@@ -112,25 +112,25 @@ func TestValidateMachineScopeParams(t *testing.T) {
112
112
func TestMachineScopeAddFinalizer (t * testing.T ) {
113
113
t .Parallel ()
114
114
115
- NewTestSuite (mock.MockK8sClient {}).Run (context . Background (), t , Paths (
116
- Call ("scheme 1" , func (ctx context.Context , m Mock ) {
117
- m .K8sClient .EXPECT ().Scheme ().DoAndReturn (func () * runtime.Scheme {
115
+ NewTestSuite (t , mock.MockK8sClient {}).Run (Paths (
116
+ Call ("scheme 1" , func (ctx context.Context , mck Mock ) {
117
+ mck .K8sClient .EXPECT ().Scheme ().DoAndReturn (func () * runtime.Scheme {
118
118
s := runtime .NewScheme ()
119
119
infrav1alpha1 .AddToScheme (s )
120
120
return s
121
121
})
122
122
}),
123
123
Either (
124
- Call ("scheme 2" , func (ctx context.Context , m Mock ) {
125
- m .K8sClient .EXPECT ().Scheme ().DoAndReturn (func () * runtime.Scheme {
124
+ Call ("scheme 2" , func (ctx context.Context , mck Mock ) {
125
+ mck .K8sClient .EXPECT ().Scheme ().DoAndReturn (func () * runtime.Scheme {
126
126
s := runtime .NewScheme ()
127
127
infrav1alpha1 .AddToScheme (s )
128
128
return s
129
129
})
130
130
}),
131
- Result ("has finalizer" , func (ctx context.Context , m Mock ) {
131
+ Result ("has finalizer" , func (ctx context.Context , mck Mock ) {
132
132
mScope , err := NewMachineScope (ctx , "token" , MachineScopeParams {
133
- Client : m .K8sClient ,
133
+ Client : mck .K8sClient ,
134
134
Cluster : & clusterv1.Cluster {},
135
135
Machine : & clusterv1.Machine {},
136
136
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -147,13 +147,13 @@ func TestMachineScopeAddFinalizer(t *testing.T) {
147
147
}),
148
148
),
149
149
Either (
150
- Case (
151
- Call ("able to patch" , func (ctx context.Context , m Mock ) {
152
- m .K8sClient .EXPECT ().Patch (ctx , gomock .Any (), gomock .Any ()).Return (nil )
150
+ Path (
151
+ Call ("able to patch" , func (ctx context.Context , mck Mock ) {
152
+ mck .K8sClient .EXPECT ().Patch (ctx , gomock .Any (), gomock .Any ()).Return (nil )
153
153
}),
154
- Result ("finalizer added" , func (ctx context.Context , m Mock ) {
154
+ Result ("finalizer added" , func (ctx context.Context , mck Mock ) {
155
155
mScope , err := NewMachineScope (ctx , "token" , MachineScopeParams {
156
- Client : m .K8sClient ,
156
+ Client : mck .K8sClient ,
157
157
Cluster : & clusterv1.Cluster {},
158
158
Machine : & clusterv1.Machine {},
159
159
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -165,13 +165,13 @@ func TestMachineScopeAddFinalizer(t *testing.T) {
165
165
assert .Equal (t , mScope .LinodeMachine .Finalizers [0 ], infrav1alpha1 .GroupVersion .String ())
166
166
}),
167
167
),
168
- Case (
169
- Call ("unable to patch" , func (ctx context.Context , m Mock ) {
170
- m .K8sClient .EXPECT ().Patch (ctx , gomock .Any (), gomock .Any ()).Return (errors .New ("fail" ))
168
+ Path (
169
+ Call ("unable to patch" , func (ctx context.Context , mck Mock ) {
170
+ mck .K8sClient .EXPECT ().Patch (ctx , gomock .Any (), gomock .Any ()).Return (errors .New ("fail" ))
171
171
}),
172
- Result ("error" , func (ctx context.Context , m Mock ) {
172
+ Result ("error" , func (ctx context.Context , mck Mock ) {
173
173
mScope , err := NewMachineScope (ctx , "token" , MachineScopeParams {
174
- Client : m .K8sClient ,
174
+ Client : mck .K8sClient ,
175
175
Cluster : & clusterv1.Cluster {},
176
176
Machine : & clusterv1.Machine {},
177
177
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -189,16 +189,16 @@ func TestMachineScopeAddFinalizer(t *testing.T) {
189
189
func TestNewMachineScope (t * testing.T ) {
190
190
t .Parallel ()
191
191
192
- NewTestSuite (mock.MockK8sClient {}).Run (context . Background (), t , Paths (
192
+ NewTestSuite (t , mock.MockK8sClient {}).Run (Paths (
193
193
Either (
194
- Result ("invalid params" , func (ctx context.Context , m Mock ) {
194
+ Result ("invalid params" , func (ctx context.Context , mck Mock ) {
195
195
mScope , err := NewMachineScope (ctx , "token" , MachineScopeParams {})
196
196
require .ErrorContains (t , err , "is required" )
197
197
assert .Nil (t , mScope )
198
198
}),
199
- Result ("no token" , func (ctx context.Context , m Mock ) {
199
+ Result ("no token" , func (ctx context.Context , mck Mock ) {
200
200
mScope , err := NewMachineScope (ctx , "" , MachineScopeParams {
201
- Client : m .K8sClient ,
201
+ Client : mck .K8sClient ,
202
202
Cluster : & clusterv1.Cluster {},
203
203
Machine : & clusterv1.Machine {},
204
204
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -207,13 +207,13 @@ func TestNewMachineScope(t *testing.T) {
207
207
require .ErrorContains (t , err , "failed to create linode client" )
208
208
assert .Nil (t , mScope )
209
209
}),
210
- Case (
211
- Call ("no secret" , func (ctx context.Context , m Mock ) {
212
- m .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).Return (apierrors .NewNotFound (schema.GroupResource {}, "example" ))
210
+ Path (
211
+ Call ("no secret" , func (ctx context.Context , mck Mock ) {
212
+ mck .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).Return (apierrors .NewNotFound (schema.GroupResource {}, "example" ))
213
213
}),
214
- Result ("error" , func (ctx context.Context , m Mock ) {
214
+ Result ("error" , func (ctx context.Context , mck Mock ) {
215
215
mScope , err := NewMachineScope (ctx , "" , MachineScopeParams {
216
- Client : m .K8sClient ,
216
+ Client : mck .K8sClient ,
217
217
Cluster : & clusterv1.Cluster {},
218
218
Machine : & clusterv1.Machine {},
219
219
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -232,20 +232,20 @@ func TestNewMachineScope(t *testing.T) {
232
232
),
233
233
),
234
234
Either (
235
- Call ("valid scheme" , func (ctx context.Context , m Mock ) {
236
- m .K8sClient .EXPECT ().Scheme ().DoAndReturn (func () * runtime.Scheme {
235
+ Call ("valid scheme" , func (ctx context.Context , mck Mock ) {
236
+ mck .K8sClient .EXPECT ().Scheme ().DoAndReturn (func () * runtime.Scheme {
237
237
s := runtime .NewScheme ()
238
238
infrav1alpha1 .AddToScheme (s )
239
239
return s
240
240
})
241
241
}),
242
- Case (
243
- Call ("invalid scheme" , func (ctx context.Context , m Mock ) {
244
- m .K8sClient .EXPECT ().Scheme ().Return (runtime .NewScheme ())
242
+ Path (
243
+ Call ("invalid scheme" , func (ctx context.Context , mck Mock ) {
244
+ mck .K8sClient .EXPECT ().Scheme ().Return (runtime .NewScheme ())
245
245
}),
246
- Result ("cannot init patch helper" , func (ctx context.Context , m Mock ) {
246
+ Result ("cannot init patch helper" , func (ctx context.Context , mck Mock ) {
247
247
mScope , err := NewMachineScope (ctx , "token" , MachineScopeParams {
248
- Client : m .K8sClient ,
248
+ Client : mck .K8sClient ,
249
249
Cluster : & clusterv1.Cluster {},
250
250
Machine : & clusterv1.Machine {},
251
251
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -257,8 +257,8 @@ func TestNewMachineScope(t *testing.T) {
257
257
),
258
258
),
259
259
Either (
260
- Call ("credentials in secret" , func (ctx context.Context , m Mock ) {
261
- m .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
260
+ Call ("credentials in secret" , func (ctx context.Context , mck Mock ) {
261
+ mck .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
262
262
DoAndReturn (func (ctx context.Context , key client.ObjectKey , obj * corev1.Secret , opts ... client.GetOption ) error {
263
263
* obj = corev1.Secret {
264
264
Data : map [string ][]byte {
@@ -268,9 +268,9 @@ func TestNewMachineScope(t *testing.T) {
268
268
return nil
269
269
})
270
270
}),
271
- Result ("default credentials" , func (ctx context.Context , m Mock ) {
271
+ Result ("default credentials" , func (ctx context.Context , mck Mock ) {
272
272
mScope , err := NewMachineScope (ctx , "token" , MachineScopeParams {
273
- Client : m .K8sClient ,
273
+ Client : mck .K8sClient ,
274
274
Cluster : & clusterv1.Cluster {},
275
275
Machine : & clusterv1.Machine {},
276
276
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -281,9 +281,9 @@ func TestNewMachineScope(t *testing.T) {
281
281
}),
282
282
),
283
283
Either (
284
- Result ("credentials from LinodeMachine credentialsRef" , func (ctx context.Context , m Mock ) {
284
+ Result ("credentials from LinodeMachine credentialsRef" , func (ctx context.Context , mck Mock ) {
285
285
mScope , err := NewMachineScope (ctx , "" , MachineScopeParams {
286
- Client : m .K8sClient ,
286
+ Client : mck .K8sClient ,
287
287
Cluster : & clusterv1.Cluster {},
288
288
Machine : & clusterv1.Machine {},
289
289
LinodeCluster : & infrav1alpha1.LinodeCluster {},
@@ -299,9 +299,9 @@ func TestNewMachineScope(t *testing.T) {
299
299
require .NoError (t , err )
300
300
assert .NotNil (t , mScope )
301
301
}),
302
- Result ("credentials from LinodeCluster credentialsRef" , func (ctx context.Context , m Mock ) {
302
+ Result ("credentials from LinodeCluster credentialsRef" , func (ctx context.Context , mck Mock ) {
303
303
mScope , err := NewMachineScope (ctx , "token" , MachineScopeParams {
304
- Client : m .K8sClient ,
304
+ Client : mck .K8sClient ,
305
305
Cluster : & clusterv1.Cluster {},
306
306
Machine : & clusterv1.Machine {},
307
307
LinodeCluster : & infrav1alpha1.LinodeCluster {
@@ -324,18 +324,18 @@ func TestNewMachineScope(t *testing.T) {
324
324
func TestMachineScopeGetBootstrapData (t * testing.T ) {
325
325
t .Parallel ()
326
326
327
- NewTestSuite (mock.MockK8sClient {}).Run (context . Background (), t , Paths (
328
- Call ("able to get secret" , func (ctx context.Context , m Mock ) {
329
- m .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
327
+ NewTestSuite (t , mock.MockK8sClient {}).Run (Paths (
328
+ Call ("able to get secret" , func (ctx context.Context , mck Mock ) {
329
+ mck .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
330
330
DoAndReturn (func (ctx context.Context , key client.ObjectKey , obj * corev1.Secret , opts ... client.GetOption ) error {
331
331
secret := corev1.Secret {Data : map [string ][]byte {"value" : []byte ("test-data" )}}
332
332
* obj = secret
333
333
return nil
334
334
})
335
335
}),
336
- Result ("success" , func (ctx context.Context , m Mock ) {
336
+ Result ("success" , func (ctx context.Context , mck Mock ) {
337
337
mScope := MachineScope {
338
- Client : m .K8sClient ,
338
+ Client : mck .K8sClient ,
339
339
Machine : & clusterv1.Machine {
340
340
Spec : clusterv1.MachineSpec {
341
341
Bootstrap : clusterv1.Bootstrap {
@@ -351,20 +351,20 @@ func TestMachineScopeGetBootstrapData(t *testing.T) {
351
351
assert .Equal (t , data , []byte ("test-data" ))
352
352
}),
353
353
Either (
354
- Call ("unable to get secret" , func (ctx context.Context , m Mock ) {
355
- m .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
354
+ Call ("unable to get secret" , func (ctx context.Context , mck Mock ) {
355
+ mck .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
356
356
Return (apierrors .NewNotFound (schema.GroupResource {}, "test-data" ))
357
357
}),
358
- Call ("secret is missing data" , func (ctx context.Context , m Mock ) {
359
- m .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
358
+ Call ("secret is missing data" , func (ctx context.Context , mck Mock ) {
359
+ mck .K8sClient .EXPECT ().Get (ctx , gomock .Any (), gomock .Any ()).
360
360
DoAndReturn (func (ctx context.Context , key client.ObjectKey , obj * corev1.Secret , opts ... client.GetOption ) error {
361
361
* obj = corev1.Secret {}
362
362
return nil
363
363
})
364
364
}),
365
- Result ("secret ref missing" , func (ctx context.Context , m Mock ) {
365
+ Result ("secret ref missing" , func (ctx context.Context , mck Mock ) {
366
366
mScope := MachineScope {
367
- Client : m .K8sClient ,
367
+ Client : mck .K8sClient ,
368
368
Machine : & clusterv1.Machine {},
369
369
LinodeMachine : & infrav1alpha1.LinodeMachine {},
370
370
}
@@ -374,9 +374,9 @@ func TestMachineScopeGetBootstrapData(t *testing.T) {
374
374
assert .Empty (t , data )
375
375
}),
376
376
),
377
- Result ("error" , func (ctx context.Context , m Mock ) {
377
+ Result ("error" , func (ctx context.Context , mck Mock ) {
378
378
mScope := MachineScope {
379
- Client : m .K8sClient ,
379
+ Client : mck .K8sClient ,
380
380
Machine : & clusterv1.Machine {
381
381
Spec : clusterv1.MachineSpec {
382
382
Bootstrap : clusterv1.Bootstrap {
0 commit comments