|
7 | 7 | "testing" |
8 | 8 | "time" |
9 | 9 |
|
10 | | - "k8s.io/api/core/v1" |
| 10 | + v1 "k8s.io/api/core/v1" |
11 | 11 | metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" |
12 | 12 | "k8s.io/apimachinery/pkg/runtime" |
13 | 13 | "k8s.io/apimachinery/pkg/watch" |
|
28 | 28 | ObjectMeta: metav1.ObjectMeta{Name: registryName, Namespace: registryNamespace}, |
29 | 29 | Spec: v1.ServiceSpec{ |
30 | 30 | ClusterIP: "172.16.123.123", |
31 | | - Ports: []v1.ServicePort{{Port: 1235}}, |
| 31 | + Ports: []v1.ServicePort{{Port: 443}}, |
32 | 32 | }, |
33 | 33 | } |
34 | 34 | ) |
@@ -182,7 +182,14 @@ func TestUpdateNewStyleSecretAndDNSSuffixAndAdditionalURLs(t *testing.T) { |
182 | 182 | } |
183 | 183 |
|
184 | 184 | expectedDockercfgMap := credentialprovider.DockerConfig{} |
185 | | - for _, key := range []string{"foo.bar.com", "172.16.123.123:1235", "docker-registry.default.svc:1235", "docker-registry.default.svc.something.else:1235"} { |
| 185 | + expectedLocations := []string{"foo.bar.com", |
| 186 | + "172.16.123.123:443", |
| 187 | + "172.16.123.123", |
| 188 | + "docker-registry.default.svc:443", |
| 189 | + "docker-registry.default.svc", |
| 190 | + "docker-registry.default.svc.something.else:443", |
| 191 | + "docker-registry.default.svc.something.else"} |
| 192 | + for _, key := range expectedLocations { |
186 | 193 | expectedDockercfgMap[key] = credentialprovider.DockerConfigEntry{ |
187 | 194 | Username: "serviceaccount", |
188 | 195 | Password: newStyleDockercfgSecret.Annotations[ServiceAccountTokenValueAnnotation], |
@@ -271,7 +278,12 @@ func TestUpdateOldStyleSecretWithKey(t *testing.T) { |
271 | 278 | } |
272 | 279 |
|
273 | 280 | expectedDockercfgMap := credentialprovider.DockerConfig{} |
274 | | - for _, key := range []string{"172.16.123.123:1235", "docker-registry.default.svc:1235"} { |
| 281 | + expectedLocations := []string{ |
| 282 | + "172.16.123.123:443", |
| 283 | + "172.16.123.123", |
| 284 | + "docker-registry.default.svc:443", |
| 285 | + "docker-registry.default.svc"} |
| 286 | + for _, key := range expectedLocations { |
275 | 287 | expectedDockercfgMap[key] = credentialprovider.DockerConfigEntry{ |
276 | 288 | Username: "serviceaccount", |
277 | 289 | Password: "token-value", |
@@ -362,7 +374,12 @@ func TestUpdateOldStyleSecretWithoutKey(t *testing.T) { |
362 | 374 | } |
363 | 375 |
|
364 | 376 | expectedDockercfgMap := credentialprovider.DockerConfig{} |
365 | | - for _, key := range []string{"172.16.123.123:1235", "docker-registry.default.svc:1235"} { |
| 377 | + expectedLocations := []string{ |
| 378 | + "172.16.123.123:443", |
| 379 | + "172.16.123.123", |
| 380 | + "docker-registry.default.svc:443", |
| 381 | + "docker-registry.default.svc"} |
| 382 | + for _, key := range expectedLocations { |
366 | 383 | expectedDockercfgMap[key] = credentialprovider.DockerConfigEntry{ |
367 | 384 | Username: "serviceaccount", |
368 | 385 | Password: "the-sa-bearer-token", |
@@ -496,7 +513,12 @@ func TestClearSecretAndRecreate(t *testing.T) { |
496 | 513 | } |
497 | 514 |
|
498 | 515 | expectedDockercfgMap := credentialprovider.DockerConfig{} |
499 | | - for _, key := range []string{"172.16.123.123:1235", "docker-registry.default.svc:1235"} { |
| 516 | + expectedLocations := []string{ |
| 517 | + "172.16.123.123:443", |
| 518 | + "172.16.123.123", |
| 519 | + "docker-registry.default.svc:443", |
| 520 | + "docker-registry.default.svc"} |
| 521 | + for _, key := range expectedLocations { |
500 | 522 | expectedDockercfgMap[key] = credentialprovider.DockerConfigEntry{ |
501 | 523 | Username: "serviceaccount", |
502 | 524 | Password: "the-token", |
|
0 commit comments