@@ -44,7 +44,9 @@ type erroringFakeClient struct {
44
44
UpdateError bool
45
45
}
46
46
47
- func (c * erroringFakeClient ) Get (ctx context.Context , key client.ObjectKey , obj client.Object ) error {
47
+ func (c * erroringFakeClient ) Get (
48
+ ctx context.Context , key client.ObjectKey , obj client.Object , _ ... client.GetOption ,
49
+ ) error {
48
50
if c .GetError {
49
51
return errors .New ("some get error" )
50
52
}
@@ -81,7 +83,7 @@ func (c *erroringFakeClient) Update(ctx context.Context, obj client.Object, opts
81
83
func generateSecret () * corev1.Secret {
82
84
key := make ([]byte , keySize / 8 )
83
85
_ , err := rand .Read (key )
84
- Expect (err ).To ( BeNil ())
86
+ Expect (err ).ToNot ( HaveOccurred ())
85
87
86
88
encryptionSecret := & corev1.Secret {
87
89
ObjectMeta : metav1.ObjectMeta {
@@ -93,7 +95,7 @@ func generateSecret() *corev1.Secret {
93
95
94
96
prevKey := make ([]byte , keySize / 8 )
95
97
_ , err = rand .Read (prevKey )
96
- Expect (err ).To ( BeNil ())
98
+ Expect (err ).ToNot ( HaveOccurred ())
97
99
98
100
encryptionSecret .Data ["previousKey" ] = prevKey
99
101
@@ -190,9 +192,9 @@ func getReconciler(encryptionSecret *corev1.Secret) *EncryptionKeysReconciler {
190
192
191
193
scheme := k8sruntime .NewScheme ()
192
194
err := clientgoscheme .AddToScheme (scheme )
193
- Expect (err ).To ( BeNil ())
195
+ Expect (err ).ToNot ( HaveOccurred ())
194
196
err = v1 .AddToScheme (scheme )
195
- Expect (err ).To ( BeNil ())
197
+ Expect (err ).ToNot ( HaveOccurred ())
196
198
197
199
builder := fake .NewClientBuilder ().WithObjects (policies ... ).WithScheme (scheme )
198
200
@@ -213,7 +215,7 @@ func getReconciler(encryptionSecret *corev1.Secret) *EncryptionKeysReconciler {
213
215
func assertTriggerUpdate (r * EncryptionKeysReconciler ) {
214
216
policyList := v1.PolicyList {}
215
217
err := r .List (context .TODO (), & policyList )
216
- Expect (err ).To ( BeNil ())
218
+ Expect (err ).ToNot ( HaveOccurred ())
217
219
218
220
for _ , policy := range policyList .Items {
219
221
annotation := policy .Annotations [propagator .TriggerUpdateAnnotation ]
@@ -230,7 +232,7 @@ func assertTriggerUpdate(r *EncryptionKeysReconciler) {
230
232
func assertNoTriggerUpdate (r * EncryptionKeysReconciler ) {
231
233
policyList := v1.PolicyList {}
232
234
err := r .List (context .TODO (), & policyList )
233
- Expect (err ).To ( BeNil ())
235
+ Expect (err ).ToNot ( HaveOccurred ())
234
236
235
237
for _ , policy := range policyList .Items {
236
238
annotation := policy .Annotations [propagator .TriggerUpdateAnnotation ]
@@ -267,12 +269,12 @@ func TestReconcileRotateKey(t *testing.T) {
267
269
request := ctrl.Request {NamespacedName : secretID }
268
270
result , err := r .Reconcile (context .TODO (), request )
269
271
270
- Expect (err ).To ( BeNil ())
272
+ Expect (err ).ToNot ( HaveOccurred ())
271
273
Expect (result .Requeue ).To (BeFalse ())
272
274
Expect (getRequeueAfterDays (result )).To (Equal (30 ))
273
275
274
276
err = r .Get (context .TODO (), secretID , encryptionSecret )
275
- Expect (err ).To ( BeNil ())
277
+ Expect (err ).ToNot ( HaveOccurred ())
276
278
Expect (bytes .Equal (encryptionSecret .Data ["key" ], originalKey )).To (BeFalse ())
277
279
Expect (bytes .Equal (encryptionSecret .Data ["previousKey" ], originalKey )).To (BeTrue ())
278
280
@@ -301,11 +303,11 @@ func TestReconcileNoRotation(t *testing.T) {
301
303
request := ctrl.Request {NamespacedName : secretID }
302
304
result , err := r .Reconcile (context .TODO (), request )
303
305
304
- Expect (err ).To ( BeNil ())
306
+ Expect (err ).ToNot ( HaveOccurred ())
305
307
Expect (getRequeueAfterDays (result )).To (Equal (30 ))
306
308
307
309
err = r .Get (context .TODO (), secretID , encryptionSecret )
308
- Expect (err ).To ( BeNil ())
310
+ Expect (err ).ToNot ( HaveOccurred ())
309
311
Expect (bytes .Equal (encryptionSecret .Data ["key" ], originalKey )).To (BeTrue ())
310
312
Expect (bytes .Equal (encryptionSecret .Data ["previousKey" ], originalKey )).To (BeFalse ())
311
313
@@ -324,12 +326,12 @@ func TestReconcileNotFound(t *testing.T) {
324
326
request := ctrl.Request {NamespacedName : secretID }
325
327
result , err := r .Reconcile (context .TODO (), request )
326
328
327
- Expect (err ).To ( BeNil ())
329
+ Expect (err ).ToNot ( HaveOccurred ())
328
330
Expect (result .RequeueAfter ).To (Equal (time .Duration (0 )))
329
331
330
332
policyList := v1.PolicyList {}
331
333
err = r .List (context .TODO (), & policyList )
332
- Expect (err ).To ( BeNil ())
334
+ Expect (err ).ToNot ( HaveOccurred ())
333
335
334
336
for _ , policy := range policyList .Items {
335
337
annotation := policy .Annotations [propagator .TriggerUpdateAnnotation ]
@@ -358,12 +360,12 @@ func TestReconcileManualRotation(t *testing.T) {
358
360
request := ctrl.Request {NamespacedName : secretID }
359
361
result , err := r .Reconcile (context .TODO (), request )
360
362
361
- Expect (err ).To ( BeNil ())
363
+ Expect (err ).ToNot ( HaveOccurred ())
362
364
Expect (result .Requeue ).To (BeFalse ())
363
365
Expect (result .RequeueAfter ).To (Equal (time .Duration (0 )))
364
366
365
367
err = r .Get (context .TODO (), secretID , encryptionSecret )
366
- Expect (err ).To ( BeNil ())
368
+ Expect (err ).ToNot ( HaveOccurred ())
367
369
Expect (bytes .Equal (encryptionSecret .Data ["key" ], originalKey )).To (BeTrue ())
368
370
Expect (bytes .Equal (encryptionSecret .Data ["previousKey" ], originalPrevKey )).To (BeTrue ())
369
371
@@ -390,14 +392,14 @@ func TestReconcileInvalidKey(t *testing.T) {
390
392
request := ctrl.Request {NamespacedName : secretID }
391
393
result , err := r .Reconcile (context .TODO (), request )
392
394
393
- Expect (err ).To ( BeNil ())
395
+ Expect (err ).ToNot ( HaveOccurred ())
394
396
Expect (result .Requeue ).To (BeFalse ())
395
397
Expect (getRequeueAfterDays (result )).To (Equal (30 ))
396
398
397
399
err = r .Get (context .TODO (), secretID , encryptionSecret )
398
- Expect (err ).To ( BeNil ())
400
+ Expect (err ).ToNot ( HaveOccurred ())
399
401
Expect (bytes .Equal (encryptionSecret .Data ["key" ], originalKey )).To (BeFalse ())
400
- Expect (len ( encryptionSecret .Data ["previousKey" ])) .To (Equal ( 0 ))
402
+ Expect (encryptionSecret .Data ["previousKey" ]).To (BeEmpty ( ))
401
403
402
404
assertTriggerUpdate (r )
403
405
}
@@ -422,14 +424,14 @@ func TestReconcileInvalidPreviousKey(t *testing.T) {
422
424
request := ctrl.Request {NamespacedName : secretID }
423
425
result , err := r .Reconcile (context .TODO (), request )
424
426
425
- Expect (err ).To ( BeNil ())
427
+ Expect (err ).ToNot ( HaveOccurred ())
426
428
Expect (result .Requeue ).To (BeFalse ())
427
429
Expect (getRequeueAfterDays (result )).To (Equal (30 ))
428
430
429
431
err = r .Get (context .TODO (), secretID , encryptionSecret )
430
- Expect (err ).To ( BeNil ())
432
+ Expect (err ).ToNot ( HaveOccurred ())
431
433
Expect (bytes .Equal (encryptionSecret .Data ["key" ], originalKey )).To (BeTrue ())
432
- Expect (len ( encryptionSecret .Data ["previousKey" ])) .To (Equal ( 0 ))
434
+ Expect (encryptionSecret .Data ["previousKey" ]).To (BeEmpty ( ))
433
435
434
436
assertNoTriggerUpdate (r )
435
437
}
@@ -451,7 +453,7 @@ func TestReconcileSecretNotFiltered(t *testing.T) {
451
453
request := ctrl.Request {NamespacedName : secretID }
452
454
result , err := r .Reconcile (context .TODO (), request )
453
455
454
- Expect (err ).To ( BeNil ())
456
+ Expect (err ).ToNot ( HaveOccurred ())
455
457
Expect (result .Requeue ).To (BeFalse ())
456
458
Expect (result .RequeueAfter ).To (Equal (time .Duration (0 )))
457
459
@@ -504,10 +506,10 @@ func TestReconcileAPIFails(t *testing.T) {
504
506
result , err := r .Reconcile (context .TODO (), request )
505
507
506
508
if ! test .ExpectedRotation {
507
- Expect (err ).ShouldNot ( BeNil ())
509
+ Expect (err ).Should ( HaveOccurred ())
508
510
Expect (result .RequeueAfter ).Should (Equal (time .Duration (0 )))
509
511
} else {
510
- Expect (err ).Should ( BeNil ())
512
+ Expect (err ).ShouldNot ( HaveOccurred ())
511
513
Expect (result .RequeueAfter ).ShouldNot (Equal (time .Duration (0 )))
512
514
}
513
515
@@ -517,7 +519,7 @@ func TestReconcileAPIFails(t *testing.T) {
517
519
r .Client = erroringClient .Client
518
520
519
521
err = r .Get (context .TODO (), client .ObjectKeyFromObject (encryptionSecret ), encryptionSecret )
520
- Expect (err ).Should ( BeNil ())
522
+ Expect (err ).ShouldNot ( HaveOccurred ())
521
523
522
524
if test .ExpectedRotation {
523
525
Expect (bytes .Equal (originalKey , encryptionSecret .Data ["key" ])).Should (BeFalse ())
0 commit comments