@@ -34,7 +34,7 @@ import (
34
34
35
35
infrav1 "sigs.k8s.io/cluster-api-provider-aws/v2/api/v1beta2"
36
36
"sigs.k8s.io/cluster-api-provider-aws/v2/pkg/cloud/scope"
37
- "sigs.k8s.io/cluster-api-provider-aws/v2/pkg/cloud/services/secretsmanager/mock_secretsmanageriface "
37
+ "sigs.k8s.io/cluster-api-provider-aws/v2/test/mocks "
38
38
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1"
39
39
)
40
40
@@ -89,15 +89,15 @@ func TestServiceCreate(t *testing.T) {
89
89
secretPrefix string
90
90
expectedPrefix string
91
91
wantErr bool
92
- expect func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder )
92
+ expect func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder )
93
93
}{
94
94
{
95
95
name : "Should not store data in secret manager if data is having zero bytes" ,
96
96
bytesCount : 0 ,
97
97
secretPrefix : "/awsprefix" ,
98
98
expectedPrefix : "/awsprefix" ,
99
99
wantErr : false ,
100
- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
100
+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
101
101
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Times (0 )
102
102
},
103
103
},
@@ -107,7 +107,7 @@ func TestServiceCreate(t *testing.T) {
107
107
secretPrefix : "prefix" ,
108
108
expectedPrefix : "prefix" ,
109
109
wantErr : false ,
110
- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
110
+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
111
111
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).MinTimes (1 ).Return (& secretsmanager.CreateSecretOutput {}, nil ).Do (
112
112
func (ctx context.Context , createSecretInput * secretsmanager.CreateSecretInput , optFns ... func (* secretsmanager.Options )) {
113
113
g .Expect (* (createSecretInput .Name )).To (HavePrefix ("prefix-" ))
@@ -123,7 +123,7 @@ func TestServiceCreate(t *testing.T) {
123
123
secretPrefix : "/prefix" ,
124
124
expectedPrefix : "/prefix" ,
125
125
wantErr : true ,
126
- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
126
+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
127
127
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.InternalServiceError {}).Do (
128
128
func (ctx context.Context , createSecretInput * secretsmanager.CreateSecretInput , optFns ... func (* secretsmanager.Options )) {
129
129
g .Expect (* (createSecretInput .Name )).To (HavePrefix ("/prefix-" ))
@@ -139,7 +139,7 @@ func TestServiceCreate(t *testing.T) {
139
139
secretPrefix : "" ,
140
140
expectedPrefix : "aws.cluster.x-k8s.io" ,
141
141
wantErr : false ,
142
- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
142
+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
143
143
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.InvalidRequestException {})
144
144
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.ResourceNotFoundException {})
145
145
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (& secretsmanager.CreateSecretOutput {}, nil )
@@ -151,7 +151,7 @@ func TestServiceCreate(t *testing.T) {
151
151
secretPrefix : "" ,
152
152
expectedPrefix : "aws.cluster.x-k8s.io" ,
153
153
wantErr : false ,
154
- expect : func (g * WithT , m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
154
+ expect : func (g * WithT , m * mocks .MockSecretsManagerAPIMockRecorder ) {
155
155
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (nil , & types.ResourceExistsException {})
156
156
m .DeleteSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.DeleteSecretInput {})).Return (& secretsmanager.DeleteSecretOutput {}, nil )
157
157
m .CreateSecret (gomock .Any (), gomock .AssignableToTypeOf (& secretsmanager.CreateSecretInput {})).Return (& secretsmanager.CreateSecretOutput {}, nil )
@@ -167,7 +167,7 @@ func TestServiceCreate(t *testing.T) {
167
167
clusterScope , err := getClusterScope (client )
168
168
g .Expect (err ).NotTo (HaveOccurred ())
169
169
170
- secretManagerClientMock := mock_secretsmanageriface .NewMockSecretsManagerAPI (mockCtrl )
170
+ secretManagerClientMock := mocks .NewMockSecretsManagerAPI (mockCtrl )
171
171
tt .expect (g , secretManagerClientMock .EXPECT ())
172
172
s := NewService (clusterScope )
173
173
s .SecretsManagerClient = secretManagerClientMock
@@ -189,7 +189,7 @@ func TestServiceDelete(t *testing.T) {
189
189
tests := []struct {
190
190
name string
191
191
secretCount int32
192
- expect func (m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder )
192
+ expect func (m * mocks .MockSecretsManagerAPIMockRecorder )
193
193
check func (* WithT , error )
194
194
}{
195
195
{
@@ -202,7 +202,7 @@ func TestServiceDelete(t *testing.T) {
202
202
{
203
203
name : "Should not return error when delete is successful" ,
204
204
secretCount : 1 ,
205
- expect : func (m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
205
+ expect : func (m * mocks .MockSecretsManagerAPIMockRecorder ) {
206
206
m .DeleteSecret (gomock .Any (), gomock .Eq (& secretsmanager.DeleteSecretInput {
207
207
SecretId : aws .String ("prefix-0" ),
208
208
ForceDeleteWithoutRecovery : aws .Bool (true ),
@@ -215,7 +215,7 @@ func TestServiceDelete(t *testing.T) {
215
215
{
216
216
name : "Should return all errors except not found errors" ,
217
217
secretCount : 3 ,
218
- expect : func (m * mock_secretsmanageriface .MockSecretsManagerAPIMockRecorder ) {
218
+ expect : func (m * mocks .MockSecretsManagerAPIMockRecorder ) {
219
219
m .DeleteSecret (gomock .Any (), gomock .Eq (& secretsmanager.DeleteSecretInput {
220
220
SecretId : aws .String ("prefix-0" ),
221
221
ForceDeleteWithoutRecovery : aws .Bool (true ),
@@ -242,7 +242,7 @@ func TestServiceDelete(t *testing.T) {
242
242
clusterScope , err := getClusterScope (client )
243
243
g .Expect (err ).NotTo (HaveOccurred ())
244
244
245
- secretManagerClientMock := mock_secretsmanageriface .NewMockSecretsManagerAPI (mockCtrl )
245
+ secretManagerClientMock := mocks .NewMockSecretsManagerAPI (mockCtrl )
246
246
if tt .expect != nil {
247
247
tt .expect (secretManagerClientMock .EXPECT ())
248
248
}
0 commit comments