user secrets.
447447
// The Secret is neither needed nor created when using CSR or SSM as the Git provider.
448-
if nt.GitProvider.Type() != e2e.CSR && nt.GitProvider.Type() != e2e.SSM {
448+
if !gitproviders.IsGoogleGitProvider(nt.GitProvider) {
449449
repoSyncAuthSecret := &corev1.Secret{}
450450
setNN(repoSyncAuthSecret, client.ObjectKey{
451451
Name: controllers.ReconcilerResourceName(repoSyncReconciler.Name, nomostest.NamespaceAuthSecretName),
@@ -941,7 +941,7 @@ func TestAutopilotReconcilerAdjustment(t *testing.T) {
941941
}
942942
// Filter container map down to just expected containers
943943
filteredContainers := []string{reconcilermanager.Reconciler, reconcilermanager.GitSync, metrics.OtelAgentName}
944-
if nt.GitProvider.Type() == e2e.CSR || nt.GitProvider.Type() == e2e.SSM {
944+
if gitproviders.IsGoogleGitProvider(nt.GitProvider) {
945945
filteredContainers = append(filteredContainers, reconcilermanager.GCENodeAskpassSidecar)
946946
}
947947
expectedResources = filterResourceMap(expectedResources, filteredContainers...)

0 commit comments

Comments
 (0)