Skip to content
This repository was archived by the owner on Jul 18, 2025. It is now read-only.

Commit cac8c32

Browse files
committed
Change the external secret validation message
A secret *must* be external, not *should* Signed-off-by: Djordje Lukic <[email protected]>
1 parent 25bc6b4 commit cac8c32

File tree

5 files changed

+6
-8
lines changed

5 files changed

+6
-8
lines changed
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
Compose file validation failed:
22
* can't use relative path as volume source ("./src:/src") in service "api"
33
* can't use relative path as volume source ("./static:/opt/${static_subdir}") in service "web"
4-
* secret "my_secret" should be external
4+
* secret "my_secret" must be external

internal/validator/rules/externalsecrets.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,15 @@ func (s *externalSecretsValidator) Validate(cfgMap interface{}) []error {
2323
errs := []error{}
2424
if value, ok := cfgMap.(map[string]interface{}); ok {
2525
for secretName, secret := range value {
26-
if v1, ok := secret.(map[string]interface{}); ok {
26+
if secretMap, ok := secret.(map[string]interface{}); ok {
2727
var hasExternal = false
28-
for key := range v1 {
28+
for key := range secretMap {
2929
if key == "external" {
3030
hasExternal = true
3131
}
3232
}
3333
if !hasExternal {
34-
errs = append(errs, errors.Errorf(`secret %q should be external`, secretName))
34+
errs = append(errs, errors.Errorf(`secret %q must be external`, secretName))
3535
}
3636
}
3737
}

internal/validator/rules/externalsecrets_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ func TestExternalSecrets(t *testing.T) {
3535

3636
errs := s.Validate(input)
3737
assert.Equal(t, len(errs), 1)
38-
assert.ErrorContains(t, errs[0], `secret "my_secret" should be external`)
38+
assert.ErrorContains(t, errs[0], `secret "my_secret" must be external`)
3939
})
4040

4141
t.Run("should return all errors", func(t *testing.T) {

internal/validator/rules/relativepath.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ func (s *relativePathRule) Validate(value interface{}) []error {
3939
}
4040
_, volumeExists := s.volumes[src.(string)]
4141
if !filepath.IsAbs(src.(string)) && !volumeExists {
42-
return []error{fmt.Errorf("1 can't use relative path as volume source (%q) in service %q", src, s.service)}
42+
return []error{fmt.Errorf("can't use relative path as volume source (%q) in service %q", src, s.service)}
4343
}
4444
}
4545

internal/validator/rules/relativepath_test.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
package rules
22

33
import (
4-
"fmt"
54
"testing"
65

76
"gotest.tools/assert"
@@ -62,7 +61,6 @@ func TestRelativePathRule(t *testing.T) {
6261
1,
6362
}
6463
errs := s.Validate(input)
65-
fmt.Println(errs)
6664
assert.Equal(t, len(errs), 1)
6765

6866
assert.ErrorContains(t, errs[0], `invalid volume in service "test"`)

0 commit comments

Comments
 (0)