5
5
package args
6
6
7
7
import (
8
- "testing"
9
8
"github.com/stretchr/testify/assert"
9
+ "testing"
10
10
11
11
deploymentmarkers "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/deployment-markers"
12
12
generatesecrets "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/generate-secrets"
13
13
renderconfig "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/render-config"
14
14
"github.com/element-hq/ess-helm/matrix-tools/internal/cmd/syn2mas"
15
- "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/tcpwait"
15
+ "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/tcpwait"
16
16
"github.com/element-hq/ess-helm/matrix-tools/internal/pkg/secret"
17
17
)
18
18
@@ -33,7 +33,7 @@ func TestParseArgs(t *testing.T) {
33
33
name : "Missing --output flag" ,
34
34
args : []string {"cmd" , "render-config" , "file1" },
35
35
expected : & Options {
36
- RenderConfig : & renderconfig.RenderConfigOptions {
36
+ RenderConfig : & renderconfig.RenderConfigOptions {
37
37
Files : []string {"file1" },
38
38
},
39
39
},
@@ -50,7 +50,7 @@ func TestParseArgs(t *testing.T) {
50
50
args : []string {"cmd" , "render-config" , "-output" , "outputFile" , "file1" , "file2" },
51
51
expected : & Options {
52
52
RenderConfig : & renderconfig.RenderConfigOptions {
53
- Files : []string {"file1" , "file2" },
53
+ Files : []string {"file1" , "file2" },
54
54
Output : "outputFile" ,
55
55
},
56
56
},
@@ -61,7 +61,7 @@ func TestParseArgs(t *testing.T) {
61
61
args : []string {"cmd" , "render-config" , "-output" , "outputFile" , "file1" , "file2" },
62
62
expected : & Options {
63
63
RenderConfig : & renderconfig.RenderConfigOptions {
64
- Files : []string {"file1" , "file2" },
64
+ Files : []string {"file1" , "file2" },
65
65
Output : "outputFile" ,
66
66
},
67
67
Command : RenderConfig ,
@@ -86,9 +86,9 @@ func TestParseArgs(t *testing.T) {
86
86
GenerateSecrets : & generatesecrets.GenerateSecretsOptions {
87
87
GeneratedSecrets : []generatesecrets.GeneratedSecret {
88
88
{ArgValue : "secret1:value1:rand32" , Name : "secret1" , Key : "value1" , Type : secret .Rand32 },
89
- },
90
- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-init-secrets" , "mykey" :"myval" },
91
89
},
90
+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-init-secrets" , "mykey" : "myval" },
91
+ },
92
92
Command : GenerateSecrets ,
93
93
},
94
94
err : false ,
@@ -103,7 +103,7 @@ func TestParseArgs(t *testing.T) {
103
103
{ArgValue : "secret1:value1:rand32" , Name : "secret1" , Key : "value1" , Type : secret .Rand32 },
104
104
{ArgValue : "secret2:value2:signingkey" , Name : "secret2" , Key : "value2" , Type : secret .SigningKey },
105
105
},
106
- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-init-secrets" },
106
+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-init-secrets" },
107
107
},
108
108
Command : GenerateSecrets ,
109
109
},
@@ -132,7 +132,7 @@ func TestParseArgs(t *testing.T) {
132
132
{Name : "cm1" , Key : "key1" , Step : "pre" , NewValue : "value1" , AllowedValues : []string {"value1" }},
133
133
{Name : "cm1" , Key : "key2" , Step : "pre" , NewValue : "value2" , AllowedValues : []string {"value1" , "value2" }},
134
134
},
135
- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-deployment-markers" },
135
+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-deployment-markers" },
136
136
},
137
137
Command : DeploymentMarkers ,
138
138
},
@@ -147,14 +147,13 @@ func TestParseArgs(t *testing.T) {
147
147
{Name : "cm1" , Key : "key1" , Step : "post" , NewValue : "value1" , AllowedValues : []string {"value1" }},
148
148
{Name : "cm1" , Key : "key2" , Step : "post" , NewValue : "value2" , AllowedValues : []string {"value1" , "value2" }},
149
149
},
150
- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-deployment-markers" },
150
+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-deployment-markers" },
151
151
},
152
152
Command : DeploymentMarkers ,
153
153
},
154
154
err : false ,
155
155
},
156
156
157
-
158
157
{
159
158
name : "Invalid secret type" ,
160
159
args : []string {"cmd" , "generate-secrets" , "-secrets" , "secret1:value1:unknown" },
@@ -170,30 +169,30 @@ func TestParseArgs(t *testing.T) {
170
169
},
171
170
172
171
{
173
- name : "Proper syntax of syn2mas" ,
174
- args : []string {"cmd" , "syn2mas" , "-config" , "file1" , "-synapse-config" , "file2" },
172
+ name : "Proper syntax of syn2mas" ,
173
+ args : []string {"cmd" , "syn2mas" , "-config" , "file1" , "-synapse-config" , "file2" },
175
174
expected : & Options {
176
175
Syn2Mas : & syn2mas.Syn2MasOptions {
177
- MASConfig : "file1" ,
176
+ MASConfig : "file1" ,
178
177
SynapseConfig : "file2" ,
179
178
},
180
179
Command : Syn2Mas ,
181
180
},
182
- err : false ,
181
+ err : false ,
183
182
},
184
183
{
185
- name : "Wrong syntax of syn2mas" ,
186
- args : []string {"cmd" , "syn2mas" },
184
+ name : "Wrong syntax of syn2mas" ,
185
+ args : []string {"cmd" , "syn2mas" },
187
186
expected : & Options {
188
187
Command : Syn2Mas ,
189
188
},
190
- err : true ,
189
+ err : true ,
191
190
},
192
191
}
193
192
194
193
for _ , tc := range testCases {
195
194
t .Run (tc .name , func (t * testing.T ) {
196
- options , err := ParseArgs (tc .args );
195
+ options , err := ParseArgs (tc .args )
197
196
if tc .err {
198
197
assert .Error (t , err )
199
198
assert .Nil (t , options )
0 commit comments