@@ -111,13 +111,11 @@ func Test_retainK8sWorkloadReplicas(t *testing.T) {
111
111
}
112
112
113
113
func Test_retainSecretServiceAccountToken (t * testing.T ) {
114
- createSecret := func (secretType corev1.SecretType , uuid , key , value string ) * unstructured.Unstructured {
114
+ createSecret := func (secretType corev1.SecretType , dataKey , dataValue string ) * unstructured.Unstructured {
115
115
ret , _ := helper .ToUnstructured (& corev1.Secret {
116
- ObjectMeta : metav1.ObjectMeta {
117
- Annotations : map [string ]string {corev1 .ServiceAccountUIDKey : uuid },
118
- },
119
- Data : map [string ][]byte {key : []byte (value )},
120
- Type : secretType ,
116
+ ObjectMeta : metav1.ObjectMeta {},
117
+ Data : map [string ][]byte {dataKey : []byte (dataValue )},
118
+ Type : secretType ,
121
119
})
122
120
return ret
123
121
}
@@ -134,10 +132,10 @@ func Test_retainSecretServiceAccountToken(t *testing.T) {
134
132
{
135
133
name : "secret data and uid are retained for type service-account-token" ,
136
134
args : args {
137
- desired : createSecret (corev1 .SecretTypeServiceAccountToken , "111" , corev1 .ServiceAccountTokenKey , "desired-token" ),
138
- observed : createSecret (corev1 .SecretTypeServiceAccountToken , "999" , corev1 .ServiceAccountTokenKey , "observed-token" ),
135
+ desired : createSecret (corev1 .SecretTypeServiceAccountToken , corev1 .ServiceAccountTokenKey , "desired-token" ),
136
+ observed : createSecret (corev1 .SecretTypeServiceAccountToken , corev1 .ServiceAccountTokenKey , "observed-token" ),
139
137
},
140
- want : createSecret (corev1 .SecretTypeServiceAccountToken , "999" , corev1 .ServiceAccountTokenKey , "observed-token" ),
138
+ want : createSecret (corev1 .SecretTypeServiceAccountToken , corev1 .ServiceAccountTokenKey , "observed-token" ),
141
139
},
142
140
{
143
141
name : "ignores missing uid and data for type service-account-token" ,
@@ -150,26 +148,26 @@ func Test_retainSecretServiceAccountToken(t *testing.T) {
150
148
{
151
149
name : "does not retain for type tls" ,
152
150
args : args {
153
- desired : createSecret (corev1 .SecretTypeTLS , "111" , corev1 .TLSCertKey , "desired-cert" ),
154
- observed : createSecret (corev1 .SecretTypeTLS , "999" , corev1 .TLSCertKey , "observed-cert" ),
151
+ desired : createSecret (corev1 .SecretTypeTLS , corev1 .TLSCertKey , "desired-cert" ),
152
+ observed : createSecret (corev1 .SecretTypeTLS , corev1 .TLSCertKey , "observed-cert" ),
155
153
},
156
- want : createSecret (corev1 .SecretTypeTLS , "111" , corev1 .TLSCertKey , "desired-cert" ),
154
+ want : createSecret (corev1 .SecretTypeTLS , corev1 .TLSCertKey , "desired-cert" ),
157
155
},
158
156
{
159
157
name : "does not retain for type basic-auth" ,
160
158
args : args {
161
- desired : createSecret (corev1 .SecretTypeBasicAuth , "111" , corev1 .BasicAuthUsernameKey , "desired-user" ),
162
- observed : createSecret (corev1 .SecretTypeBasicAuth , "999" , corev1 .BasicAuthUsernameKey , "observed-user" ),
159
+ desired : createSecret (corev1 .SecretTypeBasicAuth , corev1 .BasicAuthUsernameKey , "desired-user" ),
160
+ observed : createSecret (corev1 .SecretTypeBasicAuth , corev1 .BasicAuthUsernameKey , "observed-user" ),
163
161
},
164
- want : createSecret (corev1 .SecretTypeBasicAuth , "111" , corev1 .BasicAuthUsernameKey , "desired-user" ),
162
+ want : createSecret (corev1 .SecretTypeBasicAuth , corev1 .BasicAuthUsernameKey , "desired-user" ),
165
163
},
166
164
{
167
165
name : "does not retain for type dockercfg" ,
168
166
args : args {
169
- desired : createSecret (corev1 .SecretTypeDockercfg , "111" , corev1 .DockerConfigKey , "desired-docker-cfg" ),
170
- observed : createSecret (corev1 .SecretTypeDockercfg , "999" , corev1 .DockerConfigKey , "observed-docker-cfg" ),
167
+ desired : createSecret (corev1 .SecretTypeDockercfg , corev1 .DockerConfigKey , "desired-docker-cfg" ),
168
+ observed : createSecret (corev1 .SecretTypeDockercfg , corev1 .DockerConfigKey , "observed-docker-cfg" ),
171
169
},
172
- want : createSecret (corev1 .SecretTypeDockercfg , "111" , corev1 .DockerConfigKey , "desired-docker-cfg" ),
170
+ want : createSecret (corev1 .SecretTypeDockercfg , corev1 .DockerConfigKey , "desired-docker-cfg" ),
173
171
},
174
172
}
175
173
for _ , tt := range tests {
0 commit comments