@@ -198,9 +198,9 @@ func TestExtractResourceListFromReading(t *testing.T) {
198198 Items : []* api.GatheredResource {
199199 {
200200 Resource : & unstructured.Unstructured {
201- Object : map [string ]interface {} {
201+ Object : map [string ]any {
202202 "kind" : "Namespace" ,
203- "metadata" : map [string ]interface {} {
203+ "metadata" : map [string ]any {
204204 "name" : "default" ,
205205 "uid" : "uid-default" ,
206206 },
@@ -209,9 +209,9 @@ func TestExtractResourceListFromReading(t *testing.T) {
209209 },
210210 {
211211 Resource : & unstructured.Unstructured {
212- Object : map [string ]interface {} {
212+ Object : map [string ]any {
213213 "kind" : "Namespace" ,
214- "metadata" : map [string ]interface {} {
214+ "metadata" : map [string ]any {
215215 "name" : "kube-system" ,
216216 "uid" : "uid-kube-system" ,
217217 },
@@ -222,9 +222,9 @@ func TestExtractResourceListFromReading(t *testing.T) {
222222 {
223223 DeletedAt : api.Time {Time : time .Now ()},
224224 Resource : & unstructured.Unstructured {
225- Object : map [string ]interface {} {
225+ Object : map [string ]any {
226226 "kind" : "Namespace" ,
227- "metadata" : map [string ]interface {} {
227+ "metadata" : map [string ]any {
228228 "name" : "kube-system" ,
229229 "uid" : "uid-kube-system" ,
230230 },
@@ -384,10 +384,10 @@ func TestMinimizeSnapshot(t *testing.T) {
384384 secretWithoutClientCert := newTLSSecret ("tls-secret-without-client" , sampleCertificateChain (t , x509 .ExtKeyUsageServerAuth ))
385385 opaqueSecret := newOpaqueSecret ("opaque-secret" )
386386 serviceAccount := & unstructured.Unstructured {
387- Object : map [string ]interface {} {
387+ Object : map [string ]any {
388388 "apiVersion" : "v1" ,
389389 "kind" : "ServiceAccount" ,
390- "metadata" : map [string ]interface {} {
390+ "metadata" : map [string ]any {
391391 "name" : "my-service-account" ,
392392 "namespace" : "default" ,
393393 },
@@ -491,10 +491,10 @@ func TestIsExcludableSecret(t *testing.T) {
491491 {
492492 name : "Non-secret" ,
493493 secret : & unstructured.Unstructured {
494- Object : map [string ]interface {} {
494+ Object : map [string ]any {
495495 "apiVersion" : "cert-manager/v1" ,
496496 "kind" : "Certificate" ,
497- "metadata" : map [string ]interface {} {
497+ "metadata" : map [string ]any {
498498 "name" : "non-secret" ,
499499 "namespace" : "default" ,
500500 },
@@ -541,16 +541,16 @@ func TestIsExcludableSecret(t *testing.T) {
541541
542542// newTLSSecret creates a Kubernetes TLS secret with the given name and certificate data.
543543// If crt is nil, the secret will not contain a "tls.crt" entry.
544- func newTLSSecret (name string , crt interface {} ) * unstructured.Unstructured {
545- data := map [string ]interface {} {"tls.key" : "dummy-key" }
544+ func newTLSSecret (name string , crt any ) * unstructured.Unstructured {
545+ data := map [string ]any {"tls.key" : "dummy-key" }
546546 if crt != nil {
547547 data ["tls.crt" ] = crt
548548 }
549549 return & unstructured.Unstructured {
550- Object : map [string ]interface {} {
550+ Object : map [string ]any {
551551 "apiVersion" : "v1" ,
552552 "kind" : "Secret" ,
553- "metadata" : map [string ]interface {} {
553+ "metadata" : map [string ]any {
554554 "name" : name ,
555555 "namespace" : "default" ,
556556 },
@@ -563,15 +563,15 @@ func newTLSSecret(name string, crt interface{}) *unstructured.Unstructured {
563563// newOpaqueSecret creates a Kubernetes Opaque secret with the given name.
564564func newOpaqueSecret (name string ) * unstructured.Unstructured {
565565 return & unstructured.Unstructured {
566- Object : map [string ]interface {} {
566+ Object : map [string ]any {
567567 "apiVersion" : "v1" ,
568568 "kind" : "Secret" ,
569- "metadata" : map [string ]interface {} {
569+ "metadata" : map [string ]any {
570570 "name" : name ,
571571 "namespace" : "default" ,
572572 },
573573 "type" : "Opaque" ,
574- "data" : map [string ]interface {} {
574+ "data" : map [string ]any {
575575 "key" : "value" ,
576576 },
577577 },
0 commit comments