mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-09-14 21:53:52 +00:00
Fixing federation secret controller unit test flakiness
This commit is contained in:
@@ -127,6 +127,12 @@ func TestSecretController(t *testing.T) {
|
|||||||
assert.Equal(t, secret1.Namespace, updatedSecret.Namespace)
|
assert.Equal(t, secret1.Namespace, updatedSecret.Namespace)
|
||||||
assert.True(t, secretsEqual(secret1, *updatedSecret),
|
assert.True(t, secretsEqual(secret1, *updatedSecret),
|
||||||
fmt.Sprintf("expected: %v, actual: %v", secret1, *updatedSecret))
|
fmt.Sprintf("expected: %v, actual: %v", secret1, *updatedSecret))
|
||||||
|
// Wait for the secret to be updated in the informer store.
|
||||||
|
err = WaitForSecretStoreUpdate(
|
||||||
|
secretController.secretFederatedInformer.GetTargetStore(),
|
||||||
|
cluster1.Name, types.NamespacedName{Namespace: secret1.Namespace, Name: secret1.Name}.String(),
|
||||||
|
updatedSecret, wait.ForeverTestTimeout)
|
||||||
|
assert.Nil(t, err, "secret should have been updated in the informer store")
|
||||||
|
|
||||||
// Test update federated secret.
|
// Test update federated secret.
|
||||||
secret1.Data = map[string][]byte{
|
secret1.Data = map[string][]byte{
|
||||||
@@ -134,8 +140,8 @@ func TestSecretController(t *testing.T) {
|
|||||||
}
|
}
|
||||||
secretWatch.Modify(&secret1)
|
secretWatch.Modify(&secret1)
|
||||||
updatedSecret2 := GetSecretFromChan(cluster1UpdateChan)
|
updatedSecret2 := GetSecretFromChan(cluster1UpdateChan)
|
||||||
assert.NotNil(t, updatedSecret)
|
assert.NotNil(t, updatedSecret2)
|
||||||
assert.Equal(t, secret1.Name, updatedSecret.Name)
|
assert.Equal(t, secret1.Name, updatedSecret2.Name)
|
||||||
assert.Equal(t, secret1.Namespace, updatedSecret.Namespace)
|
assert.Equal(t, secret1.Namespace, updatedSecret.Namespace)
|
||||||
assert.True(t, secretsEqual(secret1, *updatedSecret2),
|
assert.True(t, secretsEqual(secret1, *updatedSecret2),
|
||||||
fmt.Sprintf("expected: %v, actual: %v", secret1, *updatedSecret2))
|
fmt.Sprintf("expected: %v, actual: %v", secret1, *updatedSecret2))
|
||||||
@@ -171,3 +177,17 @@ func GetSecretFromChan(c chan runtime.Object) *api_v1.Secret {
|
|||||||
secret := GetObjectFromChan(c).(*api_v1.Secret)
|
secret := GetObjectFromChan(c).(*api_v1.Secret)
|
||||||
return secret
|
return secret
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Wait till the store is updated with latest secret.
|
||||||
|
func WaitForSecretStoreUpdate(store util.FederatedReadOnlyStore, clusterName, key string, desiredSecret *api_v1.Secret, timeout time.Duration) error {
|
||||||
|
retryInterval := 100 * time.Millisecond
|
||||||
|
err := wait.PollImmediate(retryInterval, timeout, func() (bool, error) {
|
||||||
|
obj, found, err := store.GetByKey(clusterName, key)
|
||||||
|
if !found || err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
equal := secretsEqual(*obj.(*api_v1.Secret), *desiredSecret)
|
||||||
|
return equal, err
|
||||||
|
})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
Reference in New Issue
Block a user