@@ -60,7 +60,7 @@ func TestNewTXTRegistryEncryptionConfig(t *testing.T) {
60
60
},
61
61
}
62
62
for _ , test := range tests {
63
- actual , err := NewTXTRegistry (p , "txt." , "" , "owner" , time .Hour , "" , []string {}, []string {}, test .encEnabled , test .aesKeyRaw )
63
+ actual , err := NewTXTRegistry (p , "txt." , "" , "owner" , time .Hour , "" , []string {}, []string {}, test .encEnabled , test .aesKeyRaw , false )
64
64
if test .errorExpected {
65
65
require .Error (t , err )
66
66
} else {
@@ -106,7 +106,7 @@ func TestGenerateTXTGenerateTextRecordEncryptionWihDecryption(t *testing.T) {
106
106
for _ , k := range withEncryptionKeys {
107
107
t .Run (fmt .Sprintf ("key '%s' with decrypted result '%s'" , k , test .decrypted ), func (t * testing.T ) {
108
108
key := []byte (k )
109
- r , err := NewTXTRegistry (p , "" , "" , "owner" , time .Minute , "" , []string {}, []string {}, true , key )
109
+ r , err := NewTXTRegistry (p , "" , "" , "owner" , time .Minute , "" , []string {}, []string {}, true , key , false )
110
110
assert .NoError (t , err , "Error creating TXT registry" )
111
111
txtRecords := r .generateTXTRecord (test .record )
112
112
assert .Len (t , txtRecords , len (test .record .Targets ))
@@ -143,7 +143,7 @@ func TestApplyRecordsWithEncryption(t *testing.T) {
143
143
144
144
key := []byte ("ZPitL0NGVQBZbTD6DwXJzD8RiStSazzYXQsdUowLURY=" )
145
145
146
- r , _ := NewTXTRegistry (p , "" , "" , "owner" , time .Hour , "" , []string {}, []string {}, true , key )
146
+ r , _ := NewTXTRegistry (p , "" , "" , "owner" , time .Hour , "" , []string {}, []string {}, true , key , false )
147
147
148
148
_ = r .ApplyChanges (ctx , & plan.Changes {
149
149
Create : []* endpoint.Endpoint {
@@ -201,7 +201,7 @@ func TestApplyRecordsWithEncryptionKeyChanged(t *testing.T) {
201
201
}
202
202
203
203
for _ , key := range withEncryptionKeys {
204
- r , _ := NewTXTRegistry (p , "" , "" , "owner" , time .Hour , "" , []string {}, []string {}, true , []byte (key ))
204
+ r , _ := NewTXTRegistry (p , "" , "" , "owner" , time .Hour , "" , []string {}, []string {}, true , []byte (key ), false )
205
205
_ = r .ApplyChanges (ctx , & plan.Changes {
206
206
Create : []* endpoint.Endpoint {
207
207
newEndpointWithOwner ("new-record-1.test-zone.example.org" , "new-loadbalancer-1.lb.com" , endpoint .RecordTypeCNAME , "owner" ),
@@ -231,7 +231,7 @@ func TestApplyRecordsOnEncryptionKeyChangeWithKeyIdLabel(t *testing.T) {
231
231
}
232
232
233
233
for i , key := range withEncryptionKeys {
234
- r , _ := NewTXTRegistry (p , "" , "" , "owner" , time .Hour , "" , []string {}, []string {}, true , []byte (key ))
234
+ r , _ := NewTXTRegistry (p , "" , "" , "owner" , time .Hour , "" , []string {}, []string {}, true , []byte (key ), false )
235
235
keyId := fmt .Sprintf ("key-id-%d" , i )
236
236
changes := []* endpoint.Endpoint {
237
237
newEndpointWithOwnerAndOwnedRecordWithKeyIDLabel ("new-record-1.test-zone.example.org" , "new-loadbalancer-1.lb.com" , endpoint .RecordTypeCNAME , "owner" , "" , keyId ),
0 commit comments