55package args
66
77import (
8- "testing"
98 "github.com/stretchr/testify/assert"
9+ "testing"
1010
1111 deploymentmarkers "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/deployment-markers"
1212 generatesecrets "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/generate-secrets"
1313 renderconfig "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/render-config"
1414 "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/syn2mas"
15- "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/tcpwait"
15+ "github.com/element-hq/ess-helm/matrix-tools/internal/cmd/tcpwait"
1616 "github.com/element-hq/ess-helm/matrix-tools/internal/pkg/secret"
1717)
1818
@@ -33,7 +33,7 @@ func TestParseArgs(t *testing.T) {
3333 name : "Missing --output flag" ,
3434 args : []string {"cmd" , "render-config" , "file1" },
3535 expected : & Options {
36- RenderConfig : & renderconfig.RenderConfigOptions {
36+ RenderConfig : & renderconfig.RenderConfigOptions {
3737 Files : []string {"file1" },
3838 },
3939 },
@@ -50,7 +50,7 @@ func TestParseArgs(t *testing.T) {
5050 args : []string {"cmd" , "render-config" , "-output" , "outputFile" , "file1" , "file2" },
5151 expected : & Options {
5252 RenderConfig : & renderconfig.RenderConfigOptions {
53- Files : []string {"file1" , "file2" },
53+ Files : []string {"file1" , "file2" },
5454 Output : "outputFile" ,
5555 },
5656 },
@@ -61,7 +61,7 @@ func TestParseArgs(t *testing.T) {
6161 args : []string {"cmd" , "render-config" , "-output" , "outputFile" , "file1" , "file2" },
6262 expected : & Options {
6363 RenderConfig : & renderconfig.RenderConfigOptions {
64- Files : []string {"file1" , "file2" },
64+ Files : []string {"file1" , "file2" },
6565 Output : "outputFile" ,
6666 },
6767 Command : RenderConfig ,
@@ -86,9 +86,9 @@ func TestParseArgs(t *testing.T) {
8686 GenerateSecrets : & generatesecrets.GenerateSecretsOptions {
8787 GeneratedSecrets : []generatesecrets.GeneratedSecret {
8888 {ArgValue : "secret1:value1:rand32" , Name : "secret1" , Key : "value1" , Type : secret .Rand32 },
89- },
90- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-init-secrets" , "mykey" :"myval" },
9189 },
90+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-init-secrets" , "mykey" : "myval" },
91+ },
9292 Command : GenerateSecrets ,
9393 },
9494 err : false ,
@@ -103,7 +103,7 @@ func TestParseArgs(t *testing.T) {
103103 {ArgValue : "secret1:value1:rand32" , Name : "secret1" , Key : "value1" , Type : secret .Rand32 },
104104 {ArgValue : "secret2:value2:signingkey" , Name : "secret2" , Key : "value2" , Type : secret .SigningKey },
105105 },
106- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-init-secrets" },
106+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-init-secrets" },
107107 },
108108 Command : GenerateSecrets ,
109109 },
@@ -132,7 +132,7 @@ func TestParseArgs(t *testing.T) {
132132 {Name : "cm1" , Key : "key1" , Step : "pre" , NewValue : "value1" , AllowedValues : []string {"value1" }},
133133 {Name : "cm1" , Key : "key2" , Step : "pre" , NewValue : "value2" , AllowedValues : []string {"value1" , "value2" }},
134134 },
135- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-deployment-markers" },
135+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-deployment-markers" },
136136 },
137137 Command : DeploymentMarkers ,
138138 },
@@ -147,14 +147,13 @@ func TestParseArgs(t *testing.T) {
147147 {Name : "cm1" , Key : "key1" , Step : "post" , NewValue : "value1" , AllowedValues : []string {"value1" }},
148148 {Name : "cm1" , Key : "key2" , Step : "post" , NewValue : "value2" , AllowedValues : []string {"value1" , "value2" }},
149149 },
150- Labels : map [string ]string {"app.kubernetes.io/managed-by" :"matrix-tools-deployment-markers" },
150+ Labels : map [string ]string {"app.kubernetes.io/managed-by" : "matrix-tools-deployment-markers" },
151151 },
152152 Command : DeploymentMarkers ,
153153 },
154154 err : false ,
155155 },
156156
157-
158157 {
159158 name : "Invalid secret type" ,
160159 args : []string {"cmd" , "generate-secrets" , "-secrets" , "secret1:value1:unknown" },
@@ -170,30 +169,30 @@ func TestParseArgs(t *testing.T) {
170169 },
171170
172171 {
173- name : "Proper syntax of syn2mas" ,
174- args : []string {"cmd" , "syn2mas" , "-config" , "file1" , "-synapse-config" , "file2" },
172+ name : "Proper syntax of syn2mas" ,
173+ args : []string {"cmd" , "syn2mas" , "-config" , "file1" , "-synapse-config" , "file2" },
175174 expected : & Options {
176175 Syn2Mas : & syn2mas.Syn2MasOptions {
177- MASConfig : "file1" ,
176+ MASConfig : "file1" ,
178177 SynapseConfig : "file2" ,
179178 },
180179 Command : Syn2Mas ,
181180 },
182- err : false ,
181+ err : false ,
183182 },
184183 {
185- name : "Wrong syntax of syn2mas" ,
186- args : []string {"cmd" , "syn2mas" },
184+ name : "Wrong syntax of syn2mas" ,
185+ args : []string {"cmd" , "syn2mas" },
187186 expected : & Options {
188187 Command : Syn2Mas ,
189188 },
190- err : true ,
189+ err : true ,
191190 },
192191 }
193192
194193 for _ , tc := range testCases {
195194 t .Run (tc .name , func (t * testing.T ) {
196- options , err := ParseArgs (tc .args );
195+ options , err := ParseArgs (tc .args )
197196 if tc .err {
198197 assert .Error (t , err )
199198 assert .Nil (t , options )
0 commit comments