@@ -34,7 +34,7 @@ import (
3434
3535 infrav1 "sigs.k8s.io/cluster-api-provider-aws/v2/api/v1beta2"
3636 "sigs.k8s.io/cluster-api-provider-aws/v2/pkg/cloud/scope"
37- "sigs.k8s.io/cluster-api-provider-aws/v2/pkg/cloud/services/secretsmanager/mock_secretsmanageriface "
37+ "sigs.k8s.io/cluster-api-provider-aws/v2/test/mocks "
3838 clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
3939)
4040
@@ -89,15 +89,15 @@ func TestServiceCreate(t *testing.T) {
8989 secretPrefix string
9090 expectedPrefix string
9191 wantErr bool
92- expect func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder )
92+ expect func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder )
9393 }{
9494 {
9595 name : "Should not store data in secret manager if data is having zero bytes" ,
9696 bytesCount : 0 ,
9797 secretPrefix : "/awsprefix" ,
9898 expectedPrefix : "/awsprefix" ,
9999 wantErr : false ,
100- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
100+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
101101 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Times (0 )
102102 },
103103 },
@@ -107,7 +107,7 @@ func TestServiceCreate(t *testing.T) {
107107 secretPrefix : "prefix" ,
108108 expectedPrefix : "prefix" ,
109109 wantErr : false ,
110- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
110+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
111111 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).MinTimes (1 ).Return (& secretsmanager.CreateSecretOutput {}, nil ).Do (
112112 func (ctx context.Context , createSecretInput * secretsmanager.CreateSecretInput , optFns ... func (* secretsmanager.Options )) {
113113 g .Expect (* (createSecretInput .Name )).To (HavePrefix ("prefix-" ))
@@ -123,7 +123,7 @@ func TestServiceCreate(t *testing.T) {
123123 secretPrefix : "/prefix" ,
124124 expectedPrefix : "/prefix" ,
125125 wantErr : true ,
126- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
126+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
127127 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.InternalServiceError {}).Do (
128128 func (ctx context.Context , createSecretInput * secretsmanager.CreateSecretInput , optFns ... func (* secretsmanager.Options )) {
129129 g .Expect (* (createSecretInput .Name )).To (HavePrefix ("/prefix-" ))
@@ -139,7 +139,7 @@ func TestServiceCreate(t *testing.T) {
139139 secretPrefix : "" ,
140140 expectedPrefix : "aws.cluster.x-k8s.io" ,
141141 wantErr : false ,
142- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
142+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
143143 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.InvalidRequestException {})
144144 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.ResourceNotFoundException {})
145145 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (& secretsmanager.CreateSecretOutput {}, nil )
@@ -151,7 +151,7 @@ func TestServiceCreate(t *testing.T) {
151151 secretPrefix : "" ,
152152 expectedPrefix : "aws.cluster.x-k8s.io" ,
153153 wantErr : false ,
154- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
154+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
155155 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.ResourceExistsException {})
156156 m .DeleteSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.DeleteSecretInput {})).Return (& secretsmanager.DeleteSecretOutput {}, nil )
157157 m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (& secretsmanager.CreateSecretOutput {}, nil )
@@ -167,7 +167,7 @@ func TestServiceCreate(t *testing.T) {
167167 clusterScope , err := getClusterScope (client )
168168 g .Expect (err ).NotTo (HaveOccurred ())
169169
170- secretManagerClientMock := mock_secretsmanageriface .NewMockSecretsManagerAPI (mockCtrl )
170+ secretManagerClientMock := mocks .NewMockSecretsManagerAPI (mockCtrl )
171171 tt .expect (g , secretManagerClientMock .EXPECT ())
172172 s := NewService (clusterScope )
173173 s .SecretsManagerClient = secretManagerClientMock
@@ -189,7 +189,7 @@ func TestServiceDelete(t *testing.T) {
189189 tests := []struct {
190190 name string
191191 secretCount int32
192- expect func (m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder )
192+ expect func (m * mocks .MockSecretsManagerAPIMockRecorder )
193193 check func (* WithT , error )
194194 }{
195195 {
@@ -202,7 +202,7 @@ func TestServiceDelete(t *testing.T) {
202202 {
203203 name : "Should not return error when delete is successful" ,
204204 secretCount : 1 ,
205- expect : func (m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
205+ expect : func (m * mocks .MockSecretsManagerAPIMockRecorder ) {
206206 m .DeleteSecret (gomock .Any (), gomock .Eq (& secretsmanager.DeleteSecretInput {
207207 SecretId : aws .String ("prefix-0" ),
208208 ForceDeleteWithoutRecovery : aws .Bool (true ),
@@ -215,7 +215,7 @@ func TestServiceDelete(t *testing.T) {
215215 {
216216 name : "Should return all errors except not found errors" ,
217217 secretCount : 3 ,
218- expect : func (m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
218+ expect : func (m * mocks .MockSecretsManagerAPIMockRecorder ) {
219219 m .DeleteSecret (gomock .Any (), gomock .Eq (& secretsmanager.DeleteSecretInput {
220220 SecretId : aws .String ("prefix-0" ),
221221 ForceDeleteWithoutRecovery : aws .Bool (true ),
@@ -242,7 +242,7 @@ func TestServiceDelete(t *testing.T) {
242242 clusterScope , err := getClusterScope (client )
243243 g .Expect (err ).NotTo (HaveOccurred ())
244244
245- secretManagerClientMock := mock_secretsmanageriface .NewMockSecretsManagerAPI (mockCtrl )
245+ secretManagerClientMock := mocks .NewMockSecretsManagerAPI (mockCtrl )
246246 if tt .expect != nil {
247247 tt .expect (secretManagerClientMock .EXPECT ())
248248 }
0 commit comments