@@ -95,6 +95,7 @@ func TestGenerateHelmValues_Target(t *testing.T) {
9595 IsMultiNodeEnabled : false ,
9696 Proxy : nil ,
9797 AdminConsolePort : 8080 ,
98+ IsV3 : true ,
9899
99100 ClusterID : "123" ,
100101 ServiceCIDR : "10.0.0.0/24" ,
@@ -106,10 +107,10 @@ func TestGenerateHelmValues_Target(t *testing.T) {
106107 values , err := adminConsole .GenerateHelmValues (context .Background (), nil , ecv1beta1.Domains {}, nil )
107108 require .NoError (t , err , "GenerateHelmValues should not return an error" )
108109
109- assert .Contains (t , values , "embeddedClusterID" )
110110 assert .Equal (t , "123" , values ["embeddedClusterID" ])
111111 assert .Equal (t , dataDir , values ["embeddedClusterDataDir" ])
112112 assert .Equal (t , filepath .Join (dataDir , "k0s" ), values ["embeddedClusterK0sDir" ])
113+ assert .Equal (t , true , values ["isEmbeddedClusterV3" ])
113114
114115 assert .Contains (t , values ["extraEnv" ], map [string ]interface {}{
115116 "name" : "SSL_CERT_CONFIGMAP" ,
@@ -128,6 +129,7 @@ func TestGenerateHelmValues_Target(t *testing.T) {
128129 IsMultiNodeEnabled : false ,
129130 Proxy : nil ,
130131 AdminConsolePort : 8080 ,
132+ IsV3 : true ,
131133 }
132134
133135 values , err := adminConsole .GenerateHelmValues (context .Background (), nil , ecv1beta1.Domains {}, nil )
@@ -136,6 +138,7 @@ func TestGenerateHelmValues_Target(t *testing.T) {
136138 assert .NotContains (t , values , "embeddedClusterID" )
137139 assert .NotContains (t , values , "embeddedClusterDataDir" )
138140 assert .NotContains (t , values , "embeddedClusterK0sDir" )
141+ assert .Equal (t , true , values ["isEmbeddedClusterV3" ])
139142
140143 for _ , env := range values ["extraEnv" ].([]map [string ]interface {}) {
141144 assert .NotEqual (t , "SSL_CERT_CONFIGMAP" , env ["name" ], "SSL_CERT_CONFIGMAP environment variable should not be set" )
0 commit comments