55 "os"
66 "testing"
77
8- "github.com/stretchr/testify/assert"
98 "github.com/stretchr/testify/require"
109 "go.uber.org/mock/gomock"
1110 "go.uber.org/zap"
@@ -23,9 +22,9 @@ func TestLoadConfig(t *testing.T) {
2322 t .Parallel ()
2423
2524 cfg , err := d .LoadConfig (nil )
26- assert .Error (t , err )
27- assert .Equal (t , "no configProvider provided" , err .Error ())
28- assert .Equal (t , StackitDnsProviderConfig {}, cfg )
25+ require .Error (t , err )
26+ require .Equal (t , "no configProvider provided" , err .Error ())
27+ require .Equal (t , StackitDnsProviderConfig {}, cfg )
2928 })
3029
3130 t .Run ("valid cfgJSON" , func (t * testing.T ) {
@@ -34,50 +33,51 @@ func TestLoadConfig(t *testing.T) {
3433 rawCfg := & v1.JSON {Raw : []byte (`{"projectId":"test", "authTokenSecretNamespace": "test"}` )}
3534
3635 cfg , err := d .LoadConfig (rawCfg )
37- assert .NoError (t , err )
38- assert .Equal (t , "test" , cfg .ProjectId )
36+ require .NoError (t , err )
37+ require .Equal (t , "test" , cfg .ProjectId )
3938 })
4039
4140 t .Run ("not parsable cfgJSON" , func (t * testing.T ) {
4241 t .Parallel ()
4342
4443 rawCfg := & v1.JSON {Raw : []byte (`{"projectId":}` )}
4544 cfg , err := d .LoadConfig (rawCfg )
46- assert .Error (t , err )
47- assert .Contains (t , err .Error (), "error decoding solver configProvider" )
48- assert .Equal (t , StackitDnsProviderConfig {}, cfg )
45+ require .Error (t , err )
46+ require .Contains (t , err .Error (), "error decoding solver configProvider" )
47+ require .Equal (t , StackitDnsProviderConfig {}, cfg )
4948 })
5049
5150 t .Run ("invalid cfgJSON" , func (t * testing.T ) {
5251 t .Parallel ()
5352
5453 rawCfg := & v1.JSON {Raw : []byte (`{"projectId": ""}` )}
5554 cfg , err := d .LoadConfig (rawCfg )
56- assert .Error (t , err )
57- assert .Contains (t , err .Error (), "projectId must be specified" )
58- assert .Equal (t , StackitDnsProviderConfig {}, cfg )
55+ require .Error (t , err )
56+ require .Contains (t , err .Error (), "projectId must be specified" )
57+ require .Equal (t , StackitDnsProviderConfig {}, cfg )
5958 })
6059
6160 t .Run ("missing projectId" , func (t * testing.T ) {
6261 t .Parallel ()
6362
6463 rawCfg := & v1.JSON {Raw : []byte (`{}` )}
6564 cfg , err := d .LoadConfig (rawCfg )
66- assert .Error (t , err )
67- assert .Equal (t , "projectId must be specified" , err .Error ())
68- assert .Equal (t , StackitDnsProviderConfig {}, cfg )
65+ require .Error (t , err )
66+ require .Equal (t , "projectId must be specified" , err .Error ())
67+ require .Equal (t , StackitDnsProviderConfig {}, cfg )
6968 })
7069
7170 t .Run ("default values set" , func (t * testing.T ) {
7271 t .Parallel ()
7372
7473 rawCfg := & v1.JSON {Raw : []byte (`{"projectId":"test", "authTokenSecretNamespace": "test"}` )} // Only projectId provided
7574 cfg , err := d .LoadConfig (rawCfg )
76- assert .NoError (t , err )
77- assert .Equal (t , "test" , cfg .ProjectId )
78- assert .Equal (t , "https://dns.api.stackit.cloud" , cfg .ApiBasePath )
79- assert .Equal (t , "stackit-cert-manager-webhook" , cfg .AuthTokenSecretRef )
80- assert .Equal (t , "auth-token" , cfg .AuthTokenSecretKey )
75+ require .NoError (t , err )
76+ require .Equal (t , "test" , cfg .ProjectId )
77+ require .Equal (t , "https://dns.api.stackit.cloud" , cfg .ApiBasePath )
78+ require .Equal (t , "stackit-cert-manager-webhook" , cfg .AuthTokenSecretRef )
79+ require .Equal (t , "auth-token" , cfg .AuthTokenSecretKey )
80+ require .Equal (t , int64 (600 ), cfg .AcmeTxtRecordTTL )
8181 })
8282}
8383
@@ -95,17 +95,17 @@ func TestDefaultConfigProvider_LoadConfigNamespaceFile(t *testing.T) {
9595 rawCfg := & v1.JSON {Raw : []byte (`{"projectId":"test"}` )}
9696
9797 f , err := os .CreateTemp ("" , "example" )
98- assert .NoError (t , err )
98+ require .NoError (t , err )
9999 defer os .Remove (f .Name ())
100100 _ , err = f .Write ([]byte ("test-namespace" ))
101- assert .NoError (t , err )
101+ require .NoError (t , err )
102102 err = f .Close ()
103- assert .NoError (t , err )
103+ require .NoError (t , err )
104104
105105 dcp := defaultConfigProvider {fileNamespaceName : f .Name ()}
106106 cfg , err := dcp .LoadConfig (rawCfg )
107- assert .NoError (t , err )
108- assert .Equal (t , "test-namespace" , cfg .AuthTokenSecretNamespace )
107+ require .NoError (t , err )
108+ require .Equal (t , "test-namespace" , cfg .AuthTokenSecretNamespace )
109109 })
110110
111111 t .Run ("fail determine namespace from file, no content" , func (t * testing.T ) {
@@ -114,17 +114,17 @@ func TestDefaultConfigProvider_LoadConfigNamespaceFile(t *testing.T) {
114114 rawCfg := & v1.JSON {Raw : []byte (`{"projectId":"test"}` )}
115115
116116 f , err := os .CreateTemp ("" , "example" )
117- assert .NoError (t , err )
117+ require .NoError (t , err )
118118 defer os .Remove (f .Name ())
119119 _ , err = f .Write ([]byte ("" ))
120- assert .NoError (t , err )
120+ require .NoError (t , err )
121121 err = f .Close ()
122- assert .NoError (t , err )
122+ require .NoError (t , err )
123123
124124 dcp := defaultConfigProvider {fileNamespaceName : f .Name ()}
125125 _ , err = dcp .LoadConfig (rawCfg )
126- assert .Error (t , err )
127- assert .Contains (t , err .Error (), "invalid webhook pod namespace provided" )
126+ require .Error (t , err )
127+ require .Contains (t , err .Error (), "invalid webhook pod namespace provided" )
128128 })
129129
130130 t .Run ("fail to determine namespace from file" , func (t * testing.T ) {
@@ -133,8 +133,8 @@ func TestDefaultConfigProvider_LoadConfigNamespaceFile(t *testing.T) {
133133 rawCfg := & v1.JSON {Raw : []byte (`{"projectId":"test"}` )}
134134
135135 _ , err := d .LoadConfig (rawCfg )
136- assert .Error (t , err )
137- assert .Contains (t , err .Error (), "failed to find the webhook pod namespace" )
136+ require .Error (t , err )
137+ require .Contains (t , err .Error (), "failed to find the webhook pod namespace" )
138138 })
139139}
140140
@@ -157,7 +157,6 @@ func TestGetRepositoryConfig_WithSaKeyPath(t *testing.T) {
157157 }
158158
159159 config , err := r .getRepositoryConfig (cfg )
160-
161160 require .NoError (t , err )
162161 require .Equal (t , saKeyPath , config .SaKeyPath )
163162 require .True (t , config .UseSaKey )
0 commit comments