Skip to content

Commit

Permalink
fix(unit-test-coverage.yaml): Rename Package
Browse files Browse the repository at this point in the history
  • Loading branch information
LeelaChacha committed Feb 6, 2025
1 parent bb3ed6a commit a357a41
Show file tree
Hide file tree
Showing 7 changed files with 36 additions and 36 deletions.
10 changes: 5 additions & 5 deletions internal/controller/istiogatewaysecret/setup.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,10 +15,10 @@ import (
"sigs.k8s.io/controller-runtime/pkg/predicate"

"github.com/kyma-project/lifecycle-manager/api/shared"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/cabundle"
gatewaysecretclient "github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/client"
gatewaysecrethandler "github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler/cabundle"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler/legacy"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/legacy"
"github.com/kyma-project/lifecycle-manager/internal/pkg/flags"
"github.com/kyma-project/lifecycle-manager/pkg/queue"
)
Expand All @@ -34,7 +34,7 @@ func SetupReconciler(mgr ctrl.Manager, flagVar *flags.FlagVar, options ctrlrunti
options.MaxConcurrentReconciles = flagVar.MaxConcurrentWatcherReconciles

clnt := gatewaysecretclient.NewGatewaySecretRotationClient(mgr.GetConfig())
var parseLastModifiedFunc gatewaysecrethandler.TimeParserFunc = func(secret *apicorev1.Secret,
var parseLastModifiedFunc gatewaysecret.TimeParserFunc = func(secret *apicorev1.Secret,
annotation string,
) (time.Time, error) {
if strValue, ok := secret.Annotations[annotation]; ok {
Expand All @@ -45,7 +45,7 @@ func SetupReconciler(mgr ctrl.Manager, flagVar *flags.FlagVar, options ctrlrunti
return time.Time{}, fmt.Errorf("%w: %s", errCouldNotGetTimeFromAnnotation, annotation)
}

var handler gatewaysecrethandler.Handler
var handler gatewaysecret.Handler
if flagVar.UseLegacyStrategyForIstioGatewaySecret {
handler = legacy.NewGatewaySecretHandler(clnt, parseLastModifiedFunc)
} else {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ import (
apimetav1 "k8s.io/apimachinery/pkg/apis/meta/v1"

"github.com/kyma-project/lifecycle-manager/api/shared"
gatewaysecrethandler "github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret"
"github.com/kyma-project/lifecycle-manager/pkg/util"
)

Expand All @@ -19,12 +19,12 @@ const (
)

type Handler struct {
client gatewaysecrethandler.Client
parseLastModifiedTime gatewaysecrethandler.TimeParserFunc
client gatewaysecret.Client
parseLastModifiedTime gatewaysecret.TimeParserFunc
switchCertBeforeExpirationTime time.Duration
}

func NewGatewaySecretHandler(client gatewaysecrethandler.Client, timeParserFunc gatewaysecrethandler.TimeParserFunc,
func NewGatewaySecretHandler(client gatewaysecret.Client, timeParserFunc gatewaysecret.TimeParserFunc,
switchCertBeforeExpirationTime time.Duration,
) *Handler {
return &Handler{
Expand Down Expand Up @@ -63,7 +63,7 @@ func (h *Handler) createGatewaySecretFromRootSecret(ctx context.Context, rootSec
) error {
newSecret := &apicorev1.Secret{
TypeMeta: apimetav1.TypeMeta{
Kind: gatewaysecrethandler.SecretKind,
Kind: gatewaysecret.SecretKind,
APIVersion: apicorev1.SchemeGroupVersion.String(),
},
ObjectMeta: apimetav1.ObjectMeta{
Expand All @@ -73,11 +73,11 @@ func (h *Handler) createGatewaySecretFromRootSecret(ctx context.Context, rootSec
}

newSecret.Data = make(map[string][]byte)
newSecret.Data[gatewaysecrethandler.TLSCrt] = rootSecret.Data[gatewaysecrethandler.TLSCrt]
newSecret.Data[gatewaysecrethandler.TLSKey] = rootSecret.Data[gatewaysecrethandler.TLSKey]
newSecret.Data[gatewaysecrethandler.CACrt] = rootSecret.Data[gatewaysecrethandler.CACrt]
newSecret.Data[gatewaysecret.TLSCrt] = rootSecret.Data[gatewaysecret.TLSCrt]
newSecret.Data[gatewaysecret.TLSKey] = rootSecret.Data[gatewaysecret.TLSKey]
newSecret.Data[gatewaysecret.CACrt] = rootSecret.Data[gatewaysecret.CACrt]

newSecret.Data[caBundleTempCertKey] = rootSecret.Data[gatewaysecrethandler.CACrt]
newSecret.Data[caBundleTempCertKey] = rootSecret.Data[gatewaysecret.CACrt]
setLastModifiedToNow(newSecret)
setCurrentCAExpiration(newSecret, caCert)

Expand Down Expand Up @@ -119,12 +119,12 @@ func setCurrentCAExpiration(secret *apicorev1.Secret, caCert *certmanagerv1.Cert

func bundleCACrt(gatewaySecret *apicorev1.Secret, rootSecret *apicorev1.Secret) {
//nolint:gocritic // we need to append the new CA cert to the existing CA cert
gatewaySecret.Data[gatewaysecrethandler.CACrt] = append(rootSecret.Data[gatewaysecrethandler.CACrt],
gatewaySecret.Data[gatewaysecret.CACrt] = append(rootSecret.Data[gatewaysecret.CACrt],
gatewaySecret.Data[caBundleTempCertKey]...)
gatewaySecret.Data[caBundleTempCertKey] = rootSecret.Data[gatewaysecrethandler.CACrt]
gatewaySecret.Data[caBundleTempCertKey] = rootSecret.Data[gatewaysecret.CACrt]
}

func switchCertificate(gatewaySecret *apicorev1.Secret, rootSecret *apicorev1.Secret) {
gatewaySecret.Data[gatewaysecrethandler.TLSCrt] = rootSecret.Data[gatewaysecrethandler.TLSCrt]
gatewaySecret.Data[gatewaysecrethandler.TLSKey] = rootSecret.Data[gatewaysecrethandler.TLSKey]
gatewaySecret.Data[gatewaysecret.TLSCrt] = rootSecret.Data[gatewaysecret.TLSCrt]
gatewaySecret.Data[gatewaysecret.TLSKey] = rootSecret.Data[gatewaysecret.TLSKey]
}
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
package gatewaysecrethandler
package gatewaysecret

import (
"context"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,16 +9,16 @@ import (
apimetav1 "k8s.io/apimachinery/pkg/apis/meta/v1"

"github.com/kyma-project/lifecycle-manager/api/shared"
gatewaysecrethandler "github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret"
"github.com/kyma-project/lifecycle-manager/pkg/util"
)

type Handler struct {
client gatewaysecrethandler.Client
parseLastModifiedTime gatewaysecrethandler.TimeParserFunc
client gatewaysecret.Client
parseLastModifiedTime gatewaysecret.TimeParserFunc
}

func NewGatewaySecretHandler(client gatewaysecrethandler.Client, timeParserFunc gatewaysecrethandler.TimeParserFunc) *Handler {
func NewGatewaySecretHandler(client gatewaysecret.Client, timeParserFunc gatewaysecret.TimeParserFunc) *Handler {
return &Handler{
client: client,
parseLastModifiedTime: timeParserFunc,
Expand Down Expand Up @@ -51,7 +51,7 @@ func (h *Handler) ManageGatewaySecret(ctx context.Context, rootSecret *apicorev1
func (h *Handler) createGatewaySecretFromRootSecret(ctx context.Context, rootSecret *apicorev1.Secret) error {
newSecret := &apicorev1.Secret{
TypeMeta: apimetav1.TypeMeta{
Kind: gatewaysecrethandler.SecretKind,
Kind: gatewaysecret.SecretKind,
APIVersion: apicorev1.SchemeGroupVersion.String(),
},
ObjectMeta: apimetav1.ObjectMeta{
Expand Down Expand Up @@ -88,7 +88,7 @@ func copyDataFromRootSecret(secret *apicorev1.Secret, rootSecret *apicorev1.Secr
if secret.Data == nil {
secret.Data = make(map[string][]byte)
}
secret.Data[gatewaysecrethandler.TLSCrt] = rootSecret.Data[gatewaysecrethandler.TLSCrt]
secret.Data[gatewaysecrethandler.TLSKey] = rootSecret.Data[gatewaysecrethandler.TLSKey]
secret.Data[gatewaysecrethandler.CACrt] = rootSecret.Data[gatewaysecrethandler.CACrt]
secret.Data[gatewaysecret.TLSCrt] = rootSecret.Data[gatewaysecret.TLSCrt]
secret.Data[gatewaysecret.TLSKey] = rootSecret.Data[gatewaysecret.TLSKey]
secret.Data[gatewaysecret.CACrt] = rootSecret.Data[gatewaysecret.CACrt]
}
Original file line number Diff line number Diff line change
Expand Up @@ -14,9 +14,9 @@ import (
apimetav1 "k8s.io/apimachinery/pkg/apis/meta/v1"

"github.com/kyma-project/lifecycle-manager/api/shared"
gatewaysecrethandler "github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler/legacy"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/handler/testutils"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/legacy"
"github.com/kyma-project/lifecycle-manager/internal/gatewaysecret/testutils"
)

func TestManageGatewaySecret_WhenGetGatewaySecretReturnsError_ReturnsError(t *testing.T) {
Expand Down Expand Up @@ -142,7 +142,7 @@ func TestManageGatewaySecret_WhenRequiresUpdate_UpdatesGatewaySecretWithRootSecr
}
mockClient.On("GetWatcherServingCert", mock.Anything).Return(cert, nil)
mockClient.On("UpdateGatewaySecret", mock.Anything, mock.Anything).Return(nil)
var mockFunc gatewaysecrethandler.TimeParserFunc = func(secret *apicorev1.Secret,
var mockFunc gatewaysecret.TimeParserFunc = func(secret *apicorev1.Secret,
annotation string,
) (time.Time, error) {
return time.Now(), nil
Expand Down Expand Up @@ -191,7 +191,7 @@ func TestManageGatewaySecret_WhenRequiresUpdate_UpdatesGatewaySecretWithUpdatedM
}
mockClient.On("GetWatcherServingCert", mock.Anything).Return(cert, nil)
mockClient.On("UpdateGatewaySecret", mock.Anything, mock.Anything).Return(nil)
var mockFunc gatewaysecrethandler.TimeParserFunc = func(secret *apicorev1.Secret,
var mockFunc gatewaysecret.TimeParserFunc = func(secret *apicorev1.Secret,
annotation string,
) (time.Time, error) {
return time.Now(), nil
Expand Down Expand Up @@ -230,7 +230,7 @@ func TestManageGatewaySecret_WhenRequiresUpdateAndUpdateFails_ReturnsError(t *te
mockClient.On("GetWatcherServingCert", mock.Anything).Return(cert, nil)
expectedError := errors.New("some-error")
mockClient.On("UpdateGatewaySecret", mock.Anything, mock.Anything).Return(expectedError)
var mockFunc gatewaysecrethandler.TimeParserFunc = func(secret *apicorev1.Secret,
var mockFunc gatewaysecret.TimeParserFunc = func(secret *apicorev1.Secret,
annotation string,
) (time.Time, error) {
return time.Now(), nil
Expand Down Expand Up @@ -260,7 +260,7 @@ func TestManageGatewaySecret_WhenRequiresUpdateIsFalse_DoesNotUpdateGatewaySecre
}
mockClient.On("GetWatcherServingCert", mock.Anything).Return(cert, nil)
mockClient.On("UpdateGatewaySecret", mock.Anything, mock.Anything).Return(nil)
var mockFunc gatewaysecrethandler.TimeParserFunc = func(secret *apicorev1.Secret,
var mockFunc gatewaysecret.TimeParserFunc = func(secret *apicorev1.Secret,
annotation string,
) (time.Time, error) {
return time.Now(), nil
Expand Down Expand Up @@ -288,7 +288,7 @@ func TestManageGatewaySecret_WhenTimeParserFuncReturnsError_UpdatesGatewaySecret
}
mockClient.On("GetWatcherServingCert", mock.Anything).Return(cert, nil)
mockClient.On("UpdateGatewaySecret", mock.Anything, mock.Anything).Return(nil)
var mockFunc gatewaysecrethandler.TimeParserFunc = func(secret *apicorev1.Secret,
var mockFunc gatewaysecret.TimeParserFunc = func(secret *apicorev1.Secret,
annotation string,
) (time.Time, error) {
return time.Time{}, errors.New("some-error")
Expand Down
2 changes: 1 addition & 1 deletion unit-test-coverage.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ packages:
internal/descriptor/cache: 92.3
internal/descriptor/provider: 66.7
internal/event: 100
internal/gatewaysecrethandler: 100
internal/gatewaysecret: 100
internal/manifest: 15.8
internal/manifest/statecheck: 71
internal/manifest/filemutex: 100
Expand Down

0 comments on commit a357a41

Please sign in to comment.