testing

package
v0.0.0-...-2b6ec56 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Nov 22, 2024 License: Apache-2.0 Imports: 15 Imported by: 0

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func CreateDummyKubeAPIPod

func CreateDummyKubeAPIPod(name, namespace string, nodeName string) *corev1.Pod

func CreateDummyKubeAPIPodInUnknownPhase

func CreateDummyKubeAPIPodInUnknownPhase(name, namespace string, nodeName string) *corev1.Pod

func CreateEncryptionCfgNoWriteKey

func CreateEncryptionCfgNoWriteKey(keyID string, keyBase64 string, resources ...string) *apiserverconfigv1.EncryptionConfiguration

func CreateEncryptionCfgNoWriteKeyMultipleReadKeys

func CreateEncryptionCfgNoWriteKeyMultipleReadKeys(keysResources []EncryptionKeysResourceTuple) *apiserverconfigv1.EncryptionConfiguration

func CreateEncryptionKeySecretNoData

func CreateEncryptionKeySecretNoData(targetNS string, grs []schema.GroupResource, keyID uint64) *corev1.Secret

func CreateEncryptionKeySecretNoDataWithMode

func CreateEncryptionKeySecretNoDataWithMode(targetNS string, grs []schema.GroupResource, keyID uint64, mode string) *corev1.Secret

func CreateEncryptionKeySecretWithKeyFromExistingSecret

func CreateEncryptionKeySecretWithKeyFromExistingSecret(targetNS string, grs []schema.GroupResource, keyID uint64, existingSecret *corev1.Secret) *corev1.Secret

func CreateEncryptionKeySecretWithKeyFromExistingSecretWithMode

func CreateEncryptionKeySecretWithKeyFromExistingSecretWithMode(targetNS string, grs []schema.GroupResource, keyID uint64, existingSecret *corev1.Secret, mode string) *corev1.Secret

func CreateEncryptionKeySecretWithRawKey

func CreateEncryptionKeySecretWithRawKey(targetNS string, grs []schema.GroupResource, keyID uint64, rawKey []byte) *corev1.Secret

func CreateEncryptionKeySecretWithRawKeyWithMode

func CreateEncryptionKeySecretWithRawKeyWithMode(targetNS string, grs []schema.GroupResource, keyID uint64, rawKey []byte, mode string) *corev1.Secret

func CreateExpiredMigratedEncryptionKeySecretWithRawKey

func CreateExpiredMigratedEncryptionKeySecretWithRawKey(targetNS string, grs []schema.GroupResource, keyID uint64, rawKey []byte) *corev1.Secret

func CreateMigratedEncryptionKeySecretWithRawKey

func CreateMigratedEncryptionKeySecretWithRawKey(targetNS string, grs []schema.GroupResource, keyID uint64, rawKey []byte, ts time.Time) *corev1.Secret

func ValidateActionsVerbs

func ValidateActionsVerbs(actualActions []clientgotesting.Action, expectedActions []string) error

func ValidateEncryptionKey

func ValidateEncryptionKey(secret *corev1.Secret) error

func ValidateOperatorClientConditions

func ValidateOperatorClientConditions(ts *testing.T, operatorClient v1helpers.OperatorClient, expectedConditions []operatorv1.OperatorCondition)

Types

type EncryptionKeysResourceTuple

type EncryptionKeysResourceTuple struct {
	Resource string
	Keys     []apiserverconfigv1.Key
	// an ordered list of an encryption modes thatch matches the keys
	// for example mode[0] matches keys[0]
	Modes []string
}

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL